A review on autonomous vehicles: Progress, methods and challenges

D Parekh, N Poddar, A Rajpurkar, M Chahal, N Kumar… - Electronics, 2022 - mdpi.com
Vehicular technology has recently gained increasing popularity, and autonomous driving is
a hot topic. To achieve safe and reliable intelligent transportation systems, accurate …

A survey on attack detection and resilience for connected and automated vehicles: From vehicle dynamics and control perspective

Z Ju, H Zhang, X Li, X Chen, J Han… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Recent advances in attack/anomaly detection and resilience strategies for connected and
automated vehicles (CAVs) are reviewed from vehicle dynamics and control perspective …

A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles

SK Khan, N Shiwakoti, P Stasinopoulos - Accident Analysis & Prevention, 2022 - Elsevier
Abstract Emerging Connected and Autonomous Vehicles (CAVs) technology have a
ubiquitous communication framework. It poses security challenges in the form of cyber …

Post-accident cyberattack event analysis for connected and automated vehicles

M Girdhar, Y You, TJ Song, S Ghosh, J Hong - IEEE Access, 2022 - ieeexplore.ieee.org
Smart mobility is an imperative facet of smart cities, and the transition of conventional
automotive systems to connected and automated vehicles (CAVs) is envisioned as one of …

EnTruVe: ENergy and TRUst-aware Virtual Machine allocation in VEhicle fog computing for catering applications in 5G

FH Rahman, SHS Newaz, TW Au, WS Suhaili… - Future Generation …, 2022 - Elsevier
It is undoubted that fog computing contributes in catering the latency-stringent applications
of 5G, and one of the enabling technologies that fundamentally ensures the success of fog …

A frequency-domain spoofing attack on FMCW radars and its mitigation technique based on a hybrid-chirp waveform

P Nallabolu, C Li - IEEE Transactions on Microwave Theory …, 2021 - ieeexplore.ieee.org
This article presents a novel spoofing device capable of injecting false target information into
a frequency-modulated continuous-wave (FMCW) radar. The spoofing device uses a radio …

Blockchain-integrated multiagent deep reinforcement learning for securing cooperative adaptive cruise control

G Raja, K Kottursamy, K Dev… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Connected and Autonomous Vehicles (CAVs) are an emerging solution to the issues of safe
and sustainable transportation systems in the future. One major transport technology for …

Autonomous vehicles security: Challenges and solutions using blockchain and artificial intelligence

G Bendiab, A Hameurlaine, G Germanos… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The arrival of autonomous vehicles (AVs) promises many great benefits, including increased
safety and reduced energy consumption, pollution, and congestion. However, these engines …

[HTML][HTML] Alternative prioritization of freeway incident management using autonomous vehicles in mixed traffic using a type-2 neutrosophic number based decision …

I Gokasar, V Simic, M Deveci, T Senapati - Engineering Applications of …, 2023 - Elsevier
Traffic incident management is combining the assets of authorities to identify, deal with, and
manage traffic problems as rapidly as possible while providing the safety of on-scene …

Event-triggered adaptive security path following control for unmanned ground vehicles under sensor attacks

HT Sun, C Peng - IEEE Transactions on Vehicular Technology, 2023 - ieeexplore.ieee.org
This paper is concerned with the event-triggered adaptive security control (ET-ASC) for the
path following of networked unmanned ground vehicles (UGVs) subject to sensor attacks …