{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:23:16Z","timestamp":1776442996315,"version":"3.51.2"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00226-1","type":"journal-article","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T13:08:12Z","timestamp":1761570492000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Improving security in 5G vehicular networks using ASCON and machine learning based NIDS"],"prefix":"10.1007","volume":"5","author":[{"given":"A. J.","family":"Bhuvaneshwari","sequence":"first","affiliation":[]},{"given":"P.","family":"Kaythry","sequence":"additional","affiliation":[]},{"given":"Nivetha","family":"Elango","sequence":"additional","affiliation":[]},{"given":"Rahul","family":"Ramu","sequence":"additional","affiliation":[]},{"given":"S. Sai","family":"Eshwar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"issue":"19","key":"226_CR1","doi-asserted-by":"publisher","first-page":"8015","DOI":"10.3390\/s23198015","volume":"23","author":"H Allioui","year":"2023","unstructured":"Allioui H, Mourdi Y. Exploring the full potentials of IoT for better financial growth and stability: A comprehensive survey. Sensors. 2023;23(19):8015. https:\/\/doi.org\/10.3390\/s23198015.","journal-title":"Sensors"},{"key":"226_CR2","doi-asserted-by":"publisher","first-page":"47doi","DOI":"10.17705\/1CAIS.04725","volume":"47","author":"A Baiyere","year":"2020","unstructured":"Baiyere A, Topi H, Venkatesh V, Donnellan B. The internet of things (IoT): A research agenda for information systems. Commun Association Inform Syst. 2020;47:47. https:\/\/doi.org\/10.17705\/1CAIS.04725.","journal-title":"Commun Association Inform Syst"},{"issue":"1","key":"226_CR3","doi-asserted-by":"publisher","first-page":"22","DOI":"10.21272\/bel.5(1).22-30.2021","volume":"5","author":"M Moradi","year":"2021","unstructured":"Moradi M. Importance of internet of things (IoT) in marketing research and its ethical and data privacy challenges. Bus Ethics Leadersh. 2021;5(1):22\u201330. https:\/\/doi.org\/10.21272\/bel.5(1).22-30.2021.","journal-title":"Bus Ethics Leadersh"},{"key":"226_CR4","doi-asserted-by":"publisher","unstructured":"Syed A, Shah D, Sierra-Sosa A, Kumar, Adel Elmaghraby. IoT in smart cities: A survey of Technologies, practices and challenges smart cities 2021;4(2):429\u201375. https:\/\/doi.org\/10.3390\/smartcities4020024","DOI":"10.3390\/smartcities4020024"},{"issue":"1","key":"226_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1049\/iet-net.2017.0163","volume":"7","author":"B Hammi","year":"2017","unstructured":"Hammi B, Khatoun R, Zeadally S, Fayad A, Khoukhi L. IoT technologies for smart cities. IET Networks. 2017;7(1):1\u201313. https:\/\/doi.org\/10.1049\/iet-net.2017.0163.","journal-title":"IET Networks"},{"issue":"2","key":"226_CR6","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MNET.2019.8675165","volume":"33","author":"Y Qian","year":"2019","unstructured":"Qian Y, Wu D, Bao W, Lorenz P. The internet of things for smart cities: technologies and Applications, in IEEE network. March\/April. 2019;33(2):4\u20135. https:\/\/doi.org\/10.1109\/MNET.2019.8675165.","journal-title":"March\/April"},{"key":"226_CR7","doi-asserted-by":"publisher","unstructured":"Humayun M, Alsaqer MS, Jhanjhi N. Energy optimization for smart cities using IoT. Appl Artif Intell. 2022;36(1). https:\/\/doi.org\/10.1080\/08839514.2022.2037255.","DOI":"10.1080\/08839514.2022.2037255"},{"key":"226_CR8","doi-asserted-by":"publisher","unstructured":"Belli L, Cilfone A, Davoli L, Ferrari G, Adorni P, Nocera FD, Dall\u2019Olio A, Pellegrini C, Mordacci M, and Enzo Bertolotti. IoT-Enabled smart sustainable cities: challengesapproaches smart cities 2020;3(3):1039\u201371. https:\/\/doi.org\/10.3390\/smartcities3030052","DOI":"10.3390\/smartcities3030052"},{"key":"226_CR9","doi-asserted-by":"publisher","unstructured":"Ang L-M, Seng KP, Ijemaru GK, Zungeru AM. Deployment of IoV for Smart Cities: Applications, Architecture, and Challenges, in IEEE Access, 2019;vol. 7, pp. 6473\u20136492. https:\/\/doi.org\/10.1109\/ACCESS.2018.2887076","DOI":"10.1109\/ACCESS.2018.2887076"},{"key":"226_CR10","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/s12243-021-00891-7","volume":"76","author":"L Khoukhi","year":"2021","unstructured":"Khoukhi L, Xiong H, Kumari S, et al. The internet of vehicles and smart cities. Ann Telecommun. 2021;76:545\u20136. https:\/\/doi.org\/10.1007\/s12243-021-00891-7.","journal-title":"Ann Telecommun"},{"key":"226_CR11","doi-asserted-by":"publisher","unstructured":"Duan W, Gu J, Wen M, Zhang G, Ji Y, Mumtaz S. Emerging Technologies for 5G-IoV Networks: Applications, Trends and Opportunities, in IEEE Network, 2020;vol. 34, no. 5, pp. 283\u2013289.https:\/\/doi.org\/10.1109\/MNET.001.1900659","DOI":"10.1109\/MNET.001.1900659"},{"key":"226_CR12","doi-asserted-by":"publisher","unstructured":"Marieh Talebkhah A, Sali V, Khodamoradi T, Khodadadi M, Gordan. Task offloading for edge-IoV networks in the industry 4.0 era and beyond: A high-level view. Eng Sci Technol Int J, 2024;54,101699, https:\/\/doi.org\/10.1016\/j.jestch.2024.101699","DOI":"10.1016\/j.jestch.2024.101699"},{"key":"226_CR13","doi-asserted-by":"publisher","unstructured":"Ji B et al. A Vision of IoV in 5G HetNets: Architecture, Key Technologies, Applications, Challenges, and Trends, in IEEE Network, 2022;vol. 36, no. 2, pp. 153\u2013161https:\/\/doi.org\/10.1109\/MNET.012.2000527","DOI":"10.1109\/MNET.012.2000527"},{"key":"226_CR14","doi-asserted-by":"publisher","unstructured":"Kombate D, Wanglina. The Internet of Vehicles Based on 5G Communications, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Chengdu, China, 2016; pp. 445\u2013448. https:\/\/doi.org\/10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.105","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.105"},{"key":"226_CR15","doi-asserted-by":"publisher","unstructured":"Malik RQ, Ramli KN, Kareem ZH, Habelalmatee MI, Abbas AH, Alamoody A. An Overview on V2P Communication System: Architecture and Application, 2020 3rd International Conference on Engineering Technology and its Applications (IICETA), Najaf, Iraq, 2020; pp. 174\u2013178. https:\/\/doi.org\/10.1109\/IICETA50496.2020.9318863","DOI":"10.1109\/IICETA50496.2020.9318863"},{"key":"226_CR16","doi-asserted-by":"publisher","unstructured":"Liu N, Liu M, Cao J, Chen G, Lou W. When Transportation Meets Communication: V2P over VANETs, 2010 IEEE 30th International Conference on Distributed Computing Systems, Genoa, Italy, 2010; pp. 567\u2013576. https:\/\/doi.org\/10.1109\/ICDCS.2010.83","DOI":"10.1109\/ICDCS.2010.83"},{"key":"226_CR17","doi-asserted-by":"publisher","unstructured":"He W, Overview of V2V and V2I Wireless Communication for Cooperative Vehicle Infrastructure Systems,. 2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chengdu, China, 2019; pp. 127\u2013134. https:\/\/doi.org\/10.1109\/IAEAC47372.2019.8997786","DOI":"10.1109\/IAEAC47372.2019.8997786"},{"key":"226_CR18","doi-asserted-by":"publisher","unstructured":"Zhou H, Xu W, Chen J, Wang W. Evolutionary V2X Technologies Toward the Internet of Vehicles: Challenges and Opportunities, in Proceedings of the IEEE, 2020;vol. 108, no. 2, pp. 308\u2013323. https:\/\/doi.org\/10.1109\/JPROC.2019.2961937","DOI":"10.1109\/JPROC.2019.2961937"},{"key":"226_CR19","doi-asserted-by":"publisher","unstructured":"Fadhil JA, Sarhan QI. Internet of Vehicles (IoV): A Survey of Challenges and Solutions, 2020 21st International Arab Conference on Information Technology (ACIT), Giza, Egypt, 2020; pp. 1\u201310. https:\/\/doi.org\/10.1109\/ACIT50332.2020.9300095","DOI":"10.1109\/ACIT50332.2020.9300095"},{"key":"226_CR20","doi-asserted-by":"publisher","unstructured":"Hammoud A, Sami H, Mourad A, Otrok H, Mizouni R, Bentahar J. AI, Blockchain, and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions, in IEEE Internet of Things Magazine, 2020;vol. 3, no. 2, pp. 68\u201373. https:\/\/doi.org\/10.1109\/IOTM.0001.1900109","DOI":"10.1109\/IOTM.0001.1900109"},{"key":"226_CR21","unstructured":"Osazuwa OMC. Confidentiality, Integrity, and Availability in Network Systems: A Review of Related Literature, International Journal of Innovative Science and Research Technology 2023;8(12):1946."},{"key":"226_CR22","doi-asserted-by":"publisher","unstructured":"Alalwany E. and Imad Mahgoub. Security and trust management in the internet of vehicles (IoV): challenges and machine learning solutions sensors 2024;24,(2):368. https:\/\/doi.org\/10.3390\/s24020368","DOI":"10.3390\/s24020368"},{"issue":"5","key":"226_CR23","doi-asserted-by":"publisher","first-page":"5409","DOI":"10.11591\/ijece.v10i5.pp5409-5419","volume":"10","author":"T Garg","year":"2020","unstructured":"Garg T, Kagalwalla N, Churi P, Pawar A, Deshmukh S. A survey on security and privacy issues in IoV. Int J Electr Comput Eng (IJECE). 2020;10(5):5409\u201319. https:\/\/doi.org\/10.11591\/ijece.v10i5.pp5409-5419.","journal-title":"Int J Electr Comput Eng (IJECE)"},{"key":"226_CR24","doi-asserted-by":"publisher","unstructured":"Bhuvaneshwari AJ, Kaythry P. Enhanced Visual Cryptosystem Using BLAKE2 Hash Algorithm. In 2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT). IEEE. 2023; pp. 73\u201378. https:\/\/doi.org\/10.56042\/jsir.v82i12.1702","DOI":"10.56042\/jsir.v82i12.1702"},{"key":"226_CR25","doi-asserted-by":"publisher","unstructured":"Aljunaid M, Syed A. & Mohd Warip, Mohd Nazri Bin & Ku Azir, Ku Nurul Fazira & Romli, Nurul. Classification of Security Attacks in VANET: A Review of Requirements and Perspectives. MATEC Web of Conferences. 2018;150:06038. https:\/\/doi.org\/10.1051\/matecconf\/201815006038","DOI":"10.1051\/matecconf\/201815006038"},{"issue":"12","key":"226_CR26","doi-asserted-by":"publisher","first-page":"1316","DOI":"10.56042\/jsir.v82i12.1702","volume":"82","author":"AJ Bhuvaneshwari","year":"2023","unstructured":"Bhuvaneshwari AJ, Kaythry P. A review of deep Learning strategies for enhancing cybersecurity in networks: deep learning strategies for enhancing cybersecurity. J Sci Industrial Res (JSIR). 2023;82(12):1316\u201330. https:\/\/doi.org\/10.56042\/jsir.v82i12.1702.","journal-title":"J Sci Industrial Res (JSIR)"},{"key":"226_CR27","doi-asserted-by":"publisher","unstructured":"Al-kahtani MS. Survey on security attacks in Vehicular Ad hoc Networks (VANETs), 2012 6th International Conference on Signal Processing and Communication Systems, Gold Coast, QLD, Australia, 2012; pp. 1\u20139. https:\/\/doi.org\/10.1109\/ICSPCS.2012.6507953","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"226_CR28","doi-asserted-by":"publisher","unstructured":"Verma A, Saha R, Kumar G, Tai-hoon Kim. The security perspectives of vehicular networks: A taxonomical analysis of attacks and solutions Applied Sciences 2021;11(10):4682. https:\/\/doi.org\/10.3390\/app11104682","DOI":"10.3390\/app11104682"},{"issue":"1","key":"226_CR29","doi-asserted-by":"publisher","first-page":"45","DOI":"10.33851\/JMIS.2020.7.1.45","volume":"7","author":"A Quyoom","year":"2020","unstructured":"Quyoom A, Mir AA, Sarwar DA. Security attacks and challenges of vanets: A literature survey. J Multimed Inf Syst. 2020;7(1):45\u201354. https:\/\/doi.org\/10.33851\/JMIS.2020.7.1.45.","journal-title":"J Multimed Inf Syst"},{"key":"226_CR30","doi-asserted-by":"publisher","unstructured":"Devi R, Technologies N. Importance of Cryptography in Network Security, Gwalior, India, 2013; pp. 462\u2013467. https:\/\/doi.org\/10.1109\/CSNT.2013.102","DOI":"10.1109\/CSNT.2013.102"},{"issue":"1","key":"226_CR31","first-page":"01","volume":"13","author":"S Naeem","year":"2023","unstructured":"Naeem S. Network security and cryptography challenges and trends on recent technologies. J Appl Emerg Sci. 2023;13(1):01\u20138.","journal-title":"J Appl Emerg Sci"},{"issue":"3","key":"226_CR32","doi-asserted-by":"publisher","first-page":"3110","DOI":"10.37896\/JXAT12.03\/262","volume":"12","author":"RB Marqas","year":"2020","unstructured":"Marqas RB, Saman M, Almufti, Rasheed Rebar I. Comparing symmetric and asymmetric cryptography in message encryption and decryption by using AES and RSA algorithms. Xi\u2019an Jianzhu Keji Daxue Xuebao\/Journal Xi\u2019an Univ Archit Technol. 2020;12(3):3110\u20136. https:\/\/doi.org\/10.37896\/JXAT12.03\/262.","journal-title":"Xi\u2019an Jianzhu Keji Daxue Xuebao\/Journal Xi\u2019an Univ Archit Technol"},{"issue":"5","key":"226_CR33","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCOM.2002.1006971","volume":"40","author":"ME Hellman","year":"2002","unstructured":"Hellman ME. An overview of public key cryptography. IEEE Commun Mag. 2002;40(5):42\u20139.","journal-title":"IEEE Commun Mag"},{"key":"226_CR34","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1007\/s11277-020-07134-3","volume":"112","author":"SS Dhanda","year":"2020","unstructured":"Dhanda SS, Singh B, Jindal P, Lightweight Cryptography. A solution to secure IoT. Wirel Pers Commun. 2020;112:1947\u201380. https:\/\/doi.org\/10.1007\/s11277-020-07134-3.","journal-title":"Wirel Pers Commun"},{"key":"226_CR35","doi-asserted-by":"publisher","unstructured":"Thakor VA, Razzaque MA, Khandaker MRA. Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities, in IEEE Access, 2021;vol. 9, pp. 28177\u201328193. https:\/\/doi.org\/10.1109\/ACCESS.2021.3052867","DOI":"10.1109\/ACCESS.2021.3052867"},{"key":"226_CR36","doi-asserted-by":"publisher","unstructured":"Hasan ESAMK, Hassan R, Saeed RA, Hassan MB, Islam S, Nafi NS, Bevinakoppa S. Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications, Security and Communication Networks, 2021;vol. 2021, Article ID 8868355. https:\/\/doi.org\/10.1155\/2021\/8868355","DOI":"10.1155\/2021\/8868355"},{"key":"226_CR37","doi-asserted-by":"publisher","unstructured":"Reddy KR, Muralidhar A. Machine Learning-Based Road Safety Prediction Strategies for Internet of Vehicles (IoV) Enabled Vehicles: A Systematic Literature Review, in IEEE Access, 2023;vol. 11, pp. 112108\u2013112122. https:\/\/doi.org\/10.1109\/ACCESS.2023.3315852","DOI":"10.1109\/ACCESS.2023.3315852"},{"key":"226_CR38","doi-asserted-by":"publisher","unstructured":"Kong X, et al. Spatial-Temporal-Cost combination based taxi driving fraud detection for collaborative internet of vehicles. IEEE Trans Industr Inf. 2022;18(5):3426\u201336. https:\/\/doi.org\/10.1109\/TII.2021.3111536.","DOI":"10.1109\/TII.2021.3111536"},{"issue":"6","key":"226_CR39","doi-asserted-by":"publisher","first-page":"4280","DOI":"10.1109\/JIOT.2021.3103829","volume":"9","author":"G Abdelmoumin","year":"2022","unstructured":"Abdelmoumin G, Rawat DB, Rahman A. On the performance of machine learning models for Anomaly-Based intelligent intrusion detection systems for the internet of things. IEEE Internet Things J. 2022;9(6):4280\u201390. https:\/\/doi.org\/10.1109\/JIOT.2021.3103829.","journal-title":"IEEE Internet Things J"},{"key":"226_CR40","doi-asserted-by":"publisher","unstructured":"Mag\u00e1n-Carri\u00f3n. Roberto, Daniel Urda, Ignacio D\u00edaz-Cano, and Bernab\u00e9 Dorronsoro. Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches Applied Sciences 2020;10(5): 1775. https:\/\/doi.org\/10.3390\/app10051775","DOI":"10.3390\/app10051775"},{"key":"226_CR41","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-96-3094-3_10","volume-title":"Biology and sustainable development Goals. Mathematics for sustainable developments","author":"A Morchid","year":"2025","unstructured":"Morchid A, Et-taibi B, El Alami R, Abid MR, Boufounas EM. Internet of things (IoT)-Based sustainable agriculture: A smart irrigation system using embedded system and websockets. In: Elsadany AA, Adel W, Sabbar Y, editors. Biology and sustainable development Goals. Mathematics for sustainable developments. Singapore: Springer; 2025. https:\/\/doi.org\/10.1007\/978-981-96-3094-3_10."},{"key":"226_CR42","doi-asserted-by":"crossref","unstructured":"Morchid A, Ismail A, Khalid HM, Qjidaa H, and Rachid El Alami. BlockchainIoT technologies in smart farming to enhance the efficiency of the Agri-Food supply chain: A review of Applications, Benefits,Challenges. Internet Things 2025; 101733.","DOI":"10.1016\/j.iot.2025.101733"},{"key":"226_CR43","doi-asserted-by":"publisher","unstructured":"Morchid R, Jebabra RE, Alami M, Charqi, Boukili B. Smart Agriculture for Sustainability: The Implementation of Smart Irrigation Using Real-Time Embedded System Technology, 2024 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET), FEZ, Morocco, 2024; pp. 1\u20136. https:\/\/doi.org\/10.1109\/IRASET60544.2024.10548972","DOI":"10.1109\/IRASET60544.2024.10548972"},{"key":"226_CR44","doi-asserted-by":"crossref","unstructured":"Morchid A, Said Z, Almoataz Y, Abdelaziz P, Siano. and Hassan Qjidaa. Fuzzy Logic-Based IoT System for Optimizing Irrigation with Cloud Computing: Enhancing Water Sustainability in Smart Agriculture. Smart Agricultural Technology 2025; 100979.","DOI":"10.1016\/j.atech.2025.100979"},{"key":"226_CR45","doi-asserted-by":"publisher","unstructured":"Lilhore UK, Simaiya S, Dalal S, et al. Secure WSN architecture utilizing hybrid encryption with DKM to ensure consistent IoV communication. Wirel Personal Communication. 2024;1\u201329. https:\/\/doi.org\/10.1007\/s11277-024-10859-0.","DOI":"10.1007\/s11277-024-10859-0"},{"key":"226_CR46","doi-asserted-by":"publisher","unstructured":"Harsha V, Mohd S, Sanjeev KV et al. (2024)Light Key: Lightweight and Secure Key Agreement Protocol for Effective Communication in Internet of Vehicles, ICDCN \u201824: Proceedings of the 25th International Conference on Distributed Computing and Networking. https:\/\/doi.org\/10.1145\/3631461.3631558","DOI":"10.1145\/3631461.3631558"},{"key":"226_CR47","doi-asserted-by":"publisher","unstructured":"Raj K, Bodapati S. FPGA Based Light Weight Encryption of Medical Data for IoMT Devices using ASCON Cipher, IEEE International Symposium on Smart Electronic Systems (iSES), Warangal, India, 2022; pp. 196\u2013201. https:\/\/doi.org\/10.1109\/iSES54909.2022.00048","DOI":"10.1109\/iSES54909.2022.00048"},{"issue":"4","key":"226_CR48","doi-asserted-by":"publisher","first-page":"5091","DOI":"10.1007\/s11042-022-12169-8","volume":"82","author":"M Gupta","year":"2023","unstructured":"Gupta M, Singh VP, Gupta KK, et al. An efficient image encryption technique based on two-level security for internet of things. Multimedia Tools Application. 2023;82(4):5091\u2013111. https:\/\/doi.org\/10.1007\/s11042-022-12169-8.","journal-title":"Multimedia Tools Application"},{"key":"226_CR49","doi-asserted-by":"publisher","unstructured":"Uprety A, Rawat DB, Li J. Privacy-Preserving Misbehavior Detection in IoV Using Federated Machine Learning, IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 2021; pp. 1\u20136. https:\/\/doi.org\/10.1109\/CCNC49032.2021.9369513","DOI":"10.1109\/CCNC49032.2021.9369513"},{"issue":"11s","key":"226_CR50","first-page":"1","volume":"11","author":"CD Kokane","year":"2023","unstructured":"Kokane CD, Mohadikar G, Khapekar S, Jadhao B, Waykole T, Deotare VV. Machine learning approach for intelligent transport system in IOV-Based vehicular network traffic for smart cities. Int J Intell Syst Appl Eng. 2023;11(11s):1\u20136.","journal-title":"Int J Intell Syst Appl Eng"},{"key":"226_CR51","doi-asserted-by":"publisher","unstructured":"Rojas B, Bola\u00f1os C, Salazar-Cabrera R. Gustavo Ram\u00edrez-Gonz\u00e1lez, \u00c1lvaro Pach\u00f3n de la Cruz, and Juan Manuel Madrid Molina. Fleet Management and Control System for Medium-Sized Cities Based in Intelligent Transportation Systems: From Review to Proposal in a City Electronics 2020; 9, no. 9: 1383. https:\/\/doi.org\/10.3390\/electronics9091383","DOI":"10.3390\/electronics9091383"},{"key":"226_CR52","doi-asserted-by":"publisher","unstructured":"Penna M, Shivashankar B, Arjun KR, Goutham LN, Madhaw, Sanjay KG. Smart fleet monitoring system using Internet of Things (IoT), 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, India, 2017; pp. 1232\u20131236. https:\/\/doi.org\/10.1109\/RTEICT.2017.8256795","DOI":"10.1109\/RTEICT.2017.8256795"},{"key":"226_CR53","doi-asserted-by":"publisher","unstructured":"P.Singh MS, Suryawanshi, Tak D. Smart Fleet Management System Using IoT, Computer Vision, Cloud Computing and Machine Learning Technologies, 2019 IEEE 5th International Conference for Convergence in Technology (I2CT), Bombay, India, 2019; pp. 1\u20138. https:\/\/doi.org\/10.1109\/I2CT45611.2019.9033578","DOI":"10.1109\/I2CT45611.2019.9033578"},{"issue":"12","key":"226_CR54","doi-asserted-by":"publisher","first-page":"9484","DOI":"10.1109\/JIOT.2020.2986342","volume":"8","author":"S Hussain","year":"2021","unstructured":"Hussain S, Mahmud U, Yang S. Car e-Talk: an IoT-Enabled Cloud-Assisted smart fleet maintenance system. IEEE Internet Things J. 2021;8(12):9484\u201394. https:\/\/doi.org\/10.1109\/JIOT.2020.2986342.","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"226_CR55","doi-asserted-by":"publisher","first-page":"558","DOI":"10.3923\/itj.2013.558.568","volume":"12","author":"S Habib","year":"2013","unstructured":"Habib S, Hannan MA, Javadi MS, Samad SA, Muad AM, Hussain A. Inter-vehicle wireless communications technologies, issues and challenges. Inf Technol J. 2013;12(4):558\u201368. https:\/\/doi.org\/10.3923\/itj.2013.558.568.","journal-title":"Inf Technol J"},{"key":"226_CR56","doi-asserted-by":"crossref","unstructured":"Nowroozi E, Haider I, Taheri R, and Mauro Conti. Federated learning under attack: exposing vulnerabilities through data poisoning attacks in computer networks. IEEE Trans NetworkService Manage, 2025.","DOI":"10.36227\/techrxiv.170492270.09799501\/v1"},{"key":"226_CR57","doi-asserted-by":"crossref","unstructured":"Nabavirazavi S, Taheri R, Shojafar M, Iyengar SS. Impact of aggregation function randomization against model poisoning in federated learning. In 22nd IEEE international conference on trust, security and privacy in computing and communications, TrustCom 2023. Institute of Electrical and Electronics Engineers Inc.2024; 165\u2013172","DOI":"10.1109\/TrustCom60117.2023.00043"},{"key":"226_CR58","doi-asserted-by":"crossref","unstructured":"Taheri R, Arabikhan F, Gegov A, Akbari N. Robust aggregation function in federated learning. In International Conference on Information and Knowledge Systems. Cham: Springer Nature Switzerland. 2023; 168\u2013175","DOI":"10.1007\/978-3-031-51664-1_12"},{"key":"226_CR59","doi-asserted-by":"crossref","unstructured":"Rezaei H, Taheri R, Shojafar M. FedLLMGuard: A federated large Language model for anomaly detection in 5G networks. Comput Netw, 2025; 111473.","DOI":"10.1016\/j.comnet.2025.111473"},{"issue":"1","key":"226_CR60","first-page":"15","volume":"20","author":"R Jin","year":"2023","unstructured":"Jin R, Chen J, Xiang L, Xiang Y. Impact of aggregation function randomization against model poisoning in federated learning. IEEE Trans Dependable Secur Comput. 2023;20(1):15\u201328.","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"226_CR61","doi-asserted-by":"publisher","unstructured":"Bhuvaneshwari AJ, Kaythry P, Jegadish Kumar KJ,  Sachin D. 7-Stage Pipelined Architecture of ASCON for Resource Constraint Devices. In: IEEE Embedded Systems Letters, vol. 17, no. 4, pp. 252\u2013255. https:\/\/doi.org\/10.1109\/LES.2025.3541818","DOI":"10.1109\/LES.2025.3541818"},{"key":"226_CR62","doi-asserted-by":"publisher","unstructured":"Bhuvaneshwari AJ, Kaythry P. Secure IoV communications for smart fleet systems empowered with ASCON. Sci Rep. 2025;15:19103. https:\/\/doi.org\/10.1038\/s41598-025-04061-w","DOI":"10.1038\/s41598-025-04061-w"},{"key":"226_CR63","doi-asserted-by":"publisher","unstructured":"Bhuvaneshwari AJ, Kaythry P, Kishore R,  MuthuHarish R. Post-Quantum enhanced Ascon for secure vehicular IoT data integrity. Sci Rep. 2025;15:26591. https:\/\/doi.org\/10.1038\/s41598-025-10503-2","DOI":"10.1038\/s41598-025-10503-2"},{"key":"226_CR64","doi-asserted-by":"publisher","unstructured":"Jegadish Kumar KJ, Bhuvaneshwari AJ, Kaythry P. Enhanced cryptosystem for resource-constrained devices with streamlined randomness analysis. Cogent Engi. 2025;12(1):2565364. https:\/\/doi.org\/10.1080\/23311916.2025.2565364","DOI":"10.1080\/23311916.2025.2565364"},{"key":"226_CR65","doi-asserted-by":"publisher","unstructured":"Bhuvaneshwari AJ, Kaythry P. CyberSecGuard: Enhanced Visual Data Security with BLAKE2 Encryption and NIDS Defense. In: 2024 10th International Conference on Electrical Energy Systems (ICEES), Chennai, India, 2024, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICEES61253.2024.10776863","DOI":"10.1109\/ICEES61253.2024.10776863"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00226-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00226-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00226-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T13:08:18Z","timestamp":1761570498000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00226-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":65,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["226"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00226-1","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"28 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"114"}}