Zsombor Petho

@auto.bme.hu

Department of Automotive Technologies / Faculty of Transportation Engineering anf Vehicle Engineering
Department of Automotive Technologies



                       

https://researchid.co/zsomborpetho

EDUCATION

Phd [2019-2023]- Budapest University of Technology and Economics, Faculty of Transportation Engineering and Vehicle Engineering
MSc [2016-2019] - Budapest University of Technology and Economics, Faculty of Electrical Engineering, Control Engineering
BSc [2012-2016] - Technical University of Cluj Napoca, Faculty of Electrical Engineering, Electrical Engineering (Electromechanics)

RESEARCH, TEACHING, or OTHER INTERESTS

Automotive Engineering, Electrical and Electronic Engineering, Computer Networks and Communications, Multidisciplinary

7

Scopus Publications

68

Scholar Citations

5

Scholar h-index

3

Scholar i10-index

Scopus Publications


  • Considering PKI safety impact on network performance during V2X-based AD/ADAS function development processes
    Zsombor Pethö, Tamás Márton Kazár, Roland Kraudy, Zsolt Szalay, and Árpád Török

    IEEE
    In this research, we examine the impact of PKI on vehicle safety and thus make suggestions for further improvements to V2X-based safety application design processes. In the first step, we introduce the novel methodological background of characterizing the safety impact of the network performance metrics on the V2X-based automotive applications. Following this, we investigated two cases: with and without Public Key Infrastructure (PKI) authorization, to identify the potential safety effect if the V2X device is unprepared for the additional computational overhead caused by the authentication framework-related processes. Based on our results, we can identify the operational domain of a specific V2X-based application that can be used safely.

  • Recommendations on electromagnetic compatibility testing of unmanned aerial vehicles
    Gergely Friedl, Mate Liszi, Zsombor Petho, Gyorgy Wersenyi, and Miklos Kuczmann

    IEEE
    In this paper several recommendations and considerations on electromagnetic compatibility (EMC) testing of unmanned aerial vehicles (UAV, or drone) are presented. Currently, the standardization of drone EMC measurements is not yet fully established. These products are usually tested according to EN 55032, EN 55024, EN 64000-4-3 and EN 61000-4-8, while the scope of these standards is not UAV specific. The focus of this paper is on the testability of UAV emission and immunity from various aspects. The main goal of this paper is to initiate discussions regarding UAV specific conditions to describe measurement setups, conditions, and limitations suitable to drones. First, the UAV and the test environment shall be prepared from safety ant testability point of view. These aspects and recommended conditions - e.g., drone fastening, applying artificial load, and emulating the Earth's magnetic field - are explained in this paper. While the drones are assembled from CE certified components, the whole product requires a system level validation. The test conditions, limits, and stress levels shall be aligned to the specific environment an UAV might be exposed to. An initiative study aiming to describe the UAV exclusive electromagnetic conditions are also presented here. Additionally, several key aspects for EMC engineering of UAV's are also discussed in this paper, mainly focusing on functionality relevant EMC issues and solutions.

  • Analysis of Security Vulnerability Levels of In-Vehicle Network Topologies Applying Graph Representations
    Zsombor Petho, Intiyaz Khan, and Árpád Torok

    Springer Science and Business Media LLC
    AbstractThis article investigates cybersecurity issues related to in-vehicle communication networks. In-vehicle communication network security is evaluated based on the protection characteristics of the network components and the topology of the network. The automotive communication network topologies are represented as undirected weighted graphs, and their vulnerability is estimated based on the specific characteristics of the generated graph. Thirteen different vehicle models have been investigated to compare the vulnerability levels of the in-vehicle network using the Dijkstra's shortest route algorithm. An important advantage of the proposed method is that it is in accordance with the most relevant security evaluation models. On the other hand, the newly introduced approach considers the Secure-by-Design concept principles.

  • A survey of new orientations in the field of vehicular cybersecurity, applying artificial intelligence based methods
    Zsombor Pethő, Árpád Török, and Zsolt Szalay

    Wiley
    Nowadays, cybersecurity is an emerging research area in the automotive industry, and it is investigated by many different perspectives. Our article is a review of existing vehicular security solutions that covers the state‐of‐the‐art and future research directions. This article is a new contribution to tutorials/surveys related to the vehicular cybersecurity domain with the latest details. We developed a database from 140 articles from the field of automotive security. In the database, we assigned specific attributes to every article (such as Web of Science Impact Factor or the number of citations). The data set was analyzed by the K‐means clustering and decision tree analysis methods to identify and characterize the generated groups of papers. Following this, the article highlights the research areas that might receive more attention in the future. Accordingly, the result of the current research can be applied by the decision‐makers, researchers, and Original Equipment Manufacturers to allocate additional resources to those domains, which is expected to shape the future of vehicular security.

  • Towards cooperative perception services for its: Digital twin in the automotive edge cloud
    Viktor Tihanyi, András Rövid, Viktor Remeli, Zsolt Vincze, Mihály Csonthó, Zsombor Pethő, Mátyás Szalai, Balázs Varga, Aws Khalil, and Zsolt Szalay

    MDPI AG
    We demonstrate a working functional prototype of a cooperative perception system that maintains a real-time digital twin of the traffic environment, providing a more accurate and more reliable model than any of the participant subsystems—in this case, smart vehicles and infrastructure stations—would manage individually. The importance of such technology is that it can facilitate a spectrum of new derivative services, including cloud-assisted and cloud-controlled ADAS functions, dynamic map generation with analytics for traffic control and road infrastructure monitoring, a digital framework for operating vehicle testing grounds, logistics facilities, etc. In this paper, we constrain our discussion on the viability of the core concept and implement a system that provides a single service: the live visualization of our digital twin in a 3D simulation, which instantly and reliably matches the state of the real-world environment and showcases the advantages of real-time fusion of sensory data from various traffic participants. We envision this prototype system as part of a larger network of local information processing and integration nodes, i.e., the logically centralized digital twin is maintained in a physically distributed edge cloud.

  • Introducing safety and security co-engineering related research orientations in the field of automotive security
    Árpád Török and Zsombor Pethő

    Periodica Polytechnica Budapest University of Technology and Economics
    Since modern vehicles are connected and their transport processes are strongly supported by different automated functions, malicious external interventions can impair safety integrity. Therefore, it seems to be reasonable in the future to introduce safety and security co-engineering approaches in the automotive industry. With regard to the performed evaluation, three main promising research orientations have been identified. Automotive safety and security related development of co-engineering methodology and validation framework are of key importance from the viewpoint of autonomous transportation. Accordingly, a scenario based, integrated evaluation of automotive safety and security would be closely fit to the concept of SOTIF and the SoS approach. Beyond this, the communication and network security of "vehicle to everything" channels have to also be in the focus of automotive researches. Additionally, the development of automotive anomaly detection systems, especially focusing on the complex SoS operation processes will be a highly important research orientation.

RECENT SCHOLAR PUBLICATIONS

  • Considering PKI safety impact on network performance during V2X-based AD/ADAS function development processes
    Z Peth, TM Kazr, R Kraudy, Z Szalay, Trk
    2022 IEEE 1st International Conference on Cognitive Mobility (CogMob 2022

  • Safety risk focused analysis of V2V communication especially considering cyberattack sensitive network performance and vehicle dynamics factors
    Z Pethő, Z Szalay, Trk
    Vehicular Communications 37, 100514 2022

  • Simulation of Road Traffic Accidents Related to ADAS Systems in PreScan
    TM Kazr, Z Pethő, G Vida, Trk
    The First Conference on ZalaZONE Related R&I Activities of Budapest 2022

  • Analysis of security vulnerability levels of in-vehicle network topologies applying graph representations
    Z Petho, I Khan, Torok
    Journal of Electronic Testing, 1-9 2021

  • A survey of new orientations in the field of vehicular cybersecurity, applying artificial intelligence based methods
    Z Pethő, Trk, Z Szalay
    Transactions on Emerging Telecommunications Technologies 32 (10), e4325 2021

  • Towards cooperative perception services for its: Digital twin in the automotive edge cloud
    V Tihanyi, A Rvid, V Remeli, Z Vincze, M Csonth, Z Pethő, M Szalai, ...
    Energies 14 (18), 5930 2021

  • The effect of safety and security on cognitive processes related to future transport systems
    T Zsombor Pethő, Felipe Mesquita, Mohammad Obaid
    12th IEEE International Conference on Cognitive Infocommunications 2021

  • Introducing safety and security co-engineering related research orientations in the field of automotive security
    Trk, Z Pethő
    Periodica Polytechnica Transportation Engineering 48 (4), 349-356 2020

MOST CITED SCHOLAR PUBLICATIONS

  • Towards cooperative perception services for its: Digital twin in the automotive edge cloud
    V Tihanyi, A Rvid, V Remeli, Z Vincze, M Csonth, Z Pethő, M Szalai, ...
    Energies 14 (18), 5930 2021
    Citations: 28

  • Analysis of security vulnerability levels of in-vehicle network topologies applying graph representations
    Z Petho, I Khan, Torok
    Journal of Electronic Testing, 1-9 2021
    Citations: 12

  • A survey of new orientations in the field of vehicular cybersecurity, applying artificial intelligence based methods
    Z Pethő, Trk, Z Szalay
    Transactions on Emerging Telecommunications Technologies 32 (10), e4325 2021
    Citations: 12

  • Safety risk focused analysis of V2V communication especially considering cyberattack sensitive network performance and vehicle dynamics factors
    Z Pethő, Z Szalay, Trk
    Vehicular Communications 37, 100514 2022
    Citations: 8

  • Introducing safety and security co-engineering related research orientations in the field of automotive security
    Trk, Z Pethő
    Periodica Polytechnica Transportation Engineering 48 (4), 349-356 2020
    Citations: 8