Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    A Trailblazing Framework of Security Assessment for Traffic Data Management

    Abdulaziz Attaallah1, Khalil al-Sulbi2, Areej Alasiry3, Mehrez Marzougui3, Neha Yadav4, Syed Anas Ansar5,*, Pawan Kumar Chaurasia4, Alka Agrawal4

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1853-1875, 2023, DOI:10.32604/iasc.2023.039761 - 21 June 2023

    Abstract Connected and autonomous vehicles are seeing their dawn at this moment. They provide numerous benefits to vehicle owners, manufacturers, vehicle service providers, insurance companies, etc. These vehicles generate a large amount of data, which makes privacy and security a major challenge to their success. The complicated machine-led mechanics of connected and autonomous vehicles increase the risks of privacy invasion and cyber security violations for their users by making them more susceptible to data exploitation and vulnerable to cyber-attacks than any of their predecessors. This could have a negative impact on how well-liked CAVs are with… More >

  • Open Access

    ARTICLE

    Authentication of Vehicles and Road Side Units in Intelligent Transportation System

    Muhammad Waqas1, 2, Shanshan Tu1, 3, *, Sadaqat Ur Rehman1, Zahid Halim2, Sajid Anwar2, Ghulam Abbas2, Ziaul Haq Abbas4, Obaid Ur Rehman5

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 359-371, 2020, DOI:10.32604/cmc.2020.09821 - 20 May 2020

    Abstract Security threats to smart and autonomous vehicles cause potential consequences such as traffic accidents, economically damaging traffic jams, hijacking, motivating to wrong routes, and financial losses for businesses and governments. Smart and autonomous vehicles are connected wirelessly, which are more attracted for attackers due to the open nature of wireless communication. One of the problems is the rogue attack, in which the attacker pretends to be a legitimate user or access point by utilizing fake identity. To figure out the problem of a rogue attack, we propose a reinforcement learning algorithm to identify rogue nodes More >

Displaying 1-10 on page 1 of 2. Per Page