Cyber security analysis of connected vehicles

MD Mwanje, O Kaiwartya, M Aljaidi… - IET Intelligent …, 2024‏ - Wiley Online Library
The sensor‐enabled in‐vehicle communication and infrastructure‐centric vehicle‐to‐
everything (V2X) communications have significantly contributed to the spark in the amount of …

VADGAN: An Unsupervised GAN Framework for Enhanced Anomaly Detection in Connected and Autonomous Vehicles

S Devika, RR Shrivastava, P Narang… - IEEE Transactions …, 2024‏ - ieeexplore.ieee.org
The utilization of Connected and Autonomous Vehicles (CAVs) is on the rise, driven by their
ability to provide vehicular services such as enhancing vehicle safety, aiding in intelligent …

Machine Learning-Based Detection of Data Replay and Data Replay Sybil Attacks for Vehicular Communication Networks

OM Moushi, C Gunawardena, F Ye… - ICC 2024-IEEE …, 2024‏ - ieeexplore.ieee.org
A vehicular network is susceptible to various security flaws and attacks. Cryptographic
techniques are used in vehicular networks but these alone cannot provide proper security to …

An early detection and prevention of wormhole attack using dynamic threshold value in VANET

PK Ravula, S Uppalapati… - International Journal of …, 2024‏ - inderscienceonline.com
In terms of applications and research, Vehicular Ad-hoc Networks (VANET) communication
is becoming more popular. Existing VANET communication protocols try to improve network …