Securing Intelligent Transportation Systems

The field of Intelligent Transportation Systems (ITS) is moving towards increased security and privacy, with a focus on developing innovative solutions to protect against cyber threats and data breaches. Researchers are exploring novel authentication frameworks, secure data aggregation protocols, and decentralized architectures to ensure the integrity and confidentiality of transportation data. Notably, the development of Zero-Trust models and blockchain-based systems is gaining traction, offering promising approaches to mitigate security risks and enhance trust in ITS. Some noteworthy papers in this regard include: Zero-Trust Mobility-Aware Authentication Framework for Secure Vehicular Fog Computing Networks, which presents a novel authentication framework for secure communication in vehicular fog computing networks. Network Hexagons Under Attack: Secure Crowdsourcing of Geo-Referenced Data, which proposes an enhanced security architecture for secure crowdsourcing of geo-referenced data. Breaking Anonymity at Scale: Re-identifying the Trajectories of 100K Real Users in Japan, which demonstrates the limitations of current trajectory anonymization methods and highlights the need for more robust privacy mechanisms.

Sources

Zero-Trust Mobility-Aware Authentication Framework for Secure Vehicular Fog Computing Networks

Network Hexagons Under Attack: Secure Crowdsourcing of Geo-Referenced Data

Why is My Route Different Today? An Algorithm for Explaining Route Selection

Breaking Anonymity at Scale: Re-identifying the Trajectories of 100K Real Users in Japan

The NetMob25 Dataset: A High-resolution Multi-layered View of Individual Mobility in Greater Paris Region

Lightweight and High-Throughput Secure Logging for Internet of Things and Cold Cloud Continuum

Lightweight Electronic Signatures and Reliable Access Control Included in Sensor Networks to Prevent Cyber Attacks from Modifying Patient Data

On the Performance of Cloud-based ARM SVE for Zero-Knowledge Proving Systems

Identity and Access Management for the Computing Continuum

The Path is the Goal: a Study on the Nature and Effects of Shortest-Path Stability Under Perturbation of Destination

GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems

Built with on top of