Towards zero trust security in connected vehicles: A comprehensive survey

M Annabi, A Zeroual, N Messai - Computers & Security, 2024 - Elsevier
Zero Trust is the new cybersecurity model that challenges the traditional one by promoting
continuous verification of users, devices, and applications, whatever their position or origin …

A context-aware zero trust-based hybrid approach to IoT-based self-driving vehicles security

IA Khan, M Keshk, Y Hussain, D Pi, B Li, T Kousar… - Ad Hoc Networks, 2025 - Elsevier
With the speedy progression and adoption of IoT devices in modern self-driving vehicles
(SDVs), autonomous driving industry is gradually reforming its capabilities to provide better …

Adaptive Policy Learning for Connected Autonomous Vehicles Defending Malicious Access Requests by Graph Reinforcement Learning

Q Xu, L Zhang, Y Liu - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Access requests are used in cooperative tasks among connected and automated vehicles
(CAVs). Authorization decisions are determined by dynamic trust values in trust value-based …

Cybersecurity in Transportation Systems: Policies and Technology Directions

O Thomas, MS Salek, JM Tine, M Rahman… - arxiv preprint arxiv …, 2025 - arxiv.org
The transportation industry is experiencing vast digitalization as a plethora of technologies
are being implemented to improve efficiency, functionality, and safety. Although …

Fast and Post-Quantum Authentication for Real-time Next Generation Networks with Bloom Filter

K Sedghighadikolaei, AA Yavuz - 2024 IEEE 6th International …, 2024 - ieeexplore.ieee.org
Large-scale next-generation networked systems like smart grids and vehicular networks
facilitate extensive automation and autonomy through real-time communication of sensitive …

A Zero-Trust Approach for Cooperative Vehicular Networks: A Motorway Use Case

B Dawson, HT Malazi, A Kazmi… - IEEE Systems, Man …, 2025 - ieeexplore.ieee.org
Cooperative vehicular networks, integral to intelligent transportation systems, face
vulnerabilities from threat vectors that intentionally mislead information to jeopardize safety …

AI-Driven Zero Trust Architecture: Enhancing Cyber-Security Resilience

K Chokkanathan, SM Karpagavalli… - 2024 8th …, 2024 - ieeexplore.ieee.org
In the ever-changing field of cybersecurity, conventional defenses that rely on boundaries
are no longer adequate to safeguard against sophisticated and persistent assaults. The Zero …

Towards Deployment of a Zero-Trust Architecture (ZTA) for Automated Vehicles (AV)

V Murray, S Lathrop, D Mikulski - 2024 - sae.org
ABSTRACT Automated Vehicles (A) V development historically placed a significant focus on
functionality and less on security. Programs such as Cybersecurity for Robotics and …

Exponential Cluster Synchronization in Fast Switching Network Topologies: A Pinning Control Approach with Necessary and Sufficient Conditions

K Du, Y Kang - arxiv preprint arxiv:2402.11492, 2024 - arxiv.org
This research investigates the intricate domain of synchronization problem among multiple
agents operating within a dynamic fast switching network topology. We concentrate on …

The Research and Application of Zero Trust: A Review

Q Meng, J Fei, B Lu, X Wang, W Wu, Z Zhang… - Available at SSRN … - papers.ssrn.com
With the emergence of new technologies such as cloud computing, mobile internet, the
Internet of Things, and 5G, the internet ecosystem has undergone significant changes. The …