Autonomous vehicles group’s security and safety improvement and assurance is a challenging research problem. In this paper, we describe our smart data-oriented security service, which is aimed at detecting malfunctioning or malicious agents based on the fusion of multi-agents Reputation, Trust and Data Quality (DQ) models for traffic control. To address the classical Reputation zero value challenge, we introduce the DQ evaluation service, which allows to use the vehicle’s objective characteristics to assign the initial Reputation value to a new agent when it is joining the group. To validate our approach, we conducted an empirical study on real intersection traffic with multiple vehicles. Multiple experiments were performed on our custom ph...
Reliable traffic message communication is one of the most essential goals for implementing secure ve...
Automobile accidents are one of the major causes of death in the Western world. In previous decades...
With changing times, the need for security increases in all fields, whether we talk about cloud netw...
The fast-evolving Intelligent Transportation Systems (ITS) are crucial in the 21st century, promisin...
Nowadays, Vehicle Ad - hoc Nets (VANET) applications have become very important in our lives because...
Anomaly detection is critical for intelligent vehicle (IV) collaboration. Forming clusters/platoons,...
Vehicular cyber-physical systems (VCPS), among several other applications, may help address an everi...
Recently the convergence of safety and security needs in automotive systems is one of the main chall...
High reliance on wireless network connectivity makes the vehicular ad hoc network (VANET) vulnerable...
Vehicle-to-everything (V2X) communication has raised security and safety concerns. A malicious attac...
Since the beginning of this decade, several incidents report that false data injection attacks targe...
Vehicular communication networks are evolving rapidly with the emergence of novel technologies and a...
Trustworthy communication in vehicular ad-hoc networks is essential to provide functional and reliab...
In vehicular networks, trustworthiness of exchanged messages is very important since a fake message ...
Real-time data about various traffic events and conditions—offences, accidents, dangerous driving, o...
Reliable traffic message communication is one of the most essential goals for implementing secure ve...
Automobile accidents are one of the major causes of death in the Western world. In previous decades...
With changing times, the need for security increases in all fields, whether we talk about cloud netw...
The fast-evolving Intelligent Transportation Systems (ITS) are crucial in the 21st century, promisin...
Nowadays, Vehicle Ad - hoc Nets (VANET) applications have become very important in our lives because...
Anomaly detection is critical for intelligent vehicle (IV) collaboration. Forming clusters/platoons,...
Vehicular cyber-physical systems (VCPS), among several other applications, may help address an everi...
Recently the convergence of safety and security needs in automotive systems is one of the main chall...
High reliance on wireless network connectivity makes the vehicular ad hoc network (VANET) vulnerable...
Vehicle-to-everything (V2X) communication has raised security and safety concerns. A malicious attac...
Since the beginning of this decade, several incidents report that false data injection attacks targe...
Vehicular communication networks are evolving rapidly with the emergence of novel technologies and a...
Trustworthy communication in vehicular ad-hoc networks is essential to provide functional and reliab...
In vehicular networks, trustworthiness of exchanged messages is very important since a fake message ...
Real-time data about various traffic events and conditions—offences, accidents, dangerous driving, o...
Reliable traffic message communication is one of the most essential goals for implementing secure ve...
Automobile accidents are one of the major causes of death in the Western world. In previous decades...
With changing times, the need for security increases in all fields, whether we talk about cloud netw...