{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:20:32Z","timestamp":1772554832435,"version":"3.50.1"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032014283","type":"print"},{"value":"9783032014290","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T00:00:00Z","timestamp":1757116800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T00:00:00Z","timestamp":1757116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-01429-0_41","type":"book-chapter","created":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T16:11:00Z","timestamp":1757088660000},"page":"476-489","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Systematic Review on AI Ethics in Privacy for V2X Communication"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1555-6821","authenticated-orcid":false,"given":"H\u00e9ctor Dave Orrillo","family":"Ascama","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7672-3243","authenticated-orcid":false,"given":"Laercio","family":"Cruvinel J\u00fanior","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5498-3220","authenticated-orcid":false,"given":"M\u00e1rio","family":"Marques da Silva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,6]]},"reference":[{"key":"41_CR1","doi-asserted-by":"publisher","unstructured":"Zhu, M., Yuan, J., Wang, G., Xu, Z., Wei, K.: Enhancing collaborative machine learning for security and privacy in federated learning (2024). https:\/\/doi.org\/10.53469\/jtpes.2024.04(02).11","DOI":"10.53469\/jtpes.2024.04(02).11"},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"Alhabib, R., Yadav, P.: Data authorisation and validation in autonomous vehicles: a critical review (2024)","DOI":"10.1007\/s42452-025-07333-2"},{"issue":"1","key":"41_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.3390\/automation6010005","volume":"6","author":"SR Neupane","year":"2025","unstructured":"Neupane, S.R., Sun, W.: Advanced data classification framework for enhancing cyber security in autonomous vehicles. Automation. 6(1), 5 (2025). https:\/\/doi.org\/10.3390\/automation6010005","journal-title":"Automation."},{"key":"41_CR4","unstructured":"Alekszejenk\u00f3, L., Dobrowiecki, T.: A V2X-based Privacy Preserving Federated Measuring and Learning System (2024)"},{"key":"41_CR5","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/ACCESS.2023.3233983","volume":"11","author":"R Parekh","year":"2023","unstructured":"Parekh, R., et al.: GeFL: gradient encryption-aided privacy preserved federated learning for autonomous vehicles. IEEE Access. 11, 1825\u20131839 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3233983","journal-title":"IEEE Access."},{"key":"41_CR6","unstructured":"Xie, C., Cao, Z., Long, Y., Yang, D., Zhao, D., Li, B.: Privacy of Autonomous Vehicles: Risks, Protection Methods, and Future Directions (2022)"},{"key":"41_CR7","doi-asserted-by":"publisher","first-page":"9465","DOI":"10.1109\/TVT.2024.3369942","volume":"73","author":"X Feng","year":"2024","unstructured":"Feng, X., Wang, X., Liu, H., Yang, H., Wang, L.: A Privacy-preserving aggregation scheme with continuous authentication for federated learning in VANETs. IEEE Trans. Veh. Technol. 73, 9465\u20139477 (2024). https:\/\/doi.org\/10.1109\/TVT.2024.3369942","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"41_CR8","doi-asserted-by":"publisher","first-page":"25029","DOI":"10.1038\/s41598-024-71187-8","volume":"14","author":"MM Eid Kishawy","year":"2024","unstructured":"Eid Kishawy, M.M., Abd El-Hafez, M.T., Yousri, R., Darweesh, M.S.: Federated learning system on autonomous vehicles for lane segmentation. Sci. Rep. 14(1), 25029 (2024). https:\/\/doi.org\/10.1038\/s41598-024-71187-8","journal-title":"Sci. Rep."},{"key":"41_CR9","doi-asserted-by":"publisher","unstructured":"Stingelov\u00e1, B., Thrakl, C.T., Wro\u0144ska, L., Jedrej-Szymankiewicz, S., Khan, S., Svetinovic, D.: User-centric security and privacy threats in connected vehicles: a threat modeling analysis using STRIDE and LINDDUN. In: 2023 IEEE Intl Conf on Dependable, pp. 0690\u20130697 (2023). https:\/\/doi.org\/10.1109\/DASC\/PiCom\/CBDCom\/Cy59711.2023.10361381","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy59711.2023.10361381"},{"key":"41_CR10","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1109\/OJCOMS.2022.3169500","volume":"3","author":"M Hataba","year":"2022","unstructured":"Hataba, M., Sherif, A., Mahmoud, M., Abdallah, M., Alasmary, W.: Security and privacy issues in autonomous vehicles: a layer-based survey. IEEE Open J. Commun. Soc. 3, 811\u2013829 (2022). https:\/\/doi.org\/10.1109\/OJCOMS.2022.3169500","journal-title":"IEEE Open J. Commun. Soc."},{"key":"41_CR11","doi-asserted-by":"publisher","unstructured":"Lingras, S., Basu, A.: The security of autonomous vehicle software and its national security implications. Eur. J. Appl. Sci. Eng. Technol. 3, 180\u2013188 (2025). https:\/\/doi.org\/10.59324\/ejaset.2025.3(1).16","DOI":"10.59324\/ejaset.2025.3(1).16"},{"key":"41_CR12","doi-asserted-by":"publisher","unstructured":"Muslam, M.M.A.: Enhancing security in vehicle-to-vehicle communication: a comprehensive review of protocols and techniques (2024). https:\/\/doi.org\/10.3390\/vehicles6010020","DOI":"10.3390\/vehicles6010020"},{"key":"41_CR13","doi-asserted-by":"publisher","unstructured":"Rishiwal, V., Agarwal, U., Alotaibi, A., Tanwar, S., Yadav, P., Yadav, M.: Exploring secure V2X communication networks for human-centric security and privacy in smart cities. IEEE Access (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3467002","DOI":"10.1109\/ACCESS.2024.3467002"},{"key":"41_CR14","doi-asserted-by":"publisher","unstructured":"Yi, J., Bin Ariffin, S.A.: Enhancing V2x communication in intelligent vehicles using deep learning models. Int. J. Acad. Res. Bus. Soc. Sci. 14 (2024). https:\/\/doi.org\/10.6007\/IJARBSS\/v14-i10\/23255","DOI":"10.6007\/IJARBSS\/v14-i10\/23255"},{"issue":"20","key":"41_CR15","doi-asserted-by":"publisher","first-page":"6528","DOI":"10.3390\/s24206528","volume":"24","author":"MN Ali","year":"2024","unstructured":"Ali, M.N., Imran, M., Ullah, I., Raza, G.M., Kim, H.Y., Kim, B.S.: Ensemble and gossip learning-based framework for intrusion detection system in vehicle-to-everything communication environment. Sensors. 24(20), 6528 (2024). https:\/\/doi.org\/10.3390\/s24206528","journal-title":"Sensors."},{"key":"41_CR16","doi-asserted-by":"crossref","unstructured":"Himdi, T.: A Blockchain and AI-driven security framework for enhancing cybersecurity in cognitive cities (2024)","DOI":"10.54364\/AAIML.2024.44169"},{"key":"41_CR17","doi-asserted-by":"publisher","first-page":"3614","DOI":"10.1109\/TITS.2023.3236274","volume":"24","author":"G Bendiab","year":"2023","unstructured":"Bendiab, G., Hameurlaine, A., Germanos, G., Kolokotronis, N., Shiaeles, S.: Autonomous vehicles security: challenges and solutions using blockchain and artificial intelligence. IEEE Trans. Intell. Transp. Syst. 24, 3614\u20133637 (2023). https:\/\/doi.org\/10.1109\/TITS.2023.3236274","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"41_CR18","doi-asserted-by":"publisher","unstructured":"Giannaros, A., et al.: Autonomous vehicles: sophisticated attacks, safety issues, challenges, open topics, blockchain, and future directions (2023). https:\/\/doi.org\/10.3390\/jcp3030025","DOI":"10.3390\/jcp3030025"},{"key":"41_CR19","doi-asserted-by":"publisher","unstructured":"Ahmed Mohiuddin, M., Nirosha, K., Anusha, D., Nazeer, M., Raju NV, G., Lakhanpal, S.: AI to V2X privacy and security issues in autonomous vehicles: survey. MATEC Web Conf. 392, 01097 (2024). https:\/\/doi.org\/10.1051\/matecconf\/202439201097","DOI":"10.1051\/matecconf\/202439201097"},{"key":"41_CR20","doi-asserted-by":"publisher","unstructured":"Biswas, A., Wang, H.C.: Autonomous Vehicles Enabled by the Integration of IoT, Edge Intelligence, 5G, and Blockchain (2023). https:\/\/doi.org\/10.3390\/s23041963","DOI":"10.3390\/s23041963"},{"key":"41_CR21","doi-asserted-by":"publisher","unstructured":"Balkus, S.V., Wang, H., Cornet, B.D., Mahabal, C., Ngo, H., Fang, H.: A survey of collaborative machine learning using 5G vehicular communications (2022). https:\/\/doi.org\/10.1109\/COMST.2022.3149714","DOI":"10.1109\/COMST.2022.3149714"},{"key":"41_CR22","doi-asserted-by":"publisher","first-page":"1927","DOI":"10.1109\/TVT.2021.3132226","volume":"71","author":"F Ayaz","year":"2022","unstructured":"Ayaz, F., Sheng, Z., Tian, D., Guan, Y.L.: A blockchain based federated learning for message dissemination in vehicular networks. IEEE Trans. Veh. Technol. 71, 1927\u20131940 (2022). https:\/\/doi.org\/10.1109\/TVT.2021.3132226","journal-title":"IEEE Trans. Veh. Technol."},{"key":"41_CR23","doi-asserted-by":"publisher","unstructured":"Patel, V.A.K., Bhattacharya, P., Tanwar, S., Jadav, N.K., Gupta, R.: BFLEdge: Blockchain based federated edge learning scheme in V2X underlying 6G communications. In: Proceedings of the Confluence 2022 - 12th International Conference on Cloud Computing, Data Science and Engineering, pp. 146\u2013152. Institute of Electrical and Electronics Engineers Inc (2022). https:\/\/doi.org\/10.1109\/Confluence52989.2022.9734213","DOI":"10.1109\/Confluence52989.2022.9734213"},{"issue":"6","key":"41_CR24","doi-asserted-by":"publisher","first-page":"101542","DOI":"10.1016\/j.jksuci.2023.03.020","volume":"35","author":"A Smahi","year":"2023","unstructured":"Smahi, A., et al.: BV-ICVs: a privacy-preserving and verifiable federated learning framework for V2X environments using blockchain and zkSNARKs. J. King Saud Univ. Comput. Inf. Sci. 35(6), 101542 (2023). https:\/\/doi.org\/10.1016\/j.jksuci.2023.03.020","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"41_CR25","doi-asserted-by":"publisher","unstructured":"Javed, A.R., et al.: Integration of blockchain technology and federated learning in vehicular (IoT) networks: a comprehensive survey (2022). https:\/\/doi.org\/10.3390\/s22124394","DOI":"10.3390\/s22124394"},{"key":"41_CR26","doi-asserted-by":"publisher","unstructured":"Billah, M., Tanzir Mehedi, S.K., Anwar, A., Rahman, Z., Islam, R.: A systematic literature review on blockchain enabled federated learning framework for internet of vehicles (2022). https:\/\/doi.org\/10.1109\/ACCESS.2017.DOI","DOI":"10.1109\/ACCESS.2017.DOI"},{"key":"41_CR27","doi-asserted-by":"publisher","first-page":"7661","DOI":"10.1109\/TITS.2024.3351699","volume":"25","author":"Z AbouElHouda","year":"2024","unstructured":"AbouElHouda, Z., Moudoud, H., Brik, B., Khoukhi, L.: Blockchain-enabled federated learning for enhanced collaborative intrusion detection in vehicular edge computing. IEEE Trans. Intell. Transp. Syst. 25, 7661\u20137672 (2024). https:\/\/doi.org\/10.1109\/TITS.2024.3351699","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"20","key":"41_CR28","doi-asserted-by":"publisher","first-page":"3339","DOI":"10.3390\/electronics11203339","volume":"11","author":"F Ayaz","year":"2022","unstructured":"Ayaz, F., Sheng, Z., Tian, D., Nekovee, M., Saeed, N.: Blockchain-empowered AI for 6G-enabled internet of vehicles. Electronics (Switzerland) 11(20), 3339 (2022). https:\/\/doi.org\/10.3390\/electronics11203339","journal-title":"Electronics (Switzerland)"},{"key":"41_CR29","doi-asserted-by":"publisher","unstructured":"Peelam, M.S., Shah, K., Chamola, V., Sikdar, B.: Blockchain-enabled vehicle lifecycle management with predictive maintenance using federated learning. IEEE Trans. Consum. Electron. (2024). https:\/\/doi.org\/10.1109\/TCE.2024.3487874","DOI":"10.1109\/TCE.2024.3487874"},{"key":"41_CR30","doi-asserted-by":"publisher","unstructured":"Asha, S., Sree, K.D., Sandhya, S.A.: Federated learning-based network slicing in 6G systems for enhanced performance in autonomous vehicle communication. In: 2024 1st International Conference on Software, Systems and Information Technology, SSITCON 2024. Institute of Electrical and Electronics Engineers Inc (2024). https:\/\/doi.org\/10.1109\/SSITCON62437.2024.10797083","DOI":"10.1109\/SSITCON62437.2024.10797083"},{"key":"41_CR31","doi-asserted-by":"publisher","first-page":"1116","DOI":"10.3390\/s25041116","volume":"25","author":"T Alqubaysi","year":"2025","unstructured":"Alqubaysi, T., Al Asmari, A.F., Alanazi, F., Almutairi, A., Armghan, A.: Federated learning-based predictive traffic management using a contained privacy-preserving scheme for autonomous vehicles. Sensors. 25, 1116 (2025). https:\/\/doi.org\/10.3390\/s25041116","journal-title":"Sensors."},{"key":"41_CR32","doi-asserted-by":"publisher","unstructured":"Hossain, M.Z., Imteaj, A., Zaman, S., Shahid, A.R., Talukder, S., Amini, M.H.: FLID: intrusion attack and defense mechanism for federated learning empowered connected autonomous vehicles (CAVs) application. In: Proceedings - 2023 IEEE Conference on Dependable and Secure Computing, DSC 2023. Institute of Electrical and Electronics Engineers Inc (2023). https:\/\/doi.org\/10.1109\/DSC61021.2023.10354149","DOI":"10.1109\/DSC61021.2023.10354149"},{"key":"41_CR33","unstructured":"IEEE.: The IEEE Global Initiative 2.0 on Ethics of Autonomous and Intelligent Systems Industry Connections Activity Initiation Document (ICAID) (2024)"},{"key":"41_CR34","doi-asserted-by":"publisher","unstructured":"Independent expert report.: ethics of connected and automated vehicles recommendations on road safety, privacy, fairness, explainability and responsibility (2020). https:\/\/doi.org\/10.2777\/966923","DOI":"10.2777\/966923"},{"key":"41_CR35","doi-asserted-by":"crossref","unstructured":"French Comit\u00e9 National Pilote d'\u00c9thique du Num\u00e9rique.: Opinion 2 Ethical Issues Regarding Autonomous Vehicles (2021)","DOI":"10.3917\/puf.nomau.2022.01.0243"},{"key":"41_CR36","unstructured":"Ethics commission automated and automated connected driving, Report (2017)"}],"container-title":["Lecture Notes in Computer Science","Ethical and Social Impacts of Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-01429-0_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T22:15:54Z","timestamp":1759270554000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-01429-0_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,6]]},"ISBN":["9783032014283","9783032014290"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-01429-0_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,6]]},"assertion":[{"value":"6 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ETHICOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Ethical and Social Impacts of ICT","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ethicomp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/autonoma.pt\/en\/ethicomp-2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}