liu.seSearch for publications in DiVA
1 - 3 of 3
rss atomLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
  • Presentation: 2025-02-14 10:15 A35
    Lovaco, Jorge
    Linköping University, Department of Management and Engineering, Fluid and Mechatronic Systems. Linköping University, Faculty of Science & Engineering.
    Wildfire Management as a System of Systems: Systems Engineering Considerations Using Agent-Based Simulation and Large Language Models2024Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Wildfires are extremely difficult to manage and control. If they grow out of control, they are capable of destroying countless resources and entire populations. Over the years, resources and tactics have been focused on improving reactive capabilities. However, adopting a proactive approach can reduce reaction time and the necessary resources when action is needed for suppressing a fire. Both the proactive and reactive phases of wildfire management involve numerous systems that need to communicate and collaborate. When a collection of systems is working together towards a goal, it is beneficial to see them as a System of Systems. This thesis takes a System of Systems approach to wildfire management and examines modelling and simulation considerations, with special interest in methods that can be used to obtain a refined set of system requirements. More specifically, aircraft requirements for the concept generation of firefighting aerial vehicles. Additionally, the thesis considers stakeholders’ needs and the consequent viewpoints reflecting their interests and concerns, which are necessary for developing high-level operational concepts. These topics are often overlooked, yet necessary to keep communities engaged and to develop measures of effectiveness and performance that capture the value of different System of Systems combinations. All these considerations are intended to contribute to the improvement of holistic requirement generation for product development. 

    List of papers
    1. Environmental Agent-Based Modelling For A Firefighting System Of Systems
    Open this publication in new window or tab >>Environmental Agent-Based Modelling For A Firefighting System Of Systems
    2022 (English)In: 33rd Congress of the International Council of the Aeronautical Sciences, 2022Conference paper, Published paper (Refereed)
    Abstract [en]

    In the field of System-of-Systems (SoS) engineering, the study of interactions between complex systems froma holistic point of view is important for finding emerging behaviours. To observe as many behaviours aspossible, especially when field testing is not a viable option, simulations play an important role in design spaceexploration and formulation for the Firefighting SoS framework. The presented work describes an AgentBased Model (ABM) approach for simulation of wildfire spread and its detection using collaborating vehicles:Unmanned Aerial Vehicles (UAVs), or partly autonomous air- and land-based vehicles. Implemented in theopen-source software NetLogo, the usage of its Geographic Information System (GIS) extension allows tosimulate scenarios at specific locations. This ABM will be used in the future for Agent-Based Simulations(ABS) for the study of an SoS framework oriented to firefighting, including design and optimization of the SoS,constituent systems and their subsystems.

    Keywords
    Systems of Systems, Agent-Based Simulation, Aerospace Systems, Cyber-Physical Modelling, Wildfire Detection
    National Category
    Aerospace Engineering
    Identifiers
    urn:nbn:se:liu:diva-192091 (URN)
    Conference
    ICAS2022, Stockholm, Sweden, 4-9 September, 2022.
    Available from: 2023-03-01 Created: 2023-03-01 Last updated: 2024-12-17Bibliographically approved
    2. Agent-Based Simulation and Ontology Integration for System-of-System Exploration
    Open this publication in new window or tab >>Agent-Based Simulation and Ontology Integration for System-of-System Exploration
    2023 (English)In: Proceedings of IDEAS 2022: Interdisciplinary Conference on Innovation, Design, Entrepreneurship, and Sustainable Systems / [ed] Luciana Pereira, Petter Krus, Magnus Klofsten, Springer, 2023, p. 13-23Conference paper, Published paper (Refereed)
    Abstract [en]

    The increasing interest in System-of-Systems (SoS) for engineering applications are introducing new challenges that must be overcome at an early design stage. One of these is the integration of different tools that can be used to make predictions about a system under development and how these together can be used to predict SoS performances by comparison of parameter spaces.The purpose of this paper is therefore to illustrate how different SoS architectures can be modeled, simulated, and evaluated throughout different scenarios by different teams of researchers following a common workflow.An ontology is used as an overarching knowledge base where information about entities, such as scenario details, can be extracted and used for the setup of Agentbased Simulations(ABS) through a tool integration software acting as master that controls the correct execution of the defined workflow.The tool integration software also enables additional modelling capabilities, such as a Design of Experiments (DOE) definition for design space explorations, an Optimizer with different algorithms, user-defined Python scripts, etc. 

    Place, publisher, year, edition, pages
    Springer, 2023
    Series
    Design Science and Innovation, ISSN 2509-5986, E-ISSN 2509-5994
    National Category
    Aerospace Engineering
    Identifiers
    urn:nbn:se:liu:diva-192101 (URN)10.1007/978-3-031-29129-6_2 (DOI)9783031291289 (ISBN)9783031291296 (ISBN)
    Conference
    IDEAS2022, Sao Paulo, Brazil, 28-30 November, 2022
    Available from: 2023-03-02 Created: 2023-03-02 Last updated: 2024-12-17
    3. Traceable System of Systems Explorations Using RCE Workflows
    Open this publication in new window or tab >>Traceable System of Systems Explorations Using RCE Workflows
    2023 (English)Conference paper, Oral presentation with published abstract (Other academic)
    Abstract [en]

    The System of Systems (SoS) framework plays a pivotal role in delimiting aircraft design spaces by examininginteractions among its Constituent Systems (CS). Each CS has a distinct collection of capabilities, some of which may be shared with other CS. The framework explores emergent behaviours that arise from communication between the CS within the SoS. These emergent behaviours are characterized by their unattainability by any individual CS and result from their collaborative nature. The identification of these emergent behaviours enablesSystem of Systems Engineering (SoSE) to pinpoint the most valuable configurations of the SoS, thereby maximizing the collective value. Furthermore, these emergent behaviours aid in stipulating design requirements for new systems based on the capabilities outlined in the SoS study. To map the relationship between needs, capabilities, requirements, and behaviours, maintaining traceability throughout the study is paramount. This research employs workflows created using the Remote Component Environment (RCE), a specialized tool for structured and automated task development. The objective is to showcase RCE's integration capabilitiesspecifically for software tools and Python scripts- with task scheduling. This integration enables swift extraction of results, making them available at every step, thus augmenting analysis efficiency. The study focuses on the perspective of an aircraft designer during the early concept generation phase, specifically applied to the development of an electric Unmanned Aerial Vehicle (UAV) concept for wildfire detection. 

    Keywords
    System of Systems, Aircraft Conceptual Design, Wildfire Detection, Agent-Based Simulation, Systems Engineering
    National Category
    Aerospace Engineering
    Identifiers
    urn:nbn:se:liu:diva-202451 (URN)
    Conference
    64th International Conference of Scandinavian Simulation Society, SIMS 2023
    Funder
    Vinnova, 2019-05371
    Available from: 2024-04-12 Created: 2024-04-12 Last updated: 2024-12-17
    Download full text (pdf)
    fulltext
    Download (png)
    presentationsbild
  • Presentation: 2025-02-28 13:15 Ada Lovelace, B-building, LinköpingOrder onlineBuy this publication >>
    Wilson, Johannes
    Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, Faculty of Science & Engineering.
    Towards Practical Formal Verification of Cryptographic Protocol Specifications and Implementations2025Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Modern computer systems communicate using protocols. Protocols are critical to security as they are the interface over which systems are accessible to the outside world. Cryptography is what enables secure communication even over insecure channels, and cryptographic protocols are the basis for modern internet security. Encryption enables confidentiality even if eavesdropping is possible, and cryptographic signatures can provide authenticity even if messages can be mimicked, modified, or reproduced.

    Designing secure cryptographic protocols remains challenging. Many protocols once believed to be secure have since been broken and redesigned. The highest guarantees of security are achieved using formal methods, where mathematical logic is used for reasoning. Modern formal methods research tools have proven effective in finding and proving the absence of flaws in protocols, yet they are challenging to use. Correctly implementing large, complex protocols is also a challenge, and many vulnerabilities have been caused by errors introduced during the implementation phase. Formal software verification remains a daunting task which often requires manual effort by formal methods experts.

    This licentiate thesis contributes towards providing formal protocol analysis methods that are intended to be more practical and useful for industrial application. Both the design phase of protocols and the analysis of protocol implementations are covered, showing how modern tools can be used to perform thorough analysis. The analysis discovers design and implementation flaws in modern commercial cryptographic protocols which are reported to the developers.

    The analysis demonstrates challenges as well as the opportunities of adopting more formal methods for the analysis of protocols. Challenges which are tackled in this thesis include specifying an accurate model and selecting security properties for remote attestation proto-cols, and circumventing state space explosion during symbolic execution of protocol implementations. Opportunities include the ability to provide a more thorough analysis of protocol specifications as well as implementations in order to cover requirements which are difficult to test.

    To make verification goals and assumptions more clear, this thesis also presents precise formulations of authentication which are appropriate for verification in the formal model. The authentication properties are suitable for protocols which perform one-way authentication of one of the agents, and complement existing mutual authentication definitions.

    List of papers
    1. Extending the Authentication Hierarchy with One-Way Agreement
    Open this publication in new window or tab >>Extending the Authentication Hierarchy with One-Way Agreement
    2023 (English)In: 2023 IEEE 36th Computer Security Foundations Symposium (CSF), Los Alamitos, CA, USA: IEEE Computer Society, 2023, p. 214-228Conference paper, Published paper (Refereed)
    Abstract [en]

    Providing authenticated interactions is a key responsibility of most cryptographic protocols. When designing new protocols with strict security requirements it is therefore essential to formally verify that they fulfil appropriate authentication properties. We identify a gap in the case of protocols with unilateral (one-way) authentication, where existing properties are poorly adapted. In existing work, there is a preference for defining strong authentication properties, which is good in many cases but not universally applicable. In this work we make the case for weaker authentication properties. In particular, we investigate one-way authentication and extend Lowe's authentication hierarchy with two such properties. We formally prove the relationship between the added and existing properties. Moreover, we demonstrate the usefulness of the added properties in a case study on remote attestation protocols. This work complements earlier work with additional generic properties that support formal verification of a wider set of protocol types.

    Place, publisher, year, edition, pages
    Los Alamitos, CA, USA: IEEE Computer Society, 2023
    Series
    Proceedings - IEEE Computer Security Foundations Symposium (CSF), ISSN 1940-1434, E-ISSN 2374-8303
    Keywords
    authentication, network-protocols, protocol-verification, formal-methods, verification
    National Category
    Computer Sciences
    Identifiers
    urn:nbn:se:liu:diva-197049 (URN)10.1109/CSF57540.2023.00025 (DOI)001061509400015 ()9798350321920 (ISBN)9798350321937 (ISBN)
    Conference
    2023 IEEE 36th Computer Security Foundations Symposium (CSF), Jul 07 2023 to Jul 10 2023, Dubrovnik, Croatia
    Funder
    Wallenberg AI, Autonomous Systems and Software Program (WASP)
    Note

    Funding: Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

    Available from: 2023-08-21 Created: 2023-08-21 Last updated: 2025-01-28Bibliographically approved
    2. Provably Secure Communication Protocols for Remote Attestation
    Open this publication in new window or tab >>Provably Secure Communication Protocols for Remote Attestation
    2024 (English)In: Proceedings of the 19th International Conference on Availability, Reliability and Security, New York, NY, USA, 2024Conference paper, Published paper (Refereed)
    Abstract [en]

    Remote Attestation is emerging as a promising technique to ensure that some remote device is in a trustworthy state. This can for example be an IoT device that is attested by a cloud service before allowing the device to connect. However, flaws in the communication protocols associated with the remote attestation mechanism can introduce vulnerabilities into the system design and potentially nullify the added security. Formal verification of protocol security can help to prevent such flaws. In this work we provide a detailed analysis of the necessary security properties for remote attestation focusing on the authenticity of the involved agents. We extend beyond existing work by considering the possibility of an attestation server (making the attestation process involve three parties) as well as requiring verifier authentication. We demonstrate that some security properties are not met by a state-of-the-art commercial protocol for remote attestation for our strong adversary model. Moreover, we design two new communication protocols for remote attestation that we formally prove fulfil all of the considered authentication properties.

    Place, publisher, year, edition, pages
    New York, NY, USA: , 2024
    Keywords
    Remote Attestation, Formal Protocol Verification, Tamarin Prover, Authentication, Security Models, Protocol Attack
    National Category
    Computer Systems
    Identifiers
    urn:nbn:se:liu:diva-207831 (URN)10.1145/3664476.3664485 (DOI)9798400717185 (ISBN)
    Conference
    The International Conference on Availability, Reliability and Security
    Funder
    Wallenberg AI, Autonomous Systems and Software Program (WASP)
    Available from: 2024-09-26 Created: 2024-09-26 Last updated: 2025-01-28
    3. Analysing TLS Implementations Using Full-Message Symbolic Execution
    Open this publication in new window or tab >>Analysing TLS Implementations Using Full-Message Symbolic Execution
    2025 (English)In: Secure IT Systems: 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024 Proceedings / [ed] Leonardo Horn Iwaya, Liina Kamm, Leonardo Martucci, Tobias Pulls, Springer, 2025, Vol. 15396, p. 283-302Conference paper, Published paper (Refereed)
    Abstract [en]

    In this paper, we present a methodology for performing thorough analysis of TLS protocol implementations using dynamic symbolic execution. This method explores all possible inputs by treating entire messages as symbolic using KLEE. We are able to analyse the message parsing logic in detail, showing fulfilment of requirements from the protocol specification. This has previously not been performed for whole messages in complex protocols such as TLS. We tackle several problems that cause state space explosion by providing appropriate abstractions of implementation primitives. Additionally, we explore how protocol design choices impact the feasibility of analysis and argue for a strict TLS specification. We have applied our method to the ServerHello message parsing in several versions of the WolfSSL TLS 1.3 implementation. Our analysis revealed two vulnerabilities in the client implementation which were both assigned CVEs, one of them marked as high severity.

    Place, publisher, year, edition, pages
    Springer, 2025
    Series
    Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 15396
    Keywords
    Dynamic Symbolic Execution; Program Analysis; Protocol Analysis; Transport Layer Security
    National Category
    Computer Sciences
    Identifiers
    urn:nbn:se:liu:diva-211257 (URN)10.1007/978-3-031-79007-2_15 (DOI)9783031790065 (ISBN)9783031790072 (ISBN)
    Conference
    29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024
    Funder
    Wallenberg AI, Autonomous Systems and Software Program (WASP)
    Available from: 2025-01-30 Created: 2025-01-30 Last updated: 2025-01-30
    Download full text (pdf)
    fulltext
    Download (png)
    presentationsbild
  • Presentation: 2025-02-28 13:15 TemCas, TEMA-building, LinköpingOrder onlineBuy this publication >>
    Gharaie, Amirhossein
    Linköping University, Department of Management and Engineering, Information Systems and Digitalization. Linköping University, Faculty of Arts and Sciences.
    Digitalizing consumer engagement within smart grids – Role of smart service providers2025Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    The energy transition has highlighted the need for consumer engagement to visualize the future power grids known as smart grids. However, the dynamics of consumer engagement in smart grids remain poorly understood, particularly in the context of the increasing role of smart service providers. Smart service providers digitalize how consumers engage with smart grids by leveraging smart technologies to provide services for consumers. Since smart services complicate the understanding of consumer engagement, especially by automating the service functionalities, this licentiate thesis aims to explore the role of smart service providers in digitalizing consumer engagement within smart grids. Adopting a case study as the research strategy, this qualitative and interpretive thesis investigates two service providers in Sweden as case organizations. Using interviews, observation, tweet analysis, documents, and literature review, this thesis answers three questions to shed light on the characteristics of smart technologies, smart service providers’ actions to enhance the potential for engagement, and challenges of engaging consumers from the perspective of smart service providers. In conclusion, this thesis depicts that digitalizing consumer engagement incorporates different initiatives taken by service providers besides characteristics of smart technologies that facilitate the provision of services. Moreover, this thesis suggests a definition of digitalized consumer engagement based on two aspects of delegation and supervision since service providers encourage consumers to configure and monitor smart services through provided technologies. The practical contributions of this thesis provide insights for smart service providers on designing smart technologies and strategies that enhance the potential for consumer engagement. The theoretical contributions extend the understanding of consumer engagement by framing it as a dynamic, co-constructed process influenced by the sociotechnical roles of service providers and the delegation of tasks to smart technologies.

    List of papers
    1. Exploring the role of aggregators in the ecosystem of energy flexibility
    Open this publication in new window or tab >>Exploring the role of aggregators in the ecosystem of energy flexibility
    2023 (English)In: Joint Proceedings of the BIR 2023 Workshops and Doctoral Consortiumco-located with 22nd International Conference on Perspectives in Business Informatics Research (BIR 2023) / [ed] Andrea Morichetta, Robert Andrei Buchmann, Kurt Sandkuhl, Ulf Seigerroth, Marite Kirikova, Charles Møller, Peter Forbrig, Anne Gutschmidt, Ana-Maria Ghiran, Alessandro Marcelletti, Felix Härer, Barbara Re, Björn Johansson, Technical University of Aachen , 2023, Vol. 3514Conference paper, Published paper (Refereed)
    Abstract [en]

    This paper aims to explore the role of aggregators in the energy flexibility ecosystem through the lens of an employed framework built on two theories: Information ecology theory and the architectural theory of digital innovation. The framework is initially tested using descriptive data from an organization working as an aggregator in the energy market. The potential of the framework is shown from a combination of these theories and an initial test using descriptions from the aggregator case and its products and services in the context of energy flexibility. By highlighting four integration tasks of sharing, combining, standardizing, and multi-homing, the framework has the potential to explore the role of aggregator within the flexibility ecosystem. This study concludes with three propositions regarding the interaction of the ecosystem actors and the role of aggregators in the creation of flexibility ecosystem that opens up avenues for future studies.

    Place, publisher, year, edition, pages
    Technical University of Aachen, 2023
    Series
    CEUR Workshop Proceedings, ISSN 1613-0073 ; 3514
    Keywords
    Flexibility Ecosystem; Platform Architecture; Aggregator
    National Category
    Computer and Information Sciences
    Identifiers
    urn:nbn:se:liu:diva-202220 (URN)2-s2.0-85176101353 (Scopus ID)
    Conference
    BIR-WS 2023: BIR 2023 Workshops and Doctoral Consortium, 22nd International Conference on Perspectives in Business Informatics Research (BIR 2023), September 13-15, 2023, Ascoli Piceno, Italy
    Note

    Funding agency: Kamprad Family Foundation.

    Available from: 2024-04-08 Created: 2024-04-08 Last updated: 2025-01-30Bibliographically approved
    2. Consumer Engagement Potentials in the Digitalization Process of Power System
    Open this publication in new window or tab >>Consumer Engagement Potentials in the Digitalization Process of Power System
    2024 (English)In: Electronic Government / [ed] Janssen, Marijn; Crompvoets, Joep; Gil-Garcia, J. Ramon; Lee, Habin; Lindgren, Ida; Nikiforova, Anastasija; Viale Pereira, Gabriela, Springer Nature Switzerland , 2024, Vol. 14841, p. 150-165Conference paper, Published paper (Refereed)
    Abstract [en]

    Recently different studies discussed the importance of consumer engagement in the power system. Since the power system is undergoing digitalization by harnessing the capabilities of digital technologies for consumers, it triggered our curiosity to understand the role of new actors referred to as smart service providers in building consumer engagement. Therefore, this paper explores consumer engagement potentials via the digitalization of power systems by centering on the development of a smart service provider as a case in Sweden. Our analysis uncovers three types of engagement potentials: Exclusive, connective, and inclusive. These types highlight the evolution from early technology adoption focused on individual benefits, towards a more inclusive model fostering collective action and sustainability in the energy sector. Our results illustrate the dynamic interaction between smart service providers, consumers, and the wider energy grid showcasing the multifaceted nature of consumer engagement. The implication of our result provides insights for policymakers and power system stakeholders in shaping strategies for inclusive and sustainable energy transitions.

    Place, publisher, year, edition, pages
    Springer Nature Switzerland, 2024
    Series
    Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349
    Keywords
    aggregator, consumer engagement, digitalization, smart service, tweet analysis
    National Category
    Information Systems, Social aspects
    Identifiers
    urn:nbn:se:liu:diva-207785 (URN)10.1007/978-3-031-70274-7_10 (DOI)001308584400010 ()2-s2.0-85202621581 (Scopus ID)9783031702730 (ISBN)
    Conference
    23rd International Conference on Electronic Government (EGOV), Ghent Univ, Ghent, BELGIUM, SEP 03-05, 2024
    Available from: 2024-09-23 Created: 2024-09-23 Last updated: 2025-01-30Bibliographically approved
    3. Energy Smart Home Technologies and Energy Citizenship: A Literature Review
    Open this publication in new window or tab >>Energy Smart Home Technologies and Energy Citizenship: A Literature Review
    2024 (English)In: ECIS 2024 Proceedings. 41., 2024, article id 2122Conference paper, Published paper (Refereed)
    Abstract [en]

    Smart home technologies for energy-related purposes have increased attention. At the same time a concept known as energy citizenship (EC), where citizens play an active role in the energy ecosystem has emerged. The increasing automation enabled by Energy smart home technologies (ESHTs) raises questions about citizens’ active role in the emerging smart grid paradigm, potentially undermining EC. A question is how ESHTs play roles in enactment of EC. To address this, our literature review aims to describe the enactment of EC through ESHTs by introducing a conceptual framework. By adopting the lens of affordances, findings reveal that such technologies influence awareness and agency at individual and collective levels, primarily through affordances of monitoring, personalizing, flexible control, and contribution feedback. However, the influence of ESHTs on EC is not uniform, as it depends on citizens’ behaviours, preferences, and the compatibility of various technologies working together.

    National Category
    Information Systems, Social aspects
    Identifiers
    urn:nbn:se:liu:diva-207853 (URN)9781958200100 (ISBN)
    Conference
    32nd European Conference on Information Systems
    Available from: 2024-09-26 Created: 2024-09-26 Last updated: 2025-01-30Bibliographically approved
    Download full text (pdf)
    fulltext
    Download (png)
    presentationsbild