Secure Estimation and Attack Isolation for Connected and Automated Driving in the Presence of Malicious Vehicles.
Tianci YangChen LvPublished in: IEEE Trans. Veh. Technol. (2021)
Keyphrases
- malicious users
- malicious attacks
- driving simulator
- authentication mechanism
- traffic accidents
- key exchange protocol
- countermeasures
- security measures
- block cipher
- lightweight
- authentication protocol
- insider attacks
- detecting malicious
- fuel consumption
- sensitive data
- dangerous situations
- key agreement
- car navigation
- malicious behavior
- malicious nodes
- information leakage
- diffie hellman
- moving vehicles
- encryption algorithm
- vehicle detection
- secret key
- travel time