Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Continuous and Efficient Cooperative Trust Management for Resilient CCAM

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Distributed Processing and CCAM Trust Functions Offloading & Data Space Modelling (opens in new window)

State-of-the-art analysis of the most prominent orchestration and offloading techniques, within the MEC-Enhanced vehicular context, so as to identify those approaches that are most suitable for further investigation when it comes to assessing the feasibility and executing a trust calculation offloading action. Furthermore, this deliverable will document the data model, of the CONNECT VCs, by enhancing the standardized W3C model to also capture the required features of the target CCAM ecosystem.

Dissemination, Communication, Clustering and Exploitation activities (opens in new window)

Documentation on the dissemination, communication, clustering, standardization, and exploitation activities. Highlighting open-source contributions and workshop organization activities. First version will be submitted in M18. Second version will be submitted in M36 and will exclude exploitation measures which will be included within Deliverable 7.3.

Project Quality Plan (opens in new window)

A set of project templates, project management, review and internal quality control processes, and Open Science practices. The second part of D1.2, the Risk Assessment Plan, shows how potential risks are assessed and mitigated.

Operational Landscape, Requirements and Reference Architecture - Initial Version (opens in new window)

Documentation of CONNET requirements (T2.1), CCAM services positioning (T2.2), first version of the overall Reference Architecture (T2.4), and first version of the ethical analysis (T2.3) on the measures of evidence to be considered during the CONNECT trust assessment & the type of system properties (T2.5) that can be attested.

Plan for Dissemination and Exploitation incl. Communication (opens in new window)

Documentation on T7.1 and on the planned dissemination, exploitation and communication activities.

Architectural Specification of CONNECT Trust Assessment Framework, Operation and (opens in new window)

Documentation of CONNECT Trust Assessment architecture & methodology (T3.1-3).

Distributed Processing, Fast Offloading and MEC-enabled Orchestrator (opens in new window)

Documentation on the policy modelling and decision making for managing the offloading policies. This deliverable also provides the 1st release of the MEC-enabled CONNECT Orchestrator as well as the VCs for the continuous authorization, authentication and secure communication between CCAM actors.

Conceptual architecture of Customizable TEE and Attestation Models Specifications (opens in new window)

Report on the progress of T4.1-3 on blueprinting the architecture of the customisable TEE Guard and all envisioned functionalities alongside the methodology for enforcing runtime behavioural attestation.

CONNECT Trust & Risk Assessment and CAD Twinning Framework (Initial Version) (opens in new window)

Early release of CONNECT Trust Assessment framework with its internal Risk Assessment engine and first release of the Digital Twin component for the real-time offloading of the trust calculations.

Virtualization- and Edge-based Security and Trust Extensions (First Release) (opens in new window)

Early release of the CONNECT Guard and TC-enabled DTs leveraging root-of-trust capabilities of the TEE-enabled connector for enabling the provision of implemented attestation enablers (T4.3) & runtime monitors (T4.4), including details on the implementation of the Secret Sharing scheme (T4.2).

Publications

Hash-Based Direct Anonymous Attestation (opens in new window)

Author(s): Liqun Chen; Changyu Dong; Nada El Kassem; Christopher J. P. Newton; Yalan Wang
Published in: Post-Quantum Cryptography (PQCrypto 2023), 2024, ISBN 978-3-031-40003-2
Publisher: Springer
DOI: 10.1007/978-3-031-40003-2_21

WIP: A Trust Assessment Method for In-Vehicular Networks using Vehicle Risk Assessment (opens in new window)

Author(s): Artur Hermann, Natasa Trkulja, Anderson Ramon Ferraz de Lucena, Alexander Kiening, Ana Petrovska, Frank Kargl
Published in: VehicleSec 2024, 2024, ISBN 979-8-9894372-7-6
Publisher: NDSS
DOI: 10.14722/vehiclesec.2024.23016

GenSUMO: GenAI-Creation of Critical Scenarios for Autonomous Vehicle Testing

Author(s): S. Angelini, D. Gasco, C.Casetti
Published in: IEEE CCNC 2025, 2024
Publisher: IEEE

A Real-time Implementation of an Edge-Assisted Collision Warning System for Urban Intersections (opens in new window)

Author(s): Christian Vitale; Panagiotis Kardaras; Panayiotis Kolios; Carla Fabiana Chiasserini; Georgios Ellinas
Published in: 2025 IEEE Vehicular Networking Conference (VNC), 2025
DOI: 10.1109/VNC64509.2025.11054200

MS-VAN3T-CARLA: An Open-Source Co-Simulation Framework for Cooperative Perception Evaluation (opens in new window)

Author(s): Risma Carletti, Carlos Mateo; Casetti, Claudio; Härri, Jérôme; Risso, Fulvio
Published in: 2024 19th Wireless On-Demand Network Systems and Services Conference (WONS), 2024
Publisher: IEEE
DOI: 10.23919/WONS60642.2024.10449533

On Enhancing Intersection Applications With Misbehavior Detection and Mitigation (opens in new window)

Author(s): Zhang, Jiahao; Liu, Ziyi; Jemaa, Ines; Bassi, Francesca; Nashashibi, Fawzi
Published in: 2024 IEEE 100th Vehicular Technology Conference (VTC2024-Fall), 2024
Publisher: IEEE
DOI: 10.1109/VTC2024-FALL63153.2024.10757840

Edge-assisted ML-aided Uncertainty-aware Vehicle Collision Avoidance at Urban Intersections (opens in new window)

Author(s): Dinesh Cyril Selvaraj, Christian Vitale, Tania Panayiotou, Panayiotis Kolios, Carla Fabiana Chiasserini, Georgios Ellinas
Published in: IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2023, ISSN 2379-8904
Publisher: IEEE
DOI: 10.48550/arXiv.2404.14523

In-vehicle Trust Assessment Framework (opens in new window)

Author(s): Nataša Trkulja, Artur Hermann, Ana Petrovska, Alexander Kiening, Anderson Ramon Ferraz de Lucena, Frank Kargl
Published in: 21th ESCAR Europe 2023, 2023
Publisher: Ruhr-Universität Bochum
DOI: 10.13154/294-10384

OScar: An ETSI -Compliant C- ITS Stack for Field- Testing with Embedded Hardware Devices (opens in new window)

Author(s): Marco Rapelli, Francesco Raviglione, Claudio Casetti
Published in: 2024 22nd Mediterranean Communication and Computer Networking Conference (MedComNet), 2024
Publisher: IEEE
DOI: 10.1109/MEDCOMNET62012.2024.10578207

Comparative Evaluation of PKI and DAA-based Architectures for V2X Communication Security (opens in new window)

Author(s): Angelogianni Anna; Krontiris Ioannis; Giannetsos Thanassis
Published in: 2023 IEEE Vehicular Networking Conference (VNC), 2023, ISSN 2157-9865
Publisher: IEEE
DOI: 10.1109/VNC57357.2023.10136316

ETSI-Compliant Protection of Connected Vulnerable Road Users: Simulation and Field Trial (opens in new window)

Author(s): Alessandro Genovese, Marco Rapelli, Francesco Raviglione, Claudio Casetti
Published in: 2024 IEEE Vehicular Networking Conference (VNC), 2024
Publisher: IEEE
DOI: 10.1109/VNC61989.2024.10576014

Maneuver Coordination Using V2I to Improve Traffic Efficiency at Intersections (opens in new window)

Author(s): Lorenzo Farina, Marco Rapelli, Barbara Maví Masini, Claudio Casetti, Alessandro Bazzi
Published in: 2024 IEEE Vehicular Networking Conference (VNC), 2024
Publisher: IEEE
DOI: 10.1109/VNC61989.2024.10575944

Securing Cooperative Intersection Management through Subjective Trust Networks (opens in new window)

Author(s): Frank Kargl, Nataša Trkulja, Artur Hermann, Florian Sommer, Anderson Ramon Ferraz de Lucena, Alexander Kiening, Sergej Japs
Published in: 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), 2023, ISSN 2577-2465
Publisher: IEEE
DOI: 10.1109/VTC2023-Spring57618.2023.10200789

Philosophy & Technology (opens in new window)

Author(s): Chirag Arora
Published in: Philosophy & Technology, 2024, ISSN 2210-5433
Publisher: Springer
DOI: 10.1007/S13347-024-00703-5

AI/ML-based services and applications for 6G-connected and autonomous vehicles (opens in new window)

Author(s): Claudio Casetti, Carla Fabiana Chiasserini, Falko Dressler, Agon Memedi, Diego Gasco, Elad Michael Schiller
Published in: Computer Networks, Issue 255, 2024, ISSN 1389-1286
Publisher: Elsevier BV
DOI: 10.1016/J.COMNET.2024.110854

The Internet of Vehicles (IoV) — Security, Privacy, Trust, and Reputation Management for Connected Vehicles (opens in new window)

Author(s): Drobot, Adam; Zhang, Tao; Buonarosa, Mary Lynn; Kargl, Frank; Schwinke, Steve; Sikdar, Biplab
Published in: IEEE Internet of Things Magazine, 2023, ISSN 2576-3199
Publisher: IEEE
DOI: 10.1109/MIOT.2023.10145018

How To Bind A TPM’s Attestation Keys With Its Endorsement Key (opens in new window)

Author(s): Chen, Liqun; El Kassem, Nada; Newton, Christopher J P
Published in: The Computer Journal, 2023, ISSN 1460-2067
Publisher: Oxford Academic
DOI: 10.1093/COMJNL/BXAD037

S-LDM: Server Local Dynamic Map for 5G-based Centralized Enhanced Collective Perception (opens in new window)

Author(s): Carlos Mateo Risma Carletti, Francesco Raviglione, Claudio Casetti, Filippo Stoffella, Girma Mamuye Yilma, Filippo Visintainer
Published in: Journal Vehicular Communication, 2023, ISSN 2577-2465
Publisher: Elsevier
DOI: 10.2139/ssrn.4494030

ms-van3t: An integrated multi-stack framework for virtual validation of V2X communication and services (opens in new window)

Author(s): F. Raviglione, C.M. Risma Carletti, M. Malinverno, C. Casetti, C.F. Chiasserini
Published in: Computer Communications, Issue 217, 2024, ISSN 0140-3664
Publisher: Elsevier BV
DOI: 10.1016/J.COMCOM.2024.01.022

Philosophy & Technology (opens in new window)

Author(s): Adam Henschke; Chirag Arora
Published in: Philosophy & Technology, 2024, ISSN 2210-5441
Publisher: Springer
DOI: 10.1007/S13347-024-00802-3

Sphinx-in-the-Head: Group Signatures from Symmetric Primitives (opens in new window)

Author(s): Liqun Chen, Changyu Dong, Christopher J. P. Newton and Yalan Wang
Published in: ACM Transactions on Privacy and Security, 2024, ISSN 2471-2566
Publisher: Association for Computing Machinery
DOI: 10.1145/3638763

An ML-Aided Reinforcement Learning Approach for Challenging Vehicle Maneuvers (opens in new window)

Author(s): Dinesh Cyril Selvaraj, Shailesh Hegde, Nicola Amati, Francesco Deflorio and Carla Fabiana Chiasserini
Published in: IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2023, ISSN 2379-8904
Publisher: IEEE
DOI: 10.1109/TIV.2022.3224656

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0