Essential technics of cybersecurity for intelligent connected vehicles: Comprehensive review and perspective

Y Shichun, Z Zheng, M Bin, Z Yifan… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Along with the promotion of intelligent connected vehicles (ICVs), the problems of network
attacks have rapidly increased, and thus the cybersecurity has drawn much attention …

[HTML][HTML] Machine-learning-enabled intrusion detection system for cellular connected UAV networks

R Shrestha, A Omidkar, SA Roudi, R Abbas, S Kim - Electronics, 2021 - mdpi.com
The recent development and adoption of unmanned aerial vehicles (UAVs) is due to its wide
variety of applications in public and private sector from parcel delivery to wildlife …

Multi-channel based Sybil attack detection in vehicular ad hoc networks using RSSI

Y Yao, B Xiao, G Wu, X Liu, Z Yu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Vehicular Ad Hoc Networks (VANETs) bring many benefits and conveniences to road safety
and drive comfort in future transportation systems. However, VANETs suffer from almost all …

A survey on security in VANETs

T Pavithra, BS Nagabhushana - 2020 second international …, 2020 - ieeexplore.ieee.org
Vehicular Ad-hoc network (VANET) is a very promising and upcoming technologyusedfor
traffic management and for facilitating road safety along with entertainment system …

Trustworthy Event‐Information Dissemination in Vehicular Ad Hoc Networks

R Shrestha, SY Nam - Mobile Information Systems, 2017 - Wiley Online Library
In vehicular networks, trustworthiness of exchanged messages is very important since a fake
message might incur catastrophic accidents on the road. In this paper, we propose a new …

AI accelerators for cloud and server applications

R Shrestha, R Bajracharya, A Mishra, S Kim - Artificial intelligence and …, 2023 - Springer
AI accelerator is a specialized hardware processing unit that provides high throughput,
lower latency, and higher energy efficiency compared to existing server-based processors …

Rssi sequence and vehicle driving matrix based sybil nodes detection in vanet

W Li, D Zhang - 2019 IEEE 11th International Conference on …, 2019 - ieeexplore.ieee.org
In VANET, Sybil nodes generated by attackers cause serious damages to network protocols,
resource allocation mechanisms, and reputation models. Other types of attacks can also be …

MAR_Sybil: Cooperative RSU based detection and prevention of Sybil attacks in routing process of VANET

M Kabbur, VA Kumar - Journal of Physics: Conference Series, 2020 - iopscience.iop.org
VANET is a next generation communication technology where vehicles create an
autonomous network with assistance of RSU (Road Side Units). VANET provides legitimate …

Detecting Sybil node in intelligent transport system

K Akshaya, TV Sarath - … and Application: Proceedings of ICIDCA 2021, 2022 - Springer
The most important applications of vehicular ad hoc networks (VANET) are dynamic traffic
light control. Sybil attack creates multiple fake identities for the same vehicle. In this paper …

Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers

A Kumar, M von Hippel, P Manolios… - arXiv preprint arXiv …, 2022 - arxiv.org
GossipSub is a new peer-to-peer communication protocol designed to counter attacks from
misbehaving peers by controlling what information is sent and to whom, via a score function …