Star rating of driver's behavior as a tool to prevent risky behavior

M Tešić, S Miladić-Tešić, K Folla, G Yannis… - … research part F: traffic …, 2023 - Elsevier
Driver behavior is a key determinant of road safety. Risky behaviors can be measured and
quantified using traditional and modern methods, which enables the assessment of the …

Performance analysis of v2i zone activation and scalability for c-v2x transactional services

M Zaman, M Saifuddin… - 2022 IEEE 96th …, 2022 - ieeexplore.ieee.org
Cellular-V2X (C-V2X) enables communication between vehicles and other transportation
entities over the 5.9 GHz spectrum. C-V2X utilizes direct communication mode for safety …

Handover management in vehicle communication: applications, techniques, issues, and challenges: a review

HH Qasim, HZ Abidin, SAC Abdullah - Bulletin of Electrical Engineering …, 2024 - beei.org
Abstract Vehicle-to-everything (V2X) communication is an emerging technology that
facilitates communication among vehicles and numerous environmental entities. However, it …

Security and privacy in V2X communications: How can collaborative learning improve cybersecurity?

PK Sharma, D Vohra, S Rathore - IEEE Network, 2022 - ieeexplore.ieee.org
Advances in cellular technology are a key driver of the growing automotive vehicle-to-
everything (V2X) market. In V2X communications, information from sensors and other …

Precise UAV MMW-Vision Positioning: A Modal-Oriented Self-Tuning Fusion Framework

G Wu, F Zhou, C Meng, XY Li - IEEE Journal on Selected Areas …, 2023 - ieeexplore.ieee.org
Precise real-time unmanned aerial vehicle (UAV) positioning is crucial for preventing
unauthorized UAVs from damaging cooperative intelligent transportation systems (C-ITSs) …

Multi-domain denial-of-service attacks in internet-of-vehicles: Vulnerability insights and detection performance

R Sedar, C Kalalas, J Alonso-Zarate… - 2022 IEEE 8th …, 2022 - ieeexplore.ieee.org
The transformative Internet-of-Vehicles (IoV) paradigm comes inadvertently with challenges
which involve security vulnerabilities and privacy breaches. In this context, denial-of-service …

[HTML][HTML] Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication

SAA Hakeem, HW Kim - Alexandria Engineering Journal, 2023 - Elsevier
Security concerns in 5 G-V2X communication, including message authenticity, entity
identification, and efficient malicious entity detection, necessitate innovative solutions. This …

Advancements in Intrusion Detection Systems for V2X: Leveraging AI and ML for Real-Time Cyber Threat Mitigation

BJ Asaju - Journal of Computational Intelligence and …, 2024 - thesciencebrigade.com
The proliferation of Internet of Things (IoT) technology has extended its reach to the
automotive domain, notably through Vehicle-to-Everything (V2X) communication. This …

Privacy for 5G-supported vehicular networks

M Li, L Zhu, Z Zhang, C Lal, M Conti… - IEEE Open Journal of …, 2021 - ieeexplore.ieee.org
Vehicular networks allow billions of vehicular users to be connected to report and exchange
real-time data for offering various services, such as navigation, ride-hailing, smart parking …

Seamless group handover authentication protocol for vehicle networks: Services continuity

Y Bi, K Fan, Z Zeng, K Yang, H Li, Y Yang - Computer Networks, 2024 - Elsevier
The advantages of low latency, high reliability and high bandwidth of dense cellular network
support real-time sensing, decision making and regulation of vehicular network. Network …