Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and their Prevention.
Mhafuzul IslamMashrur ChowdhuryHongda LiHongxin HuPublished in: CoRR (2017)
Keyphrases
- e government
- denial of service
- dos attacks
- vehicular networks
- pedestrian detection
- vehicle speed
- countermeasures
- real time
- vehicle detection
- security threats
- data collection
- watermarking scheme
- malicious attacks
- electric vehicles
- terrorist attacks
- ddos attacks
- security protocols
- propagation model
- autonomous vehicles
- information exchange
- lightweight
- intelligent transportation systems
- traffic analysis
- disaster recovery
- computing environments
- traffic surveillance
- malicious users
- detection algorithm