[1]Garg A, Chauhan A, Shambharkar P G. Security threats & attacks in IoV environment: Open research issues and challenges[C] Proc of the 3rd Int Conf on Intelligent Computing Instrumentation and Control Technologies (ICICICT). Piscataway, NJ: IEEE, 2022: 803810[2]Alladi T, Kohli V, Chamola V, et al. Artificial intelligence (AI)empowered intrusion detection architecture for the Internet of vehicles[J]. IEEE Wireless Communications, 2021, 28(3): 144149[3]TechTarget. Internet of vehicles (IoV)[EBOL]. [20240820]. https:www.techtarget.comwhatisdefinitionInternetofVehicles[4]Liang W, Li Z, Zhang H, et al. Vehicular ad hoc networks: Architectures, research issues, methodologies, challenges, and trends[J]. International Journal of Distributed Sensor Networks, 2015, 11(8): 111[5]Alnasser A, Sun H, Jiang J. Cyber security challenges and solutions for V2X communications: A survey[J]. Computer Networks, 2019, 151: 5267[6]Lin J, Yu W, Zhang N, et al. Data integrity attacks against dynamic route guidance in transportationbased cyberphysical systems: Modeling, analysis, and defense[J]. IEEE Trans on Vehicular Technology, 2018, 67(9): 87388753[7]El Zoghby N, Cherfaoui V, Ducourthial B, et al. Distributed data fusion for detecting Sybil attacks in VANETs[C] Proc of the 2nd Int Conf on Belief Functions. Berlin: Springer, 2012: 351358[8]Aliwa E, Rana O, Perera C, et al. Cyberattacks and countermeasures for invehicle networks[J]. ACM Computing Surveys (CSUR), 2021, 54(1): 137[9]Liu J, Zhang L, Li C, et al. Blockchainbased secure communication of intelligent transportation digital twins system[J]. IEEE Trans on Intelligent Transportation Systems, 2022, 23(11): 2263022640[10]Ping H. Network information security data protection based on data encryption technology[J]. Wireless Personal Communications, 2022, 126(3): 27192729[11]Zhang N, Shi Q. Achieving nonrepudiation of receipt[J]. The Computer Journal, 1996, 39(10): 844853[12]Neto E C P, Taslimasa H, Dadkhah S, et al. CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus[EBOL]. [20240820]. https:doi.org10.1016j.iot.2024.101209[13]Khan A U, Javaid N, Khan M A, et al. A blockchain scheme for authentication, data sharing and nonrepudiation to secure Internet of wireless sensor things[J]. Cluster Computing, 2023, 26(2): 945960[14]Li L, Lin Y L, Zheng N N, et al. Artificial intelligence test: A case study of intelligent vehicles[J]. Artificial Intelligence Review, 2018, 50: 441465[15]Kang J, Yu R, Huang X, et al. Privacypreserved pseudonym scheme for fog computing supported Internet of vehicles[J]. IEEE Transa on Intelligent Transportation Systems, 2017, 19(8): 26272637[16]Li W, Yu P, Cheng Y, et al. Efficient and privacyenhanced federated learning based on parameter degradation[J]. IEEE Trans on Services Computing, 2024, (5): 116[17]Mun H, Han K, Damiani E, et al. Privacy enhanced data aggregation based on federated learning in Internet of vehicles (IoV)[J]. Computer Communications, 2024, 223: 1525[18]Derin O, Ferrante A, Taddeo A V. Coordinated management of hardware and software selfadaptivity[J]. Journal of Systems Architecture, 2009, 55(3): 170179[19]Ouedraogo C A, Medjiah S, Chassot C, et al. Adaptive performance analysis in IoT platforms[J]. IEEE Trans on Network and Service Management, 2022, 19(4): 47644778 |