Secure Communication for Intelligent Transportation Systems in Vehicular Social Networks

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (26 April 2023) | Viewed by 3379

Special Issue Editors


E-Mail Website
Guest Editor
Department of Software Engineering, Mehran University of Engineering and Technology Jamshoro, District Jamshoro, Sindh 71000, Pakistan
Interests: vehicular networks; information security; cyber security; cloud computing; software engineering

E-Mail Website
Guest Editor
College of Computer Science and Information Systems, Najran University, Najran 61441, Saudi Arabia
Interests: model verification; Service Oriented Architecture (SOA); Model Driven Development (MDD)
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Information Systems Dept., College of Computer Science and Information Systems, Najran University, Najran, Saudi Arabia
Interests: AI; machine learning; big data analytics; decision making
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Software Engineering, Nişantasi University, Istanbul 34398, Turkey
Interests: artificial intelligence; image processing; pattern recognition
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Intelligent transportation systems are a new trending area in vehicular social networks (ITS-VSNs) that decrease fuel expenditures by avoiding traffic congestion through mobile infotainment traffic security applications. These applications can be further categorized into safety and non-safety applications, where there is a huge need to build up new communications technology for integrated ITS-VSN solutions. Those commodities mentioned result in several types of vehicular communications, such as vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), and vehicle-to-roadside (V2R) communications. Due to the rapid development in this field, numerous research limitations need to be addressed, such as latency and reliability, suitable scalable strategy for MAC (medium access control) and performance, routing protocols and flexibility to changes in the environment, and the evaluation and validation of vehicular communication protocols over security assumptions using simulation methodologies. To be more specific, data retrieval in connected ITS-VSNs is in itself a great challenge in numerous ways. For example, the highly dynamic mobility of vehicles raises a plethora of research questions that must be solved.

In order to develop ITS-VSNs, the biggest stumbling block is the contradiction between the various functionalities demanded by applications and the limited energy supply for vehicle nodes. This situation is worsening, especially considering the increasing network scale. It is necessary to accept tradeoffs between system performance and energy efficiency, through adapting ITS-VSN/networking functionalities to energy budget. On the other hand, it is also worth seeking new techniques to supply energy to vehicle nodes sustainably. Potential paper submissions are likely to exploit the connectionism and emergence of networking systems in various problem-solving methods in the ITS-VSN and vehicular communications with a focus on data retrieval. They may also outline essential challenges, proof-of-concept studies with a direct and simulated comparison to technical solutions, and mathematical models of communication principles. This Special Issue is seeking conceptual, empirical, or technological papers that offer new insights into topics including, but not limited to, the following:

  • Modeling and theoretical proofs of communications in ITS-VSNs;
  • Internet of Things (IoT) applications with ITS-VSNs;
  • Smart sensors and communications in ITS-VSNs;
  • Quality-of-service (QoS) for ITS-VSNs;
  • Information and content-centric networking in ITS-VSNs;
  • Data retrieval via software-defined ITS-VSNs;
  • Performance evaluations of ITS-VSNs;
  • Wireless communication and vehicular social networking in ITS-VSNs;
  • Socially-aware intelligent transportation systems;
  • Security and privacy issues in ITS-VSNs;
  • Mobility modeling and big data mining in V ITS-VSNs;
  • Cooperative communication in ITS-VSNs;
  • Entertainment on roads/video and gaming in ITS-VSNs;
  • Data delivery reliability and network efficiency in ITS-VSNs;
  • Data privacy and security for ITS-VSNs;
  • Transportation optimization using ITS-VSNs;
  • Traffic control and management based on ITS-VSNs;
  • Real-time optimization systems for ITS-VSNs;
  • Machine learning in ITS-VSNs;
  • Big data processing in ITS-VSNs.

Prof. Dr. Qasim Ali Arain
Prof. Dr. Asadullah Shaikh
Dr. Abdullah Alghamdi
Dr. Jawad Rasheed
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

30 pages, 3059 KiB  
Article
A Comprehensive Review of Tunnel Detection on Multilayer Protocols: From Traditional to Machine Learning Approaches
by Zhonghang Sui, Hui Shu, Fei Kang, Yuyao Huang and Guoyu Huo
Appl. Sci. 2023, 13(3), 1974; https://doi.org/10.3390/app13031974 - 03 Feb 2023
Cited by 3 | Viewed by 2638
Abstract
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities. In contrast to previous studies of encrypted traffic detection, [...] Read more.
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities. In contrast to previous studies of encrypted traffic detection, we perform the first measurement study of tunnel traffic and its unique characteristics and focus on the challenges and solutions in detecting tunnel traffic among traditional and machine learning techniques. This study covers an almost twenty-year research period from 2003 to 2022. First, we present the concepts of two types of tunnels, broad and narrow tunnels, respectively, as well as a framework for major tunnel applications, such as Tor (the second-generation onion router), proxy, VPN, and their relationships. Second, we analyze state-of-the-art methods from traditional to machine learning applications to systematize tunnel traffic detection, including HTTP, HTTPS, DNS, SSH, TCP, ICMP and IPSec. A quantitative evaluation is presented with five crucial indicators applied to the detection methods and reviews. We further discuss the research work based on datasets, feature engineering, and challenges that have are solved, partly solved and unsolved. Finally, by providing open questions and the potential directions, we hope to inspire future work in this area. Full article
Show Figures

Figure 1

Back to TopTop