Autonomous driving security: State of the art and challenges

C Gao, G Wang, W Shi, Z Wang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The autonomous driving industry has mushroomed over the past decade. Although
autonomous driving has undoubtedly become one of the most promising technologies of this …

Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities

M Yahuza, MYIB Idris, AWBA Wahab, ATS Ho… - IEEE …, 2020 - ieeexplore.ieee.org
Edge computing is a promising paradigm that enhances the capabilities of cloud computing.
In order to continue patronizing the computing services, it is essential to conserve a good …

[HTML][HTML] Blockchain based peer to peer communication in autonomous drone operation

MS Kumar, S Vimal, NZ Jhanjhi, SS Dhanabalan… - Energy Reports, 2021 - Elsevier
With the prevalence of Aerospace Technologies, the regulations of cybersecurity are
becoming smarter, assured, and long-lasting. Modern communication network technologies …

Machine learning modeling of GPS features with applications to UAV location spoofing detection and classification

M Nayfeh, Y Li, K Al Shamaileh, V Devabhaktuni… - Computers & …, 2023 - Elsevier
In this paper, machine learning (ML) modeling is proposed for the detection and
classification of global positioning system (GPS) spoofing in unmanned aerial vehicles …

Artificial Intelligence techniques to mitigate cyber-attacks within vehicular networks: Survey

A Haddaji, S Ayed, LC Fourati - Computers and Electrical Engineering, 2022 - Elsevier
Rapid advancements in communication technology have made vehicular networks a reality
with numerous applications. However, vehicular network security is still an open research …

Prediction-based GNSS spoofing attack detection for autonomous vehicles

S Dasgupta, M Rahman, M Islam… - arXiv preprint arXiv …, 2020 - arxiv.org
Global Navigation Satellite System (GNSS) provides Positioning, Navigation, and Timing
(PNT) services for autonomous vehicles (AVs) using satellites and radio communications …

Uav sensor spoofing detection algorithm based on gps and optical flow fusion

L Meng, S Ren, G Tang, C Yang, W Yang - Proceedings of the 2020 4th …, 2020 - dl.acm.org
The UAV security problem is becoming more and more serious, and the security of sensors
is receiving much attention. UAV's operation depends on the data collected by sensors, and …

Secure 5G positioning with truth discovery, attack detection, and tracing

Y Li, S Liu, Z Yan, RH Deng - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
The fifth-generation (5G) cellular network is expected to provide submeter positioning
accuracy without draining the battery of user equipment (UE). As a solution, ultradense …

Attack detection based on invariant state set for SDN-enabled vehicle platoon control system

M Zhou, L Han, H Lu, C Fu, Y Qian - Vehicular Communications, 2022 - Elsevier
The characteristics of physical constraints and widespread communication of vehicle
platoon system render it vulnerable to physical intrusion or cyber attacks. To enhance the …

GPS spoofed or not? Exploiting RSSI and TSS in crowdsourced air traffic control data

G Liu, R Zhang, Y Yang, C Wang, L Liu - Distributed and Parallel …, 2021 - Springer
GPS-dependent localization, tracking and navigation applications have a significant impact
on the modern aviation industry. However, the lack of encryption and authentication makes …