Blockchain envisioned UAV networks: Challenges, solutions, and comparisons

P Mehta, R Gupta, S Tanwar - Computer Communications, 2020 - Elsevier
Abstract Unmanned Aerial Vehicles (UAV) or drones is a technology with a huge potential
for proving different efficient solutions in the smart city. It has been mostly adopted by …

A Survey on Cyber–Physical Systems Security

Z Yu, H Gao, X Cong, N Wu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Cyber–physical systems (CPSs) are new types of intelligent systems that integrate
computing, control, and communication technologies, bridging the cyberspace and physical …

A survey on cyber-security of connected and autonomous vehicles (CAVs)

X Sun, FR Yu, P Zhang - IEEE Transactions on Intelligent …, 2021 - ieeexplore.ieee.org
As the general development trend of the automotive industry, connected and autonomous
vehicles (CAVs) can be used to increase transportation safety, promote mobility choices …

Security issues in Internet of Vehicles (IoV): A comprehensive survey

H Taslimasa, S Dadkhah, ECP Neto, P Xiong, S Ray… - Internet of Things, 2023 - Elsevier
Nowadays, connected vehicles have a major role in enhancing the driving experience.
Connected vehicles in the network share their knowledge with the help of the network …

Blockchain for future wireless networks: A decade survey

T Rathod, NK Jadav, MD Alshehri, S Tanwar… - Sensors, 2022 - mdpi.com
The emerging need for high data rate, low latency, and high network capacity encourages
wireless networks (WNs) to build intelligent and dynamic services, such as intelligent …

Aspects of cyber security in autonomous and connected vehicles

BR Mudhivarthi, P Thakur, G Singh - Applied Sciences, 2023 - mdpi.com
An automobile is a computer on wheels after the integration of electronics. This handshake
of electronics and mechanical systems makes a vehicle smart, and comfortable; driver …

Directional modulation techniques for secure wireless communication: a comprehensive survey

O Ansari, M Amin - EURASIP Journal on Wireless Communications and …, 2022 - Springer
Directional Modulation (DM) techniques provide wireless communication security against
passive eavesdropping by means of specific physical layer characteristics. The original …

Toward secure and lightweight data transmission for cloud-edge-terminal collaboration in artificial intelligence of things

W Fang, C Zhu, W Zhang - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
As one of data sources in cloud–edge–terminal collaboration enabled artificial intelligence
of things (CETC-AIoT), the integrity and confidentiality of sensed information in the terminal …

A survey on secure computation based on homomorphic encryption in vehicular ad hoc networks

X Sun, FR Yu, P Zhang, W Xie, X Peng - Sensors, 2020 - mdpi.com
In vehicular ad hoc networks (VANETs), the security and privacy of vehicle data are core
issues. In order to analyze vehicle data, they need to be computed. Encryption is a common …

[PDF][PDF] Evaluations of cyber attacks on cooperative control of connected and autonomous vehicles at bottleneck points

HM Ahmad, E Sabouni, W Xiao… - … on Vehicles Security …, 2023 - par.nsf.gov
In this paper we analyze the effect of cyberattacks on cooperative control of connected and
autonomous vehicles (CAVs) at traffic bottleneck points. We focus on three types of such …