On June 21, the CARAMEL project presented to a panel of external observers the results in the area of cybersecurity for autonomous vehicles that have been developed since the beginning of the CARAMEL project.
The demonstration took place at Panasonic’s facilities in Langen (Hessen) in Germany. Representatives of most of the CARAMEL consortium members attended the meeting, which was attended by approximately 30 people, including external observers.
The activities of June 21 were consolidated into 2 sections, the first half of the day consisted of a technical presentation of the developments to be presented in a live demonstration. During the second part of the day, the technical part and the demonstrations were presented through simulations.
The first section of the day started with a welcome message offered by the organizers of the event (Panasonic Automotive) and by the project coordinator who also presented a technical summary of the project.
After the incredible introduction to the project, we proceeded to the technical explanation of the pillars 1 and 2 that would be presented technically in a live demonstration and with the vehicle in motion in an area of Panasonic prepared for such experiments.
The live demonstration topics correspond to the following:
- Cyberthreat Detection and Response Techniques (Panasonic)
- V2X interoperability (i2cat)
- Revocation of certificates (Atos)
- OBU HW antitampering (Nextium)
- CARAMEL backend (Capgemini)
Once the live presentation was over, all the participants met near the conference area to socialize while the food was offered.
The second part of the day took place in the conference room prepared for simulation demonstrations.
Each member had the opportunity to present the results of their research and integrations in mitigating cyber attacks on autonomous vehicles.
The topics were subdivided into the pillars addressed by the project.
Pillar 4: Remote Control Vehicle activities presentation
- Intrusion detection and estimation algorithm in the Gateway & RCV controller
Pillar 1: Autonomous mobility simulations
- Location Spoofing attack (AVL)
- Robust scene analysis and understanding via multimodal fusion (UPAT)
- DriveGuard countering camera attacks against autonomous vehicles (UCY)
- Traffic sign tampering detection and mitigation (0Inf)
Pillar 2: Connected Mobility
- Attack on the V2X Message Transmission (i2cat)
- OBU HW antitampering (Nextium)
- Certificate Revocation (Atos)
- Collaborative GPS Spoofing (UPAT)
- Holisitc Situational Awareness with ML Application
Pillar 3: Electromobility
- Remote detection of cyber attacks on EV Charge Stations from cloud back office (Greenflux)
It only remains to say that we appreciate the participation of each of the attendees at this event, thank you for your excellent participation. To the readers, we would like to invite you to follow us on our official channels to keep up with the latest news on the project.