[PDF][PDF] Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance.

K Jansen, L Niu, N Xue, I Martinovic, C Pöpper - NDSS, 2021 - researchgate.net
Automatic Dependent Surveillance-Broadcast (ADS-B) has been widely adopted as the de
facto standard for air-traffic surveillance. Aviation regulations require all aircraft to actively …

Pof: Proof-of-following for vehicle platoons

Z Xu, J Li, Y Pan, L Lazos, M Li, N Ghose - arXiv preprint arXiv:2107.09863, 2021 - arxiv.org
Cooperative vehicle platooning significantly improves highway safety, fuel efficiency, and
traffic flow. In this model, a set of vehicles move in line formation and coordinate …

Pedro: Secure pedestrian mobility verification in v2p communication using commercial off-the-shelf mobile devices

Y Yang, K Lee, Y Kim, K Fawaz - Proceedings of the 2th Workshop on …, 2021 - dl.acm.org
Vehicle-to-Pedestrian (V2P) communication enables numerous safety benefits such as real-
time collision detection and alert, but poses new security challenges. An imminent and …

[PDF][PDF] Cyclops: Binding a Vehicle's Digital Identity to Its Physical Trajectory Using Monocular Cameras

LW Koplon, AG Nessaee, A Choi… - Symp. Veh. Secur …, 2024 - ndss-symposium.org
We address the problem of cyber-physical access control for connected autonomous
vehicles. The goal is to bind a vehicle's digital identity to its physical identity represented by …

Emerging of Machine Learning and Deep Learning Technology: Addressing in Intelligent Wireless Network Optimization

K Hailemariam, G Singh, MK Madata… - 2023 3rd …, 2023 - ieeexplore.ieee.org
Wireless networks have grown into an essential component of modern life as a result of the
proliferation of wireless technology over what has been a decade. The science underlying …

Practical GPS spoofing attacks on consumer drones

J Cao - 2020 - search.proquest.com
While the security of drones and unmanned automatic systems has become increasingly
important, software vulnerabilities have been broadly examined but hardware vulnerabilities …

[HTML][HTML] Modeling and detection of low-altitude flight conflict network based on SVM

Y Zheng, Z Le, X Huanquan, L Junhao… - Measurement …, 2024 - Elsevier
With the continuous increase in low altitude flight density, the issue of low altitude navigation
safety has attracted widespread attention. Due to the complex low altitude environment, low …

基于广播通信信道的轻量级车辆轨迹安全验证方案

宁志强, 汪媛媛, 张驰, 魏凌波… - 网络与信息安全学报, 2023 - infocomm-journal.com
在智慧交通系统中, 智能汽车需要实时广播车辆轨迹消息来协调驾驶决策, 保证行车安全. 然而,
攻击者可以通过修改消息的发送时间戳或操纵信号发射的载波频率伪造车辆轨迹. 针对该问题 …

Message sieving to mitigate smart gridlock attacks in V2V

S Dongre, H Rahbari - Proceedings of the 14th ACM Conference on …, 2021 - dl.acm.org
Growing deployment of vehicle-to-vehicle (V2V) communications is expected to significantly
increase the volume of Basic Safety Messages (BSM) in highways and dense roads …

Detecting data spoofing in connected vehicle based intelligent traffic signal control using infrastructure-side sensors and traffic invariants

J Shen, Z Wan, Y Luo, Y Feng, ZM Mao… - 2023 IEEE Intelligent …, 2023 - ieeexplore.ieee.org
Connected Vehicle (CV) technologies are under rapid deployment across the globe and will
soon reshape our transportation systems, bringing benefits to mobility, safety, environment …