6G for vehicle-to-everything (V2X) communications: Enabling technologies, challenges, and opportunities

M Noor-A-Rahim, Z Liu, H Lee, MO Khyam… - Proceedings of the …, 2022 - ieeexplore.ieee.org
We are on the cusp of a new era of connected autonomous vehicles with unprecedented
user experiences, tremendously improved road safety and air quality, highly diverse …

Machine learning and blockchain technologies for cybersecurity in connected vehicles

J Ahmad, MU Zia, IH Naqvi, JN Chattha… - … : Data Mining and …, 2024 - Wiley Online Library
Future connected and autonomous vehicles (CAVs) must be secured against cyberattacks
for their everyday functions on the road so that safety of passengers and vehicles can be …

Secure distributed adaptive platooning control of automated vehicles over vehicular ad-hoc networks under denial-of-service attacks

S Xiao, X Ge, QL Han, Y Zhang - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This article deals with the problem of secure distributed adaptive platooning control of
automated vehicles over vehicular ad-hoc networks (VANETs) in the presence of intermittent …

Attacks on self-driving cars and their countermeasures: A survey

A Chowdhury, G Karmakar, J Kamruzzaman… - IEEE …, 2020 - ieeexplore.ieee.org
Intelligent Traffic Systems (ITS) are currently evolving in the form of a cooperative ITS or
connected vehicles. Both forms use the data communications between Vehicle-to-Vehicle …

Quantum-defended blockchain-assisted data authentication protocol for internet of vehicles

DS Gupta, A Karati, W Saad… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The so-called Internet of Vehicle (IoV) systems will interconnect numerous vehicles to
communicate significant information through an Internet of Things (IoT) enabled network. It …

Drones in distress: A game-theoretic countermeasure for protecting uavs against gps spoofing

AR Eldosouky, A Ferdowsi… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
One prominent security threat that targets unmanned aerial vehicles (UAVs) is the capture
via global positioning system (GPS) spoofing in which an attacker manipulates a UAV's GPS …

Reinforcement learning-based physical-layer authentication for controller area networks

L Xiao, X Lu, T Xu, W Zhuang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In controller area networks (CANs), electronic control units (ECUs) such as telematics ECUs
and on-board diagnostic ports must protect the message exchange from spoofing attacks. In …

Observer-based attack detection and mitigation for cyberphysical systems: A review

M Kordestani, M Saif - IEEE Systems, Man, and Cybernetics …, 2021 - ieeexplore.ieee.org
Demands for security, efficiency, and environmental protection have led to the rapid
deployment of cyberphysical systems (CPSs), which are now an integral part of modern …

[HTML][HTML] Perspectives on harmful algal blooms (HABs) and the cyberbiosecurity of freshwater systems

DG Schmale III, AP Ault, W Saad, DT Scott… - … in Bioengineering and …, 2019 - frontiersin.org
Harmful Algal Blooms (HABs) have been observed in all 50 states in the US, ranging from
large freshwater lakes, such as the Great Lakes, to smaller inland lakes, rivers, and …

Observer-based event-triggered adaptive platooning control for autonomous vehicles with motion uncertainties

Y Xue, C Wang, C Ding, B Yu, S Cui - Transportation research part C …, 2024 - Elsevier
Based on the back-stepping technique, this paper designs an observer-based event-
triggered adaptive platooning control algorithm for autonomous vehicles (AVs) with motion …