Machine learning and blockchain technologies for cybersecurity in connected vehicles

J Ahmad, MU Zia, IH Naqvi, JN Chattha… - … : Data Mining and …, 2024 - Wiley Online Library
Future connected and autonomous vehicles (CAVs) must be secured against cyberattacks
for their everyday functions on the road so that safety of passengers and vehicles can be …

Smart applications in edge computing: Overview on authentication and data security

X Li, T Chen, Q Cheng, S Ma… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
As a new computing paradigm, edge computing has appeared in the public field of vision
recently. Owing to its advantages of low delay and fast response, edge computing has …

Class-imbalance privacy-preserving federated learning for decentralized fault diagnosis with biometric authentication

S Lu, Z Gao, Q Xu, C Jiang, A Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Privacy protection as a major concern of the industrial big data enabling entities makes the
massive safety-critical operation data of a wind turbine unable to exert its great value …

Joint computation offloading and resource allocation for edge-cloud collaboration in internet of vehicles via deep reinforcement learning

J Huang, J Wan, B Lv, Q Ye, Y Chen - IEEE Systems Journal, 2023 - ieeexplore.ieee.org
Mobile edge computing (MEC) and cloud computing (CC) have been considered as the key
technologies to improve the task processing efficiency for Internet of Vehicles (IoV). In this …

Attacks on self-driving cars and their countermeasures: A survey

A Chowdhury, G Karmakar, J Kamruzzaman… - IEEE …, 2020 - ieeexplore.ieee.org
Intelligent Traffic Systems (ITS) are currently evolving in the form of a cooperative ITS or
connected vehicles. Both forms use the data communications between Vehicle-to-Vehicle …

Security in IoT-enabled smart agriculture: Architecture, security solutions and challenges

A Vangala, AK Das, V Chamola, V Korotaev… - Cluster …, 2023 - Springer
Agricultural industry is one of the most vital industries that has a major contribution to the
economy due to its share in the Gross Domestic Product (GDP) and as a source of …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

Secure and lightweight user authentication scheme for cloud-assisted internet of things

C Wang, D Wang, Y Duan, X Tao - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is developing rapidly in such fields as smart grids and intelligent …

On the design of mutual authentication and key agreement protocol in internet of vehicles-enabled intelligent transportation system

P Bagga, AK Das, M Wazid… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Internet of Vehicles (IoV), a distributed network involving connected vehicles and Vehicular
Ad Hoc Networks (VANETs), allows connected vehicles to communicate with other Internet …

TRAC: traceable and revocable access control scheme for mHealth in 5G-enabled IIoT

Q Li, B Xia, H Huang, Y Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Mobile healthcare (mHealth) enables people to collect and share their personal health
records (PHRs) and gain rapid medical treatment via mobile 5G-enabled Industrial Internet …