Autonomous vehicles security: Challenges and solutions using blockchain and artificial intelligence
The arrival of autonomous vehicles (AVs) promises many great benefits, including increased
safety and reduced energy consumption, pollution, and congestion. However, these engines …
safety and reduced energy consumption, pollution, and congestion. However, these engines …
Autonomous vehicles: Sophisticated attacks, safety issues, challenges, open topics, blockchain, and future directions
A Giannaros, A Karras, L Theodorakopoulos… - … of Cybersecurity and …, 2023 - mdpi.com
Autonomous vehicles (AVs), defined as vehicles capable of navigation and decision-making
independent of human intervention, represent a revolutionary advancement in transportation …
independent of human intervention, represent a revolutionary advancement in transportation …
A blockchain based secure IoT system using device identity management
Sharing data securely and efficiently has been identified as an issue in IoT-based smart
systems such as smart cities, smart agriculture, smart health, etc. A large number of IoT …
systems such as smart cities, smart agriculture, smart health, etc. A large number of IoT …
ForensicTransMonitor: A Comprehensive Blockchain Approach to Reinvent Digital Forensics and Evidence Management
SS Alqahtany, TA Syed - Information, 2024 - mdpi.com
In the domain of computer forensics, ensuring the integrity of operations like preservation,
acquisition, analysis, and documentation is critical. Discrepancies in these processes can …
acquisition, analysis, and documentation is critical. Discrepancies in these processes can …
User-defined privacy-preserving traffic monitoring against n-by-1 jamming attack
Traffic monitoring services collect traffic reports and respond to users' traffic queries.
However, the reports and queries may reveal the user's identity and location. Although …
However, the reports and queries may reveal the user's identity and location. Although …
Systematic review: Comparing zk‐SNARK, zk‐STARK, and bulletproof protocols for privacy‐preserving authentication
This systematic literature review examines the implementation and analysis of zk‐SNARK,
zk‐STARK, and bulletproof non‐interactive zero‐knowledge proof (NIZKP) protocols in …
zk‐STARK, and bulletproof non‐interactive zero‐knowledge proof (NIZKP) protocols in …
Decentralized and privacy-preserving smart parking with secure repetition and full verifiability
Smart Parking Services (SPSs) enable cruising drivers to find the nearest parking lot with
available spots, reducing the traveling time, gas, and traffic congestion. However, drivers risk …
available spots, reducing the traveling time, gas, and traffic congestion. However, drivers risk …
Astraea: Anonymous and secure auditing based on private smart contracts for donation systems
Many regions are in urgent need of facial masks for slowing down the spread of COVID-19.
To fight the pandemic, people are contributing masks through donation systems. Most …
To fight the pandemic, people are contributing masks through donation systems. Most …
Nereus: Anonymous and secure ride-hailing service based on private smart contracts
Security and privacy issues have become a major hindrance to the broad adoption of Ride-
Hailing Services (RHSs). In this article, we introduce a new collusion attack initiated by the …
Hailing Services (RHSs). In this article, we introduce a new collusion attack initiated by the …
Potential future directions in optimization of students' performance prediction system
Previous studies widely report the optimization of performance predictions to highlight at‐
risk students and advance the achievement of excellent students. They also have …
risk students and advance the achievement of excellent students. They also have …