Reliable detection of location spoofing and variation attacks

C Kim, SY Chang, D Lee, J Kim, K Park, J Kim - IEEE Access, 2023 - ieeexplore.ieee.org
Location spoofing is a critical attack in mobile communications. While several previous
studies investigated the detection of location spoofing attacks, they are limited in their …

[HTML][HTML] A Survey on Sensor Failures in Autonomous Vehicles: Challenges and Solutions

F Matos, J Bernardino, J Durães, J Cunha - Sensors, 2024 - mdpi.com
Autonomous vehicles (AVs) rely heavily on sensors to perceive their surrounding
environment and then make decisions and act on them. However, these sensors have …

Received Signal Strength‐Based Localization for Vehicle Distance Estimation in Vehicular Ad Hoc Networks (VANETs)

W Ahmad, G Husnain, S Ahmed, F Aadil… - Journal of …, 2023 - Wiley Online Library
Vehicular ad hoc networks (VANETs) are an eminent area of intelligent transportation
systems (ITS) which includes vehicle tracking, positioning, and emergency warnings. For …

Overview of Sensing Attacks on Autonomous Vehicle Technologies and Impact on Traffic Flow

Z Li, S Li, H Zhang, Y Zhou, S Xie, Y Zhang - arXiv preprint arXiv …, 2024 - arxiv.org
While perception systems in Connected and Autonomous Vehicles (CAVs), which
encompass both communication technologies and advanced sensors, promise to …

A machine learning approach for detecting gps location spoofing attacks in autonomous vehicles

S Filippou, A Achilleos, SZ Zukhraf… - 2023 IEEE 97th …, 2023 - ieeexplore.ieee.org
Connected and Autonomous Vehicles (CAV) depend on satellite systems, such as the
Global Positioning System (GPS), for location awareness. Location data are streamed in real …

A comprehensive solution for securing connected and autonomous vehicles

M Kamal, C Kyrkou, N Piperigkos… - … , Automation & Test …, 2022 - ieeexplore.ieee.org
With the advent of Connected and Autonomous Vehicles (CAVs) comes the very real risk
that these vehicles will be exposed to cyber-attacks by exploiting various vulnerabilities. This …

Cyber security analysis of connected vehicles

MD Mwanje, O Kaiwartya, M Aljaidi… - IET Intelligent …, 2024 - Wiley Online Library
The sensor‐enabled in‐vehicle communication and infrastructure‐centric vehicle‐to‐
everything (V2X) communications have significantly contributed to the spark in the amount of …

How can Blockchain be Integrated into Autonomous Systems to Ensure Data Integrity and Trustworthiness, and What are the Potential Pitfalls in Decentralized …

A Mesci, E Eren - Asian Journal of Research in …, 2024 - journal.article2publish.com
Real-time applications always have security issues present in their ecosystem which needs
to be improved. Blockchain technology can be considered as a solution that can ensure …

Securing Autonomous Vehicles Against GPS Spoofing Attacks: A Deep Learning Approach

M Shabbir, M Kamal, Z Ullah, MM Khan - IEEE Access, 2023 - ieeexplore.ieee.org
With the rapid advancement of technology and multimedia systems, ensuring security has
become a critical concern. Connected and Autonomous Vehicles (CAVs) are vulnerable to …

Survey on Security Attacks in Connected and Autonomous Vehicular Systems

SMM Hossain, S Banik, T Banik… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Connected and autonomous vehicles, also known as CAVs, are a general trend in the
evolution of the automotive industry that can be utilized to make transportation safer …