51 Hits in 6.0 sec

V2X Misbehavior and Collective Perception Service: Considerations for Standardization [article]

Mohammad Raashid Ansari, Jean-Philippe Monteuuis, Jonathan Petit, Cong Chen
2021 arXiv   pre-print
Unfortunately, current standardization efforts do not include misbehavior specifications for advanced V2X services such as Collective Perception yet.  ...  This work assesses the security of Collective Perception Messages and proposes inputs for consideration in existing standards.  ...  In addition, the FreeSpaceAddendumContainer As seen in Figure 2, sensor data sharing requires a CP can contain the identifiers of sensors linked to the sensor system based on V2X communication  ... 
arXiv:2112.02184v1 fatcat:loonnmkijvfopnjd5bnx7lwln4

Automotive Intelligence Embedded in Electric Connected Autonomous and Shared Vehicles Technology for Sustainable Green Mobility

Ovidiu Vermesan, Reiner John, Patrick Pype, Gerardo Daalderop, Kai Kriegel, Gerhard Mitic, Vincent Lorentz, Roy Bahr, Hans Erik Sand, Steffen Bockrath, Stefan Waldhör
2021 Frontiers in Future Transportation  
The ECAS vehicle's technology allows for the development of virtual automotive functions that run on shared hardware platforms with data unlocking value, and for introducing new, shared computing-based  ...  The automotive sector digitalization accelerates the technology convergence of perception, computing processing, connectivity, propulsion, and data fusion for electric connected autonomous and shared (  ...  A comprehensive survey of DL applications for object detection and scene perception in autonomous vehicles applicable to the perception domain is provided by Gupta et al. (2021) .  ... 
doi:10.3389/ffutr.2021.688482 fatcat:3yr2mvmoanadxpk6zcbgbtjiy4

A Survey of Security and Privacy Issues in V2X Communication Systems

Takahito Yoshizawa, Dave Singelée, Jan Tobias Mühlberg, Stéphane Delbruel, Amir Taherkordi, Danny Hughes, Bart Preneel
2022 ACM Computing Surveys  
We bring forward recommendations to address these gaps for the overall improvement of security and safety in vehicular communication.  ...  As a result, our comprehensive analysis sheds lights on a number of areas that require improvements in the standards, which are not explicitly identified in related work.  ...  [9] provide good basis for various approaches toward misbehavior detection.  ... 
doi:10.1145/3558052 fatcat:hhhfuwuxzfgwzjqteyc6527hqq

Analysis and Evaluation of Information Redundancy Mitigation for V2X Collective Perception

Quentin Delooz, Alexander Willecke, Keno Garlichs, Andreas-Christian Hagau, Lars Wolf, Alexey Vinel, Andreas Festag
2022 IEEE Access  
Initial studies provided in a pre-standardization report about sensor data sharing elaborated a first set of rules to filter objects based on their characteristics, such as their dynamics or type.  ...  Objects filtering methods for inclusion in a message are necessary to avoid overloading a channel and provoking unnecessary data processing.  ...  ACKNOWLEDGMENT The authors would like to thank Georg Volk and Florian Schiegg for valuable discussions.  ... 
doi:10.1109/access.2022.3170029 fatcat:2movactnffctrejv3rnlogw5li

Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications

Elmustafa Sayed Ali, Mohammad Kamrul Hasan, Rosilah Hassan, Rashid A. Saeed, Mona Bakri Hassan, Shayla Islam, Nazmus Shaker Nafi, Savitri Bevinakoppa, Fawad Ahmed
2021 Security and Communication Networks  
This paper has conducted a critical review with analytical modeling for offloading mobile edge-computing decisions based on machine learning and Deep Reinforcement Learning (DRL) approaches for the Internet  ...  The promised applications of smart vehicles and IoV systems face many challenges, such as big data collection in IoV and distribution to attractive vehicles and humans.  ...  Misbehavior detection based on ML for secure V2X traffic Detects spoofing attacks in the V2X application layer Identify and detect the V2X location spoofing So [24] 2018 IEEE MinMax, MLP  ... 
doi:10.1155/2021/8868355 fatcat:z3bnxkaydvd5jl36dcgvta6xa4

Comprehensive Review on Misbehavior Detection for Vehicular Ad Hoc Networks

Xiaoya Xu, Yunpeng Wang, Pengcheng Wang, Zhenzhou Yuan
2022 Journal of Advanced Transportation  
Then, the precise definition of misbehavior, detection mode, and detection objects are presented. Generic misbehavior detection is classified as data-centric and node-centric.  ...  This study aims to present a comprehensive overview of misbehavior detection in VANETs. First, VANET characteristics, security issues, and attacks are discussed.  ...  VANET misbehavior detection indicates that the node should be monitored for their misbehavior because of the false information they share.  ... 
doi:10.1155/2022/4725805 fatcat:ip7mrsk5szbxpp26hgud6rkhv4

Inter-Vehicular Communication Towards Cooperative Driving (Dagstuhl Seminar 18202)

Onur Altintas, Suman Banerjee, Falko Dressler, Geert Heijenk, Michael Wagner
2018 Dagstuhl Reports  
In this growing community, many ongoing activities focus on the design of communication protocols to support safety applications, intelligent navigation, multi-player gaming and others.  ...  We were particularly interested in eSafety applications and traffic efficiency applications that are thought to yield substantial benefits for the emerging "cooperative automated driving" domain.  ...  For example, camera-based or LIDAR-based system provides raw input from which various contexts of a vehicle and its neighborhood can be extracted.  ... 
doi:10.4230/dagrep.8.5.31 dblp:journals/dagstuhl-reports/AltintasBDH18 fatcat:t6gely67oja4nic6wkroacxpci

Distributed Edge Computing with Blockchain Technology to Enable Ultra-Reliable Low-Latency V2X Communications

Andrei Vladyko, Vasiliy Elagin, Anastasia Spirkina, Ammar Muthanna, Abdelhamied A. Ateya
2022 Electronics  
The proposed work provides a formalized mathematical model of the system, taking into account the interconnection of objects and V2X information channels and an energy-efficient offloading algorithm to  ...  The main applications of the blockchain and MEC technology in the developed system are discussed.  ...  Ateya was funded by the Ministry of Higher Education of the Arab Republic of Egypt. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics11020173 fatcat:n7usa77ptzfozlc7u2w3y3ykba

Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts

Xiaohu You, Cheng-Xiang Wang, Jie Huang, Xiqi Gao, Zaichen Zhang, Mao Wang, Yongming Huang, Chuan Zhang, Yanxiang Jiang, Jiaheng Wang, Min Zhu, Bin Sheng (+38 others)
2020 Science China Information Sciences  
will enable a new range of smart applications with the aid of artificial intelligence (AI) and big data technologies.  ...  This article provides a comprehensive survey of recent advances and future trends in these four aspects.  ...  To view a copy of this licence, visit  ... 
doi:10.1007/s11432-020-2955-6 fatcat:bf4wxtlfsbg7noe5nshf3pz3qq

Towards Strengthening the Resilience of IoV Networks—A Trust Management Perspective

Yingxun Wang, Hushairi Zen, Mohamad Faizrizwan Mohd Sabri, Xiang Wang, Lee Chin Kho
2022 Future Internet  
IoV is a new concept in the Intelligent Traffic System (ITS) and an extended application of IoV in intelligent transportation.  ...  focuses on the existing trustworthiness management models along with their corresponding trust parameters, as well as the corresponding trust evaluation parameters and simulation, which provide the basis for  ...  The authors, therefore, acknowledge the UNIMAS and the Qilu Institute of Technology for generously sponsoring the research at hand.  ... 
doi:10.3390/fi14070202 fatcat:b6x5tau4jzhglo72hudg7thgce

A Survey of Trust Management in the Internet of Vehicles

Sarah Ali Siddiqui, Adnan Mahmood, Quan Z. Sheng, Hajime Suzuki, Wei Ni
2021 Electronics  
In the course of vehicles forming perceptions towards other participating vehicles, a range of contributing parameters regarding the interactions among these vehicles are accumulated to establish a final  ...  detection, etc.  ...  resistance, and quantification of the threshold defined for misbehavior detection.  ... 
doi:10.3390/electronics10182223 fatcat:jqghqqcdv5f4xgbc3mibc2riby

Convergence of Information-Centric Networks and Edge Intelligence for IoV: Challenges and Future Directions

Salahadin Seid Musa, Marco Zennaro, Mulugeta Libsie, Ermanno Pietrosemoli
2022 Future Internet  
ITS are smart enough to make decisions based on the status of a great variety of inputs.  ...  AI has recently emerged as a powerful tool to break through obstacles in various research areas including that of intelligent transport systems (ITS).  ...  Figure 6 . 6 CNN and example of object-detection application of autonomous vehicle in IoV (a) Typical CNN learning process. (b) Object detection in IoV context.  ... 
doi:10.3390/fi14070192 fatcat:knlyn5uaurarlhq7a5p66rwrgi

Context-Aware Misbehavior Detection Scheme for Vehicular Ad Hoc Networks using Sequential Analysis of the Temporal and Spatial Correlation of the Cooperative Awareness Messages [article]

Fuad A. Ghaleb
2019 arXiv   pre-print
However, sharing false mobility information can disrupt any potential VANET application. Misbehavior detection is an important security component.  ...  The performance of most VANET applications relies on the availability of accurate and recent mobility-information, shared by neighboring vehicles.  ...  Misbehavior Detection System (MDS) acts as a second wall of defense when the prevention mechanisms are broken to ensure the quality of the data that are shared by neighboring vehicles.  ... 
arXiv:1904.01392v1 fatcat:dqtd4mn6rvhjne7r3hx7mqruoy

Blockchain for Vehicular Internet of Things: Recent Advances and Open Issues

Chunrong Peng, Celimuge Wu, Liming Gao, Jiefang Zhang, Kok-Lim Alvin Alvin Yau, Yusheng Ji
2020 Sensors  
The vehicular Internet of Things (IoT) comprises enabling technologies for a large number of important applications including collaborative autonomous driving and advanced transportation systems.  ...  A decentralized system is also more resistant to the single point of failure problem and malicious attacks.  ...  intrusion detection systems for vehicular networks.  ... 
doi:10.3390/s20185079 pmid:32906707 pmcid:PMC7571114 fatcat:ukisc67roneg7kcqugsiblh6ca

A Summary of Security Techniques-Based Blockchain in IoV

Chen Chen, Shi Quan, Haowen Tan
2022 Security and Communication Networks  
Then, it summarizes the existing blockchain-based system framework of the Internet of Vehicles (BIoV) and then discusses the security solutions of blockchain-based vehicles from the aspects of authentication  ...  With the rapid development of the informatization and industrialization of the Internet of Vehicles (IoV), the number and application of connected vehicles are growing rapidly.  ...  [60] built a data sharing system composed of a two-layer blockchain based on a new content-centered vehicle Internet data sharing model-Vehicle Naming Data Network (VNDN), which has emerged in recent  ... 
doi:10.1155/2022/8689651 fatcat:7aerxlc7v5dgtbfjdp47v72ip4
« Previous Showing results 1 — 15 out of 51 results