{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,18]],"date-time":"2026-05-18T16:59:27Z","timestamp":1779123567084,"version":"3.51.4"},"reference-count":197,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T00:00:00Z","timestamp":1691193600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>Autonomous vehicles (AVs), defined as vehicles capable of navigation and decision-making independent of human intervention, represent a revolutionary advancement in transportation technology. These vehicles operate by synthesizing an array of sophisticated technologies, including sensors, cameras, GPS, radar, light imaging detection and ranging (LiDAR), and advanced computing systems. These components work in concert to accurately perceive the vehicle\u2019s environment, ensuring the capacity to make optimal decisions in real-time. At the heart of AV functionality lies the ability to facilitate intercommunication between vehicles and with critical road infrastructure\u2014a characteristic that, while central to their efficacy, also renders them susceptible to cyber threats. The potential infiltration of these communication channels poses a severe threat, enabling the possibility of personal information theft or the introduction of malicious software that could compromise vehicle safety. This paper offers a comprehensive exploration of the current state of AV technology, particularly examining the intersection of autonomous vehicles and emotional intelligence. We delve into an extensive analysis of recent research on safety lapses and security vulnerabilities in autonomous vehicles, placing specific emphasis on the different types of cyber attacks to which they are susceptible. We further explore the various security solutions that have been proposed and implemented to address these threats. The discussion not only provides an overview of the existing challenges but also presents a pathway toward future research directions. This includes potential advancements in the AV field, the continued refinement of safety measures, and the development of more robust, resilient security mechanisms. Ultimately, this paper seeks to contribute to a deeper understanding of the safety and security landscape of autonomous vehicles, fostering discourse on the intricate balance between technological advancement and security in this rapidly evolving field.<\/jats:p>","DOI":"10.3390\/jcp3030025","type":"journal-article","created":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T10:25:36Z","timestamp":1691231136000},"page":"493-543","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":177,"title":["Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions"],"prefix":"10.3390","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9413-8841","authenticated-orcid":false,"given":"Anastasios","family":"Giannaros","sequence":"first","affiliation":[{"name":"Computer Engineering and Informatics Department, University of Patras, 26504 Patras, Greece"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4632-6511","authenticated-orcid":false,"given":"Aristeidis","family":"Karras","sequence":"additional","affiliation":[{"name":"Computer Engineering and Informatics Department, University of Patras, 26504 Patras, Greece"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0891-6780","authenticated-orcid":false,"given":"Leonidas","family":"Theodorakopoulos","sequence":"additional","affiliation":[{"name":"Department of Management Science and Technology, University of Patras, 26334 Patras, Greece"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4253-7661","authenticated-orcid":false,"given":"Christos","family":"Karras","sequence":"additional","affiliation":[{"name":"Computer Engineering and Informatics Department, University of Patras, 26504 Patras, Greece"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8625-2219","authenticated-orcid":false,"given":"Panagiotis","family":"Kranias","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Engineering, National Technical University of Athens, 15773 Athens, Greece"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8490-6544","authenticated-orcid":false,"given":"Nikolaos","family":"Schizas","sequence":"additional","affiliation":[{"name":"Computer Engineering and Informatics Department, University of Patras, 26504 Patras, Greece"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2636-3497","authenticated-orcid":false,"given":"Gerasimos","family":"Kalogeratos","sequence":"additional","affiliation":[{"name":"Department of Management Science and Technology, University of Patras, 26334 Patras, Greece"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0760-4942","authenticated-orcid":false,"given":"Dimitrios","family":"Tsolis","sequence":"additional","affiliation":[{"name":"Department of History and Archaeology, University of Patras, 26504 Patras, Greece"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2023,8,5]]},"reference":[{"key":"ref_1","unstructured":"Guizzo, E. (2023, July 23). How Google\u2019s Self-Driving Car Works. IEEE Spectrum Online. Available online: https:\/\/spectrum.ieee.org\/how-google-self-driving-car-works."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Stiller, C., and Ziegler, J. (2012, January 20\u201323). 3D perception and planning for self-driving and cooperative automobiles. Proceedings of the International Multi-Conference on Systems, Signals & Devices, Chemnitz, Germany.","DOI":"10.1109\/SSD.2012.6198130"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Levinson, J., Askeland, J., Becker, J., Dolson, J., Held, D., Kammel, S., Kolter, J.Z., Langer, D., Pink, O., and Pratt, V. (2011, January 5\u20139). Towards fully autonomous driving: Systems and algorithms. Proceedings of the 2011 IEEE Intelligent Vehicles Symposium (IV), Baden-Baden, Germany.","DOI":"10.1109\/IVS.2011.5940562"},{"key":"ref_4","first-page":"546","article-title":"Potential Cyberattacks on Automated Vehicles","volume":"16","author":"Petit","year":"2015","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_5","first-page":"12","article-title":"An Overview of Inter-Vehicular Communication Systems, Protocols and Middleware","volume":"8","author":"Jawhar","year":"2013","journal-title":"J. Netw."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Petit, J., Feiri, M., and Kargl, F. (2014, January 14\u201315). Revisiting attacker model for smart vehicles. Proceedings of the IEEE 6th International Symposium on Wireless Vehicular Communications (WiVeC 2014), Vancouver, BC, Canada.","DOI":"10.1109\/WIVEC.2014.6953258"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Kerns, A.J., Wesson, K.D., and Humphreys, T.E. (2014, January 5\u20138). A blueprint for civil GPS navigation message authentication. Proceedings of the 2014 IEEE\/ION Position, Location and Navigation Symposium-PLANS 2014, Monterey, CA, USA.","DOI":"10.1109\/PLANS.2014.6851385"},{"key":"ref_8","first-page":"390","article-title":"A survey on various cyber attacks and their classification","volume":"15","author":"Uma","year":"2013","journal-title":"Int. J. Netw. Secur."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Ahangar, M.N., Ahmed, Q.Z., Khan, F.A., and Hafeez, M. (2021). A Survey of Autonomous Vehicles: Enabling Communication Technologies and Challenges. Sensors, 21.","DOI":"10.3390\/s21030706"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1109\/JAS.2020.1003021","article-title":"Artificial intelligence applications in the development of autonomous vehicles: A survey","volume":"7","author":"Ma","year":"2020","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1109\/TITS.2019.2901817","article-title":"Autonomous vehicles that interact with pedestrians: A survey of theory and practice","volume":"21","author":"Rasouli","year":"2019","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/0600000079","article-title":"Computer vision for autonomous vehicles: Problems, datasets and state of the art","volume":"12","author":"Janai","year":"2020","journal-title":"Found. Trends\u00ae Comput. Graph. Vis."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1146\/annurev-control-060117-105157","article-title":"Planning and decision-making for autonomous vehicles","volume":"1","author":"Schwarting","year":"2018","journal-title":"Annu. Rev. Control. Robot. Auton. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Parekh, D., Poddar, N., Rajpurkar, A., Chahal, M., Kumar, N., Joshi, G.P., and Cho, W. (2022). A review on autonomous vehicles: Progress, methods and challenges. Electronics, 11.","DOI":"10.3390\/electronics11142162"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Vargas, J., Alsweiss, S., Toker, O., Razdan, R., and Santos, J. (2021). An Overview of Autonomous Vehicles Sensors and Their Vulnerability to Weather Conditions. Sensors, 21.","DOI":"10.3390\/s21165397"},{"key":"ref_16","unstructured":"Tian, Y., Pei, K., Jana, S., and Ray, B. (3, January 27). DeepTest: Automated Testing of Deep-Neural-Network-Driven Autonomous Cars. Proceedings of the 40th International Conference on Software Engineering, ICSE \u201918, Gothenburg, Sweden."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Jing, P., Xu, G., Chen, Y., Shi, Y., and Zhan, F. (2020). The Determinants behind the Acceptance of Autonomous Vehicles: A Systematic Review. Sustainability, 12.","DOI":"10.3390\/su12051719"},{"key":"ref_18","unstructured":"NHTSA (2023, July 23). Automated Vehicles for Safety, Available online: www.nhtsa.gov\/technology-innovation\/automated-vehicles-safety."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"185","DOI":"10.2190\/DUGG-P24E-52WK-6CDG","article-title":"Emotional intelligence","volume":"9","author":"Salovey","year":"1990","journal-title":"Imagin. Cogn. Personal."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1177\/0047287521993578","article-title":"Customer acceptance of autonomous vehicles in travel and tourism","volume":"61","author":"Ribeiro","year":"2022","journal-title":"J. Travel Res."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Li, J., Holl\u00e4nder, K., and Butz, A. (2019, January 21\u201325). Introducing automated driving to the generation 50+. Proceedings of the 11th International Conference on Automotive User Interfaces and Interactive Vehicular Applications: Adjunct Proceedings, Utrecht, The Netherlands.","DOI":"10.1145\/3349263.3351329"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.techfore.2015.12.014","article-title":"Applied artificial intelligence and trust\u2014The case of autonomous vehicles and medical assistance devices","volume":"105","author":"Hengstler","year":"2016","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1170","DOI":"10.1007\/s12559-020-09757-x","article-title":"Exploring personalised autonomous vehicles to influence user trust","volume":"12","author":"Sun","year":"2020","journal-title":"Cogn. Comput."},{"key":"ref_24","unstructured":"Amara, D.K., Chebrolu, N.R., R, V., and Kp, S. (2018). A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities. arXiv."},{"key":"ref_25","unstructured":"Hu, H., and Wei, N. (2009, January 19\u201320). A study of GPS jamming and anti-jamming. Proceedings of the 2009 2nd International Conference on Power Electronics and Intelligent Transportation System (PEITS), Shenzhen, China."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Ahmad, M., and Akhtar, M.U. (2019, January 30\u201331). Impact and Detection of GPS Spoofing and Countermeasures against Spoofing. Proceedings of the 2nd International Conference on Computing, Mathematics and Engineering Technologies\u2013iCoMET, Sukkur, Pakistan.","DOI":"10.1109\/ICOMET.2019.8673518"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2898","DOI":"10.1109\/TITS.2017.2665968","article-title":"Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges","volume":"18","author":"Parkinson","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1002\/navi.44","article-title":"Real-Time GPS Spoofing Detection via Correlation of Encrypted Signals","volume":"60","author":"Psiaki","year":"2013","journal-title":"Navig.-J. Inst. Navig."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"8012569","DOI":"10.1155\/2019\/8012569","article-title":"A Combined Antijamming and Antispoofing Algorithm for GPS Arrays","volume":"2019","author":"Yang","year":"2019","journal-title":"Int. J. Antennas Propag."},{"key":"ref_30","unstructured":"Nayegandhi, A. (2019, January 12). Lidar Technology Overview. Proceedings of the US Geological Survey, St. Petersburg, FL, USA."},{"key":"ref_31","first-page":"995","article-title":"Remote Attacks on Automated Vehicles Sensors: Experiments on Camera and LiDAR","volume":"11","author":"Petit","year":"2015","journal-title":"Black Hat Eur."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Cao, Y., Xiao, C., Cyr, B., Zhou, Y., Park, W., Rampazzi, S., Chen, Q.A., Fu, K., and Mao, Z.M. (2019, January 11\u201315). Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK.","DOI":"10.1145\/3319535.3339815"},{"key":"ref_33","first-page":"7","article-title":"LiDAR Data Integrity Verification for Autonomous Vehicle","volume":"18","author":"Changalvala","year":"2019","journal-title":"IEEE Access"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Bahirat, K., and Prabhakaran, B. (2017, January 10\u201314). A study on lidar data forensics. Proceedings of the 2017 IEEE International Conference on Multimedia and Expo (ICME), Hong Kong, China.","DOI":"10.1109\/ICME.2017.8019395"},{"key":"ref_35","unstructured":"Hallyburton, R.S., and Pajic, M. (2023). Securing Autonomous Vehicles Under Partial-Information Cyber Attacks on LiDAR Data. arXiv."},{"key":"ref_36","unstructured":"Bhupathiraju, S.H.V., Sheldon, J., Bauer, L.A., Bindschaedler, V., Sugawara, T., and Rampazzi, S. (June, January 29). EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting Using Electromagnetic Interference. Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Guildford, UK."},{"key":"ref_37","unstructured":"Cao, Y., Xiao, C., Yang, D., Fang, J., Yang, R., Liu, M., and Li, B. (2019). Adversarial objects against lidar-based autonomous driving systems. arXiv."},{"key":"ref_38","unstructured":"Haddrell, M., and Martin, K.M. (2023, July 23). Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures. Available online: http:\/\/book.itep.ru\/depository\/pilotless\/RH-2016-autonomous-cars-Michael-Haddrell.pdf."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/MCOM.2015.7120028","article-title":"Security vulnerabilities of connected vehicle streams and their impact on cooperative driving","volume":"53","author":"Amoozadeh","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1109\/TITS.2006.883940","article-title":"Lane Detection with Moving Vehicles in the Traffic Scenes","volume":"7","author":"Cheng","year":"2006","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Bahlmann, C., Zhu, Y., Ramesh, V., Pellkofer, M., and Koehler, T. (2005, January 6\u20138). A system for traffic sign detection, tracking, and recognition using color, shape, and motion information. Proceedings of the IEEE Proceedings, Intelligent Vehicles Symposium, Las Vegas, NV, USA.","DOI":"10.1109\/IVS.2005.1505111"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/TITS.2012.2233736","article-title":"Enhancing Light Blob Detection for Intelligent Headlight Control Using Lane Detection","volume":"14","author":"Eum","year":"2013","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_43","unstructured":"Gomes, L. (2023, July 23). Hidden Obstacles for Google\u2019s Self-Driving Cars. Available online: www.technologyreview.com\/s\/530276\/hidden-obstacles-for-googles-self-driving-cars\/."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., and Shacham, H. (2010, January 16\u201319). Experimental Security Analysis of a Modern Automobile. Proceedings of the I2010 IEEE Symposium on Security and Privacy, Berkeley\/Oakland, CA, USA.","DOI":"10.1109\/SP.2010.34"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"27846","DOI":"10.1109\/ACCESS.2019.2901710","article-title":"Deep learning-based channel prediction in realistic vehicular communications","volume":"7","author":"Joo","year":"2019","journal-title":"IEEE Access"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Mehdizadeh, A., Cai, M., Hu, Q., Alamdar Yazdi, M.A., Mohabbati-Kalejahi, N., Vinel, A., Rigdon, S.E., Davis, K.C., and Megahed, F.M. (2020). A Review of Data Analytic Applications in Road Traffic Safety. Part 1: Descriptive and Predictive Modeling. Sensors, 20.","DOI":"10.3390\/s20041107"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"e4290","DOI":"10.1002\/dac.4290","article-title":"An evolutionary game theory\u2013based security model in vehicular ad hoc networks","volume":"33","author":"Zahedi","year":"2020","journal-title":"Int. J. Commun. Syst."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Tesei, A., Luise, M., Pagano, P., and Ferreira, J. (2021, January 25\u201328). Secure Multi-access Edge Computing Assisted Maneuver Control for Autonomous Vehicles. Proceedings of the 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), Helsinki, Finland.","DOI":"10.1109\/VTC2021-Spring51267.2021.9449087"},{"key":"ref_49","first-page":"284","article-title":"A Study of Sybil and Temporal Attacks in Vehicular Ad-Hoc Networks: Types, Challenges, and Impacts","volume":"3","author":"Shrivastava","year":"2014","journal-title":"Int. J. Comput. Appl. Technol. Res."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1109\/TVT.2010.2089544","article-title":"ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks","volume":"60","author":"Huang","year":"2011","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Chen, C., Wang, X., Han, W., and Zang, B. (2009, January 22\u201326). A Robust Detection of the Sybil Attack in Urban VANETs. Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems Workshops, Montreal, QC, Canada.","DOI":"10.1109\/ICDCSW.2009.48"},{"key":"ref_52","unstructured":"Hao, Y., Tang, J., and Cheng, Y. (2011, January 5\u20139). Cooperative Sybil Attack Detection for Position Based Applications in Privacy Preserved VANETs. Proceedings of the 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, Houston, TX, USA."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1109\/JSAC.2011.110311","article-title":"A Distributed Key Management Framework with Cooperative Message Authentication in VANETs","volume":"29","author":"Hao","year":"2011","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1109\/JSAC.2011.110308","article-title":"P2DAP\u2014Sybil Attacks Detection in Vehicular Ad Hoc Networks","volume":"29","author":"Zhou","year":"2011","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Triki, B., Rekhis, S., Chammem, M., and Boudriga, N. (2013, January 23\u201325). A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks. Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC), Dubai, United Arab Emirates.","DOI":"10.1109\/WMNC.2013.6549051"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1504\/IJSN.2014.066178","article-title":"Sybil attack detection in VANET using neighbouring vehicles","volume":"9","author":"Grover","year":"2014","journal-title":"Int. J. Secur. Netw."},{"key":"ref_57","first-page":"1","article-title":"Identification of malicious vehicle in vanet environment from ddos attack","volume":"4","author":"Pathre","year":"2013","journal-title":"J. Glob. Res. Comput. Sci."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Pathre, A., Agrawal, C., and Jain, A. (2013, January 26\u201328). A novel defense scheme against DDOS attack in VANET. Proceedings of the 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN), Bhopal, India.","DOI":"10.1109\/WOCN.2013.6616194"},{"key":"ref_59","first-page":"975","article-title":"Security Attacks with an Effective Solution for DOS Attacks in VANET","volume":"66","author":"Malla","year":"2013","journal-title":"Int. J. Comput. Appl."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"He, L., and Zhu, W.T. (2012, January 25\u201327). Mitigating DoS attacks against signature-based authentication in VANETs. Proceedings of the 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE), Zhangjiajie, China.","DOI":"10.1109\/CSAE.2012.6272951"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/s11277-013-1161-5","article-title":"Prevention of DoS attacks in VANET","volume":"73","author":"Verma","year":"2013","journal-title":"Wirel. Pers. Commun."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Safi, S.M., Movaghar, A., and Mohammadizadeh, M. (2009, January 28\u201330). A novel approach for avoiding wormhole attacks in VANET. Proceedings of the 2009 First Asian Himalayas International Conference on Internet, Kathmandu, Nepal.","DOI":"10.1109\/AHICI.2009.5340317"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lu, R., Lin, X., Ho, P., and Shen, X. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. Proceedings of the IEEE INFOCOM 2008-The 27th Conference on Computer Communications, Phoenix, AZ, USA.","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.adhoc.2010.05.005","article-title":"SPECS: Secure and privacy enhancing communications schemes for VANETs","volume":"9","author":"Chim","year":"2011","journal-title":"Ad Hoc Netw."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Kim, T., Studer, A., and Dubey, R. (2010, January 24). VANET alert endorsement using multi-source filters. Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, VANET 2010, Chicago, IL, USA.","DOI":"10.1145\/1860058.1860067"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","article-title":"GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications","volume":"56","author":"Lin","year":"2007","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Buttyan, L., Hubaux, J.P., Kargl, F., Kung, A., and Raya, M. (2007, January 6\u20138). Architecture for Secure and Private Vehicular Communications. Proceedings of the 2007 7th International Conference on ITS Telecommunications, Sophia Antipolis, France.","DOI":"10.1109\/ITST.2007.4295890"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Hussein, A., Garc\u00eda, F., Armingol, J.M., and Olaverri-Monreal, C. (2016, January 1\u20134). P2V and V2P communication for Pedestrian warning on the basis of Autonomous Vehicles. Proceedings of the 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, Brazil.","DOI":"10.1109\/ITSC.2016.7795885"},{"key":"ref_69","unstructured":"(2023, July 19). Can Driverless Vehicles Be Hacked?. Available online: https:\/\/www.hlmlawfirm.com\/blog\/can-driverless-vehicles-be-hacked\/."},{"key":"ref_70","unstructured":"(2023, July 19). HackerNoon. Available online: https:\/\/hackernoon.com\/how-to-hack-self-driving-cars-vulnerabilities-in-autonomous-vehicles-jh3r37cz."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Algarni, A., and Thayananthan, V. (2022). Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data Communication. Symmetry, 14.","DOI":"10.3390\/sym14122494"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Kumar, K.N., Vishnu, C., Mitra, R., and Mohan, C.K. (2020, January 13\u201315). Black-box adversarial attacks in autonomous vehicle technology. Proceedings of the 2020 IEEE Applied Imagery Pattern Recognition Workshop (AIPR), Washington, DC, USA.","DOI":"10.1109\/AIPR50011.2020.9425267"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.procs.2020.07.027","article-title":"On-board unit to connect personal mobility vehicles to the IoT","volume":"175","author":"Santa","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref_74","first-page":"1","article-title":"Effects of on-board unit on driving behavior in connected vehicle traffic flow","volume":"2019","author":"Chang","year":"2019","journal-title":"J. Adv. Transp."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.future.2022.09.010","article-title":"A reputation mechanism based Deep Reinforcement Learning and blockchain to suppress selfish node attack motivation in Vehicular Ad-Hoc Network","volume":"139","author":"Zhang","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"4457","DOI":"10.1109\/TITS.2021.3059261","article-title":"Assessing trust level of a driverless car using deep learning","volume":"22","author":"Karmakar","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Ge, B., Li, X., Shi, B., and Li, B. (2016, January 25\u201327). Controlling a Car Through OBD Injection. Proceedings of the 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), Beijing, China.","DOI":"10.1109\/CSCloud.2016.42"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Yan, W. (2015, January 19\u201323). A two-year survey on security challenges in automotive threat landscape. Proceedings of the 2015 International Conference on Connected Vehicles and Expo (ICCVE), Shenzhen, China.","DOI":"10.1109\/ICCVE.2015.1"},{"key":"ref_79","first-page":"405","article-title":"Security, Vulnerability and Protection of Vehicular On-board Diagnostics","volume":"10","author":"Yadav","year":"2016","journal-title":"Int. J. Secur. Its Appl."},{"key":"ref_80","first-page":"28","article-title":"Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks","volume":"2","author":"Oka","year":"2009","journal-title":"Int. J. Digit. Crime Forensics"},{"key":"ref_81","unstructured":"Vallance, C. (2023, July 23). Car Hack Uses Digital-Radio Broadcasts to Seize Control. 22 July 2015. Available online: www.bbc.com\/news\/technology-33622298."},{"key":"ref_82","unstructured":"Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., and Kohno, T. (2011, January 8\u201312). Comprehensive experimental analyses of automotive attack surfaces. Proceedings of the 20th USENIX Conference on Security, San Francisco, CA, USA."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Luo, F., and Hou, S. (2019). Security Mechanisms Design of Automotive Gateway Firewall, SAE. SAE Technical Paper.","DOI":"10.4271\/2019-01-0481"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Zhang, H., Meng, X., Zhang, X., and Liu, Z. (2020). CANsec: A Practical in-Vehicle Controller Area Network Security Evaluation Tool. Sensors, 20.","DOI":"10.3390\/s20174900"},{"key":"ref_85","first-page":"2122","article-title":"In-Vehicle CAN Bus Tampering Attacks Detection for Connected and Autonomous Vehicles Using an Improved Isolation Forest Method","volume":"24","author":"Duan","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Hoque, M.A., Hossain, M., and Hasan, R. (2022, January 8\u201311). BenchAV: A Security Benchmarking Framework for Autonomous Driving. Proceedings of the 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC49033.2022.9700548"},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Brocklehurst, C., and Radenkovic, M. (2022). Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles. J. Sens. Actuator Netw., 11.","DOI":"10.3390\/jsan11030035"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Qurashi, J.M., Ikram, M.J., Jambi, K., Eassa, F.E., and Khemakhem, M. (2023, January 23\u201325). Autonomous Vehicles: Security Challenges and Game theory-based Countermeasures. Proceedings of the 2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC), Jeddah, Saudi Arabia.","DOI":"10.1109\/ICAISC56366.2023.10085301"},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Yadav, N., Ansar, S.A., and Chaurasia, P.K. (2022, January 13\u201314). Review of Attacks on Connected and Autonomous Vehicles (CAV) and their Existing Solutions. Proceedings of the 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India.","DOI":"10.1109\/ICRITO56286.2022.9965024"},{"key":"ref_90","first-page":"118","article-title":"Autonomous Vehicles: Improving Cyber Security","volume":"4","author":"Goyal","year":"2022","journal-title":"Int. J. Adv. Res. Technol. Innov."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Kamal, M., Kyrkou, C., Piperigkos, N., Papandreou, A., Kloukiniotis, A., Casademont, J., Mateu, N.P., Castillo, D.B., Rodriguez, R.D., and Durante, N.G. (2022, January 14\u201323). A Comprehensive Solution for Securing Connected and Autonomous Vehicles. Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), Antwerp, Belgium.","DOI":"10.23919\/DATE54114.2022.9774594"},{"key":"ref_92","first-page":"343","article-title":"New Threats to Vehicle Safety: How Cybersecurity Policy Will Shape the Future of Autonomous Vehicles","volume":"23","author":"Kennedy","year":"2017","journal-title":"Mich. Telecommun. Technol. Law Rev."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wei, H., Wang, J., Zeng, X., and Chang, Y. (2022). Security Issues and Solutions for Connected and Autonomous Vehicles in a Sustainable City: A Survey. Sustainability, 14.","DOI":"10.20944\/preprints202209.0230.v1"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"11735","DOI":"10.1109\/TIE.2022.3229333","article-title":"Dynamic Watermarking for Cybersecurity of Autonomous Vehicles","volume":"70","author":"Shangguan","year":"2023","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_95","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., and Fergus, R. (2014). Intriguing properties of neural networks. arXiv."},{"key":"ref_96","unstructured":"Goodfellow, I., Shlens, J., and Szegedy, C. (2014). Explaining and Harnessing Adversarial Examples. arXiv."},{"key":"ref_97","unstructured":"Kurakin, A., Goodfellow, I.J., and Bengio, S. (2018). Artificial Intelligence Safety and Security, Chapman and Hall\/CRC."},{"key":"ref_98","unstructured":"Engstrom, L., Tsipras, D., Schmidt, L., and Madry, A. (2019, January 6\u20139). A Rotation and a Translation Suffice: Fooling CNNs with Simple Transformations. Proceedings of the ICLR 2019 Conference Blind Submission, New Orleans, LA, USA."},{"key":"ref_99","unstructured":"Pei, K., Cao, Y., Yang, J., and Jana, S. (2017). Towards Practical Verification of Machine Learning: The Case of Computer Vision Systems. arXiv."},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ma, S., Aafer, Y., and Lee, W.C. (2018, January 18\u201321). Trojaning Attack on Neural Networks. Proceedings of the Network and Distributed System Security Symposium, Diego, CA, USA.","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref_101","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Jha, S., and Fredrikson, M. (2016, January 21\u201324). The Limitations of Deep Learning in Adversarial Settings. Proceedings of the 1st IEEE European Symposium on Security & Privacy, Saarbrucken, Germany.","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., and Swami, A. (2017, January 2\u20136). Practical Black-Box Attacks against Machine Learning. Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates.","DOI":"10.1145\/3052973.3053009"},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Carlini, N., and Wagner, D. (2017, January 22\u201326). Towards Evaluating the Robustness of Neural Networks. Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.","DOI":"10.1109\/SP.2017.49"},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Carlini, N., and Wagner, D. (2017, January 3). Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods. Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, Dallas, TX, USA.","DOI":"10.1145\/3128572.3140444"},{"key":"ref_105","unstructured":"Brown, T.B., Man\u00e9, D., Roy, A., Abadi, M., and Gilmer, J. (2017). Adversarial patch. arXiv."},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","article-title":"One pixel attack for fooling deep neural networks","volume":"23","author":"Su","year":"2017","journal-title":"IEEE Trans. Evol. Comput."},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"1802","DOI":"10.1080\/00207179.2021.1876922","article-title":"Design of LPV control for autonomous vehicles using the contributions of big data analysis","volume":"95","year":"2022","journal-title":"Int. J. Control"},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Familsamavati, S., Yari, P., Salehian, S., Salehian, R., Abbasi, M., and Khosravi, M.R. (2021, January 15\u201316). The Role of Big Data and Smart Technologies in Autonomous Vehicles. Proceedings of the 5th International Conference on Future Networks & Distributed Systems, ICFNDS 2021, New York, NY, USA.","DOI":"10.1145\/3508072.3508199"},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Yoo, A., Shin, S., Lee, J., and Moon, C. (2020). Implementation of a Sensor Big Data Processing System for Autonomous Vehicles in the C-ITS Environment. Appl. Sci., 10.","DOI":"10.3390\/app10217858"},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Karras, A., Karras, C., Schizas, N., Avlonitis, M., and Sioutas, S. (2023). AutoML with Bayesian Optimizations for Big Data Management. Information, 14.","DOI":"10.3390\/info14040223"},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Karras, C., Karras, A., Giotopoulos, K.C., Avlonitis, M., and Sioutas, S. (2023). Consensus Big Data Clustering for Bayesian Mixture Models. Algorithms, 16.","DOI":"10.3390\/a16050245"},{"key":"ref_112","doi-asserted-by":"crossref","unstructured":"Karras, C., Karras, A., Tsolis, D., Giotopoulos, K.C., and Sioutas, S. (2022, January 23\u201325). Distributed Gibbs Sampling and LDA Modelling for Large Scale Big Data Management on PySpark. Proceedings of the 2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), Ioannina, Greece.","DOI":"10.1109\/SEEDA-CECNSM57760.2022.9932990"},{"key":"ref_113","doi-asserted-by":"crossref","unstructured":"Samoladas, D., Karras, C., Karras, A., Theodorakopoulos, L., and Sioutas, S. (2022, January 25\u201327). Tree Data Structures and Efficient Indexing Techniques for Big Data Management: A Comprehensive Study. Proceedings of the 26th Pan-Hellenic Conference on Informatics, PCI \u201922, Athens, Greece.","DOI":"10.1145\/3575879.3575977"},{"key":"ref_114","unstructured":"Nguyen, H., Nguyen, T., Lepp\u00e4nen, T., Partala, J., and Pirttikangas, S. Situation awareness for autonomous vehicles using blockchain-based service cooperation. Proceedings of the International Conference on Advanced Information Systems Engineering."},{"key":"ref_115","doi-asserted-by":"crossref","unstructured":"Kianersi, D., Uppalapati, S., Bansal, A., and Straub, J. (2022). Evaluation of a Reputation Management Technique for Autonomous Vehicles. Future Internet, 14.","DOI":"10.3390\/fi14020031"},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Baza, M., Nabil, M., Lasla, N., Fidan, K., Mahmoud, M., and Abdallah, M. (2019, January 15\u201318). Blockchain-based firmware update scheme tailored for autonomous vehicles. Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco.","DOI":"10.1109\/WCNC.2019.8885769"},{"key":"ref_117","unstructured":"Oham, C., Kanhere, S.S., Jurdak, R., and Jha, S. (2018). A blockchain based liability attribution framework for autonomous vehicles. arXiv."},{"key":"ref_118","unstructured":"Shivers, R.M. (2019). Toward a Secure and Decentralized Blockchain-Based Ride-Hailing Platform for Autonomous Vehicles. [PhD Thesis, Tennessee Technological University]."},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"4157","DOI":"10.1109\/JIOT.2020.3028368","article-title":"Blockchain for the internet of vehicles towards intelligent transportation systems: A survey","volume":"8","author":"Mollah","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_120","doi-asserted-by":"crossref","unstructured":"Maglogiannis, I., Iliadis, L., Macintyre, J., and Cortez, P. (2022). Artificial Intelligence Applications and Innovations, Springer.","DOI":"10.1007\/978-3-031-08337-2"},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Maleh, Y., Baddi, Y., Alazab, M., Tawalbeh, L., and Romdhani, I. (2021). Artificial Intelligence and Blockchain for Future Cybersecurity Applications, Springer International Publishing.","DOI":"10.1007\/978-3-030-74575-2"},{"key":"ref_122","unstructured":"Show, A.K., Kumar, A., Singhal, A., Gayathri, N., and Vengatesan, K. (2021). Opportunities and Challenges for Blockchain Technology in Autonomous Vehicles, IGI Global."},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Pedrosa, A.R., and Pau, G. (2018, January 15). ChargeltUp: On Blockchain-Based Technologies for Autonomous Vehicles. Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, CryBlock\u201918, New York, NY, USA.","DOI":"10.1145\/3211933.3211949"},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"130264","DOI":"10.1109\/ACCESS.2021.3113649","article-title":"Blockchain and Autonomous Vehicles: Recent Advances and Future Directions","volume":"9","author":"Jain","year":"2021","journal-title":"IEEE Access"},{"key":"ref_125","first-page":"7632892","article-title":"Autonomous Vehicles and Intelligent Automation: Applications, Challenges, and Opportunities","volume":"2022","author":"Bathla","year":"2022","journal-title":"Mob. Inf. Syst."},{"key":"ref_126","doi-asserted-by":"crossref","unstructured":"Yeasmin, S., and Haque, A. (2021, January 27\u201330). A Multi-Factor Authenticated Blockchain-Based OTA Update Framework for Connected Autonomous Vehicles. Proceedings of the 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall), Norman, OK, USA.","DOI":"10.1109\/VTC2021-Fall52928.2021.9625372"},{"key":"ref_127","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1016\/j.trpro.2020.02.024","article-title":"Blockchain technology on the way of autonomous vehicles development","volume":"44","author":"Narbayeva","year":"2020","journal-title":"Transp. Res. Procedia"},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1109\/MNET.001.1900504","article-title":"Challenges and Solutions in Autonomous Driving: A Blockchain Approach","volume":"34","author":"Wang","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_129","first-page":"100249","article-title":"Applications of blockchain in unmanned aerial vehicles: A review","volume":"23","author":"Alladi","year":"2020","journal-title":"Veh. Commun."},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"4518","DOI":"10.1109\/JIOT.2021.3105547","article-title":"BCC: Blockchain-Based Collaborative Crowdsensing in Autonomous Vehicular Networks","volume":"9","author":"Hui","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"3614","DOI":"10.1109\/TITS.2023.3236274","article-title":"Autonomous Vehicles Security: Challenges and Solutions Using Blockchain and Artificial Intelligence","volume":"24","author":"Bendiab","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/MCE.2022.3141065","article-title":"On the Role of Futuristic Technologies in Securing UAV-Supported Autonomous Vehicles","volume":"11","author":"Aloqaily","year":"2022","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_133","doi-asserted-by":"crossref","unstructured":"Jha, S., Jha, N., Prashar, D., Ahmad, S., Alouffi, B., and Alharbi, A. (2022). Integrated IoT-Based Secure and Efficient Key Management Framework Using Hashgraphs for Autonomous Vehicles to Ensure Road Safety. Sensors, 22.","DOI":"10.3390\/s22072529"},{"key":"ref_134","doi-asserted-by":"crossref","unstructured":"Kuzmin, A., and Znak, E. (2018\u20132, January 31). Blockchain-base structures for a secure and operate network of semi-autonomous Unmanned Aerial Vehicles. Proceedings of the 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Singapore.","DOI":"10.1109\/SOLI.2018.8476785"},{"key":"ref_135","doi-asserted-by":"crossref","unstructured":"Rajendar, S., Thangavel, U., Devendran, S., Selvi, V., and Muthumanickam, S.S. (2023, January 2\u20134). Blockchain for Securing Autonomous Vehicles. Proceedings of the 2023 Second International Conference on Electronics and Renewable Systems (ICEARS), Tamil Nadu, India.","DOI":"10.1109\/ICEARS56392.2023.10085685"},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"106717","DOI":"10.1016\/j.compeleceng.2020.106717","article-title":"Blockchainbased security attack resilience schemes for autonomous vehicles in industry 4.0: A systematic review","volume":"86","author":"Gupta","year":"2020","journal-title":"Comput. Electr. Eng."},{"key":"ref_137","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","article-title":"On blockchain and its integration with IoT. Challenges and opportunities","volume":"88","author":"Reyna","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_138","doi-asserted-by":"crossref","first-page":"20995","DOI":"10.1109\/ACCESS.2022.3149958","article-title":"Blockchain Technology for Intelligent Transportation Systems: A Systematic Literature Review","volume":"10","author":"Jabbar","year":"2022","journal-title":"IEEE Access"},{"key":"ref_139","doi-asserted-by":"crossref","first-page":"4640","DOI":"10.1109\/JIOT.2018.2874398","article-title":"Blockchain-based internet of vehicles: Distributed network architecture and performance analysis","volume":"6","author":"Jiang","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_140","doi-asserted-by":"crossref","first-page":"58241","DOI":"10.1109\/ACCESS.2018.2890736","article-title":"Data security sharing and storage based on a consortium blockchain in a vehicular ad hoc network","volume":"7","author":"Zhang","year":"2019","journal-title":"Ieee Access"},{"key":"ref_141","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MCE.2021.3089992","article-title":"BIIoVT: Blockchain-based secure storage architecture for intelligent internet of vehicular things","volume":"11","author":"Singh","year":"2021","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_142","doi-asserted-by":"crossref","first-page":"4880","DOI":"10.1109\/TVT.2021.3068990","article-title":"A blockchain-based incremental update supported data storage system for intelligent vehicles","volume":"70","author":"Yin","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_143","first-page":"103179","article-title":"Blockchain-based secure and trusted data sharing scheme for autonomous vehicle underlying 5G","volume":"67","author":"Kakkar","year":"2022","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_144","unstructured":"Nair, M.M., and Tyagi, A.K. Preserving privacy using blockchain technology in autonomous vehicles. Proceedings of the International Conference on Network Security and Blockchain Technology."},{"key":"ref_145","doi-asserted-by":"crossref","unstructured":"Singh, M., and Kim, S. (2017, January 5\u20138). Introduce reward-based intelligent vehicles communication using blockchain. Proceedings of the 2017 International SoC Design Conference (ISOCC), Seoul, Republic of Korea.","DOI":"10.1109\/ISOCC.2017.8368806"},{"key":"ref_146","unstructured":"Rowan, S., Clear, M., Gerla, M., Huggard, M., and Goldrick, C.M. (2017). Securing vehicle to vehicle communications using blockchain through visible light and acoustic side-channels. arXiv."},{"key":"ref_147","doi-asserted-by":"crossref","first-page":"1495","DOI":"10.1109\/JIOT.2018.2836144","article-title":"Blockchain-based decentralized trust management in vehicular networks","volume":"6","author":"Yang","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_148","doi-asserted-by":"crossref","unstructured":"Mitra, S., Bose, S., Gupta, S.S., and Chattopadhyay, A. (2018, January 26\u201330). Secure and tamper-resilient distributed ledger for data aggregation in autonomous vehicles. Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), Chengdu, China.","DOI":"10.1109\/APCCAS.2018.8605625"},{"key":"ref_149","doi-asserted-by":"crossref","unstructured":"Rathee, G., Sharma, A., Iqbal, R., Aloqaily, M., Jaglan, N., and Kumar, R. (2019). A Blockchain Framework for Securing Connected and Autonomous Vehicles. Sensors, 19.","DOI":"10.3390\/s19143165"},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"102426","DOI":"10.1016\/j.ipm.2020.102426","article-title":"B-FERL: Blockchain based framework for securing smart vehicles","volume":"58","author":"Oham","year":"2021","journal-title":"Inf. Process. Manag."},{"key":"ref_151","doi-asserted-by":"crossref","first-page":"2757","DOI":"10.1007\/s12083-021-01073-x","article-title":"Blockchain-based secure and intelligent sensing scheme for autonomous vehicles activity tracking beyond 5g networks","volume":"14","author":"Reebadiya","year":"2021","journal-title":"Peer- Netw. Appl."},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.comcom.2020.11.008","article-title":"Lightweight blockchain assisted secure routing of swarm UAS networking","volume":"165","author":"Wang","year":"2021","journal-title":"Comput. Commun."},{"key":"ref_153","doi-asserted-by":"crossref","first-page":"3997","DOI":"10.1109\/TITS.2020.3002462","article-title":"Blockchain-based lightweight and secured v2v communication in the internet of vehicles","volume":"22","author":"Kamal","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_154","doi-asserted-by":"crossref","first-page":"104569","DOI":"10.1016\/j.micpro.2022.104569","article-title":"VABLOCK: A blockchain-based secure communication in V2V network using icn network support technology","volume":"93","author":"Ali","year":"2022","journal-title":"Microprocess. Microsyst."},{"key":"ref_155","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MCOM.2018.1800137","article-title":"Block4forensic: An integrated lightweight blockchain framework for forensics applications of connected vehicles","volume":"56","author":"Cebe","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_156","doi-asserted-by":"crossref","unstructured":"Alphand, O., Amoretti, M., Claeys, T., Dall\u2019Asta, S., Duda, A., Ferrari, G., Rousseau, F., Tourancheau, B., Veltri, L., and Zanichelli, F. (2018, January 15\u201318). IoTChain: A blockchain security architecture for the Internet of Things. Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain.","DOI":"10.1109\/WCNC.2018.8377385"},{"key":"ref_157","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1109\/JIOT.2018.2864168","article-title":"Privacy in internet of things: From principles to technologies","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_158","doi-asserted-by":"crossref","unstructured":"Davi, L., Hatebur, D., Heisel, M., and Wirtz, R. (2019, January 10). Combining safety and security in autonomous cars using blockchain technologies. Proceedings of the Computer Safety, Reliability, and Security: SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland. Proceedings 38.","DOI":"10.1007\/978-3-030-26250-1_18"},{"key":"ref_159","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3404500","article-title":"TangleCV: A distributed ledger technique for secure message sharing in connected vehicles","volume":"5","author":"Rathore","year":"2020","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"ref_160","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1109\/TDSC.2021.3130583","article-title":"Eunomia: Anonymous and secure vehicular digital forensics based on blockchain","volume":"20","author":"Li","year":"2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_161","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1111\/coin.12529","article-title":"Accident responsibility identification model for Internet of Vehicles based on lightweight blockchain","volume":"39","author":"Yao","year":"2023","journal-title":"Comput. Intell."},{"key":"ref_162","doi-asserted-by":"crossref","first-page":"2906","DOI":"10.1109\/TVT.2019.2894944","article-title":"Toward secure blockchain-enabled internet of vehicles: Optimizing consensus management using reputation and contract theory","volume":"68","author":"Kang","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_163","doi-asserted-by":"crossref","unstructured":"Abbes, S., and Rekhis, S. (July, January 28). A blockchain-based solution for reputation management in IoV. Proceedings of the 2021 International Wireless Communications and Mobile Computing (IWCMC), Harbin City, China.","DOI":"10.1109\/IWCMC51323.2021.9498940"},{"key":"ref_164","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/MNET.011.2000339","article-title":"Two-Layered Blockchain Architecture for Federated Learning Over the Mobile Edge Network","volume":"36","author":"Feng","year":"2022","journal-title":"IEEE Netw."},{"key":"ref_165","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.comcom.2022.04.024","article-title":"6Blocks: 6G-enabled trust management scheme for decentralized autonomous vehicles","volume":"191","author":"Bhattacharya","year":"2022","journal-title":"Comput. Commun."},{"key":"ref_166","doi-asserted-by":"crossref","unstructured":"Mushtaq, A., Haq, I., Sarwar, M.A., Khan, A., and Shafiq, O. (2022). Traffic Management of Autonomous Vehicles using Policy Based Deep Reinforcement Learning and Intelligent Routing. arXiv.","DOI":"10.1109\/ACCESS.2021.3063463"},{"key":"ref_167","doi-asserted-by":"crossref","unstructured":"Elayan, H., Aloqaily, M., Salameh, H.B., and Guizani, M. (2021, January 4\u20137). Intelligent Cooperative Health Emergency Response System in Autonomous Vehicles. Proceedings of the 2021 IEEE 46th Conference on Local Computer Networks (LCN), Edmonton, AB, Canada.","DOI":"10.1109\/LCN52139.2021.9524950"},{"key":"ref_168","doi-asserted-by":"crossref","unstructured":"Kusari, A., Li, P., Yang, H., Punshi, N., Rasulis, M., Bogard, S., and LeBlanc, D.J. (2022, January 5\u20139). Enhancing SUMO simulator for simulation based testing and validation of autonomous vehicles. Proceedings of the 2022 IEEE Intelligent Vehicles Symposium (IV), Aachen, Germany.","DOI":"10.1109\/IV51971.2022.9827241"},{"key":"ref_169","doi-asserted-by":"crossref","first-page":"4297","DOI":"10.1109\/TII.2019.2946618","article-title":"Underwater Internet of Things in Smart Ocean: System Architecture and Open Issues","volume":"16","author":"Qiu","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_170","doi-asserted-by":"crossref","first-page":"012001","DOI":"10.1088\/1755-1315\/857\/1\/012001","article-title":"Intelligent data processing methods in sensor networks of mobile and autonomous objects","volume":"857","author":"Ganin","year":"2021","journal-title":"IOP Conf. Ser. Earth Environ. Sci."},{"key":"ref_171","doi-asserted-by":"crossref","unstructured":"El Hamdani, S., and Benamar, N. (2018, January 20\u201322). Autonomous Traffic Management: Open Issues and New Directions. Proceedings of the 2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT), Tangier, Morocco.","DOI":"10.1109\/MoWNet.2018.8428937"},{"key":"ref_172","doi-asserted-by":"crossref","unstructured":"Axelrod, C.W. (2017, January 5). Cybersecurity in the age of autonomous vehicles, intelligent traffic controls and pervasive transportation networks. Proceedings of the 2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, USA.","DOI":"10.1109\/LISAT.2017.8001966"},{"key":"ref_173","doi-asserted-by":"crossref","unstructured":"Axelrod, C.W. (2017, January 7\u20138). Cybersecurity challenges of systems-of-systems for fully-autonomous road vehicles. Proceedings of the 2017 13th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT), Stony Brook, NY, USA.","DOI":"10.1109\/CEWIT.2017.8263141"},{"key":"ref_174","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MNET.003.2100522","article-title":"Security and Privacy in V2X Communications: How Can Collaborative Learning Improve Cybersecurity?","volume":"36","author":"Sharma","year":"2022","journal-title":"IEEE Netw."},{"key":"ref_175","doi-asserted-by":"crossref","unstructured":"Ahmed, M., Iqbal, R., Amin, S., Alhabshneh, O., and Garba, A. (2022, January 23\u201324). Autonomous Vehicle and its Adoption: Challenges, Opportunities, and Future Implications. Proceedings of the 2022 International Conference on Emerging Trends in Computing and Engineering Applications (ETCEA), Karak, Jordan.","DOI":"10.1109\/ETCEA57049.2022.10009804"},{"key":"ref_176","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/19427867.2021.2007681","article-title":"Vehicle ownership models for a sharing economy with autonomous vehicle considerations","volume":"15","author":"Stinson","year":"2021","journal-title":"Transp. Lett."},{"key":"ref_177","doi-asserted-by":"crossref","unstructured":"Taylor, C.R., Carter, J.M., Huff, S., Nafziger, E., Rios-Torres, J., Zhang, B., and Turcotte, J. (2022, January 8\u201311). Evaluating Efficiency and Security of Connected and Autonomous Vehicle Applications. Proceedings of the 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC49033.2022.9700691"},{"key":"ref_178","doi-asserted-by":"crossref","unstructured":"Boddupalli, S., Chamarthi, V.S.G., Lin, C.W., and Ray, S. (2022, January 8\u201312). CAVELIER: Automated Security Evaluation for Connected Autonomous Vehicle Applications. Proceedings of the 2022 IEEE 25th International Conference on Intelligent Transportation Systems (ITSC), Macau, China.","DOI":"10.1109\/ITSC55140.2022.9921825"},{"key":"ref_179","doi-asserted-by":"crossref","unstructured":"Kaasen, A.D., Grov, G., Mancini, F., and Baksaas, M. (2022\u20132, January 28). Towards data-driven autonomous cyber defence for military unmanned vehicles-threats & attacks. Proceedings of the MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), Rockville, MD, USA.","DOI":"10.1109\/MILCOM55135.2022.10017692"},{"key":"ref_180","doi-asserted-by":"crossref","unstructured":"He, Q., Meng, X., Qu, R., and Xi, R. (2020). Machine Learning-Based Detection for Cyber Security Attacks on Connected and Autonomous Vehicles. Mathematics, 8.","DOI":"10.3390\/math8081311"},{"key":"ref_181","unstructured":"(2023, July 23). Security of the Perception in Autonomous Driving under Physical-World Adversarial Attacks. Available online: https:\/\/bpb-us-w2.wpmucdn.com\/wp.ovptl.uci.edu\/dist\/e\/3\/files\/2022\/10\/ICS-1.pdf."},{"key":"ref_182","doi-asserted-by":"crossref","unstructured":"Cui, C., Du, H., Jia, Z., He, Y., Yang, Y., and Jin, M. (2022, January 18\u201320). Data Poisoning Attack Using Hybrid Particle Swarm Optimization in Connected and Autonomous Vehicles. Proceedings of the 2022 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE), Gold Coast, Australia.","DOI":"10.1109\/CSDE56538.2022.10089285"},{"key":"ref_183","doi-asserted-by":"crossref","first-page":"25469","DOI":"10.1109\/TITS.2021.3105834","article-title":"An Enhanced Multi-Stage Deep Learning Framework for Detecting Malicious Activities From Autonomous Vehicles","volume":"23","author":"Khan","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_184","doi-asserted-by":"crossref","first-page":"5389359","DOI":"10.1155\/2022\/5389359","article-title":"Privacy-preserved in-cabin monitoring system for autonomous vehicles","volume":"2022","author":"Mishra","year":"2022","journal-title":"Comput. Intell. Neurosci."},{"key":"ref_185","doi-asserted-by":"crossref","unstructured":"Jarouf, A., Meskin, N., Al-Kuwari, S., Shakerpour, M., and Cassanderas, C.G. (2022, January 4\u20139). Security analysis of merging control for connected and automated vehicles. Proceedings of the 2022 IEEE Intelligent Vehicles Symposium (IV), Aachen, Germany.","DOI":"10.1109\/IV51971.2022.9827242"},{"key":"ref_186","doi-asserted-by":"crossref","unstructured":"Brubaker, C., Jana, S., Ray, B., Khurshid, S., and Shmatikov, V. (2014, January 18\u201321). Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL\/TLS Implementations. Proceedings of the 2014 IEEE Symposium on Security and Privacy, Berkeley, CA, USA.","DOI":"10.1109\/SP.2014.15"},{"key":"ref_187","doi-asserted-by":"crossref","unstructured":"Kim, J.S. (2022\u20132, January 29). Design of Federated Learning Engagement Method for Autonomous Vehicle Privacy Protection. Proceedings of the 2022 Joint 12th International Conference on Soft Computing and Intelligent Systems and 23rd International Symposium on Advanced Intelligent Systems (SCIS&ISIS), Ise, Japan.","DOI":"10.1109\/SCISISIS55246.2022.10001931"},{"key":"ref_188","doi-asserted-by":"crossref","unstructured":"Krichen, M., Lahami, M., and Al\u2013Haija, Q.A. (2022, January 11\u201313). Formal Methods for the Verification of Smart Contracts: A Review. Proceedings of the 2022 15th International Conference on Security of Information and Networks (SIN), Sousse, Tunisia.","DOI":"10.1109\/SIN56466.2022.9970534"},{"key":"ref_189","doi-asserted-by":"crossref","unstructured":"Abdellatif, T., and Brousmiche, K.L. (2018, January 26\u201328). Formal Verification of Smart Contracts Based on Users and Blockchain Behaviors Models. Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France.","DOI":"10.1109\/NTMS.2018.8328737"},{"key":"ref_190","doi-asserted-by":"crossref","first-page":"24325","DOI":"10.1109\/ACCESS.2018.2819189","article-title":"Toward a secure drone system: Flying with real-time homomorphic authenticated encryption","volume":"6","author":"Cheon","year":"2018","journal-title":"IEEE Access"},{"key":"ref_191","first-page":"1936","article-title":"A novel image-based homomorphic approach for preserving the privacy of autonomous vehicles connected to the cloud","volume":"24","author":"Sultan","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_192","doi-asserted-by":"crossref","unstructured":"Karras, A., Karras, C., Giotopoulos, K.C., Tsolis, D., Oikonomou, K., and Sioutas, S. (2022, January 23\u201325). Peer to Peer Federated Learning: Towards Decentralized Machine Learning on Edge Devices. Proceedings of the 2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), Ioannina, Greece.","DOI":"10.1109\/SEEDA-CECNSM57760.2022.9932980"},{"key":"ref_193","doi-asserted-by":"crossref","unstructured":"Karras, A., Karras, C., Giotopoulos, K.C., Tsolis, D., Oikonomou, K., and Sioutas, S. (2023). Federated Edge Intelligence and Edge Caching Mechanisms. Information, 14.","DOI":"10.3390\/info14070414"},{"key":"ref_194","doi-asserted-by":"crossref","first-page":"4242","DOI":"10.1109\/TII.2019.2950057","article-title":"Achieving Personalized k-Anonymity-Based Content Privacy for Autonomous Vehicles in CPS","volume":"16","author":"Wang","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_195","doi-asserted-by":"crossref","first-page":"1092","DOI":"10.1016\/j.future.2017.12.041","article-title":"Driverless vehicle security: Challenges and future research opportunities","volume":"108","author":"Torre","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_196","doi-asserted-by":"crossref","unstructured":"Schizas, N., Karras, A., Karras, C., and Sioutas, S. (2022). TinyML for Ultra-Low Power AI and Large Scale IoT Deployments: A Systematic Review. Future Internet, 14.","DOI":"10.3390\/fi14120363"},{"key":"ref_197","doi-asserted-by":"crossref","unstructured":"Antonini, M., Pincheira, M., Vecchio, M., and Antonelli, F. (2023). An Adaptable and Unsupervised TinyML Anomaly Detection System for Extreme Industrial Environments. Sensors, 23.","DOI":"10.3390\/s23042344"}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/3\/3\/25\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:26:35Z","timestamp":1760127995000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/3\/3\/25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,5]]},"references-count":197,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,9]]}},"alternative-id":["jcp3030025"],"URL":"https:\/\/doi.org\/10.3390\/jcp3030025","relation":{},"ISSN":["2624-800X"],"issn-type":[{"value":"2624-800X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,5]]}}}