V-range: Enabling secure ranging in 5g wireless networks

M Singh, M Roeschlin, A Ranganathan… - NDSS, 2022 - publications.cispa.saarland
A number of safety-and security-critical applications such as asset tracking, smart
ecosystems, autonomous vehicles and driver assistance functions, etc., are expected to …

Age of information in CSMA-based networks with bursty update traffic

A Baiocchi, I Turcanu, A Vinel - IEEE Access, 2022 - ieeexplore.ieee.org
Exchanging status information between closely located mobile agents is an underlying
process in numerous future Cyber Physical System (CPS). Real-time updates including …

Blockchain‐enhanced trust management for mobile edge computing‐enabled intelligent vehicular collaboration in the 6G era

X Wang, H Zhu, H Xiao, Z Zhou… - Transactions on …, 2023 - Wiley Online Library
The rapid development and increasing popularity of mobile devices have facilitated the
development of computation‐intensive applications and services, but their constrained …

GPSKey: GPS-based secret key establishment for intra-vehicle environment

E Yang, S Fang - Workshop on Automotive and Autonomous Vehicle …, 2022 - par.nsf.gov
With the advent of the in-vehicle infotainment (IVI) systems (eg, Android Automotive) and
other portable devices (eg, smartphones) that may be brought into a vehicle, it becomes …

FL-IDS: Federated Learning-Based Intrusion Detection System Using Edge Devices for Transportation IoT

M Bhavsar, Y Bekele, K Roy, J Kelly, D Limbrick - IEEE Access, 2024 - ieeexplore.ieee.org
A federated learning-based intrusion detection system (FL-IDS) is introduced to enhance the
security of vehicular networks in the context of IoT edge device implementations. The FL-IDS …

DRIVE: Dual rider-remora optimization for vehicular routing

G Kaur, D Kakkar - Peer-to-Peer Networking and Applications, 2024 - Springer
The evolution of critical Internet of Things (IoT) wings research on Vehicular Ad-hoc
Networks (VANETs) added transmission as the primary pre-requisite for the successful …

Time-efficient detection of false position attack in 5G and beyond vehicular networks

TET Djaidja, B Brik, A Boualouache, SM Senouci… - Computer Networks, 2024 - Elsevier
Abstract 5G-V2X-enabled transportation systems rely on seamless cooperation between
vehicles, infrastructure, and pedestrians, facilitated by the exchange of real-time position …

A literature review on V2X communications security: Foundation, solutions, status, and future

Z Ying, K Wang, J Xiong, M Ma - IET Communications, 2024 - Wiley Online Library
With the refinement and development of the Vehicle to Everything (V2X) concept, its security
issues have gradually come to the fore, revealing many security risks and increasing …

Towards autonomous vehicles: a survey on cooperative vehicle-infrastructure system

JI Yangjie, Z Zewei, Y Ziru, Y Huang, Y Zhang… - Iscience, 2024 - cell.com
SUMMARY Cooperative Vehicle-Infrastructure System (CVIS) is an important part of the
intelligent transport system (ITS). Autonomous vehicles have the potential to improve safety …

Cybersecurity Frameworks for Autonomous Vehicle Systems: Safeguarding Onboard Systems, Communication Networks, and Data Privacy in Smart City Ecosystems

BJ Asaju - Internet of Things and Edge Computing Journal, 2024 - thesciencebrigade.com
In the rapidly evolving landscape of transportation technology, the advent of autonomous
vehicles (AVs) promises transformative benefits in terms of safety, efficiency, and mobility …