{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:00:04Z","timestamp":1775667604848,"version":"3.50.1"},"reference-count":101,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T00:00:00Z","timestamp":1724371200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>A self-driving vehicle can navigate autonomously in smart cities without the need for human intervention. The emergence of Autonomous Connected Vehicles (ACVs) poses a substantial threat to public and passenger safety due to the possibility of cyber-attacks, which encompass remote hacking, manipulation of sensor data, and probable disablement or accidents. The sensors collect data to facilitate the network\u2019s recognition of local landmarks, such as trees, curbs, pedestrians, signs, and traffic lights. ACVs gather vast amounts of data, encompassing the exact geographical coordinates of the vehicle, captured images, and signals received from various sensors. To create a fully autonomous system, it is imperative to intelligently integrate several technologies, such as sensors, communication, computation, machine learning (ML), data analytics, and other technologies. The primary issues in ACVs involve data privacy and security when instantaneously exchanging substantial volumes of data. This study investigates related data security and privacy research in ACVs using the Blockchain-enabled Federated Reinforcement Learning (BFRL) framework. This paper provides a literature review examining data security and privacy in ACVs and the BFRL framework that can be used to protect ACVs. This study presents the integration of FRL and Blockchain (BC) in the context of smart cities. Furthermore, the challenges and opportunities for future research on ACVs utilising BFRL frameworks are discussed.<\/jats:p>","DOI":"10.3390\/bdcc8090095","type":"journal-article","created":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T07:53:37Z","timestamp":1724658817000},"page":"95","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Data Privacy and Security in Autonomous Connected Vehicles in Smart City Environment"],"prefix":"10.3390","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2731-4627","authenticated-orcid":false,"given":"Tanweer","family":"Alam","sequence":"first","affiliation":[{"name":"Faculty of Computer and Information Systems, Islamic University of Madinah, P.O. Box. 170, Madinah 42351, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2024,8,23]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"135237","DOI":"10.1016\/j.scitotenv.2019.135237","article-title":"Connected & autonomous vehicles\u2013Environmental impacts\u2013A review","volume":"712","author":"Kopelias","year":"2020","journal-title":"Sci. Total Environ."},{"key":"ref_2","unstructured":"Zehtabchi, M. (2019). Measuring innovation in the autonomous vehicle technology. World Intellectual Property Organization (WIPO) Economic Research Working Paper Series, WIPO."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"493","DOI":"10.3390\/jcp3030025","article-title":"Autonomous vehicles: Sophisticated attacks, safety issues, challenges, open topics, blockchain, and future directions","volume":"3","author":"Giannaros","year":"2023","journal-title":"J. Cybersecur. Priv."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"3363","DOI":"10.1007\/s10586-023-04114-7","article-title":"Cybersecurity for autonomous vehicles against malware attacks in smart-cities","volume":"27","author":"Aurangzeb","year":"2024","journal-title":"Clust. Comput."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1177\/03611981231180200","article-title":"BELIEVE: Privacy-Aware Secure Multi-Party Computation for Real-Time Connected and Autonomous Vehicles and Micro-Mobility Data Validation Using Blockchain\u2014A Study on New York City Data","volume":"2678","author":"Khan","year":"2024","journal-title":"Transp. Res. Rec."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2048","DOI":"10.1109\/COMST.2024.3370169","article-title":"Vehicle as a service (VaaS): Leverage vehicles to build service networks and capabilities for smart cities","volume":"26","author":"Chen","year":"2024","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Ahmad, U., Han, M., and Mahmood, S. (2024). Enhancing Security in Connected and Autonomous Vehicles: A Pairing Approach and Machine Learning Integration. Appl. Sci., 14.","DOI":"10.3390\/app14135648"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1016\/j.jare.2014.02.006","article-title":"Cyber security challenges in Smart Cities: Safety, security and privacy","volume":"5","author":"Elmaghraby","year":"2014","journal-title":"J. Adv. Res."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Othmane, L.B., Weffers, H., Mohamad, M.M., and Wolf, M. (2015). A survey of security and privacy in connected vehicles. Wireless Sensor and Mobile Ad-Hoc Networks: Vehicular and Space Applications, Springer.","DOI":"10.1007\/978-1-4939-2468-4_10"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/MCOM.2017.1600267CM","article-title":"Security and privacy in smart city applications: Challenges and solutions","volume":"55","author":"Zhang","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Sathiyanarayanan, M., Mahendra, S., and Vasu, R.B. (2018, January 16\u201318). Smart security system for vehicles using internet of things (IoT). Proceedings of the 2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT), Bangalore, India.","DOI":"10.1109\/ICGCIoT.2018.8753073"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1016\/j.scs.2018.02.039","article-title":"Security and privacy challenges in smart cities","volume":"39","author":"Braun","year":"2018","journal-title":"Sustain. Cities Soc."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Lim, H.S., and Taeihagh, A. (2018). Autonomous vehicles for smart and sustainable cities: An in-depth exploration of privacy and cybersecurity implications. Energies, 11.","DOI":"10.3390\/en11051062"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Farahat, I.S., Tolba, A.S., Elhoseny, M., and Eladrosy, W. (2019). Data security and challenges in smart cities. Security in Smart Cities: Models, Applications, and Challenges, Springer.","DOI":"10.1007\/978-3-030-01560-2_6"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1109\/MNET.2019.1900120","article-title":"Autonomous driving cars in smart cities: Recent advances, requirements, and challenges","volume":"34","author":"Yaqoob","year":"2019","journal-title":"IEEE Netw."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Seuwou, P., Banissi, E., and Ubakanma, G. (2020). The future of mobility with connected and autonomous vehicles in smart cities. Digital Twin Technologies and Smart Cities, Springer.","DOI":"10.1007\/978-3-030-18732-3_3"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Woodrow, C., and Curran, K. (2020). Security Issues in Self-Driving Cars within Smart Cities. Security and Organization within IoT and Smart Cities, CRC Press.","DOI":"10.1201\/9781003018636-14"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"4131","DOI":"10.1109\/TII.2020.3006137","article-title":"A trust-based security system for data collection in smart city","volume":"17","author":"Fang","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1092","DOI":"10.1016\/j.future.2017.12.041","article-title":"Driverless vehicle security: Challenges and future research opportunities","volume":"108","author":"Rad","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1175","DOI":"10.1007\/s42452-020-2984-9","article-title":"Privacy and security challenges in smart and sustainable mobility","volume":"2","author":"Paiva","year":"2020","journal-title":"SN Appl. Sci."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1108\/IJPCC-10-2020-0182","article-title":"Safety driven intelligent autonomous vehicle for smart cities using IoT","volume":"17","author":"Balachander","year":"2021","journal-title":"Int. J. Pervasive Comput. Commun."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Janeera, D.A., Gnanamalar, S.S., Ramya, K.C., and Kumar, A.A. (2021). Internet of things and artificial intelligence-enabled secure autonomous vehicles for smart cities. Automotive Embedded Systems: Key Technologies, Innovations, and Applications, Springer International Publishing.","DOI":"10.1007\/978-3-030-59897-6_11"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wei, H., Wang, J., Zeng, X., and Chang, Y. (2022). Security issues and solutions for connected and autonomous vehicles in a sustainable city: A survey. Sustainability, 14.","DOI":"10.20944\/preprints202209.0230.v1"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MNET.003.2100522","article-title":"Security and privacy in V2X communications: How can collaborative learning improve cybersecurity?","volume":"36","author":"Sharma","year":"2022","journal-title":"IEEE Netw."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"586","DOI":"10.3390\/smartcities6010027","article-title":"Privacy and security concerns in the smart city","volume":"6","author":"Bogoni","year":"2023","journal-title":"Smart Cities"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2545","DOI":"10.1007\/s11277-024-11411-w","article-title":"Blockchain-Enabled Federated Reinforcement Learning (B-FRL) Model for Privacy Preservation Service in IoT Systems","volume":"136","author":"Alam","year":"2024","journal-title":"Wirel. Pers. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"100252","DOI":"10.1016\/j.treng.2024.100252","article-title":"Intelligent transportation systems for sustainable smart cities","volume":"2014","author":"Elassy","year":"2024","journal-title":"Transp. Eng."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"3417","DOI":"10.1007\/s10489-023-04991-w","article-title":"CAPPAD: A privacy-preservation solution for autonomous vehicles using SDN, differential privacy and data aggregation","volume":"54","author":"Gheisari","year":"2024","journal-title":"Appl. Intell."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Syamal, S., Datta, J., Basu, S., and Das, S. (2024). Deep Learning-Based Autonomous Driving and Cloud Traffic Management System for Smart City. Convergence of IoT, Blockchain, and Computational Intelligence in Smart Cities, CRC Press.","DOI":"10.1201\/9781003353034-7"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"e367","DOI":"10.1002\/spy2.367","article-title":"Autonomous vehicle security: Current survey and future research challenges","volume":"7","author":"Pali","year":"2024","journal-title":"Secur. Priv."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"44685","DOI":"10.1007\/s11042-023-17401-7","article-title":"An efficient federated learning based intrusion detection system using LS2DNN with PBKA based lightweight privacy preservation in cloud server","volume":"83","author":"Gupta","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_32","unstructured":"Alhabib, R., and Yadav, P. (2024). Data authorisation and validation in autonomous vehicles: A critical review. arXiv."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Ramalakshmi, K., Ganesh, S., and KrishnaKumari, L. (2024). Security and Privacy Issues of AI in Autonomous Vehicles. Artificial Intelligence for Autonomous Vehicles, Wiley.","DOI":"10.1002\/9781119847656.ch11"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"105368","DOI":"10.1016\/j.scs.2024.105368","article-title":"Cybersecurity vulnerability and resilience of cooperative driving automation for energy efficiency and flow stability in smart cities","volume":"106","author":"Khattak","year":"2024","journal-title":"Sustain. Cities Soc."},{"key":"ref_35","first-page":"27","article-title":"Cybersecurity Frameworks for Autonomous Vehicle Systems: Safeguarding Onboard Systems, Communication Networks, and Data Privacy in Smart City Ecosystems","volume":"4","author":"Asaju","year":"2024","journal-title":"Internet Things Edge Comput. J."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Ansari, A.K., and Ujjan, R.M. (2024). Addressing Security Issues and Challenges in Smart Logistics Using Smart Technologies. Cybersecurity in the Transportation Industry, Wiley.","DOI":"10.1002\/9781394204472.ch2"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1607","DOI":"10.1007\/s40747-023-01175-4","article-title":"Smart cities: The role of Internet of Things and machine learning in realizing a data-centric smart environment","volume":"10","author":"Ullah","year":"2024","journal-title":"Complex Intell. Syst."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Kong, S., Wang, K., Feng, C., and Wang, J. (2024). Smart Cities and Transportation Based Vehicle-To-Vehicle Communication and Cyber Security Analysis Using Machine Learning Model in 6G Network. Wireless Personal Communications, Springer.","DOI":"10.1007\/s11277-024-11183-3"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MNET.2024.3368457","article-title":"Privacy-Preserving Outsourcing Learning for Connected Autonomous Vehicles: Challenges, Solutions and Perspectives","volume":"38","author":"Xiong","year":"2024","journal-title":"IEEE Netw."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/MCOM.2017.1700879","article-title":"Blockchain: A distributed solution to automotive security and privacy","volume":"55","author":"Dorri","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_41","unstructured":"Sachdeva, H., Gupta, S., Misra, A., Chauhan, K., and Dave, M. (2022). Improving privacy and security in unmanned aerial vehicles network using blockchain. arXiv."},{"key":"ref_42","first-page":"1","article-title":"Integration of blockchain with connected and autonomous vehicles: Vision and challenge","volume":"14","author":"Dargahi","year":"2021","journal-title":"ACM J. Data Inf. Qual. (JDIQ)"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"3614","DOI":"10.1109\/TITS.2023.3236274","article-title":"Autonomous vehicles security: Challenges and solutions using blockchain and artificial intelligence","volume":"24","author":"Bendiab","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_44","first-page":"223","article-title":"Deep learning based blockchain solution for preserving privacy in future vehicles","volume":"16","author":"Nair","year":"2020","journal-title":"Int. J. Hybrid Intell. Syst."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Rathee, G., Sharma, A., Iqbal, R., Aloqaily, M., Jaglan, N., and Kumar, R. (2019). A blockchain framework for securing connected and autonomous vehicles. Sensors, 19.","DOI":"10.3390\/s19143165"},{"key":"ref_46","unstructured":"Ebrahim, M., Hafid, A., and Elie, E. (2022). Blockchain as privacy and security solution for smart environments: A Survey. arXiv."},{"key":"ref_47","unstructured":"Koduri, R., Nandyala, S., and Manalikandy, M. (2020). Secure Vehicular Communication Using Blockchain Technology, SAT. SAE Technical Paper."},{"key":"ref_48","first-page":"90","article-title":"Security enhancement in smart vehicle using blockchain-based architectural framework","volume":"3","author":"Smys","year":"2021","journal-title":"J. Artif. Intell."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Gupta, R., and Alam, T. (2024). Vehicular communication using federated learning empowered chimp optimization (FLECO) algorithm. Multimedia Tools and Applications, Springer.","DOI":"10.1007\/s11042-024-18137-8"},{"key":"ref_50","first-page":"390","article-title":"Privacy-preserved federated reinforcement learning for autonomy in signalized intersections","volume":"2024","author":"Asadi","year":"2024","journal-title":"Int. Conf. Transp. Dev."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"1882","DOI":"10.1109\/TITS.2023.3317358","article-title":"Privacy-preserving federated deep reinforcement learning for mobility-as-a-service","volume":"25","author":"Chu","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Li, Q., Wang, W., Zhu, Y., and Ying, Z. (2023). BOppCL: Blockchain-Enabled Opportunistic Federated Learning Applied in Intelligent Transportation Systems. Electronics, 13.","DOI":"10.3390\/electronics13010136"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"e120123212628","DOI":"10.2174\/1872212117666230112110257","article-title":"A Study of Federated Learning with Internet of Things for Data Privacy and Security using Privacy Preserving Techniques","volume":"18","author":"Shakeer","year":"2024","journal-title":"Recent Pat. Eng."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"6073","DOI":"10.1109\/TVT.2021.3076780","article-title":"Blockchain and federated learning for collaborative intrusion detection in vehicular edge computing","volume":"70","author":"Liu","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Dhasaratha, C., Hasan, M.K., Islam, S., Khapre, S., Abdullah, S., Ghazal, T.M., Alzahrani, A.I., Alalwan, N., Vo, N., and Akhtaruzzaman, M. (2024). Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things. CAAI Transactions on Intelligence Technology, IET.","DOI":"10.1049\/cit2.12287"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"4298","DOI":"10.1109\/TVT.2020.2973651","article-title":"Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles","volume":"69","author":"Lu","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Chellapandi, V.P., Yuan, L., Brinton, C.G., \u017bak, S.H., and Wang, Z. (2023, January 24\u201328). Federated learning for connected and automated vehicles: A survey of existing approaches and challenges. Proceedings of the 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), Bilbao, Spain.","DOI":"10.1109\/ITSC57777.2023.10421974"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"1825","DOI":"10.1109\/ACCESS.2023.3233983","article-title":"Gefl: Gradient encryption-aided privacy preserved federated learning for autonomous vehicles","volume":"11","author":"Parekh","year":"2023","journal-title":"IEEE Access"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Sivanantham, K., and Blessington Praveen, P. (2024). Automotive Vehicle Data Security Service in IoT Using ACO Algorithm. Supervised and Unsupervised Data Engineering for Multimedia Data, Wiley.","DOI":"10.1002\/9781119786443.ch4"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/j.ins.2022.12.088","article-title":"Federated learning in smart cities: Privacy and security survey","volume":"632","author":"Li","year":"2023","journal-title":"Inf. Sci."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"8423","DOI":"10.1109\/TITS.2021.3081560","article-title":"Privacy-preserved federated learning for autonomous driving","volume":"23","author":"Li","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_62","unstructured":"Bloom, C., Tan, J., Ramjohn, J., and Bauer, L. (2024, August 18). Self-Driving Cars and Data Collection: Privacy Perceptions of Networked Autonomous Vehicles. Thirteenth Symposium on Usable Privacy and Security (soups 2017). Available online: https:\/\/www.usenix.org\/system\/files\/conference\/soups2017\/soups2017-bloom.pdf."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"207308","DOI":"10.1109\/ACCESS.2020.3037705","article-title":"Attacks on self-driving cars and their countermeasures: A survey","volume":"8","author":"Chowdhury","year":"2020","journal-title":"IEEE Access"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Pisarov, J.L., and Mester, G. (2022). Self-driving robotic cars: Cyber security developments. Research Anthology on Cross-Disciplinary Designs and Applications of Automation, IGI Global.","DOI":"10.4018\/978-1-6684-3694-3.ch048"},{"key":"ref_65","unstructured":"Alheeti, K.M., and McDonald-Maier, K. (2016, January 7\u20138). Hybrid intrusion detection in connected self-driving vehicles. Proceedings of the 2016 22nd International Conference on Automation and Computing (ICAC), Colchester, UK."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Ayaz, F., Sheng, Z., Tian, D., and Leung, V.C. (2021). Blockchain-enabled security and privacy for Internet-of-Vehicles. Internet of Vehicles and Its Applications in Autonomous Driving, Springer.","DOI":"10.1007\/978-3-030-46335-9_9"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"10126","DOI":"10.1109\/TITS.2021.3121125","article-title":"Privacy and Trust in the Internet of Vehicles","volume":"23","author":"Zavvos","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Kim, S., Shrestha, R., Kim, S., and Shrestha, R. (2020). Security and privacy in intelligent autonomous vehicles. Automotive Cyber Security: Introduction, Challenges, and Standardization, Springer.","DOI":"10.1007\/978-981-15-8053-6"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"450","DOI":"10.3390\/vehicles6010020","article-title":"Enhancing security in vehicle-to-vehicle communication: A comprehensive review of protocols and techniques","volume":"6","author":"Muslam","year":"2024","journal-title":"Vehicles"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"100056","DOI":"10.1016\/j.commtr.2022.100056","article-title":"Future connected vehicles: Communications demands, privacy and cyber-security","volume":"2","author":"Olovsson","year":"2022","journal-title":"Commun. Transp. Res."},{"key":"ref_71","first-page":"556","article-title":"An Algorithm of the Privacy Security Protection Based on Location Service in the Internet of Vehicles","volume":"21","author":"Xie","year":"2019","journal-title":"Int. J. Netw. Secur."},{"key":"ref_72","unstructured":"Hasan, K.F., Overall, A., Ansari, K., Ramachandran, G., and Jurdak, R. (2021). Security, privacy and trust: Cognitive internet of vehicles. arXiv."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1016\/j.future.2019.02.029","article-title":"Security and privacy based access control model for internet of connected vehicles","volume":"97","author":"Habib","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"e4317","DOI":"10.1002\/ett.4317","article-title":"A survey on the blockchain techniques for the Internet of Vehicles security","volume":"35","author":"Kumar","year":"2024","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1109\/TGCN.2021.3110822","article-title":"Autonomous vehicles: Resource allocation, security, and data privacy","volume":"6","author":"Nayak","year":"2021","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"124534","DOI":"10.1109\/ACCESS.2022.3222834","article-title":"Deepclean: A robust deep learning technique for autonomous vehicle camera data privacy","volume":"10","author":"Adeboye","year":"2022","journal-title":"IEEE Access"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"8868355","DOI":"10.1155\/2021\/8868355","article-title":"Machine learning technologies for secure vehicular communication in internet of vehicles: Recent advances and applications","volume":"2021","author":"Ali","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1109\/OJCOMS.2022.3169500","article-title":"Security and privacy issues in autonomous vehicles: A layer-based survey","volume":"3","author":"Hataba","year":"2022","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_79","first-page":"90","article-title":"Privacy-Preserving Machine Learning Models for Autonomous Vehicle Data Analysis","volume":"3","author":"Yoshikawa","year":"2023","journal-title":"J. AI-Assist. Sci. Discov."},{"key":"ref_80","first-page":"01097","article-title":"AI to V2X Privacy and Security Issues in Autonomous Vehicles: Survey","volume":"Volume 392","author":"Mohiuddin","year":"2024","journal-title":"Proceedings of the International Conference on Multidisciplinary Research and Sustainable Development (ICMED 2024)"},{"key":"ref_81","unstructured":"Sani, A.R., Hassan, M.U., and Chen, J. (2022). Privacy preserving machine learning for electric vehicles: A survey. arXiv."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"2694","DOI":"10.1109\/COMST.2020.3011561","article-title":"When machine learning meets privacy in 6G: A survey","volume":"22","author":"Sun","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3417987","article-title":"Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures","volume":"53","author":"Waheed","year":"2020","journal-title":"ACM Comput. Surv. (Csur)"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Sharma, S., Ghanshala, K.K., and Mohan, S. (2018, January 8\u201310). A security system using deep learning approach for internet of vehicles (IoV). Proceedings of the 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA.","DOI":"10.1109\/UEMCON.2018.8796664"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MCE.2021.3089880","article-title":"Security, trust, and privacy for the Internet of vehicles: A deep learning approach","volume":"11","author":"Muhammad","year":"2021","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1109\/MNET.001.1900310","article-title":"Vehicular blockchain-based collective learning for connected and autonomous vehicles","volume":"27","author":"Fu","year":"2020","journal-title":"IEEE Wirel. Commun."},{"key":"ref_87","first-page":"100266","article-title":"Deep reinforcement learning approach for autonomous vehicle systems for maintaining security and safety using LSTM-GAN","volume":"26","author":"Rasheed","year":"2020","journal-title":"Veh. Commun."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"7195","DOI":"10.1007\/s10462-022-10348-5","article-title":"New challenges in reinforcement learning: A survey of security and privacy","volume":"56","author":"Lei","year":"2023","journal-title":"Artif. Intell. Rev."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1109\/MWC.005.2300030","article-title":"Convergence of communications, control, and machine learning for secure and autonomous vehicle navigation","volume":"31","author":"Zeng","year":"2024","journal-title":"IEEE Wirel. Commun."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"43303","DOI":"10.1109\/ACCESS.2022.3167812","article-title":"Deep reinforcement learning-based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles","volume":"10","author":"Muzahid","year":"2022","journal-title":"IEEE Access"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/COMST.2022.3224279","article-title":"Reinforcement learning-based physical cross-layer security and privacy in 6G","volume":"25","author":"Lu","year":"2022","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"4359","DOI":"10.1109\/TVT.2017.2780183","article-title":"Secure message communication protocol among vehicles in smart city","volume":"67","author":"Dua","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Olufowobi, H., and Bloom, G. (2019). Connected cars: Automotive cybersecurity and privacy for smart cities. Smart Cities Cybersecurity and Privacy, Elsevier.","DOI":"10.1016\/B978-0-12-815032-0.00016-0"},{"key":"ref_94","first-page":"2869","article-title":"IOT based security system for smart vehicle","volume":"5","author":"Girish","year":"2018","journal-title":"Int. Res. J. Eng. Technol. (IRJET)"},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"108101","DOI":"10.1016\/j.compeleceng.2022.108101","article-title":"Development of secure Internet of Vehicle Things (IoVT) for smart transportation system","volume":"102","author":"Karim","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_96","unstructured":"Billah, M., Mehedi, S.T., Anwar, A., Rahman, Z., and Islam, R. (2022). A systematic literature review on blockchain enabled federated learning framework for internet of vehicles. arXiv."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"102426","DOI":"10.1016\/j.ipm.2020.102426","article-title":"B-FERL: Blockchain based framework for securing smart vehicles","volume":"58","author":"Oham","year":"2021","journal-title":"Inf. Process. Manag."},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"8029","DOI":"10.3233\/JIFS-190449","article-title":"Blockchain: Perspectives and issues","volume":"37","author":"Sakho","year":"2019","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3460427","article-title":"A comprehensive survey of privacy-preserving federated learning: A taxonomy, review, and future directions","volume":"54","author":"Yin","year":"2021","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_100","first-page":"100551","article-title":"Autonomous Vehicles in 5G and beyond: A Survey","volume":"39","author":"Hakak","year":"2023","journal-title":"Veh. Commun."},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MVT.2017.2670859","article-title":"Vehicles as connected resources: Opportunities and challenges for the future","volume":"12","author":"Datta","year":"2017","journal-title":"IEEE Veh. Technol. Mag."}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/8\/9\/95\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:42:11Z","timestamp":1760110931000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/8\/9\/95"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,23]]},"references-count":101,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["bdcc8090095"],"URL":"https:\/\/doi.org\/10.3390\/bdcc8090095","relation":{},"ISSN":["2504-2289"],"issn-type":[{"value":"2504-2289","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,23]]}}}