16.7.2.5.26 Security, Privacy in Vehicle Networks, VANET

Chapter Contents (Back)
Vehicle Networks. Networks. VANET. Smart Highways.

Huang, D., Misra, S., Verma, M., Xue, G.,
PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs,
ITS(12), No. 3, September 2011, pp. 736-746.
IEEE DOI 1109
BibRef

Chim, T.W., Yiu, S.M., Hui, L.C.K., Li, V.O.K.,
OPQ: OT-Based Private Querying in VANETs,
ITS(12), No. 4, December 2011, pp. 1413-1422.
IEEE DOI 1112
BibRef

Lu, R., Lin, X., Liang, X., Shen, X.,
A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs,
ITS(13), No. 1, March 2012, pp. 127-139.
IEEE DOI 1203
BibRef

Taha, S., Shen, X.,
A Physical-Layer Location Privacy-Preserving Scheme for Mobile Public Hotspots in NEMO-Based VANETs,
ITS(14), No. 4, 2013, pp. 1665-1680.
IEEE DOI 1312
Estimation error BibRef

Yan, G., Wen, D., Olariu, S., Weigle, M.C.,
Security Challenges in Vehicular Cloud Computing,
ITS(14), No. 1, March 2013, pp. 284-294.
IEEE DOI 1303
BibRef

Petit, J., Shladover, S.E.,
Potential Cyberattacks on Automated Vehicles,
ITS(16), No. 2, April 2015, pp. 546-556.
IEEE DOI 1504
Automation BibRef

Woo, S., Jo, H.J., Lee, D.H.,
A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN,
ITS(16), No. 2, April 2015, pp. 993-1006.
IEEE DOI 1504
Automotive engineering BibRef

Woo, S., Jo, H.J., Kim, I.S., Lee, D.H.,
A Practical Security Architecture for In-Vehicle CAN-FD,
ITS(17), No. 8, August 2016, pp. 2248-2261.
IEEE DOI 1608
Automotive engineering BibRef

Qu, F., Wu, Z., Wang, F., Cho, W.,
A Security and Privacy Review of VANETs,
ITS(16), No. 6, December 2015, pp. 2985-2996.
IEEE DOI 1512
Authentication BibRef

Alcaide, A., Palomar, E., Fuentes, J.M., Gonza´lez-Manzano, L.,
Privacy-aware average speed monitoring system for vehicular ad-hoc networks,
IET-ITS(9), No. 3, 2015, pp. 293-305.
DOI Link 1506
cryptographic protocols BibRef

Jiang, S., Zhu, X., Wang, L.,
An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs,
ITS(17), No. 8, August 2016, pp. 2193-2204.
IEEE DOI 1608
Authentication BibRef

Lo, N.W., Tsai, J.L.,
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings,
ITS(17), No. 5, May 2016, pp. 1319-1328.
IEEE DOI 1605
Authentication BibRef

Li, W., Song, H.,
ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks,
ITS(17), No. 4, April 2016, pp. 960-969.
IEEE DOI 1604
Ad hoc networks BibRef

Vijayakumar, P., Azees, M., Kannan, A., Deborah, L.J.[L. Jegatha],
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks,
ITS(17), No. 4, April 2016, pp. 1015-1028.
IEEE DOI 1604
Authentication
See also Comments on Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks. BibRef

Azees, M.,
Reply to Comments on 'Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks',
ITS(20), No. 9, September 2019, pp. 3595-3595.
IEEE DOI 1909
Authentication, Vehicular ad hoc networks, Digital signatures, Cryptography, Data communication, Resistance, Authentication, replay attack
See also Comments on Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks. BibRef

Azees, M., Vijayakumar, P., Jegatha Deborah, L.,
Comprehensive survey on security services in vehicular ad-hoc networks,
IET-ITS(10), No. 6, 2016, pp. 379-388.
DOI Link 1608
intelligent transportation systems BibRef

Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Hu, C.,
Distributed Aggregate Privacy-Preserving Authentication in VANETs,
ITS(18), No. 3, March 2017, pp. 516-526.
IEEE DOI 1703
Aggregates BibRef

Xia, Y., Chen, W., Liu, X., Zhang, L., Li, X., Xiang, Y.,
Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks,
ITS(18), No. 10, October 2017, pp. 2629-2641.
IEEE DOI 1710
Ad hoc networks, Cryptography, Data privacy, Multimedia communication, Privacy, Social network services, Attributed-based encryption, decision tree, multimedia message, outsourcing decryption, vehicular ad-hoc networks BibRef

Jo, H.J., Kim, I.S., Lee, D.H.,
Reliable Cooperative Authentication for Vehicular Networks,
ITS(19), No. 4, April 2018, pp. 1065-1079.
IEEE DOI 1804
Authentication, Message authentication, Protocols, Reliability, Roads, Synchronization, Anonymity, cooperative authentication, vehicular Ad-hoc NETworks BibRef

Rosenstatter, T., Englund, C.,
Modelling the Level of Trust in a Cooperative Automated Vehicle Control System,
ITS(19), No. 4, April 2018, pp. 1237-1247.
IEEE DOI 1804
Control systems, Decision making, Kalman filters, Radar, Sensor systems, Vehicular ad hoc networks, GCDC 2016, vehicle-to-vehicle communication BibRef

Khodaei, M., Jin, H., Papadimitratos, P.,
SECMACE: Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems,
ITS(19), No. 5, May 2018, pp. 1430-1444.
IEEE DOI 1805
Authentication, Delays, Principal component analysis, Privacy, Public key, Vehicular communications, vehicular PKI BibRef

Li, L., Liu, J., Cheng, L., Qiu, S., Wang, W., Zhang, X., Zhang, Z.,
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles,
ITS(19), No. 7, July 2018, pp. 2204-2220.
IEEE DOI 1807
Authentication, Privacy, Protocols, Reliability, Servers, Smart transportation, Smart transportation, blockchain, vehicular communication BibRef

Zhang, Q., Boukerche, A.,
A Novel Infrastructure-Based Worm Spreading Countermeasure for Vehicular Networks,
ITS(19), No. 7, July 2018, pp. 2188-2203.
IEEE DOI 1807
Analytical models, Curing, Grippers, Roads, Simulation, Topology, Vehicular ad hoc networks, Vehicular networks (VANETs), worms BibRef

Kang, J., Yu, R., Huang, X., Zhang, Y.,
Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles,
ITS(19), No. 8, August 2018, pp. 2627-2637.
IEEE DOI 1808
Privacy, Cloud computing, Local government, Edge computing, Computer architecture, Safety, Internet of vehicles, fog computing, game theory BibRef

Förster, D., Löhr, H., Grätz, A., Petit, J., Kargl, F.,
An Evaluation of Pseudonym Changes for Vehicular Networks in Large-Scale, Realistic Traffic Scenarios,
ITS(19), No. 10, October 2018, pp. 3400-3405.
IEEE DOI 1810
Privacy, Vehicles, Road transportation, Vehicular ad hoc networks, Standards, Safety, Observers, C-ITS, vehicular ad hoc networks, tracking BibRef

Kaviani, A.[Arash], Thompson, R.G.[Russell G.], Rajabifard, A.[Abbas], Sarvi, M.[Majid],
Hybrid machine learning and optimisation method to solve a tri-level road network protection problem,
IET-ITS(12), No. 9, November 2018, pp. 1011-1019.
DOI Link 1810
BibRef

Abdollahi Biron, Z., Dey, S., Pisu, P.,
Real-Time Detection and Estimation of Denial of Service Attack in Connected Vehicle Systems,
ITS(19), No. 12, December 2018, pp. 3893-3902.
IEEE DOI 1812
Cyberattack, Stability analysis, Safety, Mathematical model, Delays, Estimation, Control systems, Connected vehicles, estimation BibRef

Shin, D., Kim, B., Yi, K., Carvalho, A., Borrelli, F.,
Human-Centered Risk Assessment of an Automated Vehicle Using Vehicular Wireless Communication,
ITS(20), No. 2, February 2019, pp. 667-681.
IEEE DOI 1902
Safety, Radar, Vehicles, Vehicular ad hoc networks, Risk management, Wireless communication, Delays, Risk assessment, automated drive BibRef

Corser, G.P., Fu, H., Banihani, A.,
Evaluating Location Privacy in Vehicular Communications and Applications,
ITS(17), No. 9, September 2016, pp. 2658-2667.
IEEE DOI 1609
Measurement BibRef

Lai, C., Zhang, K., Cheng, N., Li, H., Shen, X.,
SIRC: A Secure Incentive Scheme for Reliable Cooperative Downloading in Highway VANETs,
ITS(18), No. 6, June 2017, pp. 1559-1574.
IEEE DOI 1706
Authentication, Incentive schemes, Internet, Reliability, Road transportation, Vehicles, VANET, cooperation, downloading, drive-thru Internet, incentive, security BibRef

Azees, M., Vijayakumar, P., Deboarh, L.J.,
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks,
ITS(18), No. 9, September 2017, pp. 2467-2476.
IEEE DOI 1709
telecommunication security, signature verification process, Multicast communication, Conditional privacy, anonymous certificates, authentication, security, BibRef

Liu, Y., Wang, Y., Chang, G.,
Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm,
ITS(18), No. 10, October 2017, pp. 2740-2749.
IEEE DOI 1710
Authentication, Encryption, Hardware, Technological innovation, Internet of Vehicles, privacy-preserving, vehicle-to-vehicle, security BibRef

Parkinson, S., Ward, P., Wilson, K., Miller, J.,
Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges,
ITS(18), No. 11, November 2017, pp. 2898-2915.
IEEE DOI 1711
Automation, Computer security, Global Positioning System, Hardware, Jamming, Monitoring, Sensors, Connected, autonomous, cyber threats, mitigation, vehicles, vulnerabilities BibRef

Tan, H., Choi, D., Kim, P., Pan, S., Chung, I.,
Comments on 'Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks',
ITS(19), No. 7, July 2018, pp. 2149-2151.
IEEE DOI 1807

See also Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks.
See also Reply to Comments on Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks. Authentication, Cryptography, Data communication, Resistance, Vehicular ad hoc networks, Authentication, VANETs, replay attack BibRef

Ahmed, S.H., Bouk, S.H., Yaqub, M.A., Kim, D., Song, H.,
DIFS: Distributed Interest Forwarder Selection in Vehicular Named Data Networks,
ITS(19), No. 9, September 2018, pp. 3076-3080.
IEEE DOI 1809
Storms, Security, Delays, Roads, Reliability, Vehicle dynamics, IP networks, NDN, interest forwarding, vehicular networks BibRef

Suo, D.[Dajiang], Siegel, J.E.[Joshua E.], Sarma, S.E.[Sanjay E.],
Merging safety and cybersecurity analysis in product design,
IET-ITS(12), No. 9, November 2018, pp. 1103-1109.
DOI Link 1810
BibRef

Panagiotopoulos, I.[Ilias], Dimitrakopoulos, G.[George],
Diffie-Hellman process and its use in secure and authenticated VC networks,
IET-ITS(12), No. 9, November 2018, pp. 1082-1087.
DOI Link 1810
BibRef

Brecht, B., Therriault, D., Weimerskirch, A., Whyte, W., Kumar, V., Hehn, T., Goudy, R.,
A Security Credential Management System for V2X Communications,
ITS(19), No. 12, December 2018, pp. 3850-3871.
IEEE DOI 1812
Privacy, Safety, Cryptography, Risk management, Vehicles, Device-to-device communication, vehicle safety, cryptography, intelligent transportation systems BibRef

Lu, Z., Qu, G., Liu, Z.,
A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy,
ITS(20), No. 2, February 2019, pp. 760-776.
IEEE DOI 1902
Privacy, Authentication, Vehicular ad hoc networks, Safety, Tools, VANETs, security, privacy, trust management, simulation tools BibRef

Cheng, T., Liu, G., Yang, Q., Sun, J.,
Trust Assessment in Vehicular Social Network Based on Three-Valued Subjective Logic,
MultMed(21), No. 3, March 2019, pp. 652-663.
IEEE DOI 1903
road safety, road vehicles, security of data, social networking (online), traffic engineering computing, distributed algorithm BibRef

Liu, S., Liu, L., Tang, J., Yu, B., Wang, Y., Shi, W.,
Edge Computing for Autonomous Driving: Opportunities and Challenges,
PIEEE(107), No. 8, August 2019, pp. 1697-1716.
IEEE DOI 1908
Connected and autonomous vehicles (CAVs), edge computing, heterogeneous computing, security, vehicle-to-everything (V2X), vehicular operating system BibRef

Javed, M.A., Hamida, E.B.,
On the Interrelation of Security, QoS, and Safety in Cooperative ITS,
ITS(18), No. 7, July 2017, pp. 1943-1957.
IEEE DOI 1706
Cams, Quality of service, Roads, Safety, Security, Standards, Vehicles, Intelligent transport systems, QoS, VANET, safety awareness, security BibRef

Cui, J., Wei, L., Zhang, J., Xu, Y., Zhong, H.,
An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks,
ITS(20), No. 5, May 2019, pp. 1621-1632.
IEEE DOI 1905
Authentication, Message authentication, Edge computing, Vehicular ad hoc networks, Cloud computing, Vehicles, VANETs, edge computing BibRef

Arshad, M.[Muhammad], Ullah, Z.[Zahid], Khalid, M.[Muhammad], Ahmad, N.[Naveed], Khalid, W.[Waqar], Shahwar, D.[Duri], Cao, Y.[Yue],
Beacon trust management system and fake data detection in vehicular ad-hoc networks,
IET-ITS(13), No. 5, May 2019, pp. 780-788.
DOI Link 1906
BibRef

Liu, Y.[Yi], Wu, J.[Jun], Li, J.H.[Jian-Hua], Yang, W.[Wu], Chen, H.[Hao], Li, G.[Gaolei],
ISRF: interest semantic reasoning based fog firewall for information-centric Internet of Vehicles,
IET-ITS(13), No. 6, June 2019, pp. 975-982.
DOI Link 1906
BibRef

Kanchan, S.[Sneha], Singh, G.[Garima], Chaudhari, N.S.[Narendra S.],
SAPSC: SignRecrypting authentication protocol using shareable clouds in VANET groups,
IET-ITS(13), No. 9, September 2019, pp. 1447-1460.
DOI Link 1908
BibRef

Rasheed, A.A., Mahapatra, R.N., Hamza-Lup, F.G.,
Adaptive Group-Based Zero Knowledge Proof-Authentication Protocol in Vehicular Ad Hoc Networks,
ITS(21), No. 2, February 2020, pp. 867-881.
IEEE DOI 2002
Authentication, Protocols, Privacy, Vehicular ad hoc networks, Public key, Authentication, privacy and trust, anonymity, revocation BibRef

Chen, J., Mao, G., Li, C., Zhang, D.,
A Topological Approach to Secure Message Dissemination in Vehicular Networks,
ITS(21), No. 1, January 2020, pp. 135-148.
IEEE DOI 2001
Roads, Relays, Network topology, Heuristic algorithms, Encryption, Authentication, Vehicular networks, security, decision algorithm BibRef

Lu, R., Zhang, L., Ni, J., Fang, Y.,
5G Vehicle-to-Everything Services: Gearing Up for Security and Privacy,
PIEEE(108), No. 2, February 2020, pp. 373-389.
IEEE DOI 2001
5G vehicle-to-everything (V2X) services, challenges, privacy, security, solutions, trust BibRef

Ren, K., Wang, Q., Wang, C., Qin, Z., Lin, X.,
The Security of Autonomous Driving: Threats, Defenses, and Future Directions,
PIEEE(108), No. 2, February 2020, pp. 357-372.
IEEE DOI 2001
Laser radar, Sensors, Security, Global Positioning System, Autonomous vehicles, Jamming, Autonomous vehicles (AVs), sensors BibRef

Castiglione, A.[Arcangelo], Palmieri, F.[Francesco], Colace, F.[Francesco], Lombardi, M.[Marco], Santaniello, D.[Domenico], d'Aniello, G.[Giuseppe],
Securing the internet of vehicles through lightweight block ciphers,
PRL(135), 2020, pp. 264-270.
Elsevier DOI 2006
Internet of vehicles, Automotive security, Controller area network, Lightweight cryptography, Security BibRef

Boualouache, A., Senouci, S., Moussaoui, S.,
PRIVANET: An Efficient Pseudonym Changing and Management Framework for Vehicular Ad-Hoc Networks,
ITS(21), No. 8, August 2020, pp. 3209-3218.
IEEE DOI 2008
Privacy, Mathematical model, Ad hoc networks, Adaptation models, Road safety, IP networks, Vehicular ad-hoc networks (VANETs), pseudonym changing BibRef

Ji, B., Han, Y., Li, P., Mumtaz, S., Song, K., Li, C., Wang, D., Wen, H.,
Research on Secure Transmission Performance of Electric Vehicles Under Nakagami-m Channel,
ITS(22), No. 3, March 2021, pp. 1881-1891.
IEEE DOI 2103
Relays, Electric vehicles, Eavesdropping, Security, Signal to noise ratio, Probability, MIMO communication, maximal ratio combining BibRef

Distefano, S., Giacomo, A.D., Mazzara, M.,
Trustworthiness for Transportation Ecosystems: The Blockchain Vehicle Information System,
ITS(22), No. 4, April 2021, pp. 2013-2022.
IEEE DOI 2104
Transportation, Ecosystems, Ontologies, Stakeholders, Monitoring, Maintenance engineering, Insurance, Distributed ledger, scalability BibRef

Li, Y., Zhu, L., Wang, H., Yu, F.R., Liu, S.,
A Cross-Layer Defense Scheme for Edge Intelligence-Enabled CBTC Systems Against MitM Attacks,
ITS(22), No. 4, April 2021, pp. 2286-2298.
IEEE DOI 2104
Servers, Control systems, Safety, Computers, Rails, Intrusion detection, Image edge detection, CBTC, edge intelligence, cross-layer defense scheme BibRef

Zhang, J., Yang, F., Ma, Z., Wang, Z., Liu, X., Ma, J.,
A Decentralized Location Privacy-Preserving Spatial Crowdsourcing for Internet of Vehicles,
ITS(22), No. 4, April 2021, pp. 2299-2313.
IEEE DOI 2104
Task analysis, Privacy, Encryption, Crowdsourcing, Data privacy, Internet of Vehicles, spatial crowdsourcing, location privacy, blockchain BibRef

Aliwa, E.[Emad], Rana, O.[Omer], Perera, C.[Charith], Burnap, P.[Peter],
Cyberattacks and Countermeasures for In-Vehicle Networks,
Surveys(54), No. 1, March 2021, pp. xx-yy.
DOI Link 2104
cybersecurity, CAN bus, intrusion detection systems BibRef

Li, B.[Bohan], Liang, R.[Ruochen], Zhu, D.[Di], Chen, W.[Weitong], Lin, Q.[Qinyong],
Blockchain-Based Trust Management Model for Location Privacy Preserving in VANET,
ITS(22), No. 6, June 2021, pp. 3765-3775.
IEEE DOI 2106
Privacy, Trust management, Blockchain, Security, Vehicular ad hoc networks, Servers, Heuristic algorithms, VANET BibRef

Simplicio, M.A.[Marcos A.], Cominetti, E.L.[Eduardo Lopes], Patil, H.K.[Harsh Kupwade], Ricardini, J.E.[Jefferson E.], Ferraz, L.T.D.[Leonardo T. D.], Silva, M.V.M.[Marcos Vinicius M.],
Privacy-Preserving Certificate Linkage/Revocation in VANETs Without Linkage Authorities,
ITS(22), No. 6, June 2021, pp. 3326-3336.
IEEE DOI 2106
Couplings, Principal component analysis, Privacy, Public key, Vehicle-to-everything, V2X, linkage authorities BibRef

Farivar, F.[Faezeh], Haghighi, M.S.[Mohammad Sayad], Jolfaei, A.[Alireza], Wen, S.[Sheng],
On the Security of Networked Control Systems in Smart Vehicle and Its Adaptive Cruise Control,
ITS(22), No. 6, June 2021, pp. 3824-3831.
IEEE DOI 2106
Lead, Security, Cruise control, Acceleration, Intrusion detection, Automobiles, Vehicle dynamics, Internet of vehicles, covert attack BibRef

Lin, H.[Hui], Garg, S.[Sahil], Hu, J.[Jia], Kaddoum, G.[Georges], Peng, M.[Min], Hossain, M.S.[M. Shamim],
Blockchain and Deep Reinforcement Learning Empowered Spatial Crowdsourcing in Software-Defined Internet of Vehicles,
ITS(22), No. 6, June 2021, pp. 3755-3764.
IEEE DOI 2106
Task analysis, Crowdsourcing, Privacy, Blockchain, Servers, Resource management, Data privacy, Blockchain, privacy BibRef

Chaudhry, J.A.[Junaid Ahsenali], Saleem, K.[Kashif], Alazab, M.[Mamoun], Zeeshan, H.M.A.[Hafiz Maher Ali], Al-Muhtadi, J.[Jalal], Rodrigues, J.J.P.C.[Joel J. P. C.],
Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications,
ITS(22), No. 6, June 2021, pp. 3869-3879.
IEEE DOI 2106
Medical services, Security, IP networks, Biomedical imaging, Standards, Industries, Data privacy, Cybersecurity, information systems BibRef

Xu, X.[Xiaolong], Huang, Q.H.[Qi-He], Zhu, H.B.[Hai-Bin], Sharma, S.[Suraj], Zhang, X.[Xuyun], Qi, L.[Lianyong], Bhuiyan, M.Z.A.[Md Zakirul Alam],
Secure Service Offloading for Internet of Vehicles in SDN-Enabled Mobile Edge Computing,
ITS(22), No. 6, June 2021, pp. 3720-3729.
IEEE DOI 2106
Privacy, Quality of experience, Resource management, Load modeling, Edge computing, Uncertainty, Servers, SDN, IoV, edge computing, LSH, privacy preservation BibRef

Singh, P.K.[Pranav Kumar], Singh, R.[Roshan], Nandi, S.K.[Sunit Kumar], Ghafoor, K.Z.[Kayhan Zrar], Rawat, D.B.[Danda B.], Nandi, S.[Sukumar],
Blockchain-Based Adaptive Trust Management in Internet of Vehicles Using Smart Contract,
ITS(22), No. 6, June 2021, pp. 3616-3630.
IEEE DOI 2106
Data models, Contracts, Computer science, Safety, Reliability, IoV, trust management, smart contract, ethereum, blockchain BibRef

Shu, J.G.[Jian-Gang], Zhou, L.[Lei], Zhang, W.Z.[Wei-Zhe], Du, X.J.[Xiao-Jiang], Guizani, M.[Mohsen],
Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach,
ITS(22), No. 7, July 2021, pp. 4519-4530.
IEEE DOI 2107
Intrusion detection, Vehicular ad hoc networks, Collaboration, Servers, Monitoring, Machine learning, generative adversarial networks BibRef

Raja, G.[Gunasekaran], Anbalagan, S.[Sudha], Vijayaraghavan, G.[Geetha], Theerthagiri, S.[Sudhakar], Suryanarayan, S.V.[Saran Vaitangarukav], Wu, X.W.[Xin-Wen],
SP-CIDS: Secure and Private Collaborative IDS for VANETs,
ITS(22), No. 7, July 2021, pp. 4385-4393.
IEEE DOI 2107
Vehicular ad hoc networks, Security, Training data, Monitoring, Data models, Collaboration, Intrusion detection, ADMM, CIDS, privacy-preserving BibRef

Wang, X.M.[Xian-Min], Kuang, X.H.[Xiao-Hui], Li, J.[Jin], Li, J.[Jing], Chen, X.F.[Xiao-Feng], Liu, Z.[Zheli],
Oblivious Transfer for Privacy-Preserving in VANET's Feature Matching,
ITS(22), No. 7, July 2021, pp. 4359-4366.
IEEE DOI 2107
Protocols, Vehicular ad hoc networks, Privacy, Cryptography, Social network services, Structural rings, VANET, group ring BibRef

Qian, Y.F.[Yong-Feng], Ma, Y.J.[Yu-Jun], Chen, J.[Jing], Wu, D.[Di], Tian, D.X.[Da-Xin], Hwang, K.[Kai],
Optimal Location Privacy Preserving and Service Quality Guaranteed Task Allocation in Vehicle-Based Crowdsensing Networks,
ITS(22), No. 7, July 2021, pp. 4367-4375.
IEEE DOI 2107
Task analysis, Privacy, Crowdsensing, Differential privacy, Resource management, Sensors, Quality of service, vehicular network BibRef

Lakhan, A.[Abdullah], Ahmad, M.[Muneer], Bilal, M.[Muhammad], Jolfaei, A.[Alireza], Mehmood, R.M.[Raja Majid],
Mobility Aware Blockchain Enabled Offloading and Scheduling in Vehicular Fog Cloud Computing,
ITS(22), No. 7, July 2021, pp. 4212-4223.
IEEE DOI 2107
Task analysis, Security, Cloud computing, Blockchain, Processor scheduling, Mobile ad hoc networks, Internet of Things, system costs BibRef

Lv, Z.H.[Zhi-Han], Zhang, S.[Shaobiao], Xiu, W.[Wenqun],
Solving the Security Problem of Intelligent Transportation System With Deep Learning,
ITS(22), No. 7, July 2021, pp. 4281-4290.
IEEE DOI 2107
Deep learning, Transportation, Neurons, Real-time systems, Safety, Biological neural networks, Intelligent transportation system, security BibRef

Usman, M.[Muhammad], Jan, M.A.[Mian Ahmad], Jolfaei, A.[Alireza],
SPEED: A Deep Learning Assisted Privacy-Preserved Framework for Intelligent Transportation Systems,
ITS(22), No. 7, July 2021, pp. 4376-4384.
IEEE DOI 2107
Data privacy, Computer architecture, Redundancy, Machine learning algorithms, Edge computing, Deep learning, CNN BibRef

Li, L.[Lun], Chang, X.L.[Xiao-Lin], Liu, J.X.[Jing-Xian], Liu, J.[Jiqiang], Han, Z.[Zhu],
Bit2CV: A Novel Bitcoin Anti-Fraud Deposit Scheme for Connected Vehicles,
ITS(22), No. 7, July 2021, pp. 4181-4193.
IEEE DOI 2107
Bitcoin, Security, Blockchain, Connected vehicles, Privacy, Outsourcing, Usability, Bitcoin, connected vehicle, endorsement, threshold-based signature BibRef

Liao, H.[Haijun], Mu, Y.[Yansong], Zhou, Z.Y.[Zhen-Yu], Sun, M.[Meng], Wang, Z.[Zhao], Pan, C.[Chao],
Blockchain and Learning-Based Secure and Intelligent Task Offloading for Vehicular Fog Computing,
ITS(22), No. 7, July 2021, pp. 4051-4063.
IEEE DOI 2107
Task analysis, Delays, Edge computing, Privacy, Contracts, Vehicular fog computing, task offloading, blockchain, subjective logic BibRef

Wei, F.[Fushan], Zeadally, S.[Sherali], Vijayakumar, P.[Pandi], Kumar, N.[Neeraj], He, D.[Debiao],
An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles,
ITS(22), No. 7, July 2021, pp. 3939-3951.
IEEE DOI 2107
Authentication, Protocols, Privacy, Internet, Connected vehicles, Password, Authentication, connected vehicles, intelligent terminal, protocol BibRef

Zhao, S.[Shancheng], Wen, J.[Jinming], Huang, X.J.[Xiu-Jie], Wang, X.M.[Xiao-Ming],
Rate-Compatible Codes via Recursive BMST for Content-Sharing in Intelligent Vehicular Network,
ITS(22), No. 7, July 2021, pp. 3929-3938.
IEEE DOI 2107
Encoding, Parity check codes, Markov processes, Systematics, Wireless communication, Information science, vehicular networks BibRef

Singh, M.[Maninderpal], Aujla, G.S.[Gagangeet Singh], Bali, R.S.[Rasmeet Singh],
A Deep Learning-Based Blockchain Mechanism for Secure Internet of Drones Environment,
ITS(22), No. 7, July 2021, pp. 4404-4413.
IEEE DOI 2107
Approximation algorithms, Stochastic processes, Production, Optimization, Mathematical model, Linear programming, Clocks, zero knowledge proof BibRef

Xie, G.Q.[Guo-Qi], Yang, L.T.[Laurence T.], Yang, Y.[Yuanda], Luo, H.B.[Hai-Bo], Li, R.[Renfa], Alazab, M.[Mamoun],
Threat Analysis for Automotive CAN Networks: A GAN Model-Based Intrusion Detection Technique,
ITS(22), No. 7, July 2021, pp. 4467-4477.
IEEE DOI 2107
Automotive engineering, Generative adversarial networks, Intrusion detection, Deep learning, Security, Training, threat analysis BibRef

Chai, H.[Haoye], Leng, S.[Supeng], Chen, Y.J.[Yi-Jin], Zhang, K.[Ke],
A Hierarchical Blockchain-Enabled Federated Learning Algorithm for Knowledge Sharing in Internet of Vehicles,
ITS(22), No. 7, July 2021, pp. 3975-3986.
IEEE DOI 2107
Blockchain, Collaborative work, Security, Training, Computational modeling, Data models, Servers, knowledge sharing BibRef

Kamal, M.[Mohsin], Srivastava, G.[Gautam], Tariq, M.[Muhammad],
Blockchain-Based Lightweight and Secured V2V Communication in the Internet of Vehicles,
ITS(22), No. 7, July 2021, pp. 3997-4004.
IEEE DOI 2107
Blockchain, Internet, Real-time systems, Mathematical model, Authentication, Accidents, Vehicular technology, V2V, blockchain, authentication BibRef

Rathee, G.[Geetanjali], Ahmad, F.[Farhan], Kurugollu, F.[Fatih], Azad, M.A.[Muhammad Ajmal], Iqbal, R.[Razi], Imran, M.[Muhammad],
CRT-BIoV: A Cognitive Radio Technique for Blockchain-Enabled Internet of Vehicles,
ITS(22), No. 7, July 2021, pp. 4005-4015.
IEEE DOI 2107
Sensors, Cognitive radio, Copper, Internet, Decision making, Internet-of-Vehicles, cognitive radios, blockchain, topsis, spectrum availability BibRef

Jameel, F.[Furqan], Javed, M.A.[Muhammad Awais], Zeadally, S.[Sherali], Jäntti, R.[Riku],
Efficient Mining Cluster Selection for Blockchain-Based Cellular V2X Communications,
ITS(22), No. 7, July 2021, pp. 4064-4072.
IEEE DOI 2107
Task analysis, Data mining, Bandwidth, Autonomous vehicles, Blockchain, cellular V2X communications, latency, mining, vehicular BibRef

Zheng, X.[Xiao], Li, M.[Mingchu], Chen, Y.[Yuanfang], Guo, J.[Jun], Alam, M.[Muhammad], Hu, W.[Weitong],
Blockchain-Based Secure Computation Offloading in Vehicular Networks,
ITS(22), No. 7, July 2021, pp. 4073-4087.
IEEE DOI 2107
Cloud computing, Vehicular ad hoc networks, Access control, Task analysis, Servers, Vehicular ad hoc networks, blockchain, deep reinforcement learning BibRef

Gai, K.[Keke], Wu, Y.[Yulu], Zhu, L.[Liehuang], Choo, K.K.R.[Kim-Kwang Raymond], Xiao, B.[Bin],
Blockchain-Enabled Trustworthy Group Communications in UAV Networks,
ITS(22), No. 7, July 2021, pp. 4118-4130.
IEEE DOI 2107
Data transfer, Servers, Base stations, Unmanned aerial vehicles, Authentication, Wireless communication, Blockchain, unmanned aerial vehicle network BibRef

Cheema, M.A.[Muhammad Asaad], Shehzad, M.K.[Muhammad Karam], Qureshi, H.K.[Hassaan Khaliq], Hassan, S.A.[Syed Ali], Jung, H.[Haejoon],
A Drone-Aided Blockchain-Based Smart Vehicular Network,
ITS(22), No. 7, July 2021, pp. 4160-4170.
IEEE DOI 2107
Drones, Reliability, Authentication, Computer network reliability, Backhaul network, blockchain, drones, intelligent transportation, unsupervised learning BibRef

Fatemidokht, H.[Hamideh], Rafsanjani, M.K.[Marjan Kuchaki], Gupta, B.B.[Brij B.], Hsu, C.H.[Ching-Hsien],
Efficient and Secure Routing Protocol Based on Artificial Intelligence Algorithms With UAV-Assisted for Vehicular Ad Hoc Networks in Intelligent Transportation Systems,
ITS(22), No. 7, July 2021, pp. 4757-4769.
IEEE DOI 2107
Routing protocols, Routing, Roads, Vehicular ad hoc networks, Ad hoc networks, Delays, Clustering algorithms, routing BibRef

Roy, C.[Chandana], Misra, S.[Sudip],
Safe-Passé: Dynamic Handoff Scheme for Provisioning Safety-as-a-Service in 5G-Enabled Intelligent Transportation System,
ITS(22), No. 8, August 2021, pp. 5415-5425.
IEEE DOI 2108
Safety, 5G mobile communication, Vehicle dynamics, Wireless communication, Vehicles, Registers, Quality of service, decision parameters BibRef

Ridhawi, I.A.[Ismaeel Al], Aloqaily, M.[Moayad], Boukerche, A.[Azzedine], Jararweh, Y.[Yaser],
Enabling Intelligent IoCV Services at the Edge for 5G Networks and Beyond,
ITS(22), No. 8, August 2021, pp. 5190-5200.
IEEE DOI 2108
Blockchain, Quality of service, 5G mobile communication, Internet of Things, Collaboration, Reliability, Smart cities, IoCV, blockchain BibRef

Sharma, P.K.[Pradip Kumar], Park, J.H.[Jong Hyuk],
Blockchain-Based Secure Mist Computing Network Architecture for Intelligent Transportation Systems,
ITS(22), No. 8, August 2021, pp. 5168-5177.
IEEE DOI 2108
Cloud computing, Computational modeling, Computer architecture, Blockchain, Internet of Things, Edge computing, Data models, blockchain BibRef

Wang, P.[Peng], Chen, C.M.[Chien-Ming], Kumari, S.[Saru], Shojafar, M.[Mohammad], Tafazolli, R.[Rahim], Liu, Y.N.[Yi-Ning],
HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs,
ITS(22), No. 8, August 2021, pp. 5071-5080.
IEEE DOI 2108
Authentication, Privacy, 5G mobile communication, Device-to-device communication, Trajectory, Global communication, privacy preservation BibRef

Kong, Q.[Qinglei], Lu, R.X.[Rong-Xing], Yin, F.[Feng], Cui, S.G.[Shu-Guang],
Privacy-Preserving Continuous Data Collection for Predictive Maintenance in Vehicular Fog-Cloud,
ITS(22), No. 8, August 2021, pp. 5060-5070.
IEEE DOI 2108
Security, Predictive maintenance, Servers, Data privacy, Data collection, Predictive maintenance, vehicular fog-cloud BibRef

Safavat, S.[Sunitha], Rawat, D.B.[Danda B.],
On the Elliptic Curve Cryptography for Privacy-Aware Secure ACO-AODV Routing in Intent-Based Internet of Vehicles for Smart Cities,
ITS(22), No. 8, August 2021, pp. 5050-5059.
IEEE DOI 2108
Privacy, Elliptic curve cryptography, Routing, Delays, Smart transportation, Vehicular ad hoc networks, ACO-AODV (ACO-AODV) BibRef

Xie, G.Q.[Guo-Qi], Yang, L.T.[Laurence T.], Wu, W.[Wei], Zeng, K.[Keyu], Xiao, X.Z.[Xiang-Zhen], Li, R.[Renfa],
Security Enhancement for Real-Time Parallel In-Vehicle Applications by CAN FD Message Authentication,
ITS(22), No. 8, August 2021, pp. 5038-5049.
IEEE DOI 2108
Task analysis, Real-time systems, Bandwidth, Authentication, Automotive engineering, Automobiles, Authentication, security BibRef

Wang, Y.H.[Yu-Hang], Tian, Z.H.[Zhi-Hong], Sun, Y.[Yanbin], Du, X.J.[Xiao-Jiang], Guizani, N.[Nadra],
LocJury: An IBN-Based Location Privacy Preserving Scheme for IoCV,
ITS(22), No. 8, August 2021, pp. 5028-5037.
IEEE DOI 2108
Privacy, 5G mobile communication, Internet of Things, Wireless communication, Security, IoCV, location privacy, IBN, virtual currency BibRef

Ghane, S.[Soheila], Jolfaei, A.[Alireza], Kulik, L.[Lars], Ramamohanarao, K.[Kotagiri], Puthal, D.[Deepak],
Preserving Privacy in the Internet of Connected Vehicles,
ITS(22), No. 8, August 2021, pp. 5018-5027.
IEEE DOI 2108
Servers, Privacy, Differential privacy, Correlation, Roads, Differential privacy, edge computing, Internet of connected vehicles BibRef

Yu, H.Y.[Hai-Yang], Ma, S.[Shuai], Hu, Q.[Qi], Yang, Z.[Zhen],
Blockchain-Based Continuous Auditing for Dynamic Data Sharing in Autonomous Vehicular Networks,
Computer(54), No. 8, August 2021, pp. 33-45.
IEEE DOI 2108
Data security, Transportation, Servers, Vehicle dynamics, Computer security, Autonomous vehicles BibRef

Kong, Q.[Qinglei], Su, L.[Le], Ma, M.[Maode],
Achieving Privacy-Preserving and Verifiable Data Sharing in Vehicular Fog With Blockchain,
ITS(22), No. 8, August 2021, pp. 4889-4898.
IEEE DOI 2108
Sensors, Data aggregation, Reliability, Cryptography, Data privacy, Location privacy-preservation, permissioned blockchain, vehicular sensing BibRef

Tan, Z.[Zheng], Wang, C.[Cheng], Yan, C.[Chungang], Zhou, M.[Mengchu], Jiang, C.J.[Chang-Jun],
Protecting Privacy of Location-Based Services in Road Networks,
ITS(22), No. 10, October 2021, pp. 6435-6448.
IEEE DOI 2110
Roads, Privacy, Servers, Correlation, Protocols, User experience, Knowledge engineering, Internet of Vehicles, Points of Interest (POI) BibRef


Khayati, Y., Mazri, T.,
Security Study of Routing Attacks In Vehicular Ad-hoc Networks (Vanets),
SmartCityApp20(267-272).
DOI Link 2012
BibRef

Yan, G., Rawat, D.B., Shi, H.[Hui], Chong, D.,
A cross-layer and optimized privacy method in Vehicular ad-hoc Networks,
ICIVC17(894-898)
IEEE DOI 1708
Privacy, Protocols, Transportation, ad hoc network, cost optimization, privacy, scalability, vehicular, networks BibRef

Moudni, H., Er-Rouidi, M., Mouncif, H., El Hadadi, B.,
Attacks against AODV Routing Protocol in Mobile Ad-Hoc Networks,
CGiV16(385-389)
IEEE DOI 1608
mobile ad hoc networks BibRef

Chapter on Motion -- Feature-Based, Long Range, Motion and Structure Estimates, Tracking, Surveillance, Activities continues in
Rail Traffic Controls, Trains .


Last update:Nov 30, 2021 at 22:19:38