{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T00:19:05Z","timestamp":1648685945910},"reference-count":26,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2022,2,1]]},"DOI":"10.1587\/transinf.2021bcp0014","type":"journal-article","created":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T22:16:53Z","timestamp":1643667413000},"page":"280-288","source":"Crossref","is-referenced-by-count":0,"title":["Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System"],"prefix":"10.1587","volume":"E105.D","author":[{"given":"Yingxiao","family":"XIANG","sequence":"first","affiliation":[{"name":"Beijing Jiaotong University"}]},{"given":"Chao","family":"LI","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University"}]},{"given":"Tong","family":"CHEN","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University"}]},{"given":"Yike","family":"LI","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University"}]},{"given":"Endong","family":"TONG","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University"}]},{"given":"Wenjia","family":"NIU","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University"}]},{"given":"Qiong","family":"LI","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University"}]},{"given":"Jiqiang","family":"LIU","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University"}]},{"given":"Wei","family":"WANG","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] L. Zhu, F.R. Yu, Y. Wang, B. Ning, and T. Tang, \u201cBig data analytics in intelligent transportation systems: A survey,\u201d IEEE Trans. Intell. Transp. Syst., vol.20, no.1, pp.383-398, 2019. 10.1109\/tits.2018.2815678","DOI":"10.1109\/TITS.2018.2815678"},{"key":"2","unstructured":"[2] \u201cUsdot: Multimodal intelligent traffic safety system (mmitss),\u201d https:\/\/www.its.dot.gov\/research_archives\/dma\/bundle\/mmitss_plan.htm."},{"key":"3","unstructured":"[3] \u201cU.s.dot connected vehicle pilot deployment program,\u201d https:\/\/www.its.dot.gov\/pilots\/."},{"key":"4","unstructured":"[4] \u201cConnected vehicle applications,\u201d https:\/\/www.its.dot.gov\/pilots\/cv_pilot_apps.htm."},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] Q.A. Chen, Y. Yin, Y. Feng, Z.M. Mao, and H.X. Liu, \u201cExposing congestion attack on emerging connected vehicle based traffic signal control,\u201d Network and Distributed System Security Symposium, pp.39.1-15, 2018. 10.14722\/ndss.2018.23222","DOI":"10.14722\/ndss.2018.23222"},{"key":"6","unstructured":"[6] T. Jeske, \u201cFloating car data from smartphones: What google and waze know about you and how hackers can control traffic,\u201d 2012."},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] M. Amoozadeh, A. Raghuramu, C.-N. Chuah, D. Ghosal, H.M. Zhang, J. Rowe, and K.N. Levitt, \u201cSecurity vulnerabilities of connected vehicle streams and their impact on cooperative driving,\u201d IEEE Commun. Mag., vol.53, no.6, pp.126-132, 2015. 10.1109\/mcom.2015.7120028","DOI":"10.1109\/MCOM.2015.7120028"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] S. Sen and K.L. Head, \u201cControlled optimization of phases at an intersection,\u201d Transportation Science, vol.31, no.1, pp.5-17, 1997. 10.1287\/trsc.31.1.5","DOI":"10.1287\/trsc.31.1.5"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] Y. Feng, K.L. Head, S. Khoshmagham, and M. Zamanipour, \u201cA real-time adaptive signal control in a connected vehicle environment,\u201d Transportation research, Part C. Emerging technologies, vol.55, pp.460-473, 2015. 10.1016\/j.trc.2015.01.007","DOI":"10.1016\/j.trc.2015.01.007"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] Y. Li, Y. Xiang, E. Tong, W. Niu, B. Jia, L. Li, J. Liu, Z. Han, and Z. Zhou, \u201cAn empirical study on gan-based traffic congestion attack analysis: A visualized method,\u201d Wirel. Commun. Mob. Comput., vol.2020, pp.8823300:1-8823300:14, 2020. 10.1155\/2020\/8823300","DOI":"10.1155\/2020\/8823300"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] X. Wang, Y. Xiang, W. Niu, E. Tong, and J. Liu, \u201cExplainable congestion attack prediction and software-level reinforcement in intelligent traffic signal system,\u201d 26th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2020, Hong Kong, Dec. 2-4, 2020, pp.667-672, IEEE, 2020. 10.1109\/icpads51040.2020.00094","DOI":"10.1109\/ICPADS51040.2020.00094"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] W. Wang, J. Song, G. Xu, Y. Li, H. Wang, and C. Su, \u201cContractward: Automated vulnerability detection models for ethereum smart contracts,\u201d IEEE Transactions on Network Science and Engineering, vol.8, no.2, pp.1133-1144, 2021. 10.1109\/tnse.2020.2968505","DOI":"10.1109\/TNSE.2020.2968505"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] W. Wang, Y. Li, X. Wang, J. Liu, and X. Zhang, \u201cDetecting android malicious apps and categorizing benign apps with ensemble of classifiers,\u201d Future Generation Computer Systems, vol.78, pp.987-994, 2018. 10.1016\/j.future.2017.01.019","DOI":"10.1016\/j.future.2017.01.019"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] W. Wang, X. Wang, D. Feng, J. Liu, Z. Han, and X. Zhang, \u201cExploring permission-induced risk in android applications for malicious application detection,\u201d IEEE Trans. Inf. Forensics Security, vol.9, no.11, pp.1869-1882, 2014. 10.1109\/tifs.2014.2353996","DOI":"10.1109\/TIFS.2014.2353996"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] M. Gupta and R.S. Sandhu, \u201cAuthorization framework for secure cloud assisted connected cars and vehicular internet of things,\u201d Proc. 23nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, June 13-15, 2018, ed. E. Bertino, D. Lin, and J. Lobo, pp.193-204, ACM, 2018. 10.1145\/3205977.3205994","DOI":"10.1145\/3205977.3205994"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] Y. Yang, X. Niu, L. Li, and H. Peng, \u201cA secure and efficient transmission method in connected vehicular cloud computing,\u201d IEEE Netw., vol.32, no.3, pp.14-19, 2018. 10.1109\/mnet.2018.1700324","DOI":"10.1109\/MNET.2018.1700324"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] K. Fan, X. Wang, K. Suto, H. Li, and Y. Yang, \u201cSecure and efficient privacy-preserving ciphertext retrieval in connected vehicular cloud computing,\u201d IEEE Netw., vol.32, no.3, pp.52-57, 2018. 10.1109\/mnet.2018.1700327","DOI":"10.1109\/MNET.2018.1700327"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] Y. Yao, X. Chang, J.V. Misic, V.B. Misic, and L. Li, \u201cBLA: blockchain-assisted lightweight anonymous authentication for distributed vehicular fog services,\u201d IEEE Internet Things J., vol.6, no.2, pp.3775-3784, 2019. 10.1109\/jiot.2019.2892009","DOI":"10.1109\/JIOT.2019.2892009"},{"key":"19","unstructured":"[19] \u201cMmitss final conops: Concept of operations,\u201d http:\/\/www.cts.virginia.edu\/wp-content\/uploads\/2014\/05\/Task2.3._CONOPS_6_Final_Revised.pdf."},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] W. Wang, H. Xu, M. Alazab, T.R. Gadekallu, Z. Han, and C. Su, \u201cBlockchain-based reliable and efficient certificateless signature for iiot devices,\u201d IEEE Trans. Ind. Informat., pp.1-9, 2021. 10.1109\/tii.2021.3084753","DOI":"10.1109\/TII.2021.3084753"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] W. Wang, H. Huang, L. Zhang, and C. Su, \u201cSecure and efficient mutual authentication protocol for smart grid under blockchain,\u201d Peer-to-Peer Networking and Applications, vol.14, no.5, pp.2681-2693, 2021. 10.1007\/s12083-020-01020-2","DOI":"10.1007\/s12083-020-01020-2"},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] L. Zhang, Y. Zou, W. Wang, Z. Jin, Y. Su, and H. Chen, \u201cResource allocation and trust computing for blockchain-enabled edge computing system,\u201d Computers &amp; Security, vol.105, p.102249, 2021. 10.1016\/j.cose.2021.102249","DOI":"10.1016\/j.cose.2021.102249"},{"key":"23","unstructured":"[23] S. Nakamoto, \u201cBitcoin: a peer-to-peer electronic cash system,\u201d Technical report, Manubot, 2019."},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] W. Li, M. Nejad, and R. Zhang, \u201cA blockchain-based architecture for traffic signal control systems,\u201d 2019 IEEE International Congress on Internet of Things, ICIOT, pp.33-40, 2019. 10.1109\/iciot.2019.00018","DOI":"10.1109\/ICIOT.2019.00018"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis, A.D. Caro, D. Enyeart, C. Ferris, G. Laventman, Y. Manevich, S. Muralidharan, C. Murthy, B. Nguyen, M. Sethi, G. Singh, K. Smith, A. Sorniotti, C. Stathakopoulou, M. Vukolic, S.W. Cocco, and J. Yellick, \u201cHyperledger fabric: a distributed operating system for permissioned blockchains,\u201d Proc. Thirteenth EuroSys Conference, EuroSys 2018, Porto, Portugal, ed. R. Oliveira, P. Felber, and Y.C. Hu, pp.30:1-30:15, April 23-26, 2018. 10.1145\/3190508.3190538","DOI":"10.1145\/3190508.3190538"},{"key":"26","unstructured":"[26] M. Castro and B. Liskov, \u201cPractical byzantine fault tolerance,\u201d Proc. Third USENIX Symposium on Operating Systems Design and Implementation (OSDI), New Orleans, Louisiana, USA, Feb. 22-25, 1999, ed. M.I. Seltzer and P.J. Leach, pp.173-186, USENIX Association, 1999. 10.1145\/238721"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E105.D\/2\/E105.D_2021BCP0014\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,5]],"date-time":"2022-02-05T03:48:53Z","timestamp":1644032933000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E105.D\/2\/E105.D_2021BCP0014\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,1]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2021bcp0014","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,1]]},"article-number":"2021BCP0014"}}