4.7 Article

A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs)

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Intelligent Resource Allocation for Video Analytics in Blockchain-Enabled Internet of Autonomous Vehicles With Edge Computing

Xiantao Jiang et al.

Summary: This study integrates multiaccess edge computing and blockchain technologies into the video analytics framework of the Internet of Autonomous Vehicles (IoAV), optimizing transaction throughput and system latency. By utilizing deep reinforcement learning algorithm, the joint optimization problem is solved, achieving significant performance improvement.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Hardware & Architecture

From Information Networking to Intelligence Networking: Motivations, Scenarios, and Challenges

F. Richard Yu

Summary: The internet has become a major foundation for our socio-economic systems, but new challenges such as information overload and fake information have emerged in the post-Internet era. The next networking paradigm could be intelligence networking, where intelligence can be easily obtained like matter, energy, and information.

IEEE NETWORK (2021)

Article Computer Science, Information Systems

Edge Intelligence (EI)-Enabled HTTP Anomaly Detection Framework for the Internet of Things (IoT)

Yufei An et al.

Summary: This article introduces a novel HTTP anomaly detection framework for IoT based on edge intelligence, utilizing clustering and classification methods to distribute the detection process to different nodes, reducing redundant data, and enhancing the speed and accuracy of anomaly detection, especially for unknown anomalies.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Hardware & Architecture

A Defense Mechanism Against Replay Attack in Remote Keyless Entry Systems Using Timestamping and XOR Logic

Kyle Greene et al.

Summary: Remote Keyless Entry (RKE) systems are vulnerable to attacks such as jamming, replay, and cryptanalysis, which can result in property theft and casualties. To address this issue, an improved RKE system using timestamping and XOR encoding has been proposed, demonstrating superior defense mechanisms compared to conventional RKE systems.

IEEE CONSUMER ELECTRONICS MAGAZINE (2021)

Article Computer Science, Theory & Methods

Detecting Hardware-Assisted Virtualization With Inconspicuous Features

Zhi Zhang et al.

Summary: In recent years, the deployment of virtualization techniques has become more widespread. Hardware-assisted virtualization has significantly enhanced transparency and difficulty in detection. The study identified three low-level inconspicuous features that can be leveraged to effectively detect hardware-assisted virtualization.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Information Systems

Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication

Trupil Limbasiya et al.

IEEE SYSTEMS JOURNAL (2020)

Article Engineering, Electrical & Electronic

SAIDuCANT: Specification-Based Automotive Intrusion Detection Using Controller Area Network (CAN) Timing

Habeeb Olufowobi et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Engineering, Electrical & Electronic

Statistical test for GNSS spoofing attack detection by using multiple receivers on a rigid body

Ashkan Kalantari et al.

EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING (2020)

Article Engineering, Electrical & Electronic

On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment

Anil Kumar Sutrala et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Hardware & Architecture

Vehicular Blockchain-Based Collective Learning for Connected and Autonomous Vehicles

Yuchuan Fu et al.

IEEE WIRELESS COMMUNICATIONS (2020)

Article Computer Science, Artificial Intelligence

Variable control chart for detecting black hole attack in vehicular ad-hoc networks

Badreddine Cherkaoui et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020)

Article Engineering, Electrical & Electronic

Highly Efficient Authentication for CAN by Identifier Reallocation With Ordered CMACs

Bogdan Groza et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Chemistry, Analytical

A Novel Location Privacy-Preserving Approach Based on Blockchain

Ying Qiu et al.

SENSORS (2020)

Article Engineering, Electrical & Electronic

Cybersecurity Attacks in Vehicular Sensors

Zeinab El-Rewini et al.

IEEE SENSORS JOURNAL (2020)

Article Engineering, Aerospace

A GPS Spoofing Detection and Classification Correlator-Based Technique Using the LASSO

Erick Schmidt et al.

IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS (2020)

Proceedings Paper Computer Science, Information Systems

Secure Traffic Lights: Replay Attack Detection for Model-based Smart Traffic Controllers

Pratham Oza et al.

AUTOSEC'20: PROCEEDINGS OF THE SECOND ACM WORKSHOP ON AUTOMOTIVE AND AERIAL VEHICLE SECURITY (2020)

Article Computer Science, Information Systems

Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles

Zohaib Hassan et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network

Basker Palaniswamy et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Engineering, Aerospace

CUSUM-based GNSS Spoofing Detection Method for Users of GNSS Augmentation System

Seongkyun Jeong et al.

INTERNATIONAL JOURNAL OF AERONAUTICAL AND SPACE SCIENCES (2020)

Article Computer Science, Information Systems

Security and Privacy Challenges in Connected Vehicular Cloud Computing

Arooj Masood et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Theory & Methods

TBRS: A trust based recommendation scheme for vehicular CPS network

Wei Liang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Engineering, Electrical & Electronic

GNSS Spoofing Detection Based on Consistency Check of Velocities

Tao Huiqi et al.

CHINESE JOURNAL OF ELECTRONICS (2019)

Article Computer Science, Hardware & Architecture

INTERNET OF AUTONOMOUS VEHICLES COMMUNICATIONS SECURITY: OVERVIEW, ISSUES, AND DIRECTIONS

Ashish Nanda et al.

IEEE WIRELESS COMMUNICATIONS (2019)

Review Computer Science, Information Systems

A Comprehensive Survey on VANET Security Services in Traffic Management System

Muhammad Sameer Sheikh et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2019)

Article Computer Science, Hardware & Architecture

SODA: A software-defined security framework for IoT environments

Yeonkeun Kim et al.

COMPUTER NETWORKS (2019)

Article Transportation Science & Technology

DSRC-based rear-end collision warning system - An error-component safety distance model and field test

Xiangmo Zhao et al.

TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES (2019)

Article Chemistry, Multidisciplinary

A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis

Carsten Maple et al.

APPLIED SCIENCES-BASEL (2019)

Article Economics

Connected and autonomous vehicles: A cyber-risk classification framework

Barry Sheehan et al.

TRANSPORTATION RESEARCH PART A-POLICY AND PRACTICE (2019)

Article Computer Science, Information Systems

CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles

Jiliang Li et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things

Kisung Park et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Modeling and Analysis of Eavesdropping Attack in 802.11 ad mmWave Wireless Networks

Sarankumar Balakrishnan et al.

IEEE ACCESS (2019)

Proceedings Paper Telecommunications

Personal Data Privacy Challenges of the Fourth Industrial Revolution

Md Mehedi Hassan Onik et al.

2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION (2019)

Proceedings Paper Computer Science, Hardware & Architecture

VPGA: an SDN-based Location Privacy Zones Placement Scheme for Vehicular Networks

Abdelwahab Boualouache et al.

2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC) (2019)

Proceedings Paper Computer Science, Hardware & Architecture

A Low-Cost Replica-Based Distance-Spoofing Attack on mmWave FMCW Radar

Noriyuki Miura et al.

PROCEEDINGS OF THE 3RD ACM WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY WORKSHOP (ASHES '19) (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Survey of Security Aspect of V2X Standards and Related Issues

Takahito Yoshizawa et al.

2019 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN) (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Spectrum Sharing for Vehicular Communications in A Multi-operator Scenario

Zhongjie He et al.

2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP) (2019)

Article Computer Science, Information Systems

Survey and Classification of Automotive Security Attacks

Florian Sommer et al.

INFORMATION (2019)

Article Computer Science, Artificial Intelligence

Data sanitization against adversarial label contamination based on data complexity

Patrick P. K. Chan et al.

INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS (2018)

Article Computer Science, Information Systems

A simulative analysis of the performance of IEEE 802.11p and ARIB STD-T109

Julian Heinovski et al.

COMPUTER COMMUNICATIONS (2018)

Article Computer Science, Hardware & Architecture

Secrecy-Driven Resource Management for Vehicular Computation Offloading Networks

Yuan Wu et al.

IEEE NETWORK (2018)

Article Engineering, Civil

Real-Time Detection and Estimation of Denial of Service Attack in Connected Vehicle Systems

Zoleikha Abdollahi Biron et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2018)

Article Engineering, Electrical & Electronic

Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel

Lichuan Ma et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Engineering, Electrical & Electronic

Security Shortcomings and Countermeasures for the SAE J1939 Commercial Vehicle Bus Protocol

Pal-Stefan Murvay et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Engineering, Electrical & Electronic

Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense

Jie Lin et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Engineering, Electrical & Electronic

Location Privacy Violation via GPS-Agnostic Smart Phone Car Tracking

Zi Li et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Computer Science, Information Systems

Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario

Yanan Chen et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Article Computer Science, Information Systems

Energy-Efficient Wireless Transmissions for Battery-Less Vehicle Tire Pressure Monitoring System

Qinmiao Kang et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping

Yingmo Jie et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles

Wenyuan Xu et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Automation & Control Systems

Secure VANETs: Trusted Communication Scheme between Vehicles and Infrastructure Based on Fog Computing

Muhammad Arif et al.

STUDIES IN INFORMATICS AND CONTROL (2018)

Article Engineering, Civil

Cybersecurity Attacks in Vehicle-to-Infrastructure Applications and Their Prevention

Mhafuzul Islam et al.

TRANSPORTATION RESEARCH RECORD (2018)

Proceedings Paper Computer Science, Theory & Methods

A Secure LiDAR with AES-Based Side-Channel Fingerprinting

Ryuga Matsumura et al.

2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018) (2018)

Proceedings Paper Computer Science, Software Engineering

Detecting Poisoning Attacks on Machine Learning in IoT Environments

Nathalie Baracaldo et al.

2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT) (2018)

Proceedings Paper Computer Science, Theory & Methods

Detection of Multiple Malicious Nodes using entropy for mitigating the effect of Denial of Service Attack in VANETs

Sushil Kamboj et al.

2018 4TH INTERNATIONAL CONFERENCE ON COMPUTING SCIENCES (ICCS) (2018)

Proceedings Paper Computer Science, Theory & Methods

Secure and Effective Geo-Data Transmission Scheme for Vehicle-to-Vehicle Communication

Trupil Limbasiya et al.

2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI) (2018)

Article Computer Science, Information Systems

Protecting Secure Communication Under UAV Smart Attack With Imperfect Channel Estimation

Chao Li et al.

IEEE ACCESS (2018)

Article Ergonomics

Influence of cyber-attacks on longitudinal safety of connected and automated vehicles

Ye Li et al.

ACCIDENT ANALYSIS AND PREVENTION (2018)

Article Engineering, Electrical & Electronic

A Dual-Band Inverted-1 MIMO Antenna With Enhanced Isolation for WLAN Applications

JingYa Deng et al.

IEEE ANTENNAS AND WIRELESS PROPAGATION LETTERS (2017)

Article Engineering, Civil

Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges

Simon Parkinson et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2017)

Article Computer Science, Hardware & Architecture

INTELLIGENT 5G: WHEN CELLULAR NETWORKS MEET ARTIFICIAL INTELLIGENCE

Rongpeng Li et al.

IEEE WIRELESS COMMUNICATIONS (2017)

Article Engineering, Civil

Tire Pressure Monitoring System Sensor Radio Frequency Measurements for Privacy Concerns

Kevin T. Sterne et al.

TRANSPORTATION RESEARCH RECORD (2017)

Review Computer Science, Information Systems

Evolution of Positioning Techniques in Cellular Networks, from 2G to 4G

Rafael Saraiva Campos

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2017)

Article Telecommunications

Mitigation and Performance Analysis of Routing Protocols Under Black-Hole Attack in Vehicular Ad-hoc Network (VANET)

Kamlesh Chandra Purohit et al.

WIRELESS PERSONAL COMMUNICATIONS (2017)

Proceedings Paper Automation & Control Systems

Intrusion Threats And Security Solutions For Autonomous Vehicle Networks

Safa Boumiza et al.

2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA) (2017)

Proceedings Paper Computer Science, Theory & Methods

Lightweight Detection and Isolation of Black Hole Attacks in Connected Vehicles

Sami S. Albouq et al.

2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW) (2017)

Proceedings Paper Computer Science, Software Engineering

Using SAE J3061 for Automotive Security Requirement Engineering

Christoph Schmittner et al.

COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2016 (2016)

Editorial Material Computer Science, Information Systems

Cloud Attack and Risk Assessment Taxonomy

Nina Viktoria Juliadotter et al.

IEEE CLOUD COMPUTING (2015)

Article Engineering, Industrial

Architectural design and reliability analysis of a fail-operational brake-by-wire system from ISO 26262 perspectives

Purnendu Sinha

RELIABILITY ENGINEERING & SYSTEM SAFETY (2011)

Article Robotics

Path Planning for Autonomous Vehicles in Unknown Semi-structured Environments

Dmitri Dolgov et al.

INTERNATIONAL JOURNAL OF ROBOTICS RESEARCH (2010)

Article Engineering, Electrical & Electronic

AUTOMOBILE SECURITY CONCERNS

R. R. Brooks et al.

IEEE VEHICULAR TECHNOLOGY MAGAZINE (2009)