{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T20:45:57Z","timestamp":1768337157412,"version":"3.49.0"},"reference-count":23,"publisher":"Association for Computing Machinery (ACM)","issue":"1","funder":[{"name":"Deanship of Scientific Research (DSR) at King Abdulaziz University","award":["GPIP: 912-135-2024"],"award-info":[{"award-number":["GPIP: 912-135-2024"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2026,1,31]]},"abstract":"<jats:p>The current landscape of data-centric Internet of Vehicles (IoVs) encompasses a fusion of Human-driven Vehicles, Autonomous Vehicles, Road-Side Units, and edge-based devices engaged in periodic communication. Given the stringent latency requirements inherent in vehicular communications, the emergence of edge-based vehicular Digital Twins (DTs) plays a pivotal role in problem-solving, ensuring rapid response, regulatory compliance, and seamless availability. While these communications serve as the backbone of IoV, they also create an opportune environment for cybercriminals to exploit. Vulnerabilities at the network layer facilitate intrusions, resulting in a surge of data falsification attacks in recent years. Addressing this challenge demands resilient and intelligent threat detection schemes capable of adapting to the dynamic nature of IoV. This study conducts a comprehensive examination of the vulnerabilities in Vehicle-to-DT (V2DT) data communication through the lens of an attacker utilizing False Data Injection Attack (FDIA). It utilizes cutting-edge Blockchain-based decentralized storage and buffering mechanisms for vehicle dynamics data en route to edge-based DTs. Further, deep learning-powered sensor data analysis serves as an additional layer of security. Evaluation of the proposed threat detection and mitigation model demonstrates 100% tamper detection in V2DT communication, coupled with a 96% accurate classification of anomalous driving behaviors, including aggressive driving or FDIAs.<\/jats:p>","DOI":"10.1145\/3711863","type":"journal-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T10:53:42Z","timestamp":1738061622000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Securing Vehicle-to-Digital Twin Communications in the Internet of Vehicles"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0219-0712","authenticated-orcid":false,"given":"Sadia Jabeen","family":"Siddiqi","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, National University of Computer and Emerging Sciences, Islamabad, Pakistan and Department of Electrical Engineering, University of Engineering and Technology Mardan, Mardan, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6078-4685","authenticated-orcid":false,"given":"Abdulraheem H.","family":"Alobaidi","sequence":"additional","affiliation":[{"name":"Center of Research Excellence in Renewable Energy Systems, Department of Electrical and Computer Engineering, Faculty of Engineering, King Abdulaziz University, Jeddah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5298-1328","authenticated-orcid":false,"given":"Mian Ahmad","family":"Jan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Sharjah, Sharjah, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1296-2058","authenticated-orcid":false,"given":"Muhammad","family":"Tariq","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, National University of Computer and Emerging Sciences, Islamabad, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2026,1,13]]},"reference":[{"key":"e_1_3_1_2_2","first-page":"1","volume-title":"Proceedings of the 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM \u201821)","author":"Holmes David","unstructured":"David Holmes, Maria Papathanasaki, Leandros Maglaras, Mohamed Amine Ferrag, Surya Nepal, and Helge Janicke. 2021. Digital twins and cyber security\u2013solution or challenge? In Proceedings of the 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM \u201821). IEEE, 1\u20138."},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953499"},{"issue":"3","key":"e_1_3_1_4_2","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MIM.2021.9436090","article-title":"The potential of digital twins","volume":"24","author":"El Saddik Abdulmotaleb","year":"2021","unstructured":"Abdulmotaleb El Saddik, Fedwa Laamarti, and Mohammad Alja\u2019Afreh. 2021. The potential of digital twins. IEEE Instrumentation & Measurement Magazine, 24, 3 (2021), 36\u201341.","journal-title":"IEEE Instrumentation & Measurement Magazine"},{"issue":"1","key":"e_1_3_1_5_2","doi-asserted-by":"crossref","first-page":"956","DOI":"10.1109\/TCE.2023.3329007","article-title":"Secure teleoperated vehicles in augmented reality of things: A multichain and digital twin approach","volume":"70","author":"Siddiqi Sadia Jabeen","year":"2023","unstructured":"Sadia Jabeen Siddiqi, Mian Ahmad Jan, Anas Basalamah, and Muhammad Tariq. 2023. Secure teleoperated vehicles in augmented reality of things: A multichain and digital twin approach. IEEE Transactions on Consumer Electronics, 70, 1 (2023), 956\u2013965.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119842316.ch13ePDFPDF"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3063246"},{"key":"e_1_3_1_8_2","first-page":"205","volume-title":"Proceedings of the 14th IEEE Conference on Software Testing, Verification and Validation (ICST \u201821)","author":"Xu Qinghua","year":"2021","unstructured":"Qinghua Xu, Shaukat Ali, and Tao Yue. 2021. Digital twin-based anomaly detection in cyber-physical systems. In Proceedings of the 14th IEEE Conference on Software Testing, Verification and Validation (ICST \u201821). IEEE, 205\u2013216."},{"key":"e_1_3_1_9_2","first-page":"1484","volume-title":"Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (SMC \u201819)","author":"Mattuvarkuzhali Ezhilarasu Cordelia","year":"2019","unstructured":"Cordelia Mattuvarkuzhali Ezhilarasu, Zakwan Skaf, and Ian K. Jennions. 2019. Understanding the role of a digital twin in integrated vehicle health management (IVHM). In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (SMC \u201819). IEEE, 1484\u20131491."},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","unstructured":"Sabah Suhail Raja Jurdak and Rasheed Hussain. 2022. Security attacks and solutions for digital twins. arXiv:2202.12501. Retrieved from 10.48550\/arXiv.2202.12501","DOI":"10.48550\/arXiv.2202.12501"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.05.023"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100548"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1080\/21680566.2022.2092231"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3304762"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3309864"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100547"},{"issue":"5","key":"e_1_3_1_17_2","doi-asserted-by":"crossref","first-page":"178","DOI":"10.3390\/fi15050178","article-title":"Survey of distributed and decentralized IoT securities: Approaches using deep learning and blockchain technology","volume":"15","author":"Falayi Ayodeji","year":"2023","unstructured":"Ayodeji Falayi, Qianlong Wang, Weixian Liao, and Wei Yu. 2023. Survey of distributed and decentralized IoT securities: Approaches using deep learning and blockchain technology. Future Internet 15, 5 (2023), 178.","journal-title":"Future Internet"},{"issue":"9","key":"e_1_3_1_18_2","article-title":"Multichain-assisted lightweight security for code mutated false data injection attacks in connected autonomous vehicles","volume":"25","author":"Siddiqi Sadia Jabeen","year":"2024","unstructured":"Sadia Jabeen Siddiqi, Bushra Tahir, Mian Ahmad Jan, and Muhammad Tariq. 2024. Multichain-assisted lightweight security for code mutated false data injection attacks in connected autonomous vehicles. IEEE Transactions on Intelligent Transportation Systems 25, 9 (Sep. 2024), 11000\u201311010.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"6","key":"e_1_3_1_19_2","doi-asserted-by":"crossref","first-page":"1698","DOI":"10.1016\/j.dcan.2023.08.004","article-title":"Digital twin empowered lightweight and efficient blockchain for dynamic internet of vehicles","volume":"10","author":"Chai Haoye","year":"2024","unstructured":"Haoye Chai, Supeng Leng, Jianhua He, and Ke Zhang. 2024. Digital twin empowered lightweight and efficient blockchain for dynamic internet of vehicles. Digital Communications and Networks 10, 6 (Dec. 2023), 1698\u20131707.","journal-title":"Digital Communications and Networks"},{"issue":"10","key":"e_1_3_1_20_2","doi-asserted-by":"crossref","first-page":"13474","DOI":"10.1109\/TVT.2023.3275591","article-title":"Digital twin enabled remote data sharing for internet of vehicles: System and incentive design","volume":"72","author":"Tan Chenchen","year":"2023","unstructured":"Chenchen Tan, Xinghao Li, Longxiang Gao, Tom H Luan, Youyang Qu, Yong Xiang, and Rongxing Lu. 2023. Digital twin enabled remote data sharing for internet of vehicles: System and incentive design. IEEE Transactions on Vehicular Technology 72, 10 (Oct. 2023), 13474\u201313489.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3191414"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3249116"},{"issue":"1","key":"e_1_3_1_23_2","first-page":"41","article-title":"Modeling and simulation of a vehicle dynamics system","volume":"1","author":"Aboazoum Ahmed","year":"2022","unstructured":"Ahmed Aboazoum. 2022. Modeling and simulation of a vehicle dynamics system. Nexus: Journal of Advances Studies of Engineering Science 1, 1 (2022), 41\u201346.","journal-title":"Nexus: Journal of Advances Studies of Engineering Science"},{"key":"e_1_3_1_24_2","doi-asserted-by":"crossref","first-page":"108","DOI":"10.37789\/rochi.2022.1.1.18","volume-title":"Proceedings of the RoCHI","author":"Cojocaru Ion","year":"2022","unstructured":"Ion Cojocaru, Paul-Stefan Popescu, and Marian Cristian Mihaescu. 2022. Driver behaviour analysis based on deep learning algorithms. In Proceedings of the RoCHI, 108\u2013114."}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:20:15Z","timestamp":1768314015000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711863"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,13]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1,31]]}},"alternative-id":["10.1145\/3711863"],"URL":"https:\/\/doi.org\/10.1145\/3711863","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,13]]},"assertion":[{"value":"2024-03-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-13","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-01-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}