2022
DOI: 10.1007/978-3-030-85559-8_11
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security and Privacy of Connected and Automated Vehicles (CAVs)-Based Federated Learning: Challenges, Opportunities, and Open Issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(6 citation statements)
references
References 41 publications
0
6
0
Order By: Relevance
“…Different sensor nodes (SNs) with diverse networking knowledge capabilities are interconnected to provide the users with information and different high-quality services efficiently and at any time and place [5]. e WSN is different from the VANET [6][7][8] network due to its mobility [9].…”
Section: Introductionmentioning
confidence: 99%
“…Different sensor nodes (SNs) with diverse networking knowledge capabilities are interconnected to provide the users with information and different high-quality services efficiently and at any time and place [5]. e WSN is different from the VANET [6][7][8] network due to its mobility [9].…”
Section: Introductionmentioning
confidence: 99%
“…Jamil et al [38] explore the application of digital twin (DT) and FL in various contexts such as industrial IoT (IIoT), IoV, and the Internet of Drones (IoD). Under the topic of IoV security and privacy issues, Hussain et al [39] discuss cybersecurity and privacy issues in Connected and Autonomous Vehicles (CAVs) under an FL architecture, while Xing et al [40] elaborate on the attack model of the Social Internet of Vehicles (SloV) and provide a comparative analysis of typical data security solutions, emphasizing the synergy of federated learning in data security protection. Other studies focus on the integration of blockchain and FL in ITS.…”
Section: A Current State Of Art and Our Contributionsmentioning
confidence: 99%
“…Similarly, studies by Zhu et al [41] and Billah et al [37] concentrate on blockchain-assisted FL architectures and do not comprehensively cover other assistive technologies. The works by Hussain et al [39] and Xing et al [40] solely discuss the advantages of FL in terms of privacy protection and security. Finally, with the exception of Billah et al [37] and Chellapandi et al [43], the other articles lack organization based on ITS task scenarios, which hinders the reader's intuitive understanding of FL-enabled ITS.…”
Section: A Current State Of Art and Our Contributionsmentioning
confidence: 99%
“…Therefore, there is a distinction between internal and external nodal attacks. Attacks from external nodes cause the former, but attacks from grayholes and blackholes cause the latter [17][18][19][20]. Consequently, optimization plays a major role in achieving trust-enabled secure routing, providing a solution or two based on different objectives.…”
Section: Literaturementioning
confidence: 99%