You are currently viewing a new version of our website. To view the old version click .

143 Results Found

  • Article
  • Open Access
55 Citations
4,597 Views
14 Pages

9 September 2020

Vehicle-to-grid (V2G) technology has become a promising concept for the near future smart grid eco-system. V2G improves smart grid resiliency by enabling two-way communication and electricity flows while reducing the greenhouse gases emission. V2G pr...

  • Article
  • Open Access
483 Views
17 Pages

Dyn-Pri: A Dynamic Privacy Sensitivity Assessment Framework for V2G Interactive Service Scenarios

  • Tianbao Liu,
  • Jingyang Wang,
  • Nan Zhang,
  • Jing Guo,
  • Yanyan Tao,
  • Qingyao Li and
  • Zi Li

In V2G service operations, highly efficient data sharing among participants is useful in grid load balancing and renewable energy integration. However, the data quality and sharing efficiency greatly rely on entities’ willingness to share. More...

  • Article
  • Open Access
2 Citations
3,200 Views
26 Pages

Protecting Hybrid ITS Networks: A Comprehensive Security Approach

  • Ricardo Severino,
  • José Simão,
  • Nuno Datia and
  • António Serrador

30 November 2023

Cooperative intelligent transport systems (C-ITS) continue to be developed to enhance transportation safety and sustainability. However, the communication of vehicle-to-everything (V2X) systems is inherently open, leading to vulnerabilities that atta...

  • Article
  • Open Access
7 Citations
3,894 Views
19 Pages

Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems

  • Nuwan Weerasinghe,
  • Muhammad Arslan Usman,
  • Chaminda Hewage,
  • Eckhard Pfluegel and
  • Christos Politis

23 April 2023

Implementing 5G-enabled Vehicle-to-Everything (V2X) intelligent transportation systems presents a promising opportunity to enhance road safety and traffic flow while facilitating the integration of artificial intelligence (AI) based solutions. Yet, s...

  • Review
  • Open Access
12 Citations
3,991 Views
27 Pages

As the scale of electric vehicles continues to expand, the charging load of electric vehicles into the network has become an issue that cannot be ignored. This paper introduces the concept and development of ordered charging based on the current back...

  • Article
  • Open Access
10 Citations
2,934 Views
16 Pages

Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches

  • Abdul Majeed,
  • Abdullah M. Alnajim,
  • Athar Waseem,
  • Aleem Khaliq,
  • Aqdas Naveed,
  • Shabana Habib,
  • Muhammad Islam and
  • Sheroz Khan

In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been...

  • Article
  • Open Access
8 Citations
2,623 Views
13 Pages

A Copula-Based Attack Prediction Model for Vehicle-to-Grid Networks

  • Toffa Zidane Nonvignon,
  • Amar Bensaber Boucif and
  • Mesfioui Mhamed

11 April 2022

The Vehicle-to-Grid (V2G) networks are a part of the Smart Grid networks. Their primary goal is to recharge electric vehicles. These networks, as with any computer system, are facing cyber attacks. For example, during a charge or recharge process, V2...

  • Article
  • Open Access
1 Citations
1,005 Views
12 Pages

Co-Secure Domination Number in Some Graphs

  • Jiatong Cui,
  • Tianhao Li,
  • Jiayuan Zhang,
  • Xiaodong Chen and
  • Liming Xiong

27 December 2024

Let G be a graph and S⊆V(G). If S is a dominating set of G, and for each vertex u∈V(G)−S, there is a neighbor of u in S, denoted by v, such that (S∖{v})∪{u} is a dominating set of G, then S is a secure dominating set (SDS) o...

  • Article
  • Open Access
345 Views
12 Pages

Characterization of Some Claw-Free Graphs in Co-Secure Domination Number

  • Yuexin Zhang,
  • Jiayuan Zhang,
  • Siwen Jing,
  • Xiaodong Chen and
  • Liming Xiong

28 July 2025

For a vertex subset S of a graph G, if each vertex of G is either in S or adjacent to some vertex in S, then S is a dominating set of G. Let S be a dominating set of a graph G. If each vertex v not in S has a neighbor u in S such that (S\{u})∪{v}...

  • Article
  • Open Access
5 Citations
3,668 Views
11 Pages

Secure w-Domination in Graphs

  • Abel Cabrera Martínez,
  • Alejandro Estrada-Moreno and
  • Juan A. Rodríguez-Velázquez

25 November 2020

This paper introduces a general approach to the idea of protection of graphs, which encompasses the known variants of secure domination and introduces new ones. Specifically, we introduce the study of secure w-domination in graphs, where w=(w0,w1,&he...

  • Feature Paper
  • Article
  • Open Access
4 Citations
3,363 Views
10 Pages

Secure Resolving Sets in a Graph

  • Hemalathaa Subramanian and
  • Subramanian Arasappan

27 September 2018

Let G = (V, E) be a simple, finite, and connected graph. A subset S = {u1, u2, …, uk} of V(G) is called a resolving set (locating set) if for any x ∈ V(G), the code of x with respect to S that is denoted by CS (x), which is defined as CS...

  • Article
  • Open Access
9 Citations
5,745 Views
12 Pages

On the Secure Total Domination Number of Graphs

  • Abel Cabrera Martínez,
  • Luis P. Montejano and
  • Juan A. Rodríguez-Velázquez

15 September 2019

A total dominating set D of a graph G is said to be a secure total dominating set if for every vertex u ∈ V ( G ) \ D , there exists a vertex v ∈ D , which is adjacent to u, such that ( D \ { v } ) ∪ { u } is a tot...

  • Article
  • Open Access
2 Citations
1,505 Views
11 Pages

Co-Secure Domination in Jump Graphs for Enhanced Security

  • Manjusha Pothuvath,
  • Radha Rajamani Iyer,
  • Ahmad Asiri and
  • Kanagasabapathi Somasundaram

1 October 2024

This study proposes a general approach to protect graphs using co-secure domination within jump graphs. In the context of graphs, a dominating set is a group of vertices that are either directly linked or connected to all other vertices within the gr...

  • Review
  • Open Access
105 Citations
15,113 Views
33 Pages

Evolution of V2X Communication and Integration of Blockchain for Security Enhancements

  • Rakesh Shrestha,
  • Seung Yeob Nam,
  • Rojeena Bajracharya and
  • Shiho Kim

With the rapid evolution in wireless communications and autonomous vehicles, intelligent and autonomous vehicles will be launched soon. Vehicle to Everything (V2X) communications provides driving safety, traffic efficiency, and road information in re...

  • Review
  • Open Access
1,256 Views
35 Pages

18 August 2025

Integration of sensing, communication, computing, and intelligence (ISCCI) represents a pivotal advancement in B5G and 6G technologies, offering transformative potential for the Internet of Vehicles (IoV). As IoV systems become increasingly integral...

  • Article
  • Open Access
1 Citations
1,092 Views
20 Pages

2 January 2025

The Internet of Vehicles (IoV), a key component of smart transportation systems, leverages 5G communication for low-latency data transmission, facilitating real-time interactions between vehicles, roadside units (RSUs), and sensor networks. However,...

  • Article
  • Open Access
4 Citations
2,151 Views
22 Pages

11 March 2024

As an important component of the smart grid, vehicle-to-grid (V2G) networks can deliver diverse auxiliary services and enhance the overall resilience of electrical power systems. However, V2G networks face two main challenges due to a large number of...

  • Article
  • Open Access
36 Citations
5,679 Views
22 Pages

LoRa-Based Physical Layer Key Generation for Secure V2V/V2I Communications

  • Biao Han,
  • Sirui Peng,
  • Celimuge Wu,
  • Xiaoyan Wang and
  • Baosheng Wang

26 January 2020

In recent years, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication brings more and more attention from industry (e.g., Google and Uber) and government (e.g., United States Department of Transportation). These Vehicle-to-Every...

  • Feature Paper
  • Article
  • Open Access
24 Citations
4,028 Views
12 Pages

Blockchain-Empowered AI for 6G-Enabled Internet of Vehicles

  • Ferheen Ayaz,
  • Zhengguo Sheng,
  • Daxin Tian,
  • Maziar Nekovee and
  • Nagham Saeed

17 October 2022

The 6G communication technologies are expected to provide fast data rates and incessant connectivity to heterogeneous networks, such as the Internet of Vehicles (IoV). However, the resulting unprecedented surge in data traffic, massive increase in th...

  • Article
  • Open Access
2 Citations
1,916 Views
16 Pages

11 May 2024

Due to the openness of the vehicle-to-grid (V2G) network, the upload of charging and discharging data faces severe security challenges such as eavesdropping, tampering, and forgery. These challenges can lead to privacy breaches, transmission delays,...

  • Review
  • Open Access
129 Citations
19,613 Views
29 Pages

Explainable Artificial Intelligence (XAI) for Intrusion Detection and Mitigation in Intelligent Connected Vehicles: A Review

  • Cosmas Ifeanyi Nwakanma,
  • Love Allen Chijioke Ahakonye,
  • Judith Nkechinyere Njoku,
  • Jacinta Chioma Odirichukwu,
  • Stanley Adiele Okolie,
  • Chinebuli Uzondu,
  • Christiana Chidimma Ndubuisi Nweke and
  • Dong-Seong Kim

17 January 2023

The potential for an intelligent transportation system (ITS) has been made possible by the growth of the Internet of things (IoT) and artificial intelligence (AI), resulting in the integration of IoT and ITS—known as the Internet of vehicles (I...

  • Review
  • Open Access
19 Citations
6,553 Views
19 Pages

With the rapid growth in the number of EVs, a huge number of EVs are connected to the power grid for charging, which places a great amount of pressure on the stable operation of the power grid. This paper focuses on the development of V2G application...

  • Article
  • Open Access
2 Citations
1,870 Views
25 Pages

Integrated Blockchain and Federated Learning for Robust Security in Internet of Vehicles Networks

  • Zhikai He,
  • Rui Xu,
  • Binyu Wang,
  • Qisong Meng,
  • Qiang Tang,
  • Li Shen,
  • Zhen Tian and
  • Jianyu Duan

21 July 2025

The Internet of Vehicles (IoV) operates in an environment characterized by asymmetric security threats, where centralized vulnerabilities create a critical imbalance that can be disproportionately exploited by attackers. This study addresses this imb...

  • Article
  • Open Access
78 Citations
7,721 Views
14 Pages

Secure D2D Communication for 5G IoT Network Based on Lightweight Cryptography

  • Byoungjin Seok,
  • Jose Costa Sapalo Sicato,
  • Tcydenova Erzhena,
  • Canshou Xuan,
  • Yi Pan and
  • Jong Hyuk Park

27 December 2019

Device-to-device (D2D) communication is a direct means of communication between devices without an intermediate node, and it helps to expand cell coverage and to increase radio frequency reuse in a 5G network. Moreover, D2D communication is a core te...

  • Article
  • Open Access
14 Citations
2,944 Views
38 Pages

3 November 2021

One of the key aspects of vehicle-to-grid technology (V2G) is the analysis of uncertainty in electric vehicle user behavior. Correct estimation of the amount of available energy from electric vehicles that are expected to provide ancillary services t...

  • Article
  • Open Access
14 Citations
4,514 Views
16 Pages

Impact Evaluation of Electric Vehicle Parking on Solving Security-Constrained Unit Commitment Problem

  • Mahmood Hosseini Imani,
  • Mojtaba Jabbari Ghadi,
  • Shahaboddin Shamshirband and
  • Marius M. Balas

In this paper, the employment of a vehicle-to-grid (V2G) system in the security-constrained unit commitment (SCUC) problem is considered. SCUC has gained remarkable attention from researchers in the field of electric power systems, aiming to determin...

  • Article
  • Open Access
638 Views
17 Pages

As a new generation of mobile communication networks, 6G security faces many new security challenges. Vehicle to Everything (V2X) will be an important part of 6G. In V2X, connected and automated vehicles (CAVs) need to frequently share data with othe...

  • Article
  • Open Access
22 Citations
2,813 Views
31 Pages

Advancing XSS Detection in IoT over 5G: A Cutting-Edge Artificial Neural Network Approach

  • Rabee Alqura’n,
  • Mahmoud AlJamal,
  • Issa Al-Aiash,
  • Ayoub Alsarhan,
  • Bashar Khassawneh,
  • Mohammad Aljaidi and
  • Rakan Alanazi

25 July 2024

The rapid expansion of the Internet of Things (IoT) and the advancement of 5G technology require strong cybersecurity measures within IoT frameworks. Traditional security methods are insufficient due to the wide variety and large number of IoT device...

  • Review
  • Open Access
1,278 Views
23 Pages

Generative AI for the Internet of Vehicles: A Review of Advances in Training, Decision-Making, and Security

  • Xiaoming Yuan,
  • Xinling Zhang,
  • Aiwen Wang,
  • Jiaxin Zhou,
  • Yingying Du,
  • Qingxu Deng and
  • Lei Liu

31 August 2025

Generative artificial intelligence (GAI) has emerged as a transformative force in the Internet of Vehicles (IoV), addressing limitations of traditional AI such as reliance on large labeled datasets and narrow task applicability. This paper aims to sy...

  • Project Report
  • Open Access
2 Citations
2,508 Views
23 Pages

17 April 2021

The Internet of Things (IoT) is a technology that allows every object or item to become part of the Internet and interact with each other. One of the technologies based on the IoT is Long Range (LoRa). Apart from the increasing number of IoT services...

  • Article
  • Open Access
2 Citations
2,755 Views
9 Pages

(Quantum) Time-Memory-Data Tradeoff Attacks on the SNOW-V Stream Cipher

  • Sijia Li,
  • Zhiyi Liao,
  • Zhengyang Wu,
  • Zheng Wu and
  • Lin Ding

30 May 2022

Symmetric cryptosystems (i.e., stream ciphers and block ciphers) have always played an important part in securing the various generations of 3GPP (3rd Generation Partnership Project) mobile telephony systems. The SNOW-V stream cipher, published in Se...

  • Article
  • Open Access
10 Citations
4,440 Views
16 Pages

12 September 2024

The integration of electric vehicles (EVs) into the electricity grid through vehicle-to-grid (V2G) technology represents a promising opportunity to improve energy efficiency and stabilize grid operations in the context of building sustainable cities....

  • Article
  • Open Access
26 Citations
5,288 Views
26 Pages

The use of Electric Vehicles (EVs) is almost inevitable in the near future for the sake of the environment and our plant’s long-term sustainability. The availability of an Electric-Vehicle-Charging Station (EVCS) is the key challenge that owner...

  • Article
  • Open Access
1 Citations
2,865 Views
34 Pages

Modern autonomous driving and intelligent transportation systems face critical challenges in managing real-time data processing, network latency, and security threats across distributed vehicular environments. Conventional cloud-centric architectures...

  • Article
  • Open Access
22 Citations
3,848 Views
30 Pages

19 January 2021

5G-Vehicle-to-Everything (5G-V2X) supports high-reliability and low latency autonomous services and applications. Proposing an efficient security solution that supports multi-zone broadcast authentication and satisfies the 5G requirement is a critica...

  • Article
  • Open Access
18 Citations
4,635 Views
19 Pages

23 October 2018

Many car manufacturers have recently proposed to release autonomous self-driving cars within the next few years. Information gathered by sensors (e.g., cameras, GPS, lidar, radar, ultrasonic) enable cars to drive autonomously on roads. However, in ur...

  • Proceeding Paper
  • Open Access
1 Citations
3,363 Views
7 Pages

Domination Number in the Context of Some New Graphs

  • Slashi Leel,
  • Sweta Srivastav,
  • Sangeeta Gupta and
  • Geetha Ganesan

Let G = (V, E) be a graph, where D is a subset of V, such that the set of vertices in the set (V-D) is adjacent to at least one vertex in set D. Then, set D is known as the domination set. In other words, a dominating set in graph G is a set of verti...

  • Article
  • Open Access
41 Citations
6,973 Views
16 Pages

Certificate Based Security Mechanisms in Vehicular Ad-Hoc Networks based on IEC 61850 and IEEE WAVE Standards

  • Shaik Mullapathi Farooq,
  • S. M. Suhail Hussain,
  • Siddavaram Kiran and
  • Taha Selim Ustun

When equipped with an on-board wireless kit, electric vehicles (EVs) can communicate with nearby entities, e.g., road side units (RSUs), via a vehicle ad-hoc network (VANET). More observability enables smart charging algorithms where charging station...

  • Article
  • Open Access
31 Citations
7,897 Views
15 Pages

20 May 2017

This research aims to improve the operational efficiency and security of electric power systems at high renewable penetration by exploiting the envisioned controllability or flexibility of electric vehicles (EVs); EVs interact with the grid through g...

  • Article
  • Open Access
5 Citations
2,935 Views
11 Pages

Interaction of Nipah Virus F and G with the Cellular Protein Cortactin Discovered by a Proximity Interactome Assay

  • Chunmei Cui,
  • Pengfei Hao,
  • Chaozhi Jin,
  • Wang Xu,
  • Yuchen Liu,
  • Letian Li,
  • Shouwen Du,
  • Limin Shang,
  • Xin Jin and
  • Ningyi Jin
  • + 2 authors

Nipah virus (NiV) is a highly lethal zoonotic virus with a potential large-scale outbreak, which poses a great threat to world health and security. In order to explore more potential factors associated with NiV, a proximity labeling method was applie...

  • Feature Paper
  • Review
  • Open Access
1,131 Views
33 Pages

29 August 2025

The integration of electric vehicles (EVs) into smart grids (SGs) is reshaping both energy systems and mobility infrastructures. This review presents a comprehensive and cross-disciplinary synthesis of current technologies, methodologies, and challen...

  • Article
  • Open Access
533 Views
21 Pages

In the post-disaster recovery of power distribution networks (PDNs), electric vehicles (EVs) possess a great potential as mobile energy storage units. When supported by vehicle-to-grid (V2G)-enabled charging stations, EVs can provide effective supple...

  • Article
  • Open Access
11 Citations
2,945 Views
17 Pages

30 May 2022

With the establishment of intelligent transportation systems (ITS), research on vehicle ad-hoc networks (VANETs) has played an irreplaceable role in improving traffic safety and efficiency. However, because the deployment of devices based on the IoV...

  • Article
  • Open Access
22 Citations
4,218 Views
19 Pages

5G-Enabled Cyber-Physical Systems for Smart Transportation Using Blockchain Technology

  • Anand Singh Rajawat,
  • S. B. Goyal,
  • Pradeep Bedi,
  • Chaman Verma,
  • Eusebiu Ilarian Ionete and
  • Maria Simona Raboaca

29 January 2023

The physical world can be controlled directly over the Internet once a Cyber-Physical 1 System (CPS) infrastructure is established. The Intelligent Transportation System (ITS) encompasses Wireless Sensor Network (WSN), Vehicular ad hoc network (VANET...

  • Article
  • Open Access
21 Citations
8,620 Views
26 Pages

5G V2X System-Level Architecture of 5GCAR Project

  • Massimo Condoluci,
  • Laurent Gallo,
  • Laurent Mussot,
  • Apostolos Kousaridas,
  • Panagiotis Spapis,
  • Maliheh Mahlouji and
  • Toktam Mahmoodi

19 October 2019

One of the goals of the 5G Communication Automotive Research and innovation (5GCAR) project has been to evaluate and propose system architecture enhancements aiming at supporting the strict requirements of vehicle-to-everything (V2X) use cases. In th...

  • Article
  • Open Access
18 Citations
7,511 Views
19 Pages

FAC-V: An FPGA-Based AES Coprocessor for RISC-V

  • Tiago Gomes,
  • Pedro Sousa,
  • Miguel Silva,
  • Mongkol Ekpanyapong and
  • Sandro Pinto

In the new Internet of Things (IoT) era, embedded Field-Programmable Gate Array (FPGA) technology is enabling the deployment of custom-tailored embedded IoT solutions for handling different application requirements and workloads. Combined with the op...

  • Technical Note
  • Open Access
12 Citations
7,696 Views
6 Pages

21 June 2016

In this study, a personal gamma (γ) spectrometer was developed for use in applications in various fields, such as homeland security and environmental radiation monitoring systems. The prototype consisted of a 3 × 3 × 20 mm3 Ce-doped Gd–Al–Ga–garnet (...

  • Article
  • Open Access
1,046 Views
21 Pages

7 February 2025

The rapidly growing number of electric vehicles and the large-scale user privacy management in smart grids have led to a symmetrical phenomenon. While decentralized identifiers (DIDs) offer a promising solution for users to better control their priva...

  • Feature Paper
  • Article
  • Open Access
3 Citations
6,892 Views
23 Pages

Fake Base Station Detection and Link Routing Defense

  • Sourav Purification,
  • Jinoh Kim,
  • Jonghyun Kim and
  • Sang-Yoon Chang

1 September 2024

Fake base stations comprise a critical security issue in mobile networking. A fake base station exploits vulnerabilities in the broadcast message announcing a base station’s presence, which is called SIB1 in 4G LTE and 5G NR, to get user equipm...

  • Article
  • Open Access
2,051 Views
15 Pages

13 August 2025

This paper systematically analyzes security vulnerabilities that may occur during the OpenCV library and IP camera linkage process for the YOLO v10-based IP camera image processing system used in the disaster safety management field. Recently, the us...

of 3