Huang, D.,
Misra, S.,
Verma, M.,
Xue, G.,
PACP: An Efficient Pseudonymous Authentication-Based Conditional
Privacy Protocol for VANETs,
ITS(12), No. 3, September 2011, pp. 736-746.
IEEE DOI
1109
BibRef
Chim, T.W.,
Yiu, S.M.,
Hui, L.C.K.,
Li, V.O.K.,
OPQ: OT-Based Private Querying in VANETs,
ITS(12), No. 4, December 2011, pp. 1413-1422.
IEEE DOI
1112
BibRef
Lu, R.,
Lin, X.,
Liang, X.,
Shen, X.,
A Dynamic Privacy-Preserving Key Management Scheme for Location-Based
Services in VANETs,
ITS(13), No. 1, March 2012, pp. 127-139.
IEEE DOI
1203
BibRef
Taha, S.,
Shen, X.,
A Physical-Layer Location Privacy-Preserving Scheme for Mobile Public
Hotspots in NEMO-Based VANETs,
ITS(14), No. 4, 2013, pp. 1665-1680.
IEEE DOI
1312
Estimation error
BibRef
Yan, G.,
Wen, D.,
Olariu, S.,
Weigle, M.C.,
Security Challenges in Vehicular Cloud Computing,
ITS(14), No. 1, March 2013, pp. 284-294.
IEEE DOI
1303
BibRef
Petit, J.,
Shladover, S.E.,
Potential Cyberattacks on Automated Vehicles,
ITS(16), No. 2, April 2015, pp. 546-556.
IEEE DOI
1504
Automation
BibRef
Woo, S.,
Jo, H.J.,
Lee, D.H.,
A Practical Wireless Attack on the Connected Car and Security
Protocol for In-Vehicle CAN,
ITS(16), No. 2, April 2015, pp. 993-1006.
IEEE DOI
1504
Automotive engineering
BibRef
Woo, S.,
Jo, H.J.,
Kim, I.S.,
Lee, D.H.,
A Practical Security Architecture for In-Vehicle CAN-FD,
ITS(17), No. 8, August 2016, pp. 2248-2261.
IEEE DOI
1608
Automotive engineering
BibRef
Qu, F.,
Wu, Z.,
Wang, F.,
Cho, W.,
A Security and Privacy Review of VANETs,
ITS(16), No. 6, December 2015, pp. 2985-2996.
IEEE DOI
1512
Authentication
BibRef
Alcaide, A.,
Palomar, E.,
Fuentes, J.M.,
Gonza´lez-Manzano, L.,
Privacy-aware average speed monitoring system for vehicular ad-hoc
networks,
IET-ITS(9), No. 3, 2015, pp. 293-305.
DOI Link
1506
cryptographic protocols
BibRef
Jiang, S.,
Zhu, X.,
Wang, L.,
An Efficient Anonymous Batch Authentication Scheme Based on HMAC for
VANETs,
ITS(17), No. 8, August 2016, pp. 2193-2204.
IEEE DOI
1608
Authentication
BibRef
Lo, N.W.,
Tsai, J.L.,
An Efficient Conditional Privacy-Preserving Authentication Scheme for
Vehicular Sensor Networks Without Pairings,
ITS(17), No. 5, May 2016, pp. 1319-1328.
IEEE DOI
1605
Authentication
BibRef
Li, W.,
Song, H.,
ART: An Attack-Resistant Trust Management Scheme for Securing
Vehicular Ad Hoc Networks,
ITS(17), No. 4, April 2016, pp. 960-969.
IEEE DOI
1604
Ad hoc networks
BibRef
Vijayakumar, P.,
Azees, M.,
Kannan, A.,
Deborah, L.J.[L. Jegatha],
Dual Authentication and Key Management Techniques for Secure Data
Transmission in Vehicular Ad Hoc Networks,
ITS(17), No. 4, April 2016, pp. 1015-1028.
IEEE DOI
1604
Authentication
See also Comments on Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks.
BibRef
Azees, M.,
Reply to Comments on 'Dual Authentication and Key Management
Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks',
ITS(20), No. 9, September 2019, pp. 3595-3595.
IEEE DOI
1909
Authentication, Vehicular ad hoc networks, Digital signatures,
Cryptography, Data communication, Resistance, Authentication,
replay attack
See also Comments on Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks.
BibRef
Azees, M.,
Vijayakumar, P.,
Jegatha Deborah, L.,
Comprehensive survey on security services in vehicular ad-hoc
networks,
IET-ITS(10), No. 6, 2016, pp. 379-388.
DOI Link
1608
intelligent transportation systems
BibRef
Zhang, L.,
Wu, Q.,
Domingo-Ferrer, J.,
Qin, B.,
Hu, C.,
Distributed Aggregate Privacy-Preserving Authentication in VANETs,
ITS(18), No. 3, March 2017, pp. 516-526.
IEEE DOI
1703
Aggregates
BibRef
Xia, Y.,
Chen, W.,
Liu, X.,
Zhang, L.,
Li, X.,
Xiang, Y.,
Adaptive Multimedia Data Forwarding for Privacy Preservation in
Vehicular Ad-Hoc Networks,
ITS(18), No. 10, October 2017, pp. 2629-2641.
IEEE DOI
1710
Ad hoc networks, Cryptography, Data privacy,
Multimedia communication, Privacy, Social network services,
Attributed-based encryption, decision tree, multimedia message,
outsourcing decryption, vehicular ad-hoc networks
BibRef
Jo, H.J.,
Kim, I.S.,
Lee, D.H.,
Reliable Cooperative Authentication for Vehicular Networks,
ITS(19), No. 4, April 2018, pp. 1065-1079.
IEEE DOI
1804
Authentication, Message authentication, Protocols, Reliability,
Roads, Synchronization, Anonymity, cooperative authentication,
vehicular Ad-hoc NETworks
BibRef
Rosenstatter, T.,
Englund, C.,
Modelling the Level of Trust in a Cooperative Automated Vehicle
Control System,
ITS(19), No. 4, April 2018, pp. 1237-1247.
IEEE DOI
1804
Control systems, Decision making, Kalman filters, Radar,
Sensor systems, Vehicular ad hoc networks, GCDC 2016,
vehicle-to-vehicle communication
BibRef
Khodaei, M.,
Jin, H.,
Papadimitratos, P.,
SECMACE: Scalable and Robust Identity and Credential Management
Infrastructure in Vehicular Communication Systems,
ITS(19), No. 5, May 2018, pp. 1430-1444.
IEEE DOI
1805
Authentication, Delays, Principal component analysis, Privacy,
Public key, Vehicular communications,
vehicular PKI
BibRef
Li, L.,
Liu, J.,
Cheng, L.,
Qiu, S.,
Wang, W.,
Zhang, X.,
Zhang, Z.,
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive
Announcement Network for Communications of Smart Vehicles,
ITS(19), No. 7, July 2018, pp. 2204-2220.
IEEE DOI
1807
Authentication, Privacy, Protocols, Reliability, Servers,
Smart transportation, Smart transportation, blockchain,
vehicular communication
BibRef
Zhang, Q.,
Boukerche, A.,
A Novel Infrastructure-Based Worm Spreading Countermeasure for
Vehicular Networks,
ITS(19), No. 7, July 2018, pp. 2188-2203.
IEEE DOI
1807
Analytical models, Curing, Grippers, Roads, Simulation, Topology,
Vehicular ad hoc networks, Vehicular networks (VANETs),
worms
BibRef
Kang, J.,
Yu, R.,
Huang, X.,
Zhang, Y.,
Privacy-Preserved Pseudonym Scheme for Fog Computing Supported
Internet of Vehicles,
ITS(19), No. 8, August 2018, pp. 2627-2637.
IEEE DOI
1808
Privacy, Cloud computing, Local government, Edge computing,
Computer architecture, Safety, Internet of vehicles, fog computing,
game theory
BibRef
Förster, D.,
Löhr, H.,
Grätz, A.,
Petit, J.,
Kargl, F.,
An Evaluation of Pseudonym Changes for Vehicular Networks in
Large-Scale, Realistic Traffic Scenarios,
ITS(19), No. 10, October 2018, pp. 3400-3405.
IEEE DOI
1810
Privacy, Vehicles, Road transportation, Vehicular ad hoc networks,
Standards, Safety, Observers, C-ITS, vehicular ad hoc networks,
tracking
BibRef
Kaviani, A.[Arash],
Thompson, R.G.[Russell G.],
Rajabifard, A.[Abbas],
Sarvi, M.[Majid],
Hybrid machine learning and optimisation method to solve a tri-level
road network protection problem,
IET-ITS(12), No. 9, November 2018, pp. 1011-1019.
DOI Link
1810
BibRef
Abdollahi Biron, Z.,
Dey, S.,
Pisu, P.,
Real-Time Detection and Estimation of Denial of Service Attack in
Connected Vehicle Systems,
ITS(19), No. 12, December 2018, pp. 3893-3902.
IEEE DOI
1812
Cyberattack, Stability analysis, Safety, Mathematical model, Delays,
Estimation, Control systems, Connected vehicles,
estimation
BibRef
Shin, D.,
Kim, B.,
Yi, K.,
Carvalho, A.,
Borrelli, F.,
Human-Centered Risk Assessment of an Automated Vehicle Using
Vehicular Wireless Communication,
ITS(20), No. 2, February 2019, pp. 667-681.
IEEE DOI
1902
Safety, Radar, Vehicles, Vehicular ad hoc networks, Risk management,
Wireless communication, Delays, Risk assessment,
automated drive
BibRef
Corser, G.P.,
Fu, H.,
Banihani, A.,
Evaluating Location Privacy in Vehicular Communications and
Applications,
ITS(17), No. 9, September 2016, pp. 2658-2667.
IEEE DOI
1609
Measurement
BibRef
Lai, C.,
Zhang, K.,
Cheng, N.,
Li, H.,
Shen, X.,
SIRC: A Secure Incentive Scheme for Reliable Cooperative Downloading
in Highway VANETs,
ITS(18), No. 6, June 2017, pp. 1559-1574.
IEEE DOI
1706
Authentication, Incentive schemes, Internet, Reliability,
Road transportation, Vehicles, VANET, cooperation, downloading,
drive-thru Internet, incentive, security
BibRef
Azees, M.,
Vijayakumar, P.,
Deboarh, L.J.,
EAAP: Efficient Anonymous Authentication With Conditional
Privacy-Preserving Scheme for Vehicular Ad Hoc Networks,
ITS(18), No. 9, September 2017, pp. 2467-2476.
IEEE DOI
1709
telecommunication security, signature verification process,
Multicast communication, Conditional privacy,
anonymous certificates, authentication, security,
BibRef
Liu, Y.,
Wang, Y.,
Chang, G.,
Efficient Privacy-Preserving Dual Authentication and Key Agreement
Scheme for Secure V2V Communications in an IoV Paradigm,
ITS(18), No. 10, October 2017, pp. 2740-2749.
IEEE DOI
1710
Authentication, Encryption, Hardware, Technological innovation,
Internet of Vehicles,
privacy-preserving, vehicle-to-vehicle, security
BibRef
Parkinson, S.,
Ward, P.,
Wilson, K.,
Miller, J.,
Cyber Threats Facing Autonomous and Connected Vehicles:
Future Challenges,
ITS(18), No. 11, November 2017, pp. 2898-2915.
IEEE DOI
1711
Automation, Computer security, Global Positioning System, Hardware,
Jamming, Monitoring, Sensors, Connected, autonomous, cyber threats,
mitigation, vehicles, vulnerabilities
BibRef
Tan, H.,
Choi, D.,
Kim, P.,
Pan, S.,
Chung, I.,
Comments on 'Dual Authentication and Key Management Techniques for
Secure Data Transmission in Vehicular Ad Hoc Networks',
ITS(19), No. 7, July 2018, pp. 2149-2151.
IEEE DOI
1807
See also Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks.
See also Reply to Comments on Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks. Authentication, Cryptography, Data communication, Resistance,
Vehicular ad hoc networks, Authentication, VANETs,
replay attack
BibRef
Ahmed, S.H.,
Bouk, S.H.,
Yaqub, M.A.,
Kim, D.,
Song, H.,
DIFS: Distributed Interest Forwarder Selection in Vehicular Named
Data Networks,
ITS(19), No. 9, September 2018, pp. 3076-3080.
IEEE DOI
1809
Storms, Security, Delays, Roads, Reliability, Vehicle dynamics,
IP networks, NDN, interest forwarding, vehicular networks
BibRef
Suo, D.[Dajiang],
Siegel, J.E.[Joshua E.],
Sarma, S.E.[Sanjay E.],
Merging safety and cybersecurity analysis in product design,
IET-ITS(12), No. 9, November 2018, pp. 1103-1109.
DOI Link
1810
BibRef
Panagiotopoulos, I.[Ilias],
Dimitrakopoulos, G.[George],
Diffie-Hellman process and its use in secure and authenticated VC
networks,
IET-ITS(12), No. 9, November 2018, pp. 1082-1087.
DOI Link
1810
BibRef
Brecht, B.,
Therriault, D.,
Weimerskirch, A.,
Whyte, W.,
Kumar, V.,
Hehn, T.,
Goudy, R.,
A Security Credential Management System for V2X Communications,
ITS(19), No. 12, December 2018, pp. 3850-3871.
IEEE DOI
1812
Privacy, Safety, Cryptography, Risk management, Vehicles,
Device-to-device communication, vehicle safety, cryptography,
intelligent transportation systems
BibRef
Lu, Z.,
Qu, G.,
Liu, Z.,
A Survey on Recent Advances in Vehicular Network Security, Trust, and
Privacy,
ITS(20), No. 2, February 2019, pp. 760-776.
IEEE DOI
1902
Privacy, Authentication, Vehicular ad hoc networks, Safety, Tools,
VANETs, security, privacy, trust management, simulation tools
BibRef
Cheng, T.,
Liu, G.,
Yang, Q.,
Sun, J.,
Trust Assessment in Vehicular Social Network Based on Three-Valued
Subjective Logic,
MultMed(21), No. 3, March 2019, pp. 652-663.
IEEE DOI
1903
road safety, road vehicles, security of data,
social networking (online), traffic engineering computing,
distributed algorithm
BibRef
Liu, S.,
Liu, L.,
Tang, J.,
Yu, B.,
Wang, Y.,
Shi, W.,
Edge Computing for Autonomous Driving: Opportunities and Challenges,
PIEEE(107), No. 8, August 2019, pp. 1697-1716.
IEEE DOI
1908
Connected and autonomous vehicles (CAVs), edge computing,
heterogeneous computing, security, vehicle-to-everything (V2X),
vehicular operating system
BibRef
Javed, M.A.,
Hamida, E.B.,
On the Interrelation of Security, QoS, and Safety in Cooperative ITS,
ITS(18), No. 7, July 2017, pp. 1943-1957.
IEEE DOI
1706
Cams, Quality of service, Roads, Safety, Security, Standards, Vehicles,
Intelligent transport systems, QoS, VANET, safety awareness, security
BibRef
Cui, J.,
Wei, L.,
Zhang, J.,
Xu, Y.,
Zhong, H.,
An Efficient Message-Authentication Scheme Based on Edge Computing
for Vehicular Ad Hoc Networks,
ITS(20), No. 5, May 2019, pp. 1621-1632.
IEEE DOI
1905
Authentication, Message authentication, Edge computing,
Vehicular ad hoc networks, Cloud computing, Vehicles, VANETs,
edge computing
BibRef
Arshad, M.[Muhammad],
Ullah, Z.[Zahid],
Khalid, M.[Muhammad],
Ahmad, N.[Naveed],
Khalid, W.[Waqar],
Shahwar, D.[Duri],
Cao, Y.[Yue],
Beacon trust management system and fake data detection in vehicular
ad-hoc networks,
IET-ITS(13), No. 5, May 2019, pp. 780-788.
DOI Link
1906
BibRef
Liu, Y.[Yi],
Wu, J.[Jun],
Li, J.H.[Jian-Hua],
Yang, W.[Wu],
Chen, H.[Hao],
Li, G.[Gaolei],
ISRF: interest semantic reasoning based fog
firewall for information-centric Internet of Vehicles,
IET-ITS(13), No. 6, June 2019, pp. 975-982.
DOI Link
1906
BibRef
Kanchan, S.[Sneha],
Singh, G.[Garima],
Chaudhari, N.S.[Narendra S.],
SAPSC: SignRecrypting authentication protocol using shareable clouds in
VANET groups,
IET-ITS(13), No. 9, September 2019, pp. 1447-1460.
DOI Link
1908
BibRef
Rasheed, A.A.,
Mahapatra, R.N.,
Hamza-Lup, F.G.,
Adaptive Group-Based Zero Knowledge Proof-Authentication Protocol in
Vehicular Ad Hoc Networks,
ITS(21), No. 2, February 2020, pp. 867-881.
IEEE DOI
2002
Authentication, Protocols, Privacy, Vehicular ad hoc networks,
Public key, Authentication, privacy and trust, anonymity, revocation
BibRef
Chen, J.,
Mao, G.,
Li, C.,
Zhang, D.,
A Topological Approach to Secure Message Dissemination in Vehicular
Networks,
ITS(21), No. 1, January 2020, pp. 135-148.
IEEE DOI
2001
Roads, Relays, Network topology, Heuristic algorithms, Encryption,
Authentication, Vehicular networks, security,
decision algorithm
BibRef
Lu, R.,
Zhang, L.,
Ni, J.,
Fang, Y.,
5G Vehicle-to-Everything Services:
Gearing Up for Security and Privacy,
PIEEE(108), No. 2, February 2020, pp. 373-389.
IEEE DOI
2001
5G vehicle-to-everything (V2X) services, challenges, privacy,
security, solutions, trust
BibRef
Ren, K.,
Wang, Q.,
Wang, C.,
Qin, Z.,
Lin, X.,
The Security of Autonomous Driving: Threats, Defenses, and Future
Directions,
PIEEE(108), No. 2, February 2020, pp. 357-372.
IEEE DOI
2001
Laser radar, Sensors, Security, Global Positioning System,
Autonomous vehicles, Jamming, Autonomous vehicles (AVs),
sensors
BibRef
Castiglione, A.[Arcangelo],
Palmieri, F.[Francesco],
Colace, F.[Francesco],
Lombardi, M.[Marco],
Santaniello, D.[Domenico],
d'Aniello, G.[Giuseppe],
Securing the internet of vehicles through lightweight block ciphers,
PRL(135), 2020, pp. 264-270.
Elsevier DOI
2006
Internet of vehicles, Automotive security,
Controller area network, Lightweight cryptography,
Security
BibRef
Boualouache, A.,
Senouci, S.,
Moussaoui, S.,
PRIVANET: An Efficient Pseudonym Changing and Management Framework
for Vehicular Ad-Hoc Networks,
ITS(21), No. 8, August 2020, pp. 3209-3218.
IEEE DOI
2008
Privacy, Mathematical model, Ad hoc networks, Adaptation models,
Road safety, IP networks, Vehicular ad-hoc networks (VANETs),
pseudonym changing
BibRef
Yan, G.,
Rawat, D.B.,
Shi, H.[Hui],
Chong, D.,
A cross-layer and optimized privacy method in Vehicular ad-hoc
Networks,
ICIVC17(894-898)
IEEE DOI
1708
Privacy, Protocols, Transportation, ad hoc network,
cost optimization, privacy, scalability, vehicular, networks
BibRef
Moudni, H.,
Er-Rouidi, M.,
Mouncif, H.,
El Hadadi, B.,
Attacks against AODV Routing Protocol in Mobile Ad-Hoc Networks,
CGiV16(385-389)
IEEE DOI
1608
mobile ad hoc networks
BibRef
Chapter on Motion -- Feature-Based, Long Range, Motion and Structure Estimates, Tracking, Surveillance, Activities continues in
Rail Traffic Controls, Trains .