LEChain: A blockchain-based lawful evidence management scheme for digital forensics

M Li, C Lal, M Conti, D Hu - Future Generation Computer Systems, 2021 - Elsevier
Lawful evidence management in digital forensics is of paramount importance in police
investigations because such evidence is used to convict suspects of crimes. Existing studies …

Distributed intelligence in the internet of things: Challenges and opportunities

T Alsboui, Y Qin, R Hill, H Al-Aqrabi - SN Computer Science, 2021 - Springer
Widespread adoption of smart IoT devices is accelerating research for new techniques to
make IoT applications secure, scalable, energy-efficient, and capable of working in mission …

Security considerations for Internet of Things: A survey

A Jurcut, T Niculcea, P Ranaweera, NA Le-Khac - SN Computer Science, 2020 - Springer
Interconnecting “things” and devices that takes the form of wearables, sensors, actuators,
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …

Roadmap for cybersecurity in autonomous vehicles

VK Kukkala, SV Thiruloga… - IEEE Consumer …, 2022 - ieeexplore.ieee.org
Autonomous vehicles are on the horizon and will be transforming transportation safety and
comfort. These vehicles will be connected to various external systems and utilize advanced …

Cybersecurity attacks in vehicular sensors

Z El-Rewini, K Sadatsharan, N Sugunaraj… - IEEE Sensors …, 2020 - ieeexplore.ieee.org
Today's modern vehicles contain anywhere from sixty to one-hundred sensors and exhibit
the characteristics of Cyber-Physical-Systems (CPS). There is a high degree of coupling …

CAN bus intrusion detection based on auxiliary classifier GAN and out-of-distribution detection

Q Zhao, M Chen, Z Gu, S Luan, H Zeng… - ACM Transactions on …, 2022 - dl.acm.org
The Controller Area Network (CAN) is a ubiquitous bus protocol present in the
Electrical/Electronic (E/E) systems of almost all vehicles. It is vulnerable to a range of attacks …

A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols

A Lotto, F Marchiori, A Brighente, M Conti - arxiv preprint arxiv …, 2024 - arxiv.org
The large number of Electronic Control Units (ECUs) mounted on modern cars and their
expansive communication capabilities create a substantial attack surface for potential …

Analyzing the efficiency of machine learning classifiers in hardware-based malware detectors

AP Kuruvila, S Kundu, K Basu - 2020 IEEE Computer Society …, 2020 - ieeexplore.ieee.org
The emergence of promising Internet-of-things (IoT) empowered Consumer Electronic
devices resulted in their exhaustive proliferation across several safety-critical architectures …

DRAM-based authentication using deep convolutional neural networks

M Yue, N Karimian, W Yan… - IEEE Consumer …, 2020 - ieeexplore.ieee.org
Authentication is the act of proving that an integrated circuit (IC) is not counterfeit. One
application of a physical unclonable function (PUF) circuit is to authenticate the identity of …

Review of attacks on connected and autonomous vehicles (CAV) and their existing solutions

N Yadav, SA Ansar… - 2022 10th International …, 2022 - ieeexplore.ieee.org
Connected and automated vehicles (CAV) have proven to be a boon in recent years since it
is a probable method to reduce traffic congestion, emissions, and accidents. In recent …