Digital twins and artificial intelligence in transportation infrastructure: Classification, application, and future research directions

J Wu, X Wang, Y Dang, Z Lv - Computers and Electrical Engineering, 2022 - Elsevier
Artificial Intelligence (AI) technology is extensively applied in all walks of life with continuous
acceleration of the construction of smart cities. The current research status of intelligent …

Security in V2I communications: a systematic literature review

P Marcillo, D Tamayo-Urgilés, ÁL Valdivieso Caraguay… - Sensors, 2022 - mdpi.com
Recently, the number of vehicles equipped with wireless connections has increased
considerably. The impact of that growth in areas such as telecommunications, infotainment …

Amalgamation of blockchain and sixth‐generation‐envisioned responsive edge orchestration in future cellular vehicle‐to‐anything ecosystems: Opportunities and …

P Bhattacharya, U Bodkhe, M Zuhair… - Transactions on …, 2024 - Wiley Online Library
In modern decentralized cellular‐vehicle‐to‐anything (C‐V2X) infrastructures, connected
autonomous smart vehicles (CASVs) exchange vehicular information with peer CASVs. To …

Context-aware quantification for VANET security: A Markov chain-based scheme

J Wang, H Chen, Z Sun - IEEE Access, 2020 - ieeexplore.ieee.org
Recently, the quantification of VANET security has drawn significant attention due to the lack
of standard computational metrics. The salient features of VANET, such as highly dynamic …

[HTML][HTML] Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication

SAA Hakeem, HW Kim - Alexandria Engineering Journal, 2023 - Elsevier
Security concerns in 5 G-V2X communication, including message authenticity, entity
identification, and efficient malicious entity detection, necessitate innovative solutions. This …

Trustworthy execution in untrustworthy autonomous systems

D Halasz, S Shandilya… - 2023 IEEE 22nd …, 2023 - ieeexplore.ieee.org
With the increasing pervasiveness of software solutions, which are joining cyber-physical
spaces and forming partnerships with humans, the importance of the trustworthiness of …

Enhancing Urban Traffic Management Through Real-Time Anomaly Detection and Load Balancing

MD Laanaoui, M Lachgar, H Mohamed, H Hamid… - IEEE …, 2024 - ieeexplore.ieee.org
Efficient traffic management has become a major concern within the framework of smart city
projects. However, the increasing complexity of data exchanges and the growing importance …

An Efficient Lightweight Mutual Authentication and Key Exchange Protocol for Roaming Vehicle

KA Yadav, P Vijayakumar - IEEE Access, 2023 - ieeexplore.ieee.org
Intelligent vehicles and their infrastructure have been a booming topic that requires attention
towards grooming security services and providing a safe-secure drive experience to users …

Anomaly Detection of Attempt Through Genetic Algorithm and ANN

S Chavan, N Jagadisha, P Mahalle… - … on Applications of …, 2023 - atlantis-press.com
Vehicular ad-hoc network, commonly known as VANET, is an enabling technology for
supplying security and useful information in modern transport systems but subject to a …

[HTML][HTML] Joint energy and spectral optimization in Heterogeneous Vehicular Network

A Alam, K Ali, R Trestian, P Shah, G Mapp - Computer Networks, 2024 - Elsevier
With the latest developments in both the automotive and communications industries,
especially concerning the emerging 5G networks, IoV, and the adoption of Vehicle-to …