Abstract | ||
---|---|---|
By equipping various sensors and analyzing sensed data, vehicles can perform automatic driving; these vehicles are known as connected and autonomous vehicles (CAVs). In CAVs, tampered data will result in incorrect driving decisions. Hence, secure data transmission should be ensured to enable correct life-critical decisions. Untrusted resource-constrained modules allow attackers to obtain private d... |
Year | DOI | Venue |
---|---|---|
2021 | 10.1109/JIOT.2021.3082542 | IEEE Internet of Things Journal |
Keywords | DocType | Volume |
Authentication,Protocols,Message authentication,Security,Trusted computing,Real-time systems,Privacy | Journal | 8 |
Issue | ISSN | Citations |
24 | 2327-4662 | 0 |
PageRank | References | Authors |
0.34 | 0 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hong Zhong | 1 | 208 | 33.15 |
Wenwen Cao | 2 | 0 | 0.34 |
Qingyang Zhang | 3 | 19 | 3.07 |
Jing Zhang | 4 | 60 | 6.90 |
Jie Cui | 5 | 60 | 11.46 |