A comprehensive survey of v2x cybersecurity mechanisms and future research paths

R Sedar, C Kalalas, F Vázquez-Gallego… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
Recent advancements in vehicle-to-everything (V2X) communication have notably improved
existing transport systems by enabling increased connectivity and driving autonomy levels …

Probabilistic data structures in smart city: Survey, applications, challenges, and research directions

M Kumar, A Singh - Journal of Ambient Intelligence and …, 2022 - journals.sagepub.com
With the commencement of new technologies like IoT and the Cloud, the sources of data
generation have increased exponentially. The use and processing of this generated data …

Multi-domain denial-of-service attacks in internet-of-vehicles: Vulnerability insights and detection performance

R Sedar, C Kalalas, J Alonso-Zarate… - 2022 IEEE 8th …, 2022 - ieeexplore.ieee.org
The transformative Internet-of-Vehicles (IoV) paradigm comes inadvertently with challenges
which involve security vulnerabilities and privacy breaches. In this context, denial-of-service …

An IEEE Xplore Database Literature Review Concerning Internet of Everything During 2020-2021

F Alqasemi, S Al-Hagree, RQ Shaddad… - … , System and Service …, 2021 - ieeexplore.ieee.org
For communication and computing sciences researchers, the Internet of Everything (IoE) is
one of the most attractive topics. It is the field that represents the interconnection between …

Intelligent integrated cross-layer authentication for efficient mutual verification in udn with guaranteed security-of-service

H Fang, X Wang, W Zhu - 2022 IEEE Future Networks World …, 2022 - ieeexplore.ieee.org
While conventional cryptographic authentication methods suffer from high computation
overhead and long latency in ultra-dense networks (UDNs), physical (PHY) layer …

[PDF][PDF] INtelligent Security and PervasIve tRust for 5G and Beyond

P Porambage, Y Siriwardana, R Sedar… - INSPIRE-5Gplus …, 2019 - inspire-5gplus.eu
This report describes the work done in the WP3 within the Task 3.3 “Exploration of additional
AI techniques and solutions”. This task aims to explore the use of AI/ML driven security for …

Misbehaviour detection and trustworthy collaboration in vehicular communication networks

MRM Sedar - 2024 - upcommons.upc.edu
(English) The integration of advanced wireless technologies, eg, cellular and IEEE 802.11 p,
in modern vehicles enables vehicle-to-everything (V2X) communication, fostering the next …

基于脉冲电流注入的差分芯片敏感度研究

董亚运, 崔志同, 杜传报, 程引会, 聂鑫… - Journal of terahertz …, 2023 - opticsjournal.net
摘要采用脉冲电流注入(PCI) 技术, 对差分信号接收芯片(DS26C32ATM) 的敏感阈值进行研究.
试验结果表明, 随着脉冲源电压的增大, 传输线上的注入电流增大, 差分信号接收芯片接口电路 …

[PDF][PDF] SUCCESS-6G: DEVISE

R Sedar, C Kalalas, P Mulinka, F Paredes, M Fornell - success-6g-project.cttc.es
This deliverable provides an assessment of the security landscape in vehicle-to-everything
(V2X) systems. A classification of V2X attacks is first performed according to key security and …

[PDF][PDF] WP4 Deliverable 4.3 a Report on Heterogeneous Big Data Aggregation I

JM de Souza Sant'Ana, E Eldeeb, H Alves, C Kalalas… - fireman-project.eu
The objective of Deliverable 4.3 a is to present the results of the points presented in
Deliverable 4.1 (D4. 1) related to heterogeneous data aggregation of FIREMAN task 4.1 …