Privacy for 5G-supported vehicular networks

M Li, L Zhu, Z Zhang, C Lal, M Conti… - IEEE Open Journal of …, 2021 - ieeexplore.ieee.org
Vehicular networks allow billions of vehicular users to be connected to report and exchange
real-time data for offering various services, such as navigation, ride-hailing, smart parking …

Star rating of driver's behavior as a tool to prevent risky behavior

M Tešić, S Miladić-Tešić, K Folla, G Yannis… - … research part F: traffic …, 2023 - Elsevier
Driver behavior is a key determinant of road safety. Risky behaviors can be measured and
quantified using traditional and modern methods, which enables the assessment of the …

Precise UAV MMW-Vision Positioning: A Modal-Oriented Self-Tuning Fusion Framework

G Wu, F Zhou, C Meng, XY Li - IEEE Journal on Selected Areas …, 2023 - ieeexplore.ieee.org
Precise real-time unmanned aerial vehicle (UAV) positioning is crucial for preventing
unauthorized UAVs from damaging cooperative intelligent transportation systems (C-ITSs) …

Multi-domain denial-of-service attacks in Internet-of-Vehicles: Vulnerability insights and detection performance

R Sedar, C Kalalas, J Alonso-Zarate… - 2022 IEEE 8th …, 2022 - ieeexplore.ieee.org
The transformative Internet-of-Vehicles (IoV) paradigm comes inadvertently with challenges
which involve security vulnerabilities and privacy breaches. In this context, denial-of-service …

Network Capacity Optimization for Cellular‐Assisted Vehicular Systems by Online Learning‐Based mmWave Beam Selection

J Gui, Y Liu, X Deng, B Liu - Wireless Communications and …, 2021 - Wiley Online Library
Directional communication is helpful to improve the performance of millimeter Wave
(mmWave) links. However, the dynamic nature of vehicular scenarios raises the complexity …

[HTML][HTML] Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication

SAA Hakeem, HW Kim - Alexandria Engineering Journal, 2023 - Elsevier
Security concerns in 5 G-V2X communication, including message authenticity, entity
identification, and efficient malicious entity detection, necessitate innovative solutions. This …

Implementation and Design of a Zero‐Day Intrusion Detection and Response System for Responding to Network Security Blind Spots

WS Choi, SY Lee, SG Choi - Mobile Information Systems, 2022 - Wiley Online Library
We propose a zero‐day intrusion detection and response system (ZDRS) for responding to
network security blind spots. An existing detection and response system for the analysis of …

[HTML][HTML] Leveraging UAV capabilities for vehicle tracking and collision risk assessment at road intersections

S Zong, S Chen, M Alinizzi, S Labi - Sustainability, 2022 - mdpi.com
Transportation agencies continue to pursue crash reduction. Initiatives include the design of
safer facilities, promotion of safe behaviors, and assessments of collision risk as a precursor …

A comprehensive survey on the application of blockchain/hash chain technologies in V2X communications

H Farran, D Khoury, L Bokor - Infocommunications Journal, 2022 - real.mtak.hu
The Vehicle-to-Everything (V2X) technology and protocols are the main cornerstones for
advanced transportation and autonomous vehicle applications. V2X has several subsets …

An analysis of a stochastic on-off queueing mobility model for software-defined vehicle networks

TA Edwan, A Tahat, H Yanikomeroglu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We have recently witnessed a number of new software-defined paradigms of VANET in what
is referred to as software-defined vehicle networks (SDVN). In order to evaluate the …