{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:35:05Z","timestamp":1766486105302,"version":"build-2065373602"},"reference-count":46,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2022,2,20]],"date-time":"2022-02-20T00:00:00Z","timestamp":1645315200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Information fusion in automated vehicle for various datatypes emanating from many resources is the foundation for making choices in intelligent transportation autonomous cars. To facilitate data sharing, a variety of communication methods have been integrated to build a diverse V2X infrastructure. However, information fusion security frameworks are currently intended for specific application instances, that are insufficient to fulfill the overall requirements of Mutual Intelligent Transportation Systems (MITS). In this work, a data fusion security infrastructure has been developed with varying degrees of trust. Furthermore, in the V2X heterogeneous networks, this paper offers an efficient and effective information fusion security mechanism for multiple sources and multiple type data sharing. An area-based PKI architecture with speed provided by a Graphic Processing Unit (GPU) is given in especially for artificial neural synchronization-based quick group key exchange. A parametric test is performed to ensure that the proposed data fusion trust solution meets the stringent delay requirements of V2X systems. The efficiency of the suggested method is tested, and the results show that it surpasses similar strategies already in use.<\/jats:p>","DOI":"10.3390\/s22041652","type":"journal-article","created":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T08:34:47Z","timestamp":1645432487000},"page":"1652","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Information Fusion in Autonomous Vehicle Using Artificial Neural Group Key Synchronization"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2409-7172","authenticated-orcid":false,"given":"Mohammad Zubair","family":"Khan","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information, Taibah University, Medina 42353, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4951-4729","authenticated-orcid":false,"given":"Arindam","family":"Sarkar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electronics, Ramakrishna Mission Vidyamandira, Belur Math, Howrah 711202, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0537-8163","authenticated-orcid":false,"given":"Hamza","family":"Ghandorh","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Taibah University, Medina 42353, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8236-8746","authenticated-orcid":false,"given":"Maha","family":"Driss","sequence":"additional","affiliation":[{"name":"Security Engineering Lab, CCIS, Prince Sultan University, Riyadh 12435, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2133-0757","authenticated-orcid":false,"given":"Wadii","family":"Boulila","sequence":"additional","affiliation":[{"name":"Robotics and Internet-of-Things Laboratory, Prince Sultan University, Riyadh 12435, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2022,2,20]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Ghaleb, F., Maarof, M., Zainal, A., Al-rimy, B., Alsaeedi, A., and Boulila, W. (2019). Ensemble-based hybrid context-aware misbehavior detection model for vehicular ad hoc network. Remote Sens., 23.","DOI":"10.3390\/rs11232852"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Ghaleb, F., Saeed, F., Al-Sarem, M., Ali Saleh Al-rimy, B., Boulila, W., Eljialy, A., Aloufi, K., and Alazab, M. (2020). Misbehavior-aware on-demand collaborative intrusion detection system using distributed ensemble learning for VANET. Electronics, 9.","DOI":"10.3390\/electronics9091411"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2977954","DOI":"10.1155\/2021\/2977954","article-title":"Fairness-Oriented Semichaotic Genetic Algorithm-Based Channel Assignment Technique for Node Starvation Problem in Wireless Mesh Networks","volume":"2021","author":"Ghaleb","year":"2021","journal-title":"Comput. Intell. Neurosci."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1016\/j.jpdc.2011.12.004","article-title":"A hierarchical reliability-driven scheduling algorithm in grid systems","volume":"72","author":"Tang","year":"2012","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"9457","DOI":"10.1109\/TVT.2016.2591558","article-title":"Interworking of DSRC and cellular network technologies for V2X communications: A survey","volume":"65","author":"Abboud","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_6","unstructured":"Filippi, A., Moerman, K., Daalderop, G., Alexandera, P.D., Schober, F., and Pfliegl, W. (2021, August 10). Ready to roll: Why 802.11p beats LTE and 5G for V2X, A White Paper by NXP Semiconductors. Cohda Wirel. Siemens, Available online: https:\/\/assets.new.siemens.com\/siemens\/assets\/api\/uuid:ab5935c545ee430a94910921b8ec75f3c17bab6c\/its-g5-ready-to-roll-en.pdf."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/3161587.3161593","article-title":"An overview of 3GPP cellular Vehicle-to-Everything standards","volume":"21","author":"Wang","year":"2017","journal-title":"GetMobile"},{"key":"ref_8","unstructured":"ETSI (2014). 302 637-2 v1. 3.1-Intelligent Transport Systems (ITS). Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service, ETSI."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Haidar, F., Kaiser, A., and Lonc, B. (2017, January 24\u201327). On the performance evaluation of vehicular PKI protocol for V2X communications security. Proceedings of the IEEE 86th Vehicular Technology Conference, Toronto, ON, Canada.","DOI":"10.1109\/VTCFall.2017.8288286"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"4999","DOI":"10.1109\/TNNLS.2019.2955165","article-title":"Neural Cryptography Based on Complex-Valued Neural Network","volume":"31","author":"Dong","year":"2020","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1007\/s11063-021-10443-8","article-title":"Deep Learning Guided Double Hidden Layer Neural Synchronization Through Mutual Learning","volume":"53","author":"Sarkar","year":"2021","journal-title":"Neural Process. Lett."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"6680782","DOI":"10.1155\/2021\/6680782","article-title":"Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems","volume":"2021","author":"Jeong","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Teodoro, A.A.M., Gomes, O.S.M., Saadi, M., Silva, B.A., Rosa, R.L., and Rodr\u00edguez, D.Z. (2021). An FPGA-Based Performance Evaluation of Artificial Neural Network Architecture Algorithm for IoT. Wirel. Pers. Commun.","DOI":"10.1007\/s11277-021-08566-1"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1007\/978-3-319-24369-6_37","article-title":"The Impact of the TPM Weights Distribution on Network Synchronization Time","volume":"Volume 9339","author":"Dolecki","year":"2015","journal-title":"ComputerInformation Systems and Industrial Management"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Bellavista, P., Foschini, L., and Zamagni, E. (2014, January 14\u201317). V2X protocols for low-penetration-rate and cooperative traffic estimations. Proceedings of the IEEE 80th Vehicular Technology Conference (VTC Fall), Vancouver, BC, Canada.","DOI":"10.1109\/VTCFall.2014.6966225"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"836460","DOI":"10.1155\/2011\/836460","article-title":"Prime field ECDSA signature processing for reconfigurable embedded systems","volume":"2011","author":"Glas","year":"2011","journal-title":"Int. J. Reconfigurable Comput."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Khalil-Hani, M., Nambiar, V.P., and Marsono, M. (2010, January 27\u201329). Hardware acceleration of openssl cryptographic functions for high-performance Internet security. Proceedings of the IEEE International Conference on Intelligent Systems, Modelling and Simulation (ISMS), Liverpool, UK.","DOI":"10.1109\/ISMS.2010.89"},{"key":"ref_18","first-page":"720","article-title":"Performance analysis of SHA-2 and SHA-3 finalists","volume":"3","author":"Dahal","year":"2013","journal-title":"Int. J. Cryptogr. Inf. Secur."},{"key":"ref_19","first-page":"714","article-title":"A conference key distribution system","volume":"28","author":"Ingemarsson","year":"1982","journal-title":"IEEE Trans."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Steiner, M., Tsudik, G., and Waidner, M. (1996). Diffie-Hellman key distribution extended to group communication. Proceedings of the 3rd ACM Conference on Computer and Communications Security, New Delhi, India, 14\u201315 March 1996, ACM Press.","DOI":"10.1145\/238168.238182"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1109\/71.877936","article-title":"Key Agreement in Dynamic Peer Groups","volume":"11","author":"Steiner","year":"2000","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1080\/09720529.2019.1637154","article-title":"An enhanced quantum key distribution protocol for security authentication","volume":"22","author":"Kumar","year":"2019","journal-title":"J. Discret. Math. Sci. Cryptogr."},{"key":"ref_23","unstructured":"AdrainPerrig (1999). Efficient Collaborative key management protocols for secure autonomous group communication. International Workshop on Cryptographic Techniques and Electronic Commerce, University of Hong Kong Press."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Kim, Y., Perrig, A., and Tsudik, G. (2000). Simple and Fault Tolerant Key agreement for Dynamic Collaborative groups. Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, 1\u20134 November 2000, ACM Press.","DOI":"10.1145\/352600.352638"},{"key":"ref_25","unstructured":"Joux, A. (2009). Asymmetric group key agreement. EUROCRYPT 2009: Advances in Cryptology, Springer. LNCS."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"4318","DOI":"10.1016\/j.ins.2011.05.009","article-title":"Provably secure one-round identity-based authenticated asymmetric group key agreement protocol","volume":"181","author":"Zhang","year":"2011","journal-title":"Inf. Sci."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1109\/JCN.2012.6292248","article-title":"Reducing rekeying time using an integrated group key agreement scheme","volume":"14","author":"Gu","year":"2012","journal-title":"J. Commun. Netw."},{"key":"ref_28","first-page":"563","article-title":"An efficient constant round ID-based group key agreement protocol for Ad hoc networks","volume":"Volume 7873","author":"Lopez","year":"2013","journal-title":"NSS 2013: Network and System Security"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1109\/TPDS.2010.128","article-title":"Flexible robust group key agreement","volume":"22","author":"Jarecki","year":"2011","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_30","unstructured":"Boyd, C., and Mathuria, A. (2013). Protocols for Authentication and Key Establishment, Springer Books."},{"key":"ref_31","first-page":"385","article-title":"A one round Protocol for Tripartite Diffie-Hellman","volume":"Volume 1838","author":"Joux","year":"2000","journal-title":"Algorithmic Number Theory, Proceedings of the 4th International Symposium, ANTS-IV, Leiden, The Netherlands, 2\u20137 July 2000"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Aliev, H., Kim, H., and Choi, S. (2020). A Scalable and Secure Group Key Management Method for Secure V2V Communication. Sensors, 20.","DOI":"10.3390\/s20216137"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Han, B., Peng, S., Wu, C., Wang, X., and Wang, B. (2020). LoRa-Based Physical Layer Key Generation for Secure V2V\/V2I Communications. Sensors, 20.","DOI":"10.3390\/s20030682"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2358","DOI":"10.1109\/TNNLS.2018.2884620","article-title":"Global synchronization of coupled fractional-order recurrent neural networks","volume":"30","author":"Liu","year":"2019","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.chaos.2018.12.021","article-title":"A true random bit generator based on a memristive chaotic circuit: Analysis, design and FPGA implementation","volume":"119","author":"Karakaya","year":"2019","journal-title":"Chaos Solitons Fractals"},{"key":"ref_36","first-page":"441","article-title":"A pseudo random bit generator based on chaotic logistic map and its statistical testing","volume":"33","author":"Patidar","year":"2009","journal-title":"Informatica"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1049\/iet-ifs.2014.0192","article-title":"Pseudo-random bit generator based on non-stationary logistic maps","volume":"10","author":"Liu","year":"2016","journal-title":"IET Inf. Secur."},{"key":"ref_38","unstructured":"(2021, October 20). Autotalks and Security. Available online: https:\/\/www.auto-talks.com."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Bian, K., Zhang, G., and Song, L. (2017, January 24\u201327). Security in use cases of Vehicle-to-Everything communications. Proceedings of the IEEE 86th Vehicular Technology Conference, Toronto, ON, Canada.","DOI":"10.1109\/VTCFall.2017.8288208"},{"key":"ref_40","unstructured":"(2021, October 24). ETSI. TUAK Algorithm Set, 2018, Available online: https:\/\/www.etsi.org\/about\/what-we-do\/security-algorithms-and-codes\/cellular-algorithm-licences."},{"key":"ref_41","unstructured":"Bos, J.W. (2013). High-performance cryptology on GPUs. GTC, Microsoft Research."},{"key":"ref_42","unstructured":"Barker, J., and Wu, B. (2017). Nvidia Tegra X2 Architecture and Design, Rochester Institute of Technology. Available online: https:\/\/meseec.ce.rit.edu\/551-projects\/spring2017\/1-4.pdf."},{"key":"ref_43","unstructured":"Kontzer, T. (2021, September 05). Driving Change: Volvo\u2019s \u201cDrive Me \u201d Project to Make Self-Driving Carssynonymous with Safety. Available online: https:\/\/blogs.nvidia.com\/blog\/2016\/04\/06\/volvo-safetyself-driving."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Singla, A., Chandrasekaran, B., Godfrey, P., and Maggs, B. (2014, January 27\u201328). The Internet at the speed of light. Proceedings of the 13th ACM Workshop on Hot Topics in Networks, Los Angeles, CA, USA.","DOI":"10.1145\/2670518.2673876"},{"key":"ref_45","first-page":"4","article-title":"The new SHA-3 software shootout","volume":"2012","author":"Bernstein","year":"2012","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_46","unstructured":"NIST (2021, November 26). NIST Statistical Test; 2020, Available online: https:\/\/csrc.nist.gov\/projects\/random-bit-generation\/documentation-and-software."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/4\/1652\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:23:24Z","timestamp":1760135004000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/4\/1652"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,20]]},"references-count":46,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2022,2]]}},"alternative-id":["s22041652"],"URL":"https:\/\/doi.org\/10.3390\/s22041652","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2022,2,20]]}}}