Autonomous vehicles security: Challenges and solutions using blockchain and artificial intelligence

G Bendiab, A Hameurlaine, G Germanos… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The arrival of autonomous vehicles (AVs) promises many great benefits, including increased
safety and reduced energy consumption, pollution, and congestion. However, these engines …

Autonomous vehicles: Sophisticated attacks, safety issues, challenges, open topics, blockchain, and future directions

A Giannaros, A Karras, L Theodorakopoulos… - … of Cybersecurity and …, 2023 - mdpi.com
Autonomous vehicles (AVs), defined as vehicles capable of navigation and decision-making
independent of human intervention, represent a revolutionary advancement in transportation …

A blockchain based secure IoT system using device identity management

F Sabrina, N Li, S Sohail - Sensors, 2022 - mdpi.com
Sharing data securely and efficiently has been identified as an issue in IoT-based smart
systems such as smart cities, smart agriculture, smart health, etc. A large number of IoT …

ForensicTransMonitor: A Comprehensive Blockchain Approach to Reinvent Digital Forensics and Evidence Management

SS Alqahtany, TA Syed - Information, 2024 - mdpi.com
In the domain of computer forensics, ensuring the integrity of operations like preservation,
acquisition, analysis, and documentation is critical. Discrepancies in these processes can …

User-defined privacy-preserving traffic monitoring against n-by-1 jamming attack

M Li, L Zhu, Z Zhang, C Lal, M Conti… - … /ACM Transactions on …, 2022 - ieeexplore.ieee.org
Traffic monitoring services collect traffic reports and respond to users' traffic queries.
However, the reports and queries may reveal the user's identity and location. Although …

Systematic review: Comparing zk‐SNARK, zk‐STARK, and bulletproof protocols for privacy‐preserving authentication

B Oude Roelink, M El‐Hajj, D Sarmah - Security and Privacy, 2024 - Wiley Online Library
This systematic literature review examines the implementation and analysis of zk‐SNARK,
zk‐STARK, and bulletproof non‐interactive zero‐knowledge proof (NIZKP) protocols in …

Decentralized and privacy-preserving smart parking with secure repetition and full verifiability

M Li, M Zhang, L Zhu, Z Zhang, M Conti… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Smart Parking Services (SPSs) enable cruising drivers to find the nearest parking lot with
available spots, reducing the traveling time, gas, and traffic congestion. However, drivers risk …

Astraea: Anonymous and secure auditing based on private smart contracts for donation systems

M Li, Y Chen, L Zhu, Z Zhang, J Ni… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Many regions are in urgent need of facial masks for slowing down the spread of COVID-19.
To fight the pandemic, people are contributing masks through donation systems. Most …

Nereus: Anonymous and secure ride-hailing service based on private smart contracts

M Li, Y Chen, C Lal, M Conti… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Security and privacy issues have become a major hindrance to the broad adoption of Ride-
Hailing Services (RHSs). In this article, we introduce a new collusion attack initiated by the …

Potential future directions in optimization of students' performance prediction system

S Ahmad, MA El-Affendi, MS Anwar… - Computational …, 2022 - Wiley Online Library
Previous studies widely report the optimization of performance predictions to highlight at‐
risk students and advance the achievement of excellent students. They also have …