A Cross-Layer Defense Method for Blockchain Empowered CBTC Systems Against Data Tampering Attacks
Published 2022 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A Cross-Layer Defense Method for Blockchain Empowered CBTC Systems Against Data Tampering Attacks
Authors
Keywords
-
Journal
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
Volume 24, Issue 1, Pages 501-515
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Online
2022-10-13
DOI
10.1109/tits.2022.3211020
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- EdgeLSTM: Towards Deep and Sequential Edge Computing for IoT Applications
- (2021) Di Wu et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- Detecting Temporal Attacks: An Intrusion Detection System for Train Communication Ethernet Based on Dynamic Temporal Convolutional Network
- (2021) Chuan Yue et al. Security and Communication Networks
- Radiometric Normalization for Cross-Sensor Optical Gaofen Images with Change Detection and Chi-Square Test
- (2021) Li Yan et al. Remote Sensing
- Joint Security and Train Control Design in Blockchain-Empowered CBTC System
- (2021) Li Zhu et al. IEEE Internet of Things Journal
- AI-Envisioned Blockchain-Enabled Signature-Based Key Management Scheme for Industrial Cyber–Physical Systems
- (2021) Ashok Kumar Das et al. IEEE Internet of Things Journal
- Blockchain Empowered Cooperative Authentication With Data Traceability in Vehicular Edge Computing
- (2020) Hong Liu et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- An Identity Management and Authentication Scheme Based on Redactable Blockchain for Mobile Networks
- (2020) Jie Xu et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- A Cross-Layer Defense Scheme for Edge Intelligence-Enabled CBTC Systems Against MitM Attacks
- (2020) Yang Li et al. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
- Cross-Layer Defense Methods for Jamming-Resistant CBTC Systems
- (2020) Li Zhu et al. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
- Point-Based Value Iteration for Finite-Horizon POMDPs
- (2019) Erwin Walraven et al. JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH
- Cyber-Physical Vulnerability Analysis of Communication-Based Train Control
- (2019) Sangjun Kim et al. IEEE Internet of Things Journal
- LSTM Learning With Bayesian and Gaussian Processing for Anomaly Detection in Industrial IoT
- (2019) Di Wu et al. IEEE Transactions on Industrial Informatics
- Cooperative Computation Offloading and Resource Allocation for Blockchain-Enabled Mobile-Edge Computing: A Deep Reinforcement Learning Approach
- (2019) Jie Feng et al. IEEE Internet of Things Journal
- LEDGE: Leveraging Edge Computing for Resilient Access Management of Mobile IoT
- (2019) Di Wu et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- A POMDP Approach to the Dynamic Defense of Large-Scale Cyber Networks
- (2018) Erik Miehling et al. IEEE Transactions on Information Forensics and Security
- Radio Communication for Communications-Based Train Control (CBTC): A Tutorial and Survey
- (2017) Jahanzeb Farooq et al. IEEE Communications Surveys and Tutorials
- Dynamic Secrets and Secret Keys Based Scheme for Securing Last Mile Smart Grid Wireless Communication
- (2017) Neetesh Saxena et al. IEEE Transactions on Industrial Informatics
- Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems
- (2017) Ao Lei et al. IEEE Internet of Things Journal
- Instantiability of RSA-OAEP Under Chosen-Plaintext Attack
- (2016) Eike Kiltz et al. JOURNAL OF CRYPTOLOGY
- A Cognitive Control Approach to Communication-Based Train Control Systems
- (2015) Hongwei Wang et al. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
- False data injection attacks against state estimation in electric power grids
- (2011) Yao Liu et al. ACM Transactions on Information and System Security
- What is communication-based train control?
- (2009) Robert Pascoe et al. IEEE Vehicular Technology Magazine
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started