Posts by Collection

portfolio

publications

Applicability of IEC 61499 for event based Smart Grid applications

Published in International Symposium on Smart Electric Distribution Systems and Technologies (EDST), 2015

Abstract: IEC 61499 is an open standard based on function blocks applied for distributed automation solutions. In this paper we discuss the application of IEC 61499 for designing and implementing event-based Smart Grid applications. We show that IEC 61499 is well suited in the context of Smart Grids at the example of the concrete use case of power exchange between several peers of the Smart Grid. The feasibility of IEC 61499 in the context of this use case is assessed on the basis of a prototypical implementation using the open source framework 4DIAC. We conclude that IEC 61499 is a powerful tool for engineering event-based Smart Grid applications.

Recommended citation: T. Rosenstatter, R. Wanger, S. Huber, T. Heistracher and D. Engel, "Applicability of IEC 61499 for event based Smart Grid applications," 2015 International Symposium on Smart Electric Distribution Systems and Technologies (EDST), Vienna, 2015, pp. 278-283. https://doi.org/10.1109/SEDST.2015.7315221

Modelling the Level of Trust in a Cooperative Automated Vehicle Control System

Published in IEEE Transactions on Intelligent Transportation Systems (Volume: 19, Issue: 4, April 2018), 2017

Vehicle-to-vehicle communication is a key technology for achieving increased perception for automated vehicles, where the communication enables virtual sensing by means of sensors in other vehicles. This paper presents a trust system that allows a cooperative and automated vehicle that uses V2V communication to make more reliable and safe decisions. Read more.

Recommended citation: T. Rosenstatter and C. Englund, "Modelling the Level of Trust in a Cooperative Automated Vehicle Control System," in IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 4, pp. 1237-1247, April 2018. https://doi.org/10.1109/TITS.2017.2749962

Team Halmstad Approach to Cooperative Driving in the Grand Cooperative Driving Challenge 2016

Published in IEEE Transactions on Intelligent Transportation Systems (Volume: 19, Issue: 4, April 2018), 2018

This paper is an experience report of team Halmstad from the participation in a competition organised by the i-GAME project, the Grand Cooperative Driving Challenge 2016. The competition was held in Helmond, The Netherlands, during the last weekend of May 2016. We give an overview of our car’s control and communication system that was developed for the competition following the requirements and specifications of the i-GAME project. Read more.

Recommended citation: M. Aramrattana et al., "Team Halmstad Approach to Cooperative Driving in the Grand Cooperative Driving Challenge 2016," in IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 4, pp. 1248-1261, April 2018. https://doi.org/10.1109/TITS.2017.2752359

Open Problems when Mapping Automotive Security Levels to System Requirements

Published in 4th International Conference on Vehicle Technology and Intelligent Transport Systems, VEHITS, 2018

We describe open problems that need to be addressed in a prospective security framework for the automotive domain. Based on a study of several safety and security standards from other areas as well as suggested automotive security models, we propose an appropriate representation of security levels which is similar to, and will work in parallel with traditional safety, and a method to perform the mapping to a set of predefined system requirements, design rules and security mechanisms. Read more.

Recommended citation: T. Rosenstatter and T. Olovsson, "Open Problems when Mapping Automotive Security Levels to System Requirements," 4th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS), Funchal, 2018, pp. 251-260. https://dx.doi.org/10.5220/0006665302510260

Towards a Standardized Mapping from Automotive Security Levels to Security Mechanisms

Published in 21st International Conference on Intelligent Transportation Systems (ITSC), 2018

We first suggest that the risk assessment process should result in five security levels. Further, we identify suitable security mechanisms and design rules for automotive system design and associate them with appropriate security levels. Our proposed methodology is as much as possible aligned with ISO 26262 and we believe that it should therefore be realistic to deploy in existing organizations. Read more.

Recommended citation: T. Rosenstatter and T. Olovsson, "Towards a Standardized Mapping from Automotive Security Levels to Security Mechanisms," 2018 21st International Conference on Intelligent Transportation Systems (ITSC), Maui, HI, USA, 2018, pp. 1501-1507. https://doi.org/10.1109/ITSC.2018.8569679

talks

teaching