Yan, G.,
Wen, D.,
Olariu, S.,
Weigle, M.C.,
Security Challenges in Vehicular Cloud Computing,
ITS(14), No. 1, March 2013, pp. 284-294.
IEEE DOI
1303
BibRef
Petit, J.,
Shladover, S.E.,
Potential Cyberattacks on Automated Vehicles,
ITS(16), No. 2, April 2015, pp. 546-556.
IEEE DOI
1504
Automation
BibRef
Woo, S.,
Jo, H.J.,
Lee, D.H.,
A Practical Wireless Attack on the Connected Car and Security
Protocol for In-Vehicle CAN,
ITS(16), No. 2, April 2015, pp. 993-1006.
IEEE DOI
1504
Automotive engineering
BibRef
Woo, S.,
Jo, H.J.,
Kim, I.S.,
Lee, D.H.,
A Practical Security Architecture for In-Vehicle CAN-FD,
ITS(17), No. 8, August 2016, pp. 2248-2261.
IEEE DOI
1608
Automotive engineering
BibRef
Jiang, S.,
Zhu, X.,
Wang, L.,
An Efficient Anonymous Batch Authentication Scheme Based on HMAC for
VANETs,
ITS(17), No. 8, August 2016, pp. 2193-2204.
IEEE DOI
1608
Authentication
BibRef
Li, W.,
Song, H.,
ART: An Attack-Resistant Trust Management Scheme for Securing
Vehicular Ad Hoc Networks,
ITS(17), No. 4, April 2016, pp. 960-969.
IEEE DOI
1604
Ad hoc networks
BibRef
Vijayakumar, P.,
Azees, M.,
Kannan, A.,
Deborah, L.J.[L. Jegatha],
Dual Authentication and Key Management Techniques for Secure Data
Transmission in Vehicular Ad Hoc Networks,
ITS(17), No. 4, April 2016, pp. 1015-1028.
IEEE DOI
1604
Authentication
See also Comments on Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks.
BibRef
Azees, M.,
Reply to Comments on 'Dual Authentication and Key Management
Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks',
ITS(20), No. 9, September 2019, pp. 3595-3595.
IEEE DOI
1909
Authentication, Vehicular ad hoc networks, Digital signatures,
Cryptography, Data communication, Resistance, Authentication,
replay attack
See also Comments on Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks.
BibRef
Azees, M.,
Vijayakumar, P.,
Jegatha Deborah, L.,
Comprehensive survey on security services in vehicular ad-hoc
networks,
IET-ITS(10), No. 6, 2016, pp. 379-388.
DOI Link
1608
intelligent transportation systems
BibRef
Jo, H.J.,
Kim, I.S.,
Lee, D.H.,
Reliable Cooperative Authentication for Vehicular Networks,
ITS(19), No. 4, April 2018, pp. 1065-1079.
IEEE DOI
1804
Authentication, Message authentication, Protocols, Reliability,
Roads, Synchronization, Anonymity, cooperative authentication,
vehicular Ad-hoc NETworks
BibRef
Rosenstatter, T.,
Englund, C.,
Modelling the Level of Trust in a Cooperative Automated Vehicle
Control System,
ITS(19), No. 4, April 2018, pp. 1237-1247.
IEEE DOI
1804
Control systems, Decision making, Kalman filters, Radar,
Sensor systems, Vehicular ad hoc networks, GCDC 2016,
vehicle-to-vehicle communication
BibRef
Zhang, Q.,
Boukerche, A.,
A Novel Infrastructure-Based Worm Spreading Countermeasure for
Vehicular Networks,
ITS(19), No. 7, July 2018, pp. 2188-2203.
IEEE DOI
1807
Analytical models, Curing, Grippers, Roads, Simulation, Topology,
Vehicular ad hoc networks, Vehicular networks (VANETs),
worms
BibRef
Kaviani, A.[Arash],
Thompson, R.G.[Russell G.],
Rajabifard, A.[Abbas],
Sarvi, M.[Majid],
Hybrid machine learning and optimisation method to solve a tri-level
road network protection problem,
IET-ITS(12), No. 9, November 2018, pp. 1011-1019.
DOI Link
1810
BibRef
Abdollahi Biron, Z.,
Dey, S.,
Pisu, P.,
Real-Time Detection and Estimation of Denial of Service Attack in
Connected Vehicle Systems,
ITS(19), No. 12, December 2018, pp. 3893-3902.
IEEE DOI
1812
Cyberattack, Stability analysis, Safety, Mathematical model, Delays,
Estimation, Control systems, Connected vehicles,
estimation
BibRef
Shin, D.,
Kim, B.,
Yi, K.,
Carvalho, A.,
Borrelli, F.,
Human-Centered Risk Assessment of an Automated Vehicle Using
Vehicular Wireless Communication,
ITS(20), No. 2, February 2019, pp. 667-681.
IEEE DOI
1902
Safety, Radar, Vehicles, Vehicular ad hoc networks, Risk management,
Wireless communication, Delays, Risk assessment,
automated drive
BibRef
Lai, C.,
Zhang, K.,
Cheng, N.,
Li, H.,
Shen, X.,
SIRC: A Secure Incentive Scheme for Reliable Cooperative Downloading
in Highway VANETs,
ITS(18), No. 6, June 2017, pp. 1559-1574.
IEEE DOI
1706
Authentication, Incentive schemes, Internet, Reliability,
Road transportation, Vehicles, VANET, cooperation, downloading,
drive-thru Internet, incentive, security
BibRef
Parkinson, S.,
Ward, P.,
Wilson, K.,
Miller, J.,
Cyber Threats Facing Autonomous and Connected Vehicles:
Future Challenges,
ITS(18), No. 11, November 2017, pp. 2898-2915.
IEEE DOI
1711
Automation, Computer security, Global Positioning System, Hardware,
Jamming, Monitoring, Sensors, Connected, autonomous, cyber threats,
mitigation, vehicles, vulnerabilities
BibRef
Tan, H.,
Choi, D.,
Kim, P.,
Pan, S.,
Chung, I.,
Comments on 'Dual Authentication and Key Management Techniques for
Secure Data Transmission in Vehicular Ad Hoc Networks',
ITS(19), No. 7, July 2018, pp. 2149-2151.
IEEE DOI
1807
See also Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks.
See also Reply to Comments on Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks. Authentication, Cryptography, Data communication, Resistance,
Vehicular ad hoc networks, Authentication, VANETs,
replay attack
BibRef
Ahmed, S.H.,
Bouk, S.H.,
Yaqub, M.A.,
Kim, D.,
Song, H.,
DIFS: Distributed Interest Forwarder Selection in Vehicular Named
Data Networks,
ITS(19), No. 9, September 2018, pp. 3076-3080.
IEEE DOI
1809
Storms, Security, Delays, Roads, Reliability, Vehicle dynamics,
IP networks, NDN, interest forwarding, vehicular networks
BibRef
Suo, D.J.[Da-Jiang],
Siegel, J.E.[Joshua E.],
Sarma, S.E.[Sanjay E.],
Merging safety and cybersecurity analysis in product design,
IET-ITS(12), No. 9, November 2018, pp. 1103-1109.
DOI Link
1810
BibRef
Panagiotopoulos, I.[Ilias],
Dimitrakopoulos, G.[George],
Diffie-Hellman process and its use in secure and authenticated VC
networks,
IET-ITS(12), No. 9, November 2018, pp. 1082-1087.
DOI Link
1810
BibRef
Lu, Z.,
Qu, G.,
Liu, Z.,
A Survey on Recent Advances in Vehicular Network Security, Trust, and
Privacy,
ITS(20), No. 2, February 2019, pp. 760-776.
IEEE DOI
1902
Survey, VANET Security. Privacy, Authentication, Vehicular ad hoc networks, Safety, Tools,
VANETs, security, privacy, trust management, simulation tools
BibRef
Cheng, T.,
Liu, G.,
Yang, Q.,
Sun, J.,
Trust Assessment in Vehicular Social Network Based on Three-Valued
Subjective Logic,
MultMed(21), No. 3, March 2019, pp. 652-663.
IEEE DOI
1903
road safety, road vehicles, security of data,
social networking (online), traffic engineering computing,
distributed algorithm
BibRef
Javed, M.A.,
Hamida, E.B.,
On the Interrelation of Security, QoS, and Safety in Cooperative ITS,
ITS(18), No. 7, July 2017, pp. 1943-1957.
IEEE DOI
1706
Cams, Quality of service, Roads, Safety, Security, Standards, Vehicles,
Intelligent transport systems, QoS, VANET, safety awareness, security
BibRef
Arshad, M.[Muhammad],
Ullah, Z.[Zahid],
Khalid, M.[Muhammad],
Ahmad, N.[Naveed],
Khalid, W.[Waqar],
Shahwar, D.[Duri],
Cao, Y.[Yue],
Beacon trust management system and fake data detection in vehicular
ad-hoc networks,
IET-ITS(13), No. 5, May 2019, pp. 780-788.
DOI Link
1906
BibRef
Liu, Y.[Yi],
Wu, J.[Jun],
Li, J.H.[Jian-Hua],
Yang, W.[Wu],
Chen, H.[Hao],
Li, G.[Gaolei],
ISRF: interest semantic reasoning based fog
firewall for information-centric Internet of Vehicles,
IET-ITS(13), No. 6, June 2019, pp. 975-982.
DOI Link
1906
BibRef
Kanchan, S.[Sneha],
Singh, G.[Garima],
Chaudhari, N.S.[Narendra S.],
SAPSC: SignRecrypting authentication protocol using shareable clouds in
VANET groups,
IET-ITS(13), No. 9, September 2019, pp. 1447-1460.
DOI Link
1908
BibRef
Li, J.[Jing],
Wu, H.[Hao],
Localisation algorithm for security access control in railway
communications,
IET-ITS(14), No. 14, 27 December 2020, pp. 2151-2159.
DOI Link
2103
BibRef
Chen, J.,
Mao, G.,
Li, C.,
Zhang, D.,
A Topological Approach to Secure Message Dissemination in Vehicular
Networks,
ITS(21), No. 1, January 2020, pp. 135-148.
IEEE DOI
2001
Roads, Relays, Network topology, Heuristic algorithms, Encryption,
Authentication, Vehicular networks, security,
decision algorithm
BibRef
Ren, K.,
Wang, Q.,
Wang, C.,
Qin, Z.,
Lin, X.,
The Security of Autonomous Driving:
Threats, Defenses, and Future Directions,
PIEEE(108), No. 2, February 2020, pp. 357-372.
IEEE DOI
2001
Laser radar, Sensors, Security, Global Positioning System,
Autonomous vehicles, Jamming, Autonomous vehicles (AVs),
sensors
BibRef
Castiglione, A.[Arcangelo],
Palmieri, F.[Francesco],
Colace, F.[Francesco],
Lombardi, M.[Marco],
Santaniello, D.[Domenico],
d'Aniello, G.[Giuseppe],
Securing the internet of vehicles through lightweight block ciphers,
PRL(135), 2020, pp. 264-270.
Elsevier DOI
2006
Internet of vehicles, Automotive security,
Controller area network, Lightweight cryptography,
Security
BibRef
Ji, B.,
Han, Y.,
Li, P.,
Mumtaz, S.,
Song, K.,
Li, C.,
Wang, D.,
Wen, H.,
Research on Secure Transmission Performance of Electric Vehicles
Under Nakagami-m Channel,
ITS(22), No. 3, March 2021, pp. 1881-1891.
IEEE DOI
2103
Relays, Electric vehicles, Eavesdropping, Security,
Signal to noise ratio, Probability, MIMO communication,
maximal ratio combining
BibRef
Distefano, S.,
Giacomo, A.D.,
Mazzara, M.,
Trustworthiness for Transportation Ecosystems:
The Blockchain Vehicle Information System,
ITS(22), No. 4, April 2021, pp. 2013-2022.
IEEE DOI
2104
Transportation, Ecosystems, Ontologies, Stakeholders, Monitoring,
Maintenance engineering, Insurance, Distributed ledger, scalability
BibRef
Aliwa, E.[Emad],
Rana, O.[Omer],
Perera, C.[Charith],
Burnap, P.[Peter],
Cyberattacks and Countermeasures for In-Vehicle Networks,
Surveys(54), No. 1, March 2021, pp. xx-yy.
DOI Link
2104
cybersecurity, CAN bus, intrusion detection systems
BibRef
Farivar, F.[Faezeh],
Haghighi, M.S.[Mohammad Sayad],
Jolfaei, A.[Alireza],
Wen, S.[Sheng],
On the Security of Networked Control Systems in Smart Vehicle and Its
Adaptive Cruise Control,
ITS(22), No. 6, June 2021, pp. 3824-3831.
IEEE DOI
2106
Lead, Security, Cruise control, Acceleration, Intrusion detection,
Automobiles, Vehicle dynamics, Internet of vehicles,
covert attack
BibRef
Singh, P.K.[Pranav Kumar],
Singh, R.[Roshan],
Nandi, S.K.[Sunit Kumar],
Ghafoor, K.Z.[Kayhan Zrar],
Rawat, D.B.[Danda B.],
Nandi, S.[Sukumar],
Blockchain-Based Adaptive Trust Management in Internet of Vehicles
Using Smart Contract,
ITS(22), No. 6, June 2021, pp. 3616-3630.
IEEE DOI
2106
Data models, Contracts, Computer science, Safety, Reliability, IoV,
trust management, smart contract, ethereum, blockchain
BibRef
Shu, J.G.[Jian-Gang],
Zhou, L.[Lei],
Zhang, W.Z.[Wei-Zhe],
Du, X.J.[Xiao-Jiang],
Guizani, M.[Mohsen],
Collaborative Intrusion Detection for VANETs: A Deep Learning-Based
Distributed SDN Approach,
ITS(22), No. 7, July 2021, pp. 4519-4530.
IEEE DOI
2107
Intrusion detection, Vehicular ad hoc networks, Collaboration,
Servers, Monitoring, Machine learning,
generative adversarial networks
BibRef
Lakhan, A.[Abdullah],
Ahmad, M.[Muneer],
Bilal, M.[Muhammad],
Jolfaei, A.[Alireza],
Mehmood, R.M.[Raja Majid],
Mobility Aware Blockchain Enabled Offloading and Scheduling in
Vehicular Fog Cloud Computing,
ITS(22), No. 7, July 2021, pp. 4212-4223.
IEEE DOI
2107
Task analysis, Security, Cloud computing, Blockchain,
Processor scheduling, Mobile ad hoc networks, Internet of Things,
system costs
BibRef
Lv, Z.H.[Zhi-Han],
Zhang, S.B.[Shao-Biao],
Xiu, W.[Wenqun],
Solving the Security Problem of Intelligent Transportation System
With Deep Learning,
ITS(22), No. 7, July 2021, pp. 4281-4290.
IEEE DOI
2107
Deep learning, Transportation, Neurons, Real-time systems, Safety,
Biological neural networks, Intelligent transportation system,
security
BibRef
Lv, Z.H.[Zhi-Han],
Li, Y.X.[Yu-Xi],
Feng, H.L.[Hai-Lin],
Lv, H.B.[Hai-Bin],
Deep Learning for Security in Digital Twins of Cooperative
Intelligent Transportation Systems,
ITS(23), No. 9, September 2022, pp. 16666-16675.
IEEE DOI
2209
Transportation, Security, Roads, Prediction algorithms,
Convolutional neural networks, Real-time systems, Collaboration, digital twins
BibRef
Liu, J.[Jun],
Li, C.L.[Chun-Lin],
Bai, J.P.[Jing-Pan],
Luo, Y.L.[You-Long],
Lv, H.B.[Hai-Bin],
Lv, Z.H.[Zhi-Han],
Security in IoT-Enabled Digital Twins of Maritime Transportation
Systems,
ITS(24), No. 2, February 2023, pp. 2359-2367.
IEEE DOI
2302
Transportation, Internet of Things, Marine vehicles, Sensors,
Security, Relays, Radio frequency, Digital twins,
maritime silk road
BibRef
Zhao, S.C.[Shan-Cheng],
Wen, J.M.[Jin-Ming],
Huang, X.J.[Xiu-Jie],
Wang, X.M.[Xiao-Ming],
Rate-Compatible Codes via Recursive BMST for Content-Sharing in
Intelligent Vehicular Network,
ITS(22), No. 7, July 2021, pp. 3929-3938.
IEEE DOI
2107
Encoding, Parity check codes, Markov processes, Systematics,
Wireless communication, Information science,
vehicular networks
BibRef
Singh, M.[Maninderpal],
Aujla, G.S.[Gagangeet Singh],
Bali, R.S.[Rasmeet Singh],
A Deep Learning-Based Blockchain Mechanism for Secure Internet of
Drones Environment,
ITS(22), No. 7, July 2021, pp. 4404-4413.
IEEE DOI
2107
Approximation algorithms, Stochastic processes, Production,
Optimization, Mathematical model, Linear programming, Clocks,
zero knowledge proof
BibRef
Xie, G.Q.[Guo-Qi],
Yang, L.T.[Laurence T.],
Yang, Y.[Yuanda],
Luo, H.B.[Hai-Bo],
Li, R.[Renfa],
Alazab, M.[Mamoun],
Threat Analysis for Automotive CAN Networks: A GAN Model-Based
Intrusion Detection Technique,
ITS(22), No. 7, July 2021, pp. 4467-4477.
IEEE DOI
2107
Automotive engineering, Generative adversarial networks,
Intrusion detection, Deep learning, Security, Training,
threat analysis
BibRef
Kamal, M.[Mohsin],
Srivastava, G.[Gautam],
Tariq, M.[Muhammad],
Blockchain-Based Lightweight and Secured V2V Communication in the
Internet of Vehicles,
ITS(22), No. 7, July 2021, pp. 3997-4004.
IEEE DOI
2107
Blockchain, Internet, Real-time systems, Mathematical model,
Authentication, Accidents, Vehicular technology, V2V, blockchain,
authentication
BibRef
Rathee, G.[Geetanjali],
Ahmad, F.[Farhan],
Kurugollu, F.[Fatih],
Azad, M.A.[Muhammad Ajmal],
Iqbal, R.[Razi],
Imran, M.[Muhammad],
CRT-BIoV: A Cognitive Radio Technique for Blockchain-Enabled Internet
of Vehicles,
ITS(22), No. 7, July 2021, pp. 4005-4015.
IEEE DOI
2107
Sensors, Cognitive radio, Copper, Internet, Decision making,
Internet-of-Vehicles, cognitive radios, blockchain, topsis,
spectrum availability
BibRef
Jameel, F.[Furqan],
Javed, M.A.[Muhammad Awais],
Zeadally, S.[Sherali],
Jäntti, R.[Riku],
Efficient Mining Cluster Selection for Blockchain-Based Cellular V2X
Communications,
ITS(22), No. 7, July 2021, pp. 4064-4072.
IEEE DOI
2107
Task analysis, Data mining, Bandwidth, Autonomous vehicles,
Blockchain, cellular V2X communications, latency, mining, vehicular
BibRef
Zheng, X.[Xiao],
Li, M.C.[Ming-Chu],
Chen, Y.F.[Yuan-Fang],
Guo, J.[Jun],
Alam, M.[Muhammad],
Hu, W.T.[Wei-Tong],
Blockchain-Based Secure Computation Offloading in Vehicular Networks,
ITS(22), No. 7, July 2021, pp. 4073-4087.
IEEE DOI
2107
Cloud computing, Vehicular ad hoc networks, Access control,
Task analysis, Servers, Vehicular ad hoc networks, blockchain,
deep reinforcement learning
BibRef
Gai, K.[Keke],
Wu, Y.[Yulu],
Zhu, L.[Liehuang],
Choo, K.K.R.[Kim-Kwang Raymond],
Xiao, B.[Bin],
Blockchain-Enabled Trustworthy Group Communications in UAV Networks,
ITS(22), No. 7, July 2021, pp. 4118-4130.
IEEE DOI
2107
Data transfer, Servers, Base stations, Unmanned aerial vehicles,
Authentication, Wireless communication, Blockchain,
unmanned aerial vehicle network
BibRef
Cheema, M.A.[Muhammad Asaad],
Shehzad, M.K.[Muhammad Karam],
Qureshi, H.K.[Hassaan Khaliq],
Hassan, S.A.[Syed Ali],
Jung, H.[Haejoon],
A Drone-Aided Blockchain-Based Smart Vehicular Network,
ITS(22), No. 7, July 2021, pp. 4160-4170.
IEEE DOI
2107
Drones, Reliability, Authentication, Computer network reliability,
Backhaul network, blockchain, drones, intelligent transportation,
unsupervised learning
BibRef
Fatemidokht, H.[Hamideh],
Rafsanjani, M.K.[Marjan Kuchaki],
Gupta, B.B.[Brij B.],
Hsu, C.H.[Ching-Hsien],
Efficient and Secure Routing Protocol Based on Artificial
Intelligence Algorithms With UAV-Assisted for Vehicular Ad Hoc
Networks in Intelligent Transportation Systems,
ITS(22), No. 7, July 2021, pp. 4757-4769.
IEEE DOI
2107
Routing protocols, Routing, Roads, Vehicular ad hoc networks,
Ad hoc networks, Delays, Clustering algorithms,
routing
BibRef
Roy, C.[Chandana],
Misra, S.[Sudip],
Safe-Passé: Dynamic Handoff Scheme for Provisioning
Safety-as-a-Service in 5G-Enabled Intelligent Transportation System,
ITS(22), No. 8, August 2021, pp. 5415-5425.
IEEE DOI
2108
Safety, 5G mobile communication, Vehicle dynamics,
Wireless communication, Vehicles, Registers, Quality of service,
decision parameters
BibRef
Xie, G.Q.[Guo-Qi],
Yang, L.T.[Laurence T.],
Wu, W.[Wei],
Zeng, K.Y.[Ke-Yu],
Xiao, X.Z.[Xiang-Zhen],
Li, R.[Renfa],
Security Enhancement for Real-Time Parallel In-Vehicle Applications
by CAN FD Message Authentication,
ITS(22), No. 8, August 2021, pp. 5038-5049.
IEEE DOI
2108
Task analysis, Real-time systems, Bandwidth, Authentication,
Automotive engineering, Automobiles, Authentication,
security
BibRef
Yu, H.Y.[Hai-Yang],
Ma, S.[Shuai],
Hu, Q.[Qi],
Yang, Z.[Zhen],
Blockchain-Based Continuous Auditing for Dynamic Data Sharing in
Autonomous Vehicular Networks,
Computer(54), No. 8, August 2021, pp. 33-45.
IEEE DOI
2108
Data security, Transportation, Servers, Vehicle dynamics,
Computer security, Autonomous vehicles
BibRef
Török, Á.[Árpád],
Szalay, Z.[Zsolt],
Sághi, B.[Balázs],
New Aspects of Integrity Levels in Automotive Industry-Cybersecurity
of Automated Vehicles,
ITS(23), No. 1, January 2022, pp. 383-391.
IEEE DOI
2201
Hazards, Automotive engineering, Computer crime, Industries,
Automotive safety integrity level, clustering model,
tolerable hazard rate
BibRef
Chen, X.[Xiao],
Ding, J.[Jie],
Lu, Z.Y.[Zhen-Yu],
A Decentralized Trust Management System for Intelligent
Transportation Environments,
ITS(23), No. 1, January 2022, pp. 558-571.
IEEE DOI
2201
Social network services, Transportation, Protocols,
Trust management, vehicular network, blockchain, TEE,
incentive mechanism
BibRef
Alexakos, C.[Christos],
Votis, K.[Konstantinos],
Tzovaras, D.[Dimitrios],
Serpanos, D.[Dimitrios],
Reshaping the Intelligent Transportation Scene:
Challenges of an Operational and Safe Internet of Vehicles,
Computer(55), No. 1, January 2022, pp. 104-107.
IEEE DOI
2201
BibRef
Wang, Y.[Yu],
Zhang, W.F.[Wen-Fang],
Wang, X.M.[Xiao-Min],
Guo, W.[Wei],
Khan, M.K.[Muhammad Khurram],
Fan, P.[Pingzhi],
Improving the Security of LTE-R for High-Speed Railway:
From the Access Authentication View,
ITS(23), No. 2, February 2022, pp. 1332-1346.
IEEE DOI
2202
Authentication, Rail transportation, Handover,
Wireless communication, Protocols, LTE-R, authentication,
Scyther
BibRef
Dibaei, M.[Mahdi],
Zheng, X.[Xi],
Xia, Y.[Youhua],
Xu, X.[Xiwei],
Jolfaei, A.[Alireza],
Bashir, A.K.[Ali Kashif],
Tariq, U.[Usman],
Yu, D.J.[Dong-Jin],
Vasilakos, A.V.[Athanasios V.],
Investigating the Prospect of Leveraging Blockchain and Machine
Learning to Secure Vehicular Networks: A Survey,
ITS(23), No. 2, February 2022, pp. 683-700.
IEEE DOI
2202
Blockchains, 5G mobile communication, Wireless communication,
Protocols, Dedicated short range communication,
machine learning
BibRef
Zhang, D.J.[Da-Jun],
Yu, F.R.[F. Richard],
Yang, R.Z.[Rui-Zhe],
Zhu, L.[Li],
Software-Defined Vehicular Networks With Trust Management:
A Deep Reinforcement Learning Approach,
ITS(23), No. 2, February 2022, pp. 1400-1414.
IEEE DOI
2202
Vehicular ad hoc networks, Vehicle dynamics,
Heuristic algorithms, Learning (artificial intelligence), trust model
BibRef
Ren, Y.J.[Yong-Jun],
Zhu, F.[Fujian],
Wang, J.[Jin],
Sharma, P.K.[Pradip Kumar],
Ghosh, U.[Uttam],
Novel Vote Scheme for Decision-Making Feedback Based on Blockchain in
Internet of Vehicles,
ITS(23), No. 2, February 2022, pp. 1639-1648.
IEEE DOI
2202
Blockchains, Peer-to-peer computing, Outsourcing,
Computational modeling, Transportation, Data models,
outsourcing computation
BibRef
Overko, R.[Roman],
Ordóńez-Hurtado, R.[Rodrigo],
Zhuk, S.[Sergiy],
Ferraro, P.[Pietro],
Cullen, A.[Andrew],
Shorten, R.[Robert],
Spatial Positioning Token (SPToken) for Smart Mobility,
ITS(23), No. 2, February 2022, pp. 1529-1542.
IEEE DOI
2202
Crowdsourced Smart Mobility.
Distributed ledger, Distributed databases,
Recommender systems, Reinforcement learning, Smart cities
BibRef
Liu, X.J.[Xue-Jiao],
Chen, W.[Wei],
Xia, Y.J.[Ying-Jie],
Security-Aware Information Dissemination With Fine-Grained Access
Control in Cooperative Multi-RSU of VANETs,
ITS(23), No. 3, March 2022, pp. 2170-2179.
IEEE DOI
2203
Reliability, Encryption, Access control, Protocols, Task analysis,
Data dissemination, Roads, Vehicular ad hoc networks (VANETs),
ciphertext-policy attribute-based encryption
BibRef
Derhab, A.[Abdelouahid],
Belaoued, M.[Mohamed],
Mohiuddin, I.[Irfan],
Kurniawan, F.[Fajri],
Khan, M.K.[Muhammad Khurram],
Histogram-Based Intrusion Detection and Filtering Framework for
Secure and Safe In-Vehicle Networks,
ITS(23), No. 3, March 2022, pp. 2366-2379.
IEEE DOI
2203
Intrusion detection, Feature extraction, Histograms, Safety,
Filtering, Wireless fidelity, Vehicle-to-everything, OCSVM
BibRef
Islam, R.[Riadul],
Refat, R.U.D.[Rafi Ud Daula],
Yerram, S.M.[Sai Manikanta],
Malik, H.[Hafiz],
Graph-Based Intrusion Detection System for Controller Area Networks,
ITS(23), No. 3, March 2022, pp. 1727-1736.
IEEE DOI
2203
Protocols, Autonomous vehicles, Fabrication, Intrusion detection,
Feature extraction, Cyberattack, Controller area network, security,
graph-theory
BibRef
Li, Z.[Zhong],
Kong, Y.[Yubo],
Wang, C.[Cheng],
Jiang, C.J.[Chang-Jun],
DDoS Mitigation Based on Space-Time Flow Regularities in IoV:
A Feature Adaption Reinforcement Learning Approach,
ITS(23), No. 3, March 2022, pp. 2262-2278.
IEEE DOI
2203
Computer crime, Denial-of-service attack, Reinforcement learning,
Feature extraction, Base stations, Unsupervised learning,
DDoS mitigation
BibRef
Sutrala, A.K.[Anil Kumar],
Obaidat, M.S.[Mohammad S.],
Saha, S.[Sourav],
Das, A.K.[Ashok Kumar],
Alazab, M.[Mamoun],
Park, Y.[Youngho],
Authenticated Key Agreement Scheme With User Anonymity and
Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical
Systems,
ITS(23), No. 3, March 2022, pp. 2316-2330.
IEEE DOI
2203
Security, Authentication, 5G mobile communication, Protocols,
Switches, Smart devices, Virtualization,
AVISPA simulation
BibRef
Yin, Z.S.[Zhi-Sheng],
Jia, M.[Min],
Cheng, N.[Nan],
Wang, W.[Wei],
Lyu, F.[Feng],
Guo, Q.[Qing],
Shen, X.M.[Xue-Min],
UAV-Assisted Physical Layer Security in Multi-Beam Satellite-Enabled
Vehicle Communications,
ITS(23), No. 3, March 2022, pp. 2739-2751.
IEEE DOI
2203
Satellites, Interference, Unmanned aerial vehicles, Security,
Quality of service, Physical layer security, Downlink,
physical layer security
BibRef
Wang, D.Y.[Dan-Yang],
Qi, P.[Peihan],
Zhao, Y.[Yue],
Li, C.X.[Chen-Xi],
Wu, W.[Wen],
Li, Z.[Zan],
Covert Wireless Communication With Noise Uncertainty in
Space-Air-Ground Integrated Vehicular Networks,
ITS(23), No. 3, March 2022, pp. 2784-2797.
IEEE DOI
2203
Communication systems, Uncertainty, Wireless communication,
Probability, Power system reliability, Uplink, Optimization,
air to ground communication
BibRef
Fang, X.J.[Xiao-Jie],
Du, Z.P.[Zhao-Peng],
Yin, X.Y.[Xin-Yu],
Liu, L.[Lei],
Sha, X.J.[Xue-Jun],
Zhang, H.L.[Hong-Li],
Toward Physical Layer Security and Efficiency for SAGIN: A
WFRFT-Based Parallel Complex-Valued Spectrum Spreading Approach,
ITS(23), No. 3, March 2022, pp. 2819-2829.
IEEE DOI
2203
Security, Fourier transforms, Wireless communication,
Spread spectrum communication,
weighted fractional Fourier transform
BibRef
Suo, D.J.[Da-Jiang],
Moore, J.[John],
Boesch, M.[Mathew],
Post, K.[Kyle],
Sarma, S.E.[Sanjay E.],
Location-Based Schemes for Mitigating Cyber Threats on Connected and
Automated Vehicles: A Survey and Design Framework,
ITS(23), No. 4, April 2022, pp. 2919-2937.
IEEE DOI
2204
Survey, VANET Security. Security, Safety, Transportation, Sensors, Roads, Privacy,
Real-time systems, Connected and automated vehicles, security, V2I
BibRef
Feng, S.[Shuo],
Haykin, S.[Simon],
Coordinated Cognitive Risk Control for Bridging Vehicular Radar and
Communication Systems,
ITS(23), No. 5, May 2022, pp. 4135-4150.
IEEE DOI
2205
Radar, Jamming, Communication systems, Radar tracking,
Vehicular ad hoc networks, Kalman filters, Vehicle dynamics,
cognitive risk control
BibRef
Li, M.L.[Mei-Ling],
Yang, X.X.[Xiao-Xia],
Khan, F.[Fazlullah],
Jan, M.A.[Mian Ahmad],
Chen, W.[Wei],
Han, Z.[Zhu],
Improving Physical Layer Security in Vehicles and Pedestrians
Networks With Ambient Backscatter Communication,
ITS(23), No. 7, July 2022, pp. 9380-9390.
IEEE DOI
2207
Backscatter, Security, Autonomous vehicles, Reliability,
Radio frequency, Wireless communication,
artificial noise
BibRef
Jo, H.J.[Hyo Jin],
Choi, W.[Wonsuk],
A Survey of Attacks on Controller Area Networks and Corresponding
Countermeasures,
ITS(23), No. 7, July 2022, pp. 6123-6141.
IEEE DOI
2207
Automotive engineering, Wireless communication, Telematics,
Universal Serial Bus, Transceivers, Security, Audio systems,
authentication
BibRef
Sun, X.Q.[Xiao-Qiang],
Yu, F.R.[F. Richard],
Zhang, P.[Peng],
A Survey on Cyber-Security of Connected and Autonomous Vehicles
(CAVs),
ITS(23), No. 7, July 2022, pp. 6240-6259.
IEEE DOI
2207
Protocols, Wireless communication, Communication system security,
Standards, Wireless LAN, Security, Safety
BibRef
Ji, B.F.[Bao-Feng],
Han, Y.[Ying],
Wang, Y.[Yanan],
Cao, D.[Dun],
Tao, F.[Fazhan],
Fu, Z.[Zhumu],
Li, P.[Peng],
Wen, H.[Hong],
Relay Cooperative Transmission Algorithms for IoV Under Aggregated
Interference,
ITS(23), No. 7, July 2022, pp. 9712-9725.
IEEE DOI
2207
Relays, Interference, Blockchains, Wireless communication, Security,
Capacity planning, Probability, Outage probability, aggregated interference
BibRef
Zhou, Z.L.[Zhi-Li],
Gaurav, A.[Akshat],
Gupta, B.B.[Brij Bhooshan],
Lytras, M.D.[Miltiadis D.],
Razzak, I.[Imran],
A Fine-Grained Access Control and Security Approach for Intelligent
Vehicular Transport in 6G Communication System,
ITS(23), No. 7, July 2022, pp. 9726-9735.
IEEE DOI
2207
Vehicular ad hoc networks, 6G mobile communication,
Communication systems, Access control, Deep learning,
deep learning
BibRef
Zhou, Z.L.[Zhi-Li],
Wang, M.M.[Mei-Min],
Huang, J.W.[Jing-Wang],
Lin, S.L.[Sheng-Liang],
Lv, Z.H.[Zhi-Han],
Blockchain in Big Data Security for Intelligent Transportation With
6G,
ITS(23), No. 7, July 2022, pp. 9736-9746.
IEEE DOI
2207
Logistics, Blockchains, Transportation, Security, Companies,
Supply chains, Industries, Blockchain,
big data
BibRef
Berlato, S.[Stefano],
Centenaro, M.[Marco],
Ranise, S.[Silvio],
Smart Card-Based Identity Management Protocols for V2V and V2I
Communications in CCAM: A Systematic Literature Review,
ITS(23), No. 8, August 2022, pp. 10086-10103.
IEEE DOI
2208
Protocols, Authentication, Security, Vehicles, Cryptography, Privacy,
Safety, Cooperative connected and automated mobility,
systematic literature review
BibRef
Liang, J.W.[Jun-Wei],
Ma, M.[Maode],
Tan, X.[Xu],
GaDQN-IDS: A Novel Self-Adaptive IDS for VANETs Based on Bayesian
Game Theory and Deep Reinforcement Learning,
ITS(23), No. 8, August 2022, pp. 12724-12737.
IEEE DOI
2208
Vehicle dynamics, Monitoring, Roads, Intrusion detection, Games,
Bayes methods, Game theory, IDSs, VANETs, GaDQN-IDS, Nash equilibria,
EPL
BibRef
Liu, X.J.[Xue-Jiao],
Ma, O.[Oubo],
Chen, W.[Wei],
Xia, Y.J.[Ying-Jie],
Zhou, Y.X.[Yu-Xuan],
HDRS: A Hybrid Reputation System With Dynamic Update Interval for
Detecting Malicious Vehicles in VANETs,
ITS(23), No. 8, August 2022, pp. 12766-12777.
IEEE DOI
2208
Reliability, Vehicle dynamics, Vehicular ad hoc networks,
Intelligent transportation systems, Blacklisting,
dynamic adjustment
BibRef
Comert, G.[Gurcan],
Rahman, M.[Mizanur],
Islam, M.[Mhafuzul],
Chowdhury, M.[Mashrur],
Change Point Models for Real-Time Cyber Attack Detection in Connected
Vehicle Environment,
ITS(23), No. 8, August 2022, pp. 12328-12342.
IEEE DOI
2208
Adaptation models, Data models, Computational modeling,
Cyberattack, Connected vehicles, Real-time systems, roadside equipment
BibRef
Ghourab, E.M.[Esraa M.],
Azab, M.[Mohamed],
Ezzeldin, N.[Noha],
Blockchain-Guided Dynamic Best-Relay Selection for Trustworthy
Vehicular Communication,
ITS(23), No. 8, August 2022, pp. 13678-13693.
IEEE DOI
2208
Relays, Blockchains, Mathematical models, Wireless communication,
Reliability, Vehicular ad hoc networks, Bit error rate,
throughput
BibRef
Lopez, A.B.[Anthony Bahadir],
Jin, W.L.[Wen-Long],
Faruque, M.A.A.[Mohammad Adbullah Al],
Attack Modeling Methodology and Taxonomy for Intelligent
Transportation Systems,
ITS(23), No. 8, August 2022, pp. 13255-13264.
IEEE DOI
2208
Mathematical models, Roads, Sensors, Vehicle-to-everything, Taxonomy,
Safety, Measurement, Intelligent Transportation Systems (ITS),
network security
BibRef
Verma, S.[Sandeep],
Zeadally, S.[Sherali],
Kaur, S.[Satnam],
Sharma, A.K.[Ajay Kumar],
Intelligent and Secure Clustering in Wireless Sensor Network
(WSN)-Based Intelligent Transportation Systems,
ITS(23), No. 8, August 2022, pp. 13473-13481.
IEEE DOI
2208
Wireless sensor networks, Security, Genetic algorithms, Roads,
Intelligent transportation systems, Military computing,
security and wireless sensor network
BibRef
Bhargava, A.[Arpita],
Verma, S.[Shekhar],
DUEL: Dempster Uncertainty-Based Enhanced- Trust Level Scheme for
VANET,
ITS(23), No. 9, September 2022, pp. 15079-15090.
IEEE DOI
2209
Vehicular ad hoc networks, Uncertainty, Receivers,
Vehicle dynamics, Routing, Delays, Computational modeling, Trust,
decision
BibRef
Gao, H.H.[Hong-Hao],
Liu, C.[Can],
Yin, Y.[Yuyu],
Xu, Y.S.[Yue-Shen],
Li, Y.[Yu],
A Hybrid Approach to Trust Node Assessment and Management for VANETs
Cooperative Data Communication: Historical Interaction Perspective,
ITS(23), No. 9, September 2022, pp. 16504-16513.
IEEE DOI
2209
Peer-to-peer computing, Security, Bayes methods, Trust management,
Wireless communication, Data communication, Analytical models,
bayesian inference
BibRef
Shim, K.A.[Kyung-Ah],
A Survey on Post-Quantum Public-Key Signature Schemes for Secure
Vehicular Communications,
ITS(23), No. 9, September 2022, pp. 14025-14042.
IEEE DOI
2209
Cryptography, Public key cryptography, Quantum algorithm,
Computer security, Digital signatures, Standards, Authentication,
side-channel attack
BibRef
Chai, H.[Haoye],
Leng, S.[Supeng],
Wu, F.[Fan],
He, J.H.[Jian-Hua],
Secure and Efficient Blockchain-Based Knowledge Sharing for
Intelligent Connected Vehicles,
ITS(23), No. 9, September 2022, pp. 14620-14631.
IEEE DOI
2209
Blockchains, Data models, Adaptation models, Knowledge engineering,
Vehicle dynamics, Sensors, Distance learning, Knowledge sharing,
distributed learning
BibRef
Zhou, Z.L.[Zhi-Li],
Gupta, B.B.[Brij Bhooshan],
Gaurav, A.[Akshat],
Li, Y.J.[Yu-Jiang],
Lytras, M.D.[Miltiadis D.],
Nedjah, N.[Nadia],
An Efficient and Secure Identity-Based Signature System for
Underwater Green Transport System,
ITS(23), No. 9, September 2022, pp. 16161-16169.
IEEE DOI
2209
Authentication, Security, Green products, Sensors,
Temperature sensors, Ocean temperature, Neural networks,
identity-based encryption
BibRef
Feng, H.L.[Hai-Lin],
Chen, D.L.[Dong-Liang],
Lv, Z.H.[Zhi-Han],
Blockchain in Digital Twins-Based Vehicle Management in VANETs,
ITS(23), No. 10, October 2022, pp. 19613-19623.
IEEE DOI
2210
Blockchains, Roads, Transportation, Digital twins, Smart cities,
Safety, Analytical models, Vehicular adhoc networks (VANETs),
vehicle management
BibRef
Ahmed, M.[Mohiuddin],
Moustafa, N.[Nour],
Suaib Akhter, A.F.M.,
Razzak, I.[Imran],
Surid, E.[Ehsanuzzaman],
Anwar, A.[Adnan],
Shahen Shah, A.F.M.,
Zengin, A.[Ahmet],
A Blockchain-Based Emergency Message Transmission Protocol for
Cooperative VANET,
ITS(23), No. 10, October 2022, pp. 19624-19633.
IEEE DOI
2210
Blockchains, Protocols, Vehicular ad hoc networks, Authentication,
Servers, Security, Databases, Authentication, blockchain, FDIA, IoV, PoC, VANET
BibRef
Xiao, T.T.[Ting-Ting],
Chen, C.[Chen],
Pei, Q.Q.[Qing-Qi],
Song, H.H.[Houbing Herbert],
Consortium Blockchain-Based Computation Offloading Using Mobile Edge
Platoon Cloud in Internet of Vehicles,
ITS(23), No. 10, October 2022, pp. 17769-17783.
IEEE DOI
2210
Task analysis, Games, Cloud computing, Voting, Blockchains, Delays,
Resource management, Internet of vehicle, computation offloading,
consortium blockchain
BibRef
Hammi, B.[Badis],
Idir, Y.M.[Yacine Mohamed],
Zeadally, S.[Sherali],
Khatoun, R.[Rida],
Nebhen, J.[Jamel],
Is it Really Easy to Detect Sybil Attacks in C-ITS Environments:
A Position Paper,
ITS(23), No. 10, October 2022, pp. 18273-18287.
IEEE DOI
2210
Security, Standards, Safety, ETSI, Roads, Proposals,
Wireless communication, Certificate, C-ITS, PKI, privacy, pseudonym,
VANET
BibRef
Ding, Y.[Yi],
Zhu, G.Q.[Gui-Qin],
Chen, D.J.[Da-Jiang],
Qin, X.[Xue],
Cao, M.S.[Ming-Sheng],
Qin, Z.G.[Zhi-Guang],
Adversarial Sample Attack and Defense Method for Encrypted Traffic
Data,
ITS(23), No. 10, October 2022, pp. 18024-18039.
IEEE DOI
2210
Cryptography, Deep learning, Convolutional neural networks,
Resists, Training, Classification algorithms, Task analysis,
deep learning
BibRef
Rahman, M.A.[Md. Arafatur],
Rahim, M.A.[Md. Abdur],
Rahman, M.M.[Md. Mustafizur],
Moustafa, N.[Nour],
Razzak, I.[Imran],
Ahmad, T.[Tanvir],
Patwary, M.N.[Mohammad N.],
A Secure and Intelligent Framework for Vehicle Health Monitoring
Exploiting Big-Data Analytics,
ITS(23), No. 10, October 2022, pp. 19727-19742.
IEEE DOI
2210
Monitoring, Optical fiber networks, Taxonomy, Stakeholders,
Wireless sensor networks, Fourth Industrial Revolution,
VehiChain
BibRef
Aloqaily, M.[Moayad],
Ridhawi, I.A.[Ismaeel Al],
Guizani, M.[Mohsen],
Energy-Aware Blockchain and Federated Learning-Supported Vehicular
Networks,
ITS(23), No. 11, November 2022, pp. 22641-22652.
IEEE DOI
2212
Task analysis, Performance evaluation, Blockchains, Virtualization,
Unmanned aerial vehicles, Service level agreements, Servers,
federated learning
BibRef
Liu, J.[Jun],
Zhang, L.[Lei],
Li, C.L.[Chun-Lin],
Bai, J.[Jingpan],
Lv, H.B.[Hai-Bin],
Lv, Z.H.[Zhi-Han],
Blockchain-Based Secure Communication of Intelligent Transportation
Digital Twins System,
ITS(23), No. 11, November 2022, pp. 22630-22640.
IEEE DOI
2212
Security, Encryption, Data models, Computational modeling,
6G mobile communication, Vehicles, Real-time systems,
intelligent transportation
BibRef
Liao, S.Y.[Si-Yi],
Wu, J.[Jun],
Bashir, A.K.[Ali Kashif],
Yang, W.[Wu],
Li, J.H.[Jian-Hua],
Tariq, U.[Usman],
Digital Twin Consensus for Blockchain-Enabled Intelligent
Transportation Systems in Smart Cities,
ITS(23), No. 11, November 2022, pp. 22619-22629.
IEEE DOI
2212
Blockchains, Smart cities, Security, Digital twin, Servers,
Reliability, Sensors, Digital Twin, blockchain,
auction
BibRef
Cao, H.T.[Hao-Tong],
Zhao, H.T.[Hai-Tao],
Luo, D.X.[Daniel Xiapu],
Kumar, N.[Neeraj],
Yang, L.X.[Long-Xiang],
Dynamic Virtual Resource Allocation Mechanism for Survivable Services
in Emerging NFV-Enabled Vehicular Networks,
ITS(23), No. 11, November 2022, pp. 22492-22504.
IEEE DOI
2212
Resource management, 5G mobile communication, Dynamic scheduling,
Vehicle dynamics, Heuristic algorithms, Business, survivable services
BibRef
Zhang, D.J.[Da-Jun],
Shi, W.[Wei],
St-Hilaire, M.[Marc],
Yang, R.Z.[Rui-Zhe],
Multiaccess Edge Integrated Networking for Internet of Vehicles:
A Blockchain-Based Deep Compressed Cooperative Learning Approach,
ITS(23), No. 11, November 2022, pp. 21593-21607.
IEEE DOI
2212
Blockchains, Computer architecture, Training, Servers, Deep learning,
Neural networks, Peer-to-peer computing, Internet of Vehicles,
deep neural network compression
BibRef
Liu, S.S.[Shuang-Shuang],
Chen, C.M.[Chien-Ming],
Comments on 'A Secure and Lightweight Drones-Access Protocol for
Smart City Surveillance',
ITS(23), No. 12, December 2022, pp. 25054-25058.
IEEE DOI
2212
Protocols, Drones, Authentication, Resists, Databases,
Vehicular ad hoc networks, Surveillance, Drone capture attacks,
perfect forward secrecy
See also Secure and Lightweight Drones-Access Protocol for Smart City Surveillance, A.
BibRef
Khan, I.A.[Izhar Ahmed],
Moustafa, N.[Nour],
Pi, D.C.[De-Chang],
Haider, W.[Waqas],
Li, B.[Bentian],
Jolfaei, A.[Alireza],
An Enhanced Multi-Stage Deep Learning Framework for Detecting
Malicious Activities From Autonomous Vehicles,
ITS(23), No. 12, December 2022, pp. 25469-25478.
IEEE DOI
2212
Computer crime, Tools, Intrusion detection, Security,
Autonomous vehicles, Automobiles, Vehicles, deep learning
BibRef
Zhang, T.[Tao],
Xu, C.Q.[Chang-Qiao],
Zhang, B.C.[Bing-Chi],
Shen, J.H.[Jia-Hao],
Kuang, X.H.[Xiao-Hui],
Grieco, L.A.[Luigi Alfredo],
Toward Attack-Resistant Route Mutation for VANETs: An Online and
Adaptive Multiagent Reinforcement Learning Approach,
ITS(23), No. 12, December 2022, pp. 23254-23267.
IEEE DOI
2212
Routing, Security, Vehicular ad hoc networks, Routing protocols,
Convergence, Vehicle dynamics, Network topology,
multi-agent reinforcement learning
BibRef
Agbaje, P.[Paul],
Anjum, A.[Afia],
Mitra, A.[Arkajyoti],
Oseghale, E.[Emmanuel],
Bloom, G.[Gedare],
Olufowobi, H.[Habeeb],
Survey of Interoperability Challenges in the Internet of Vehicles,
ITS(23), No. 12, December 2022, pp. 22838-22861.
IEEE DOI
2212
Survey, VANET. Interoperability, Ecosystems, Standards, Real-time systems,
Vehicle dynamics, Semantics, Internet of Vehicles,
intelligent transportation system
BibRef
Yu, Y.T.[Yan-Tao],
Zeng, X.[Xin],
Xue, X.P.[Xiao-Ping],
Ma, J.X.[Jing-Xiao],
LSTM-Based Intrusion Detection System for VANETs: A Time Series
Classification Approach to False Message Detection,
ITS(23), No. 12, December 2022, pp. 23906-23918.
IEEE DOI
2212
Time series analysis, Safety, Deep learning, Data models,
Visualization, Vehicular ad hoc networks, Vehicles,
long short-term memory model (LSTM)
BibRef
Bajracharya, C.[Chandra],
Performance Evaluation for Secure Communications in Mobile Internet
of Vehicles With Joint Reactive Jamming and Eavesdropping Attacks,
ITS(23), No. 11, November 2022, pp. 22563-22570.
IEEE DOI
2212
Jamming, Wireless communication, Eavesdropping,
Communication system security, Encryption, Mathematical model,
association in IoV
BibRef
Ma, R.[Ruhui],
Cao, J.[Jin],
Zhang, Y.H.[Ying-Hui],
Shang, C.[Chao],
Xiong, L.H.[Li-Hui],
Li, H.[Hui],
A Group-Based Multicast Service Authentication and Data Transmission
Scheme for 5G-V2X,
ITS(23), No. 12, December 2022, pp. 23976-23992.
IEEE DOI
2212
Authentication, Security, Vehicle-to-everything,
5G mobile communication, 3GPP, Standards, Data models, 5G-V2X,
data transmission
BibRef
Bojjagani, S.[Sriramulu],
Padmanabha Reddy, Y.C.A.,
Anuradha, T.[Thati],
Rao, P.V.V.[P. V. Venkateswara],
Reddy, B.R.[B. Ramachandra],
Khan, M.K.[Muhammad Khurram],
Secure Authentication and Key Management Protocol for Deployment of
Internet of Vehicles (IoV) Concerning Intelligent Transport Systems,
ITS(23), No. 12, December 2022, pp. 24698-24713.
IEEE DOI
2212
Authentication, Protocols, Security, Servers, Cloud computing,
Smart cities, Vehicular ad hoc networks, Tamarin
BibRef
Mirzadeh, I.[Ida],
Haghighi, M.S.[Mohammad Sayad],
Jolfaei, A.[Alireza],
Filtering Malicious Messages by Trust-Aware Cognitive Routing in
Vehicular Ad Hoc Networks,
ITS(24), No. 1, January 2023, pp. 1134-1143.
IEEE DOI
2301
Peer-to-peer computing, Accidents, Trust management,
Vehicular ad hoc networks, Routing,
cyber security
BibRef
Oseni, A.[Ayodeji],
Moustafa, N.[Nour],
Creech, G.[Gideon],
Sohrabi, N.[Nasrin],
Strelzoff, A.[Andrew],
Tari, Z.[Zahir],
Linkov, I.[Igor],
An Explainable Deep Learning Framework for Resilient Intrusion
Detection in IoT-Enabled Transportation Networks,
ITS(24), No. 1, January 2023, pp. 1000-1014.
IEEE DOI
2301
Internet of Things, Security, Intrusion detection, Protocols,
Deep learning, Safety, Explainable AI, network intrusion detection,
Internet of Vehicles (IoV)
BibRef
Sun, Y.[Yi],
Yu, K.P.[Ke-Ping],
Bashir, A.K.[Ali Kashif],
Liao, X.[Xin],
Bl-IEA: A Bit-Level Image Encryption Algorithm for Cognitive Services
in Intelligent Transportation Systems,
ITS(24), No. 1, January 2023, pp. 1062-1074.
IEEE DOI
2301
Encryption, Cats, Logistics, Security,
Intelligent transportation systems, Resists, Correlation,
logistic chaotic map
BibRef
Wang, Z.Y.[Zhao-Yang],
Wang, S.[Song],
Bhuiyan, M.Z.A.[Md Zakirul Alam],
Xu, J.P.[Ji-Ping],
Hu, Y.Z.[Yan-Zhu],
Cooperative Location-Sensing Network Based on Vehicular Communication
Security Against Attacks,
ITS(24), No. 1, January 2023, pp. 942-952.
IEEE DOI
2301
Location awareness, Security, Cryptography, Message passing, Sensors,
Probability density function, Position measurement,
eavesdropping attack
BibRef
Ahn, H.[Haesung],
Choi, J.[Juyeong],
Kim, Y.H.[Yong Hoon],
A Mathematical Modeling of Stuxnet-Style Autonomous Vehicle Malware,
ITS(24), No. 1, January 2023, pp. 673-683.
IEEE DOI
2301
Malware, Computer worms, Computers, Epidemics, Security, Diseases,
Computer hacking, Autonomous vehicles, cybersecurity, vector-host model
BibRef
Yang, Y.Q.[Yao-Qi],
Wang, W.Z.[Wei-Zheng],
Liu, L.[Lingjun],
Dev, K.[Kapal],
Qureshi, N.M.F.[Nawab Muhammad Faseeh],
AoI Optimization in the UAV-Aided Traffic Monitoring Network Under
Attack: A Stackelberg Game Viewpoint,
ITS(24), No. 1, January 2023, pp. 932-941.
IEEE DOI
2301
Age of Information (AoI).
Optimization, Monitoring, Games, Sensors, Data models, Data integrity,
Security, UAV, traffic monitoring network, AoI, Stackelberg game
BibRef
Sun, Z.B.[Zhan-Bo],
Liu, R.Z.[Run-Zhe],
Hu, H.T.[Hai-Tao],
Liu, D.Y.[Deng-Yue],
Yan, Z.Q.[Zhi-Qi],
Cyberattacks on connected automated vehicles:
A traffic impact analysis,
IET-ITS(17), No. 2, 2023, pp. 295-311.
DOI Link
2302
BibRef
Zhu, L.[Li],
Li, Y.[Yang],
Yu, F.R.[F. Richard],
Ning, B.[Bin],
Tang, T.[Tao],
Wang, X.X.[Xiao-Xuan],
Cross-Layer Defense Methods for Jamming-Resistant CBTC Systems,
ITS(22), No. 11, November 2021, pp. 7266-7278.
IEEE DOI
2112
Jamming, Games, Security, Control systems, Physical layer,
Stochastic processes, Communication systems, stochastic game
BibRef
Liang, H.[Hao],
Zhu, L.[Li],
Yu, F.R.[F. Richard],
Wang, X.[Xuan],
A Cross-Layer Defense Method for Blockchain Empowered CBTC Systems
Against Data Tampering Attacks,
ITS(24), No. 1, January 2023, pp. 501-515.
IEEE DOI
2301
Blockchains, Cross layer design, Computer crime, Authentication,
Protocols, Safety, Physical layer, CBTC, data tampering attacks,
blockchain
BibRef
Zhang, P.Y.[Pei-Ying],
Wang, Y.Q.[Ya-Qi],
Aujla, G.S.[Gagangeet Singh],
Jindal, A.[Anish],
Al-Otaibi, Y.D.[Yasser D.],
A Blockchain-Based Authentication Scheme and Secure Architecture for
IoT-Enabled Maritime Transportation Systems,
ITS(24), No. 2, February 2023, pp. 2322-2331.
IEEE DOI
2302
Blockchains, Authentication, Industries, Information security,
Monitoring, Safety, Internet of Things,
authentication mechanism
BibRef
Duan, Y.S.[Yong-Shuai],
Huang, J.Q.[Jun-Qin],
Lei, J.[Jiale],
Kong, L.[Linghe],
Lv, Y.[Yibin],
Lin, Z.L.[Zhi-Liang],
Chen, G.[Guihai],
Khan, M.K.[Muhammad Khurram],
AISChain: Blockchain-Based AIS Data Platform With Dynamic Bloom
Filter Tree,
ITS(24), No. 2, February 2023, pp. 2332-2343.
IEEE DOI
2302
Artificial intelligence, Blockchains, Soft sensors, Throughput,
Satellite broadcasting, Safety, Automatic identification system,
security
BibRef
Gupta, B.B.[Brij Bhooshan],
Gaurav, A.[Akshat],
Hsu, C.H.[Ching-Hsien],
Jiao, B.[Bo],
Identity-Based Authentication Mechanism for Secure Information
Sharing in the Maritime Transport System,
ITS(24), No. 2, February 2023, pp. 2422-2430.
IEEE DOI
2302
Blockchains, Marine vehicles, Authentication, Sea measurements,
Identity-based encryption, Performance evaluation, Monitoring, IoT,
blockchain
BibRef
Munusamy, A.[Ambigavathi],
Adhikari, M.[Mainak],
Khan, M.A.[Mohammad Ayoub],
Menon, V.G.[Varun G.],
Srirama, S.N.[Satish Narayana],
Alex, L.T.[Linss T.],
Khosravi, M.R.[Mohammad R.],
Edge-Centric Secure Service Provisioning in IoT-Enabled Maritime
Transportation Systems,
ITS(24), No. 2, February 2023, pp. 2568-2577.
IEEE DOI
2302
Task analysis, Real-time systems, Security, Servers,
Internet of Things, Computational modeling, Blockchains, IoT,
vessel tracking
BibRef
He, Y.J.[Ya-Jie],
Kong, M.[Menglei],
Du, C.[Chunshan],
Yao, D.Y.[Ding-Yi],
Yu, M.[Miao],
Communication Security Analysis of Intelligent Transportation System
Using 5G Internet of Things From the Perspective of Big Data,
ITS(24), No. 2, February 2023, pp. 2199-2207.
IEEE DOI
2302
Security, 5G mobile communication, Transportation, Big Data,
Blockchains, Vehicular ad hoc networks, Roads, Big data,
risk prediction
BibRef
Ashraf, I.[Imran],
Park, Y.[Yongwan],
Hur, S.[Soojung],
Kim, S.W.[Sung Won],
Alroobaea, R.[Roobaea],
Zikria, Y.B.[Yousaf Bin],
Nosheen, S.[Summera],
A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry,
ITS(24), No. 2, February 2023, pp. 2677-2690.
IEEE DOI
2302
Marine vehicles, Computer crime, Industries, Security,
Artificial intelligence, Jamming, Seaports, Maritime security, IoT,
malware
BibRef
Ali, F.[Farhan],
Sarwar, S.[Sohail],
Shafi, Q.M.[Qaisar M.],
Iqbal, M.[Muddesar],
Safyan, M.[Muhammad],
Qayyum, Z.U.[Zia Ul],
Securing IoT Based Maritime Transportation System Through
Entropy-Based Dual-Stack Machine Learning Framework,
ITS(24), No. 2, February 2023, pp. 2482-2491.
IEEE DOI
2302
Internet of Things, Entropy, Denial-of-service attack, Security,
Computer crime, Machine learning, IP networks, entropy features
BibRef
Kumar, P.[Prabhat],
Gupta, G.P.[Govind P.],
Tripathi, R.[Rakesh],
Garg, S.[Sahil],
Hassan, M.M.[Mohammad Mehedi],
DLTIF: Deep Learning-Driven Cyber Threat Intelligence Modeling and
Identification Framework in IoT-Enabled Maritime Transportation
Systems,
ITS(24), No. 2, February 2023, pp. 2472-2481.
IEEE DOI
2302
Feature extraction, Logic gates, Hidden Markov models, Data mining,
Data models, Internet of Things, Analytical models, Cyber-attack,
threat type identification
BibRef
Liu, D.Z.[Deng-Zhi],
Zhang, Y.[Yong],
Wang, W.Z.[Wei-Zheng],
Dev, K.[Kapal],
Khowaja, S.A.[Sunder Ali],
Flexible Data Integrity Checking With Original Data Recovery in
IoT-Enabled Maritime Transportation Systems,
ITS(24), No. 2, February 2023, pp. 2618-2629.
IEEE DOI
2302
Cloud computing, Data integrity, Security, Memory,
Internet of Things, Trajectory, Real-time systems,
data recovery
BibRef
Le, H.V.[Ha V.],
Nguyen, T.N.[Tu N.],
Nguyen, H.N.[Hoa N.],
Le, L.[Linh],
An Efficient Hybrid Webshell Detection Method for Webserver of Marine
Transportation Systems,
ITS(24), No. 2, February 2023, pp. 2630-2642.
IEEE DOI
2302
Malware, Codes, Deep learning, Computer hacking, Pattern matching,
Payloads, Indexes, Obfuscation webshells, webshell detection,
maritime intelligent transportation systems
BibRef
He, X.D.[Xu-Dong],
Wang, J.[Jian],
Liu, J.Q.[Ji-Qiang],
Ding, W.P.[Wei-Ping],
Han, Z.[Zhen],
Wang, B.[Bin],
Nebhen, J.[Jamel],
Wang, W.[Wei],
DNS Rebinding Threat Modeling and Security Analysis for Local Area
Network of Maritime Transportation Systems,
ITS(24), No. 2, February 2023, pp. 2643-2655.
IEEE DOI
2302
Computer crime, Marine vehicles, Security, Local area networks,
Internet of Things, Servers, Sensors, IoT, DNS rebinding,
threat detection
BibRef
Kamal, M.[Mohsin],
Tariq, M.[Muhammad],
Srivastava, G.[Gautam],
Malina, L.[Lukas],
Optimized Security Algorithms for Intelligent and Autonomous
Vehicular Transportation Systems,
ITS(24), No. 2, February 2023, pp. 2038-2044.
IEEE DOI
2302
Security, Optimization, Servers, Data transfer, Internet of Things,
Data models, Vehicular ad hoc networks, Internet of Vehicles,
optimization
BibRef
Liu, Z.Q.[Zhi-Quan],
Guo, J.J.[Jing-Jing],
Huang, F.[Feiran],
Cai, D.H.[Dong-Hong],
Wu, Y.D.[Yong-Dong],
Chen, X.[Xin],
Igorevich, K.K.[Kostromitin Konstantin],
Lightweight Trustworthy Message Exchange in Unmanned Aerial Vehicle
Networks,
ITS(24), No. 2, February 2023, pp. 2144-2157.
IEEE DOI
2302
Autonomous aerial vehicles, Resists, Trust management, Robustness,
Broadcasting, Smart cities, Unmanned aerial vehicle (UAV),
smart city
BibRef
Zheng, Y.[Yike],
Li, X.W.[Xing-Wang],
Zhang, H.[Hui],
Alshehri, M.D.[Mohammad Dahman],
Dang, S.P.[Shu-Ping],
Huang, G.[Gaojian],
Zhang, C.[Changsen],
Overlay Cognitive ABCom-NOMA-Based ITS: An In-Depth Secrecy Analysis,
ITS(24), No. 2, February 2023, pp. 2217-2228.
IEEE DOI
2302
NOMA, Security, Backscatter, Transceivers, Resource management,
Radio frequency, Power system reliability,
secrecy outage probability
BibRef
Mahmood, K.[Khalid],
Ferzund, J.[Javed],
Saleem, M.A.[Muhammad Asad],
Shamshad, S.[Salman],
Das, A.K.[Ashok Kumar],
Park, Y.[Youngho],
A Provably Secure Mobile User Authentication Scheme for Big Data
Collection in IoT-Enabled Maritime Intelligent Transportation System,
ITS(24), No. 2, February 2023, pp. 2411-2421.
IEEE DOI
2302
Protocols, Security, Internet of Things, Authentication, Big Data,
Logic gates, Transportation, Authentication protocol,
security protocol
BibRef
Gyamfi, E.[Eric],
Ansere, J.A.[James Adu],
Kamal, M.[Mohsin],
Tariq, M.[Muhammad],
Jurcut, A.[Anca],
An Adaptive Network Security System for IoT-Enabled Maritime
Transportation,
ITS(24), No. 2, February 2023, pp. 2538-2547.
IEEE DOI
2302
Security, Servers, Internet of Things, Task analysis, Data models,
Sensors, Performance evaluation, Internet of Things, intrusion detection
BibRef
Li, X.[Xiong],
Shang, S.[Shuai],
Liu, S.[Shanpeng],
Gu, K.[Ke],
Jan, M.A.[Mian Ahmad],
Zhang, X.S.[Xiao-Song],
Khan, F.[Fazlullah],
An Identity-Based Data Integrity Auditing Scheme for Cloud-Based
Maritime Transportation Systems,
ITS(24), No. 2, February 2023, pp. 2556-2567.
IEEE DOI
2302
Cloud computing, Security, Transportation, Data integrity,
Public key, Servers, Computational modeling, batch auditing
BibRef
Liang, C.[Chen],
Baker, T.[Thar],
Li, Y.Z.[Yuan-Zhang],
Nawaz, R.[Raheel],
Tan, Y.A.[Yu-An],
Building Covert Timing Channel of the IoT-Enabled MTS Based on
Multi-Stage Verification,
ITS(24), No. 2, February 2023, pp. 2578-2595.
IEEE DOI
2302
Packet loss, Timing, Interference, Robustness, Bit error rate,
Industries, Error correction codes, Covert timing channel,
robustness
BibRef
Li, X.W.[Xing-Wang],
Zheng, Y.[Yike],
Alshehri, M.D.[Mohammad Dahman],
Hai, L.[Linpeng],
Balasubramanian, V.[Venki],
Zeng, M.[Ming],
Nie, G.F.[Gao-Feng],
Cognitive AmBC-NOMA IoV-MTS Networks With IQI:
Reliability and Security Analysis,
ITS(24), No. 2, February 2023, pp. 2596-2607.
IEEE DOI
2302
NOMA, Security, Reliability, Quality of service, Transceivers,
Backscatter, Radio frequency, Ambient backscatter communication,
physical layer security
BibRef
Wang, C.[Chen],
Shen, J.[Jian],
Vijayakumar, P.[Pandi],
Gupta, B.B.[Brij B.],
Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled
Maritime Transportation Systems,
ITS(24), No. 2, February 2023, pp. 2608-2617.
IEEE DOI
2302
Transportation, Data aggregation, Security, Satellites, Data centers,
Monitoring, Base stations,
on-board sensors
BibRef
Cui, J.[Jie],
Yu, J.[Jing],
Zhong, H.[Hong],
Wei, L.[Lu],
Liu, L.[Lu],
Chaotic Map-Based Authentication Scheme Using Physical Unclonable
Function for Internet of Autonomous Vehicle,
ITS(24), No. 3, March 2023, pp. 3167-3181.
IEEE DOI
2303
Security, Authentication, Physical unclonable function, Protocols,
Cloud computing, Autonomous vehicles, Costs,
physical unclonable function
BibRef
Yang, Z.[Zian],
Xiang, Y.P.[Yue-Ping],
Liao, K.[Kai],
Yang, J.W.[Jian-Wei],
Research on Security Defense of Coupled Transportation and
Cyber-Physical Power System Based on the Static Bayesian Game,
ITS(24), No. 3, March 2023, pp. 3571-3583.
IEEE DOI
2303
Transportation, Power systems, Load modeling, Security, Games,
Vehicle dynamics, Power system dynamics, Electric vehicle,
game theory charging guidance
BibRef
Yuan, M.Y.[Ming-Yang],
Xu, Y.[Yang],
Zhang, C.[Cheng],
Tan, Y.[Yunlin],
Wang, Y.C.[Yi-Chuan],
Ren, J.[Ju],
Zhang, Y.[Yaoxue],
TRUCON: Blockchain-Based Trusted Data Sharing With Congestion Control
in Internet of Vehicles,
ITS(24), No. 3, March 2023, pp. 3489-3500.
IEEE DOI
2303
Blockchains, Trust management, Computer science,
Internet of Vehicles, Roads, Accidents, Internet of Vehicles,
congestion control
BibRef
Nassi, B.[Ben],
Mirsky, Y.[Yisroel],
Shams, J.[Jacob],
Ben-Netanel, R.[Raz],
Nassi, D.[Dudi],
Elovici, Y.[Yuval],
Protecting Autonomous Cars from Phantom Attacks,
CACM(66), No. 4, April 2023, pp. 56-69.
DOI Link
2303
BibRef
Chaeikar, S.S.[Saman Shojae],
Jolfaei, A.[Alireza],
Mohammad, N.[Nazeeruddin],
AI-Enabled Cryptographic Key Management Model for Secure
Communications in the Internet of Vehicles,
ITS(24), No. 4, April 2023, pp. 4589-4598.
IEEE DOI
2304
Security, Trajectory, Authentication, Encryption, Road side unit,
Internet of Vehicles, Automobiles, Cybersecurity, key management,
trajectory data analysis
BibRef
Anyanwu, G.O.[Goodness Oluchi],
Nwakanma, C.I.[Cosmas Ifeanyi],
Lee, J.M.[Jae-Min],
Kim, D.S.[Dong-Seong],
Falsification Detection System for IoV Using Randomized Search
Optimization Ensemble Algorithm,
ITS(24), No. 4, April 2023, pp. 4158-4172.
IEEE DOI
2304
Radio frequency, Safety, Computational modeling, Standards,
Protocols, Optimization, Data models, Ensemble-algorithm,
vehicle network
BibRef
Han, Z.Y.[Zhao-Yang],
Yang, Y.Q.[Yao-Qi],
Wang, W.Z.[Wei-Zheng],
Zhou, L.[Lu],
Gadekallu, T.R.[Thippa Reddy],
Alazab, M.[Mamoun],
Gope, P.[Prosanta],
Su, C.H.[Chun-Hua],
RSSI Map-Based Trajectory Design for UGV Against Malicious Radio
Source: A Reinforcement Learning Approach,
ITS(24), No. 4, April 2023, pp. 4641-4650.
IEEE DOI
2304
Trajectory, Costs, Task analysis,
Received signal strength indicator, Optimization, reinforcement learning
BibRef
Sikarwar, H.[Himani],
Das, D.[Debasis],
A Novel MAC-Based Authentication Scheme (NoMAS) for Internet of
Vehicles (IoV),
ITS(24), No. 5, May 2023, pp. 4904-4916.
IEEE DOI
2305
Authentication, Side-channel attacks, Passwords,
Internet of Vehicles, Computational modeling, Quality of service,
intelligent transportation system (ITS)
BibRef
Zhao, N.[Ning],
Zhao, X.D.[Xu-Dong],
Chen, M.[Meng],
Zong, G.D.[Guang-Deng],
Zhang, H.[Huiyan],
Resilient Distributed Event-Triggered Platooning Control of Connected
Vehicles Under Denial-of-Service Attacks,
ITS(24), No. 6, June 2023, pp. 6191-6202.
IEEE DOI
2306
Connected vehicles, Security, Denial-of-service attack,
Switched systems, Roads, Vehicular ad hoc networks,
vehicle platooning
BibRef
Tan, H.[Haowen],
Zheng, W.Y.[Wen-Ying],
Vijayakumar, P.[Pandi],
Secure and Efficient Authenticated Key Management Scheme for
UAV-Assisted Infrastructure-Less IoVs,
ITS(24), No. 6, June 2023, pp. 6389-6400.
IEEE DOI
2306
Authentication, Security, Autonomous aerial vehicles, Servers,
Vehicle dynamics, Real-time systems, Protocols,
key updating
BibRef
Zhu, Q.Y.[Qing-Yi],
Jing, A.[Ankui],
Gan, C.Q.[Chen-Quan],
Guan, X.W.[Xin-Wei],
Qin, Y.Z.[Yu-Ze],
HCSC: A Hierarchical Certificate Service Chain Based on Reputation
for VANETs,
ITS(24), No. 6, June 2023, pp. 6123-6145.
IEEE DOI
2306
Authentication, Blockchains, Security, Consensus algorithm,
Behavioral sciences, Smart contracts, Proof of Work, VANETs,
security validation
BibRef
Limbasiya, T.[Trupil],
Das, D.[Debasis],
QueryCom: Secure Message Communication and Data Searching Protocols
for Smart Transportation,
ITS(24), No. 6, June 2023, pp. 5752-5764.
IEEE DOI
2306
Security, Protocols, Cloud computing, Smart transportation, Memory,
Data communication, Costs, Attacks, vehicular communication,
smart transportation
BibRef
Ahmed, U.[Usman],
Lin, J.C.W.[Jerry Chun-Wei],
Srivastava, G.[Gautam],
Yun, U.[Unil],
Singh, A.K.[Amit Kumar],
Deep Active Learning Intrusion Detection and Load Balancing in
Software-Defined Vehicular Networks,
ITS(24), No. 1, January 2023, pp. 953-961.
IEEE DOI
2301
Sensors, Load modeling, Load management, Task analysis, Servers,
Resource management, Optimization,
smart city application
BibRef
de Ree, M.[Marcus],
Mantas, G.[Georgios],
Rodriguez, J.[Jonathan],
Otung, I.E.[Ifiok E.],
DECENT: Decentralized and Efficient Key Management to Secure
Communication in Dense and Dynamic Environments,
ITS(24), No. 7, July 2023, pp. 7586-7598.
IEEE DOI
2307
Security, Cryptography, Vehicle dynamics,
Spread spectrum communication, Servers,
security
BibRef
Sun, J.F.[Jian-Fei],
Xu, G.[Guowen],
Zhang, T.W.[Tian-Wei],
Cheng, X.C.[Xiao-Chun],
Han, X.[Xingshuo],
Tang, M.J.[Ming-Jian],
Secure Data Sharing With Flexible Cross-Domain Authorization in
Autonomous Vehicle Systems,
ITS(24), No. 7, July 2023, pp. 7527-7540.
IEEE DOI
2307
Encryption, Autonomous vehicles, Authorization, Security, Public key,
Vehicular ad hoc networks, Transforms, Autonomous vehicle,
cross-domain authorization
BibRef
Voloin, M.[Marcel],
lapak, E.[Eugen],
Becvar, Z.[Zdenek],
Maksymyuk, T.[Taras],
Petík, A.[Adam],
Liyanage, M.[Madhusanka],
Gazda, J.[Juraj],
Blockchain-Based Route Selection With Allocation of Radio and
Computing Resources for Connected Autonomous Vehicles,
ITS(24), No. 7, July 2023, pp. 7230-7243.
IEEE DOI
2307
Resource management, Task analysis, Routing,
Computational modeling, Optimization, Autonomous vehicles,
blockchain
BibRef
Abyaneh, A.Z.[Arezou Zamanyzadeh],
Zorba, N.[Nizar],
Hamdaoui, B.[Bechir],
Empowering Next-Generation IoT WLANs Through Blockchain and 802.11ax
Technologies,
ITS(24), No. 7, July 2023, pp. 7412-7421.
IEEE DOI
2307
Blockchains, Peer-to-peer computing, Wireless communication,
Wireless sensor networks, Internet of Things, throughput
BibRef
Otoum, S.[Safa],
Guizani, N.[Nadra],
Mouftah, H.[Hussein],
On the Feasibility of Split Learning, Transfer Learning and Federated
Learning for Preserving Security in ITS Systems,
ITS(24), No. 7, July 2023, pp. 7462-7470.
IEEE DOI
2307
Transfer learning, Security, Collaborative work, Medical services,
Task analysis, Monitoring, Industrial Internet of Things,
Internet of Things (IoT)
BibRef
Zhuo, B.[Biting],
Duan, W.[Wei],
Gu, J.[Juping],
Gu, X.H.[Xiao-Hui],
Zhang, G.[Guoan],
Ji, Y.C.[Yan-Cheng],
Choi, J.[Jaeho],
Wen, M.[Miaowen],
Partial-NOMA Based Physical Layer Security:
Forwarding Design and Secrecy Analysis,
ITS(24), No. 7, July 2023, pp. 7471-7484.
IEEE DOI
2307
Relays, NOMA, Resource management, Signal to noise ratio, Bandwidth,
Security, Power system reliability, Physical layer security,
achievable secrecy rate
BibRef
Ji, B.F.[Bao-Feng],
Huang, J.[Jiayu],
Wang, Y.[Yi],
Song, K.[Kang],
Li, C.G.[Chun-Guo],
Han, C.Z.[Cong-Zheng],
Wen, H.[Hong],
Multi-Relay Cognitive Network With Anti-Fragile Relay Communication
for Intelligent Transportation System Under Aggregated Interference,
ITS(24), No. 7, July 2023, pp. 7736-7745.
IEEE DOI
2307
Relays, Security, Interference, Analytical models,
Internet of Things, Base stations, Servers, outage probability
BibRef
Rathore, H.[Heena],
Sai, S.[Siva],
Gundewar, A.[Akshay],
Social Psychology Inspired Distributed Ledger Technique for Anomaly
Detection in Connected Vehicles,
ITS(24), No. 7, July 2023, pp. 7092-7107.
IEEE DOI
2307
Anomaly detection, Data models, Security, Psychology,
Hidden Markov models, Cryptography, Distributed ledger, trust
BibRef
Soderi, S.[Simone],
Masti, D.[Daniele],
Lun, Y.Z.[Yuriy Zacchia],
Railway Cyber-Security in the Era of Interconnected Systems: A Survey,
ITS(24), No. 7, July 2023, pp. 6764-6779.
IEEE DOI
2307
Rail transportation, Security, Computer security, Safety, Standards,
Industries, Transportation, Railway systems, network security,
cybersecurity assessment
BibRef
Lakhan, A.[Abdullah],
Mohammed, M.A.[Mazin Abed],
Ibrahim, D.A.[Dheyaa Ahmed],
Kadry, S.[Seifedine],
Abdulkareem, K.H.[Karrar Hameed],
ITS Based on Deep Graph Convolutional Fraud Detection Network
Blockchain-Enabled Fog-Cloud,
ITS(24), No. 8, August 2023, pp. 8399-8408.
IEEE DOI
2308
Costs, Blockchains, Security, Task analysis, Data models,
Cloud computing, Monitoring, SBETS
BibRef
Manogaran, G.[Gunasekaran],
Alsabet, R.[Reham],
Uprety, A.[Aashma],
Rawat, D.B.[Danda B.],
GTSM: Graph-Transient Security Model for Intelligent Transportation
System Information Exchange,
ITS(24), No. 8, August 2023, pp. 8421-8430.
IEEE DOI
2308
Reliability, Information sharing, Computational modeling,
Computer security, Information exchange, Real-time systems,
trust assessment
BibRef
Gupta, B.B.[Brij Bhooshan],
Gaurav, A.[Akshat],
Marín, E.C.[Enrique Cańo],
Alhalabi, W.[Wadee],
Novel Graph-Based Machine Learning Technique to Secure Smart Vehicles
in Intelligent Transportation Systems,
ITS(24), No. 8, August 2023, pp. 8483-8491.
IEEE DOI
2308
Machine learning, Automobiles, Vehicular ad hoc networks,
Authentication, Intelligent transportation systems, support vector machine
BibRef
Jiang, B.C.[Bing-Cheng],
He, Q.[Qian],
Liu, P.[Peng],
Maharjan, S.[Sabita],
Zhang, Y.[Yan],
Blockchain Empowered Secure Video Sharing With Access Control for
Vehicular Edge Computing,
ITS(24), No. 9, September 2023, pp. 9041-9054.
IEEE DOI
2310
BibRef
Siddiqui, S.A.[Sarah Ali],
Mahmood, A.[Adnan],
Sheng, Q.Z.[Quan Z.],
Suzuki, H.[Hajime],
Ni, W.[Wei],
Trust in Vehicles: Toward Context-Aware Trust and Attack Resistance
for the Internet of Vehicles,
ITS(24), No. 9, September 2023, pp. 9546-9560.
IEEE DOI
2310
BibRef
Yu, H.F.[Hui-Fang],
Wang, H.[Han],
Lattice-Based Threshold Signcryption for Blockchain Oracle Data
Transmission,
ITS(24), No. 10, October 2023, pp. 11057-11065.
IEEE DOI
2310
BibRef
Gao, Z.[Zhen],
Zhang, D.B.[Dong-Bin],
Zhang, J.[Jiuzhi],
Liu, L.[Lei],
Niyato, D.[Dusit],
Leung, V.C.M.[Victor C. M.],
World State Attack to Blockchain Based IoV and Efficient Protection
With Hybrid RSUs Architecture,
ITS(24), No. 9, September 2023, pp. 9952-9965.
IEEE DOI
2310
BibRef
Yao, Y.[Yu],
Shu, F.[Feng],
Li, Z.[Zeqing],
Cheng, X.[Xu],
Wu, L.[Lenan],
Secure Transmission Scheme Based on Joint Radar and Communication in
Mobile Vehicular Networks,
ITS(24), No. 9, September 2023, pp. 10027-10037.
IEEE DOI
2310
BibRef
Wang, F.Y.[Fei-Yue],
Lin, Y.L.[Yi-Lun],
Ioannou, P.A.[Petros A.],
Vlacic, L.[Ljubo],
Liu, X.M.[Xiao-Ming],
Eskandarian, A.[Azim],
Lv, Y.S.[Yi-Sheng],
Na, X.X.[Xiao-Xiang],
Cebon, D.[David],
Ma, J.Q.[Jia-Qi],
Li, L.X.[Ling-Xi],
Olaverri-Monreal, C.[Cristina],
Transportation 5.0: The DAO to Safe, Secure, and Sustainable
Intelligent Transportation Systems,
ITS(24), No. 10, October 2023, pp. 10262-10278.
IEEE DOI
2310
BibRef
Yue, B.F.[Bai-Fan],
Che, W.W.[Wei-Wei],
Data-Driven Fault-Tolerant Platooning Control Under Aperiodic DoS
Attacks,
ITS(24), No. 11, November 2023, pp. 12166-12179.
IEEE DOI
2311
BibRef
Xiao, Y.[Yuquan],
Du, Q.[Qinghe],
Zhang, Y.S.[Yun-Sheng],
Lu, C.[Chen],
Secure Vehicular Communications With Varying QoS and Environments:
A Unified Cross-Layer Policy-Adaptation Approach,
ITS(24), No. 11, November 2023, pp. 13462-13471.
IEEE DOI
2311
BibRef
Wani, A.R.[Aabid Rashid],
Gupta, S.K.[Sachin Kumar],
Khanam, Z.[Zeba],
Rashid, M.[Mamoon],
Alshamrani, S.S.[Sultan S.],
Baz, M.[Mohammed],
A novel approach for securing data against adversary attacks in UAV
embedded HetNet using identity based authentication scheme,
IET-ITS(17), No. 11, 2023, pp. 2171-2189.
DOI Link
2311
BibRef
Liu, P.[Peng],
Jing, W.P.[Wei-Peng],
Fu, X.Y.[Xin-Yu],
Xiao, Y.[Yang],
Jia, L.[Lili],
Consortium Blockchain-Based Security and Efficient Resource Trading
in V2V-Assisted Intelligent Transport Systems,
ITS(24), No. 11, November 2023, pp. 13436-13447.
IEEE DOI
2311
BibRef
Zhu, R.B.[Rong-Bo],
Li, M.Y.[Meng-Yao],
Yin, J.J.[Jiang-Jin],
Sun, L.B.[Lu-Bing],
Liu, H.[Hao],
Enhanced Federated Learning for Edge Data Security in Intelligent
Transportation Systems,
ITS(24), No. 11, November 2023, pp. 13396-13408.
IEEE DOI
2311
BibRef
Zhang, J.B.[Jin-Bao],
Ji, X.D.[Xiao-Dong],
Wang, J.[Jiehua],
Li, J.H.[Jian-Hua],
Wang, N.[Nina],
A Differential Fault Attack on Security Vehicle System Applied SIMON
Block Cipher,
ITS(24), No. 11, November 2023, pp. 12900-12911.
IEEE DOI
2311
BibRef
Qurashi, J.M.[Junaid M.],
Jambi, K.[Kamal],
Alsolami, F.[Fawaz],
Eassa, F.E.[Fathy E.],
Khemakhem, M.[Maher],
Basuhail, A.[Abdullah],
Resilient Countermeasures Against Cyber-Attacks on Self-Driving Car
Architecture,
ITS(24), No. 11, November 2023, pp. 11514-11543.
IEEE DOI
2311
BibRef
Fan, Q.[Qi],
Xin, Y.[Yang],
Jia, B.[Bin],
Zhang, Y.[Yang],
Wang, P.[Pinxiang],
COBATS: A Novel Consortium Blockchain-Based Trust Model for Data
Sharing in Vehicular Networks,
ITS(24), No. 11, November 2023, pp. 12255-12271.
IEEE DOI
2311
BibRef
Duan, X.[Xuting],
Yan, H.[Huiwen],
Tian, D.X.[Da-Xin],
Zhou, J.[Jianshan],
Su, J.[Jian],
Hao, W.[Wei],
In-Vehicle CAN Bus Tampering Attacks Detection for Connected and
Autonomous Vehicles Using an Improved Isolation Forest Method,
ITS(24), No. 2, February 2023, pp. 2122-2134.
IEEE DOI
2302
Anomaly detection, Computer hacking, Support vector machines,
Safety, Encryption, Autonomous vehicles, Authentication, data mass
BibRef
Li, Z.P.[Zeng-Peng],
Wang, M.[Mei],
Sharma, V.[Vishal],
Gope, P.[Prosanta],
Sustainable and Round-Optimized Group Authenticated Key Exchange in
Vehicle Communication,
ITS(24), No. 12, December 2023, pp. 15400-15413.
IEEE DOI
2312
BibRef
Dong, S.[Shi],
Su, H.D.[Hua-Dong],
Xia, Y.J.[Yuan-Jun],
Zhu, F.[Fei],
Hu, X.R.[Xin-Rong],
Wang, B.[Bangchao],
A Comprehensive Survey on Authentication and Attack Detection Schemes
That Threaten It in Vehicular Ad-Hoc Networks,
ITS(24), No. 12, December 2023, pp. 13573-13602.
IEEE DOI
2312
BibRef
Yang, T.[Tianci],
Murguia, C.[Carlos],
Lv, C.[Chen],
Risk Assessment for Connected Vehicles Under Stealthy Attacks on
Vehicle-to-Vehicle Networks,
ITS(24), No. 12, December 2023, pp. 13627-13638.
IEEE DOI
2312
BibRef
Tan, H.[Haowen],
Zheng, W.Y.[Wen-Ying],
Vijayakumar, P.[Pandi],
Sakurai, K.[Kouichi],
Kumar, N.[Neeraj],
An Efficient Vehicle-Assisted Aggregate Authentication Scheme for
Infrastructure-Less Vehicular Networks,
ITS(24), No. 12, December 2023, pp. 15590-15600.
IEEE DOI
2312
BibRef
Mahmood, K.[Khalid],
Shamshad, S.[Salman],
Ayub, M.F.[Muhammad Faizan],
Ghaffar, Z.[Zahid],
Khan, M.K.[Muhammad Khurram],
Das, A.K.[Ashok Kumar],
Design of Provably Secure Authentication Protocol for Edge-Centric
Maritime Transportation System,
ITS(24), No. 12, December 2023, pp. 14536-14545.
IEEE DOI
2312
BibRef
Cui, J.[Jie],
Shen, Y.[Yun],
Zhong, H.[Hong],
Zhang, J.[Jing],
Liu, L.[Lu],
A Multilevel Electronic Control Unit Re-Encryption Scheme for
Autonomous Vehicles,
ITS(25), No. 1, January 2024, pp. 104-119.
IEEE DOI
2402
Autonomous vehicles, Security, Logic gates, Encryption, Protocols,
Safety, Authentication, Autonomous vehicle,
electronic computing unit
BibRef
Chu, K.F.[Kai-Fung],
Guo, W.S.[Wei-Si],
Privacy-Preserving Federated Deep Reinforcement Learning for
Mobility-as-a-Service,
ITS(25), No. 2, February 2024, pp. 1882-1896.
IEEE DOI
2402
Mobility as a service, Servers, Training, Privacy,
Inference algorithms, Reinforcement learning, Data models, secret sharing
BibRef
Wu, G.[Guangjun],
Li, J.[Jun],
Ning, Z.[Zhaolong],
Wang, Y.[Yong],
Li, B.B.[Bin-Bin],
Federated Learning Enabled Credit Priority Task Processing for
Transportation Big Data,
ITS(25), No. 1, January 2024, pp. 839-849.
IEEE DOI
2402
Task analysis, Federated learning, Privacy, COVID-19, Big Data,
Computer architecture, Transportation, Vehicular network, federated learning
BibRef
Dwivedi, S.K.[Sanjeev Kumar],
Amin, R.[Ruhul],
Vollala, S.[Satyanarayana],
Das, A.K.[Ashok Kumar],
Design of Blockchain and ECC-Based Robust and Efficient Batch
Authentication Protocol for Vehicular Ad-Hoc Networks,
ITS(25), No. 1, January 2024, pp. 275-288.
IEEE DOI
2402
Vehicular ad hoc networks, Authentication, Protocols, Blockchains,
Security, Public key, Servers, VANET security, blockchain, Scyther simulation
BibRef
Dabbaghzadeh, H.[Hamed],
Falahati, A.[Abolfazl],
Sanandaji, N.[Nader],
CBTC Security and Reliability Enhancements by a Key-Based Direct
Sequence Spread Spectrum Technique,
ITS(25), No. 1, January 2024, pp. 159-172.
IEEE DOI
2402
Safety, Security, Spread spectrum communication, Reliability,
Receivers, Standards, Jamming,
packet failure rate
BibRef
Petit, J.[Jonathan],
Le Lann, G.[Gérard],
Next Generation Vehicles, Safety, and Cybersecurity:
The CMX Framework,
ITS(25), No. 2, February 2024, pp. 1333-1345.
IEEE DOI
2402
Safety, Vehicle-to-everything, Protocols, Cyber-physical systems,
Security, Next generation networking, Authentication,
cyberphysical constructs
BibRef
Liu, C.[Chun],
Jiang, B.[Bin],
Wang, X.F.[Xiao-Fan],
Zhang, Y.[Youmin],
Xie, S.[Shaorong],
Event-Based Distributed Secure Control of Unmanned Surface Vehicles
With DoS Attacks,
SMCS(54), No. 4, April 2024, pp. 2159-2170.
IEEE DOI
2403
Actuators, Safety, Denial-of-service attack, Estimation, Topology,
Autonomous vehicles, Physical layer,
unmanned surface vehicles (USVs)
BibRef
Zhao, Y.[Yanan],
Yu, H.Y.[Hai-Yang],
Yang, Y.[Yang],
Xu, L.[Liang],
Pan, S.[Shuyue],
Ren, Y.L.[Yi-Long],
Flexible and Secure Cross-Domain Signcrypted Data Authorization in
Multi-Platoon Vehicular Networks,
ITS(25), No. 3, March 2024, pp. 3166-3176.
IEEE DOI
2405
Proposals, Authorization, Non-repudiation, Security, Encryption,
Cryptography, Costs, Multi-platoon, cross-domain, access control, signcryption
BibRef
Zhao, Y.[Yanan],
Yu, H.Y.[Hai-Yang],
Liang, Y.H.[Yu-Hao],
Conti, M.[Mauro],
Bazzi, W.[Wael],
Ren, Y.L.[Yi-Long],
A Sanitizable Access Control With Policy-Protection for Vehicular
Social Networks,
ITS(25), No. 3, March 2024, pp. 2956-2965.
IEEE DOI
2405
Encryption, Cryptography, Social networking (online), Receivers,
Security, Privacy, Authorization, Vehicular social networks,
malicious data publishers
BibRef
Jia, S.B.[Shao-Bo],
Wang, R.[Rong],
Xu, Y.[Yao],
Lou, Y.[Yi],
Zhang, D.[Di],
Sato, T.[Takuro],
Secrecy Analysis of ABCom-Based Intelligent Transportation Systems
With Jamming,
ITS(25), No. 3, March 2024, pp. 2880-2892.
IEEE DOI
2405
Security, Jamming, Backscatter, Radio frequency,
Closed-form solutions, Wireless communication,
secrecy outage probability
BibRef
Sun, J.F.[Jian-Fei],
Tao, J.[Junyi],
Zhang, H.[Hao],
Zhao, Y.[Yanan],
Nie, L.M.[Li-Ming],
Cheng, X.C.[Xiao-Chun],
Zhang, T.W.[Tian-Wei],
A Tamper-Resistant Broadcasting Scheme for Secure Communication in
Internet of Autonomous Vehicles,
ITS(25), No. 3, March 2024, pp. 2837-2846.
IEEE DOI
2405
Security, Autonomous vehicles, Encryption, Games, Internet of Things,
Computer science, Sun, Internet of the autonomous vehicle,
identity-based broadcast signcryption
BibRef
Wei, H.Q.[Hong-Qian],
Ai, Q.[Qiang],
Zhai, Y.[Yong],
Zhang, Y.[Youtong],
Automotive Security: Threat Forewarning and ECU Source Mapping
Derived From Physical Features of Network Signals,
ITS(25), No. 3, March 2024, pp. 2479-2491.
IEEE DOI
2405
Feature extraction, Fingerprint recognition, Voltage measurement,
Protocols, Signal processing algorithms, Electric potential,
feature extraction
BibRef
Wang, Y.T.[Yun-Tao],
Su, Z.[Zhou],
Xu, Q.C.[Qi-Chao],
Luan, T.H.[Tom H.],
Lu, R.X.[Rong-Xing],
Secured and Cooperative Publish/Subscribe Scheme in Autonomous
Vehicular Networks,
ITS(25), No. 3, March 2024, pp. 2235-2252.
IEEE DOI
2405
Games, Autonomous vehicles, Vehicle dynamics, Collaboration,
Single-photon avalanche diodes, Computational modeling,
reinforcement learning
BibRef
Li, Z.[Zhi],
Wang, H.[Hao],
Xu, G.Q.[Guang-Quan],
Jolfaei, A.[Alireza],
Zheng, X.[Xi],
Su, C.H.[Chun-Hua],
Zhang, W.Y.[Wen-Ying],
Privacy-Preserving Distributed Transfer Learning and Its Application
in Intelligent Transportation,
ITS(25), No. 3, March 2024, pp. 2253-2269.
IEEE DOI
2405
Transfer learning, Protocols, Security, Training, Roads,
Distributed databases, Privacy-preserving, transfer learning,
intelligent transportation system
BibRef
Jeong, Y.[Yeonseon],
Kim, H.[Hyunghoon],
Lee, S.[Seyoung],
Choi, W.[Wonsuk],
Lee, D.H.[Dong Hoon],
Jo, H.J.[Hyo Jin],
In-Vehicle Network Intrusion Detection System Using CAN Frame-Aware
Features,
ITS(25), No. 5, May 2024, pp. 3843-3853.
IEEE DOI
2405
Feature extraction, Random forests, Decision trees, Standards,
Fuzzing, Boosting, Vehicles, Controller area network,
machine learning
BibRef
Sutradhar, K.[Kartick],
A Quantum Cryptographic Protocol for Secure Vehicular Communication,
ITS(25), No. 5, May 2024, pp. 3513-3522.
IEEE DOI
2405
Costs, Accidents, Security, Road transportation, Cryptography,
Cryptographic protocols, Quantum computing,
foggy highway
See also Comments on A Quantum Cryptographic Protocol for Secure Vehicular Communication.
BibRef
Batalla, J.M.[Jordi Mongay],
de la Cruz-Llopis, L.J.[Luis J.],
Gómez, G.P.[Germán Peinado],
Andrukiewicz, E.[Elzbieta],
Krawiec, P.[Piotr],
Mavromoustakis, C.X.[Constandinos X.],
Song, H.H.[Houbing Herbert],
Multi-Layer Security Assurance of the 5G Automotive System Based on
Multi-Criteria Decision Making,
ITS(25), No. 5, May 2024, pp. 3496-3512.
IEEE DOI
2405
Security, Automotive engineering, Telecommunications,
5G mobile communication, Companies, Certification, Standards,
multi-criteria decision making
BibRef
Kumar, V.[Vinod],
RSFVC: Robust Biometric-Based Secure Framework for Vehicular Cloud
Networking,
ITS(25), No. 5, May 2024, pp. 3364-3374.
IEEE DOI
2405
Authentication, Protocols, Security, Privacy,
Biometrics (access control), Elliptic curve cryptography,
privacy
BibRef
Li, W.C.[Wen-Chao],
Multi-Receiver Data Authorization With Data Search for Data Sharing
in Cloud-Assisted IoV,
ITS(25), No. 5, May 2024, pp. 4233-4250.
IEEE DOI
2405
Cloud computing, Encryption, Public key, Authorization, Security,
Sensors, Vehicle-to-everything, Cloud-assisted IoV, re-encryption,
privacy preserve
BibRef
Miglani, A.[Arzoo],
Kumar, N.[Neeraj],
A Blockchain Based Matching Game for Content Sharing in
Content-Centric Vehicle-to-Grid Network Scenarios,
ITS(25), No. 5, May 2024, pp. 4032-4048.
IEEE DOI
2405
Vehicle-to-grid, Games, Proposals, Blockchains, Reliability,
Stability criteria, Quality of service, V2G, Ethereum, CCN, caching,
blind matching algorithm
BibRef
Liu, C.[Chun],
Xia, Z.W.[Zhi-Wei],
Tian, Y.X.[Yong-Xiao],
Patton, R.J.[Ron J.],
Defense and Tolerance Technique Against Attacks and Faults on
Leader-Following Multi-USVs,
ITS(25), No. 6, June 2024, pp. 5450-5461.
IEEE DOI
2406
Actuators, Topology, Fault tolerant systems, Fault tolerance,
Cyberattack, Switches, Network topology, cyber-attacks
BibRef
\
Adil, M.[Muhammad],
Abulkasim, H.[Hussein],
Farouk, A.[Ahmed],
Song, H.[Houbing],
R3ACWU: A Lightweight, Trustworthy Authentication Scheme for
UAV-Assisted IoT Applications,
ITS(25), No. 6, June 2024, pp. 6161-6172.
IEEE DOI
2406
Authentication, Internet of Things, Security, Servers, Protocols,
Computational modeling, Autonomous aerial vehicles,
public and private key exchange
BibRef
Ding, K.[Kui],
Zhu, Q.X.[Quan-Xin],
Network-Based Modeling and Sampling Guaranteed Cost Control for
Unmanned Surface Vehicle Systems Under Stochastic Cyber-Attacks,
ITS(25), No. 6, June 2024, pp. 6173-6185.
IEEE DOI
2406
Cyberattack, Costs, Stochastic processes, Marine vehicles, Security,
Pollution measurement, Upper bound, Communication network,
stochastic cyber-attacks
BibRef
Wazid, M.[Mohammad],
Das, A.K.[Ashok Kumar],
Shetty, S.[Sachin],
An Authentication and Key Management Framework for Secure and
Intelligent Transportation of Internet of Space Things,
ITS(25), No. 6, June 2024, pp. 5242-5257.
IEEE DOI
2406
Security, Authentication, Internet of Things, Satellites,
Low earth orbit satellites, Satellite broadcasting, simulation
BibRef
Banerjee, S.[Sourav],
Das, D.[Debashis],
Chatterjee, P.[Pushpita],
Blakely, B.[Benjamin],
Ghosh, U.[Uttam],
A Blockchain-Enabled Sustainable Safety Management Framework for
Connected Vehicles,
ITS(25), No. 6, June 2024, pp. 5271-5281.
IEEE DOI
2406
Safety, Transportation, Vehicles, Roads, Accidents, Connected vehicles,
Intelligent transportation systems, vehicular communication,
connected vehicles
BibRef
Xu, D.Y.[Dong-Yang],
Yu, K.P.[Ke-Ping],
Liu, L.[Lei],
Chen, G.L.[Guo-Long],
Kumar, N.[Neeraj],
Guizani, M.[Mohsen],
Ritcey, J.A.[James A.],
Post-Quantum Authentication Against Cyber-Physical Attacks in
V2X-Based Autonomous Vehicle Platoon,
ITS(25), No. 6, June 2024, pp. 5034-5044.
IEEE DOI
2406
Authentication, Vehicle-to-everything, Encryption, Protocols,
Computer security, Reliability, Autonomous platooning,
authentication
BibRef
Han, S.[Sheng],
Zhu, H.[Hong],
Zhong, Q.[Qishui],
Shi, K.[Kaibo],
Kwon, O.M.[Oh-Min],
Secure Sampled-Data Consensus of Multi-Agent Systems Under
Asynchronous Deception Attacks With Application to Unmanned Surface
Vehicles,
ITS(25), No. 6, June 2024, pp. 5462-5473.
IEEE DOI
2406
Protocols, Communication networks, Delays, Multi-agent systems,
Denial-of-service attack, Couplings, Topology,
Lyapunov-Krasovskii functional
BibRef
Zhang, H.[Han],
Liang, H.B.[Hong-Bin],
Wang, L.[Lei],
Yao, Y.T.[Yi-Ting],
Lin, B.[Bin],
Zhao, D.M.[Dong-Mei],
Joint resource allocation and security redundancy for autonomous
driving based on deep reinforcement learning algorithm,
IET-ITS(18), No. 6, 2024, pp. 1109-1120.
DOI Link
2406
automated driving and intelligent vehicles, emergency management
BibRef
Shang, C.[Chao],
Cao, J.[Jin],
Liu, J.J.[Jia-Jia],
Zhang, Y.H.[Ying-Hui],
Niu, B.[Ben],
Li, H.[Hui],
CEAMP: A Cross-Domain Entity Authentication and Message Protection
Framework for Intra-Vehicle Network,
ITS(25), No. 7, July 2024, pp. 6780-6795.
IEEE DOI
2407
Authentication, Protocols, Security, Encryption, Monitoring,
Instruments, Fingerprint recognition, Intra-vehicle network, MAC
BibRef
Yan, S.[Shen],
Gu, Z.[Zhou],
Park, J.H.[Ju H.],
Shen, M.[Mouquan],
Fusion-Based Event-Triggered H_inf State Estimation of Networked
Autonomous Surface Vehicles With Measurement Outliers and
Cyber-Attacks,
ITS(25), No. 7, July 2024, pp. 7541-7551.
IEEE DOI
2407
State estimation, Cyberattack, Fluctuations,
Denial-of-service attack, Bandwidth, Time-varying systems,
H_inf state estimation
BibRef
Zhang, Z.S.[Zhi-Shuo],
Huang, Y.[Ying],
Huang, W.[Wen],
Liao, Y.J.[Yong-Jian],
Zhou, S.J.[Shi-Jie],
A Fully Auditable Data Propagation Scheme With Dynamic Vehicle
Management for EC-ITS,
ITS(25), No. 7, July 2024, pp. 7861-7877.
IEEE DOI
2407
Encryption, Cryptography, Heuristic algorithms, Access control,
Vehicle dynamics, Denial-of-service attack, Floods,
flooding and DDoS attack
BibRef
Mwanje, M.D.[Maria Drolence],
Kaiwartya, O.[Omprakash],
Aljaidi, M.[Mohammad],
Cao, Y.[Yue],
Kumar, S.[Sushil],
Jha, D.N.[Devki Nandan],
Naser, A.[Abdallah],
Lloret, J.[Jaime],
Cyber security analysis of connected vehicles,
IET-ITS(18), No. 7, 2024, pp. 1175-1195.
DOI Link
2407
cyber-physical systems, security of data,
vehicle automation and connectivity, vehicular ad hoc networks
BibRef
AlMarshoud, M.[Mishri],
Kiraz, M.S.[Mehmet Sabir],
Al-Bayatti, A.H.[Ali H.],
Security, Privacy, and Decentralized Trust Management in VANETs: A
Review of Current Research and Future Directions,
Surveys(56), No. 10, June 2024, pp. xx-yy.
DOI Link
2407
Survey, Security. Security, privacy, VANETs, decentralization, trust management
BibRef
Meng, X.W.[Xiang-Wei],
Liu, B.B.[Bing-Bing],
Meng, X.Y.[Xiang-Yin],
Liang, Y.F.[Yu-Feng],
Deng, H.[Hai],
A Lightweight Group Authentication Protocol for Blockchain-Based
Vehicular Edge Computing Networks,
ITS(25), No. 8, August 2024, pp. 8556-8567.
IEEE DOI
2408
Authentication, Protocols, Blockchains, Task analysis,
Computational modeling, Edge computing, Computational efficiency,
group key agreement
BibRef
Akpinar, M.[Murat],
Schmidt, E.G.[Ece Güran],
Schmidt, K.W.[Klaus Werner],
Weak TDMA for the Deterministic Medium Access on the Controller Area
Network,
ITS(25), No. 8, August 2024, pp. 8568-8577.
IEEE DOI
2408
Schedules, Time division multiple access, Software,
Synchronization, Protocols, Clocks, Delays, Controller area network,
clock synchronization
BibRef
Tan, W.[Wen],
Li, Y.X.[Yuan-Xin],
Hou, Z.S.[Zhong-Sheng],
Data-Driven Security Control for Vehicular Platooning Systems With
Finite-Time Prescribed Performance,
ITS(25), No. 9, September 2024, pp. 12385-12394.
IEEE DOI
2409
Denial-of-service attack, Adaptation models, Security, Protocols,
Mathematical models, Vehicle dynamics, Safety, aperiodic DoS attacks
BibRef
Azees, M.[Maria],
Rajasekaran, A.S.[Arun Sekar],
Vijayakumar, P.[Pandi],
Karuppiah, M.[Marimuthu],
Hybrid CMOS Memristor Based Biometric OBU Authentication and
Anonymous Mutual Authentication for Secure Communication in Fog-Based
VANETs,
ITS(25), No. 9, September 2024, pp. 11117-11129.
IEEE DOI
2409
Servers, Vehicular ad hoc networks, Cloud computing,
Authentication, Security, Privacy, Edge computing, Authentication,
privacy
BibRef
Ismail, M.,
Chatterjee, S.[Santanu],
Sing, J.K.[Jamuna Kanta],
Kumari, S.[Saru],
Rodrigues, J.J.P.C.[Joel J. P. C.],
Designing Anonymous Key Agreement Scheme for Secure Vehicular Ad-Hoc
Networks,
ITS(25), No. 9, September 2024, pp. 11382-11396.
IEEE DOI
2409
Authentication, Vehicular ad hoc networks, Protocols,
5G mobile communication, Biometrics (access control), security
BibRef
Agbaje, P.[Paul],
Olufowobi, H.[Habeeb],
Hounsinou, S.[Sena],
Bloom, G.[Gedare],
From Weeping to Wailing: A Transitive Stealthy Bus-Off Attack,
ITS(25), No. 9, September 2024, pp. 12066-12080.
IEEE DOI
2409
Software, Feature extraction, Threat modeling, Synchronization,
Standards, Security, Intelligent transportation systems, WeepingCAN
BibRef
Xu, S.W.[Shi-Wei],
Wang, T.[Tao],
Sun, A.[Ao],
Tong, Y.[Yan],
Ren, Z.W.[Zheng-Wei],
Zhu, R.[Rongbo],
Song, H.H.[Houbing Herbert],
Post-Quantum Anonymous, Traceable and Linkable Authentication Scheme
Based on Blockchain for Intelligent Vehicular Transportation Systems,
ITS(25), No. 9, September 2024, pp. 12108-12119.
IEEE DOI
2409
Authentication, Security, Privacy, NIST, Public key, Blockchains,
Resistance, Post-quantum, security and privacy,
blockchain-based
BibRef
Mei, Y.Y.[Yang-Yang],
Han, W.H.[Wei-Hong],
Li, S.D.[Shu-Dong],
Lin, K.[Kaihan],
Tian, Z.H.[Zhi-Hong],
Li, S.[Shumei],
A Novel Network Forensic Framework for Advanced Persistent Threat
Attack Attribution Through Deep Learning,
ITS(25), No. 9, September 2024, pp. 12131-12140.
IEEE DOI
2409
Forensics, Data models, Deep learning, Security, Analytical models,
Cyberattack, Telecommunication traffic, Network forensic,
multi-layer perceptual deep neural network
BibRef
Yang, X.D.[Xiao-Dong],
Li, S.[Songyu],
Yang, L.[Lan],
Du, X.[Xiaoni],
Wang, C.[Caifen],
Efficient and Security-Enhanced Certificateless Aggregate
Signature-Based Authentication Scheme With Conditional Privacy
Preservation for VANETs,
ITS(25), No. 9, September 2024, pp. 12256-12268.
IEEE DOI
2409
Authentication, Security, Public key, Aggregates, Privacy,
Vehicular ad hoc networks, Elliptic curves, VANETs, coalition attack
BibRef
Chen, G.X.[Guo-Xi],
Wu, T.J.[Tie-Jun],
Li, X.[Xinde],
Zhang, Y.[Ya],
Secure and Safe Control of Connected and Automated Vehicles Against
False Data Injection Attacks,
ITS(25), No. 9, September 2024, pp. 12347-12360.
IEEE DOI
2409
Estimation, Trajectory, Safety, Predictive models,
Prediction algorithms, Detectors, Sensors, Secure control,
artificial intelligence
BibRef
Wang, C.H.[Chen-Hao],
Ming, Y.[Yang],
Liu, H.[Hang],
Feng, J.[Jie],
Zhang, N.[Ning],
Secure and Flexible Data Sharing With Dual Privacy Protection in
Vehicular Digital Twin Networks,
ITS(25), No. 9, September 2024, pp. 12407-12420.
IEEE DOI
2409
Data privacy, Authentication, Encryption, Digital twins, Blockchains,
Synchronization, Costs, Vehicular digital twin networks, blockchain
BibRef
Saleem, M.A.[Muhammad Asad],
Li, X.[Xiong],
Mahmood, K.[Khalid],
Tariq, T.[Tayyaba],
Alenazi, M.J.F.[Mohammed J. F.],
Das, A.K.[Ashok Kumar],
Secure RFID-Assisted Authentication Protocol for Vehicular Cloud
Computing Environment,
ITS(25), No. 9, September 2024, pp. 12528-12537.
IEEE DOI
2409
Protocols, Authentication, Security, RFID tags, Cloud computing,
Threat modeling, Object recognition, Authentication protocol,
radio frequency identification (RFID)
BibRef
Saleem, M.A.[Muhammad Asad],
Li, X.[Xiong],
Mahmood, K.[Khalid],
Shamshad, S.[Salman],
Alenazi, M.J.F.[Mohammed J. F.],
Das, A.K.[Ashok Kumar],
A Cost-Efficient Anonymous Authenticated and Key Agreement Scheme for
V2I-Based Vehicular Ad-Hoc Networks,
ITS(25), No. 9, September 2024, pp. 12621-12630.
IEEE DOI
2409
Security, Authentication, Vehicular ad hoc networks,
Biology, Computer architecture,
vehicular ad-hoc network (VANET)
BibRef
Guo, H.Z.[Hong-Zhi],
Wu, X.H.[Xin-Han],
Liu, J.J.[Jia-Jia],
Mao, B.M.[Bo-Min],
Chen, X.[Xiangshen],
Adaptive and Reliable Location Privacy Risk Sensing in Internet of
Vehicles,
ITS(25), No. 9, September 2024, pp. 12696-12708.
IEEE DOI
2409
Privacy, Risk management, Security, Protection, Sensors, Urban areas,
Reliability, Internet of Vehicles, risk sensing, location privacy,
adaptive weight
BibRef
Sun, H.[Heng],
Su, H.[Huibiao],
Weng, J.[Jian],
Liu, Z.Q.[Zhi-Quan],
Li, M.[Ming],
Liu, Y.[Yi],
Zhong, Y.C.[Yu-Cheng],
Sun, W.Z.[Wen-Zhen],
MTDCAP: Moving Target Defense-Based CAN Authentication Protocol,
ITS(25), No. 9, September 2024, pp. 12800-12817.
IEEE DOI
2409
Protocols, Authentication, Feature extraction, Encryption,
Cryptography, Computer crime, Sun, Automotive security,
authentication protocol
BibRef
Vasudevan, V.[Vinod],
Abdullatif, A.[Amr],
Kabir, S.[Sohag],
Campean, F.[Felician],
Certifiability Analysis of Machine Learning Systems for Low-Risk
Automotive Applications,
Computer(57), No. 9, September 2024, pp. 45-56.
IEEE DOI
2409
Regulators, ISO Standards, Automotive applications,
Machine learning, Safety, Stakeholders, Computer security
BibRef
Siddiqi, S.J.[Sadia Jabeen],
Tahir, B.[Bushra],
Jan, M.A.[Mian Ahmad],
Tariq, M.[Muhammad],
Multichain-Assisted Lightweight Security for Code Mutated False Data
Injection Attacks in Connected Autonomous Vehicles,
ITS(25), No. 9, September 2024, pp. 11000-11010.
IEEE DOI
2409
Blockchains, Security, Hidden Markov models,
Intelligent transportation systems, Codes,
lightweight security
BibRef
Boualouache, A.[Abdelwahab],
Jolfaei, A.A.[Amirhossein Adavoudi],
Engel, T.[Thomas],
Multi-Process Federated Learning With Stacking for Securing 6G-V2X
Network Slicing at Cross-Borders,
ITS(25), No. 9, September 2024, pp. 10941-10952.
IEEE DOI
2409
6G mobile communication, Security, Network slicing, Privacy,
Biological system modeling, 5G mobile communication, Stacking,
federated learning
BibRef
Liu, R.Q.[Rui-Qi],
Hua, M.[Meng],
Guan, K.[Ke],
Wang, X.[Xiping],
Zhang, L.[Leyi],
Mao, T.Q.[Tian-Qi],
Zhang, D.[Di],
Wu, Q.Q.[Qing-Qing],
Jamalipour, A.[Abbas],
6G Enabled Advanced Transportation Systems,
ITS(25), No. 9, September 2024, pp. 10564-10580.
IEEE DOI
2409
Transportation, 6G mobile communication, 5G mobile communication,
Industries, Bandwidth, Rails, Wireless networks, 6G, security
BibRef
Hu, S.L.[Song-Lin],
Ma, Y.[Yong],
Qi, X.[Xin],
Li, Z.X.[Zhi-Xiong],
Malekian, R.[Reza],
Sotelo, M.A.[Miguel Angel],
L_2-Gain-Based Path Following Control for Autonomous Vehicles Under
Time-Constrained DoS Attacks,
ITS(25), No. 9, September 2024, pp. 10604-10616.
IEEE DOI
2409
Autonomous vehicles, Denial-of-service attack, Cyberattack, Wheels,
Symmetric matrices, Lyapunov methods, Wireless communication,
linear matrix inequality (LMI)
BibRef
Miglani, A.[Arzoo],
Kumar, N.[Neeraj],
BloomACS: Bloom Filter-Based Access Control Scheme in
Blockchain-Enabled V2G Networks,
ITS(25), No. 9, September 2024, pp. 10636-10651.
IEEE DOI
2409
Access control, Vehicle-to-grid, Blockchains, Authentication,
Smart contracts, Proposals, Open source software, Blockchain,
proof-of-authority
BibRef
Wei, Z.J.[Zi-Jie],
Du, X.[Xian],
Liu, K.Z.[Kun-Zhi],
Sun, X.M.[Xi-Ming],
Data-Driven Dynamic Event-Triggered Control for NCSs Under
Denial-of-Service and Time-Varying Delays,
ITS(25), No. 9, September 2024, pp. 11156-11167.
IEEE DOI
2409
Delays, Denial-of-service attack, Trajectory, Noise measurement,
Vectors, Time-varying systems, Resilience, Data-driven control,
time delays
BibRef
Rong, D.L.[Dong-Lei],
Jin, S.[Sheng],
Yao, W.B.[Wen-Bin],
Yang, C.C.[Cheng-Cheng],
Bai, C.C.[Cong-Cong],
Alagbé, A.J.[Adjé Jérémie],
Hybrid Trajectory Planning for Connected and Autonomous Vehicle
Considering Communication Spoofing Attacks,
ITS(25), No. 9, September 2024, pp. 11961-11976.
IEEE DOI
2409
Safety, Trajectory planning, Adaptation models, Decision making,
Optimization, Autonomous vehicles, Vehicle dynamics,
hybrid trajectory planning
BibRef
Abbasinezhad-Mood, D.[Dariush],
Ghaemi, H.[Hadi],
Dual-Signature Blockchain-Based Key Sharing Protocol for Secure V2V
Communications in Multi-Domain IoV Environments,
ITS(25), No. 10, October 2024, pp. 13407-13416.
IEEE DOI
2410
Protocols, Servers, Blockchains, Security, Authentication,
Vehicular ad hoc networks, Computational efficiency,
vehicle to vehicle (V2V)
BibRef
Feng, X.[Xia],
Cui, K.[Kaiping],
Wang, L.[Liangmin],
Liu, Z.Q.[Zhi-Quan],
Ma, J.F.[Jian-Feng],
PBAG: A Privacy-Preserving Blockchain-Based Authentication Protocol
With Global-Updated Commitment in IoVs,
ITS(25), No. 10, October 2024, pp. 13524-13545.
IEEE DOI
2410
Authentication, Protocols, Blockchains, Privacy, Security,
Real-time systems, Protection, Blockchain, authentication,
commitment
BibRef
Karati, A.[Arijit],
Chang, L.C.[Li-Chun],
AnonMAKE: Toward Secure and Anonymous Mutually Authenticated Key
Exchange Protocol for Vehicular Communications,
ITS(25), No. 10, October 2024, pp. 14245-14258.
IEEE DOI
2410
Authentication, Security, Protocols, Safety, Privacy,
Dedicated short range communication, Vehicular ad hoc networks,
cryptanalysis
BibRef
Ju, Y.[Ying],
Gao, Z.[Zipeng],
Wang, H.Y.[Hao-Yu],
Liu, L.[Lei],
Pei, Q.Q.[Qing-Qi],
Dong, M.[Mianxiong],
Mumtaz, S.[Shahid],
Leung, V.C.M.[Victor C. M.],
Energy-Efficient Cooperative Secure Communications in mmWave
Vehicular Networks Using Deep Recurrent Reinforcement Learning,
ITS(25), No. 10, October 2024, pp. 14460-14475.
IEEE DOI
2410
Millimeter wave communication, Relays, Energy consumption,
Eavesdropping, Base stations, Jamming, Security,
deep recurrent reinforcement learning
BibRef
Gautam, D.[Deepika],
Thakur, G.[Garima],
Kumar, P.[Pankaj],
Das, A.K.[Ashok Kumar],
Park, Y.[Youngho],
Blockchain Assisted Intra-Twin and Inter-Twin Authentication Scheme
for Vehicular Digital Twin System,
ITS(25), No. 10, October 2024, pp. 15002-15015.
IEEE DOI
2410
Digital twins, Authentication, Blockchains, Security,
Cloud computing, Protocols, Servers, Digital twin, security
BibRef
Qian, Y.[Yuwen],
Rao, L.P.[Lu-Ping],
Ma, C.[Chuan],
Wei, K.[Kang],
Ding, M.[Ming],
Shi, L.[Long],
Toward Efficient and Secure Object Detection With Sparse Federated
Training Over Internet of Vehicles,
ITS(25), No. 10, October 2024, pp. 14507-14520.
IEEE DOI
2410
Training, Servers, Computational modeling, YOLO, Data models,
Image edge detection, Data privacy, Internet of Vehicles,
YOLO
BibRef
Zhong, Q.[Qiang],
Zhao, X.[Xiang],
Xia, Y.J.[Ying-Jie],
Liu, X.J.[Xue-Jiao],
CD-BASA: An Efficient Cross-Domain Batch Authentication Scheme Based
on Blockchain With Accumulator for VANETs,
ITS(25), No. 10, October 2024, pp. 14560-14571.
IEEE DOI
2410
Authentication, Blockchains, Protocols, Vehicle dynamics,
Real-time systems, Throughput, Heuristic algorithms, VANETs,
accumulator
BibRef
Xu, Q.[Qian],
Zhang, L.[Lei],
Qin, X.J.[Xiao-Jie],
Zhou, Y.X.[Yi-Xuan],
A Novel Machine Learning-Based Trust Management Against Multiple
Misbehaviors for Connected and Automated Vehicles,
ITS(25), No. 11, November 2024, pp. 16775-16790.
IEEE DOI
2411
Trust management, Computational modeling, Predictive models,
Hidden Markov models, Data models, Roads, Real-time systems,
multi-dimensional trust factor
BibRef
Gong, Y.J.[Yu-Jing],
Hu, B.J.[Bin-Jie],
A Quantum-Resistant Key Management Scheme Using Blockchain in C-V2X,
ITS(25), No. 11, November 2024, pp. 16831-16844.
IEEE DOI
2411
Blockchains, Cryptography, Vectors, Lattices, Security, Proposals,
Resistance, C-V2X, quantum attack, blockchain, key management
BibRef
Khalid, H.[Haqi],
Hashim, S.J.[Shaiful Jahari],
Hashim, F.[Fazirulhisyam],
Al-Jawher, W.A.M.[Waleed Ameen Mahmoud],
Chaudhary, M.A.[Muhammad Akmal],
Altarturi, H.H.M.[Hamza H. M.],
RAVEN: Robust Anonymous Vehicular End-to-End Encryption and Efficient
Mutual Authentication for Post-Quantum Intelligent Transportation
Systems,
ITS(25), No. 11, November 2024, pp. 17574-17586.
IEEE DOI
2411
Security, Authentication, Quantum computing, Encryption, Privacy, Cryptography,
Polynomials, Authentication, security, post-quantum,
intelligent transportation system
BibRef
Wang, J.F.[Ji-Fang],
Wang, S.[Shangping],
Deng, Y.J.[Yig-Juan],
Zhang, D.[Duo],
He, B.[Bintao],
Lightweight Access Delegation With Multi-Ciphertext Equivalence Test
for Shared Data in ITS,
ITS(25), No. 11, November 2024, pp. 15775-15790.
IEEE DOI
2411
Cryptography, Vehicles, Authentication, Encryption, Privacy,
Vehicular ad hoc networks, Real-time systems, ITS, shared data,
certificateless cryptosystem
BibRef
Li, W.F.[Wen-Feng],
Xie, Z.C.[Zheng-Chao],
Wong, P.K.[Pak Kin],
Zhang, X.[Xiang],
Zhao, J.[Jian],
Zhao, J.[Jing],
Interval Type-2 Fuzzy Path Tracking Control for Autonomous Ground
Vehicles Under Switched Triggered and Sensor Attacks,
ITS(25), No. 11, November 2024, pp. 16024-16035.
IEEE DOI
2411
Vehicle dynamics, Switches, Tires, Uncertainty, Tracking,
Land vehicles, Cyberattack, Path tracking control, cyber attacks
BibRef
Zhang, H.Y.[Hai-Yang],
Zhang, X.J.[Xiao-Jun],
Zhang, Y.[Yuan],
Wang, X.[Xin],
Liu, Q.[Qing],
Blockchain-Based Proxy-Oriented Data Integrity Checking Mechanism in
Cloud-Assisted Intelligent Transportation Systems,
ITS(25), No. 11, November 2024, pp. 17366-17381.
IEEE DOI
2411
Cloud computing, Intelligent transportation systems,
Data integrity, Blockchains, Smart contracts, Oils,
blockchain
BibRef
Shi, R.H.[Run-Hua],
Comments on 'A Quantum Cryptographic Protocol for Secure Vehicular
Communication',
ITS(25), No. 12, December 2024, pp. 21796-21798.
IEEE DOI
2412
Protocols, Road transportation, Quantum entanglement,
Fourier transforms, Reviews, Resists, Logic gates,
foggy highway
See also Quantum Cryptographic Protocol for Secure Vehicular Communication, A.
BibRef
Gu, C.[Chen],
Ma, B.S.[Bao-Shan],
Hu, D.H.[Dong-Hui],
A Dependable and Efficient Decentralized Trust Management System
Based on Consortium Blockchain for Intelligent Transportation Systems,
ITS(25), No. 12, December 2024, pp. 19430-19443.
IEEE DOI
2412
Blockchains, Trust management, Servers,
Intelligent transportation systems, Classification algorithms,
intelligent transportation systems
BibRef
Ghosh, S.[Sanchita],
Saha, N.[Nutan],
Roy, T.[Tanushree],
A Cyberattack Detection-Isolation Algorithm for CAV Under Changing
Driving Environment,
ITS(25), No. 12, December 2024, pp. 19646-19657.
IEEE DOI
2412
Cyberattack, Vehicular ad hoc networks,
Vehicle-to-infrastructure, Security, Safety, Trajectory, Switches,
VANET security
BibRef
Mugunthan, S.[Sundararaju],
Sureshkumar, V.[Venkatasamy],
Saravanan, P.[Paramasivam],
Amin, R.[Ruhul],
VAuth: Robust Lightweight Mutual Authentication Protocol Preserving
User's Anonymity for VANET With FPGA Implementation,
ITS(25), No. 12, December 2024, pp. 21097-21106.
IEEE DOI
2412
Protocols, Security, Vehicular ad hoc networks, Authentication,
Privacy, Servers, Sensors, Safety, Costs, Logic,
security attacks
BibRef
Yang, W.J.[Wen-Jie],
Fan, J.Z.[Jun-Zhe],
Song, K.[Kai],
Zheng, Y.[Yun],
Zhang, F.[Futai],
An Efficient and Practical Conditional Privacy-Preserving Aggregate
Authentication for Vehicular Ad-Hoc Networks,
ITS(25), No. 12, December 2024, pp. 20256-20267.
IEEE DOI
2412
Aggregates, Security, Forgery, Public key, Authentication, Resists,
Servers, Costs, Reviews, Law, Certificateless aggregate signature,
public verification
BibRef
He, C.[Chao],
Wang, Y.T.[Yun-Tao],
Hu, J.[Juan],
Luan, T.H.[Tom H.],
Bi, Y.G.[Yuan-Guo],
Su, Z.[Zhou],
Collaborative Vehicular Threat Sharing: A Long-Term Contract-Based
Incentive Mechanism With Privacy Preservation,
ITS(25), No. 12, December 2024, pp. 21528-21544.
IEEE DOI
2412
Privacy, Contracts, Vehicle dynamics, Security, Collaboration, Costs,
Servers, Internet of Vehicles, vehicular honeypot,
incentive mechanism
BibRef
Yu, S.J.[Sung-Jin],
Das, A.K.[Ashok Kumar],
Park, Y.[Youngho],
RLBA-UAV: A Robust and Lightweight Blockchain-Based Authentication
and Key Agreement Scheme for PUF-Enabled UAVs,
ITS(25), No. 12, December 2024, pp. 21697-21708.
IEEE DOI
2412
Security, Autonomous aerial vehicles,
Physical unclonable function, Authentication, Servers,
authentication
BibRef
Tang, M.[Min],
Huang, Z.[Zengyi],
Deng, G.Q.[Guo-Qiang],
FEDL: Confidential Deep Learning for Autonomous Driving in VANETs
Based on Functional Encryption,
ITS(25), No. 12, December 2024, pp. 21074-21085.
IEEE DOI Code:
WWW Link.
2412
Deep learning, Encryption, Privacy, Cryptography, Accuracy, Training,
Data privacy, VANETs, deep learning, privacy-preserving,
Voronoi diagram
BibRef
Wang, X.J.[Xiao-Jie],
Zhao, Z.H.[Zhong-Hui],
Yi, L.[Ling],
Ning, Z.L.[Zhao-Long],
Guo, L.[Lei],
Yu, F.R.[F. Richard],
Guo, S.[Song],
A Survey on Security of UAV Swarm Networks: Attacks and
Countermeasures,
Surveys(57), No. 3, November 2024, pp. xx-yy.
DOI Link
2501
UAV swarm networks, security technologies, network attacks,
security countermeasures
BibRef
Xiao, J.R.[Jian-Ru],
Ren, Y.L.[Yi-Long],
Du, J.W.[Jie-Wei],
Zhao, Y.[Yanan],
Kumari, S.[Saru],
Alenazi, M.J.F.[Mohammed J. F.],
Yu, H.Y.[Hai-Yang],
CALRA: Practical Conditional Anonymous and Leakage-Resilient
Authentication Scheme for Vehicular Crowdsensing Communication,
ITS(26), No. 1, January 2025, pp. 1273-1285.
IEEE DOI
2501
Encryption, Sensors, Authentication, Data privacy, Crowdsensing,
Proposals, Privacy, Data communication, Resists, traceability
BibRef
Rawat, G.S.[Gopal Singh],
Singh, K.[Karan],
Shariq, M.[Mohd],
Das, A.K.[Ashok Kumar],
Chaudhry, S.A.[Shehzad Ashraf],
Lorenz, P.[Pascal],
BTC2PA: A Blockchain-Assisted Trust Computation With Conditional
Privacy- Preserving Authentication for Connected Vehicles,
ITS(26), No. 1, January 2025, pp. 1134-1148.
IEEE DOI
2501
Security, Authentication, Protocols, Vehicular ad hoc networks,
Privacy, Cryptography, Resists, Computer science, Transportation,
trust management
BibRef
Khayati, Y.,
Mazri, T.,
Security Study of Routing Attacks in Vehicular Ad-Hoc Networks (Vanets),
SmartCityApp20(267-272).
DOI Link
2012
BibRef
Moudni, H.,
Er-Rouidi, M.,
Mouncif, H.,
El Hadadi, B.,
Attacks against AODV Routing Protocol in Mobile Ad-Hoc Networks,
CGiV16(385-389)
IEEE DOI
1608
mobile ad hoc networks
BibRef
Chapter on Motion -- Feature-Based, Long Range, Motion and Structure Estimates, Tracking, Surveillance, Activities continues in
Privacy in Vehicle Networks, VANET .