Article
Computer Science, Information Systems
Alireza Aghabagherloo, Mahshid Delavar, Javad Mohajeri, Mahmoud Salmasizadeh, Bart Preneel
Summary: Vehicular ad-hoc networks (VANETs) play a crucial role in enhancing traffic safety and efficiency by providing a communication platform for real-time information sharing. This paper proposes a secure and efficient Conditional Privacy-Preserving Authentication (CPPA) scheme to address the security requirements of data authentication and privacy preservation in VANETS, with improved performance compared to existing schemes.
Article
Computer Science, Information Systems
Hong Zhong, Lei Chen, Jie Cui, Jing Zhang, Irina Bolodurina, Lu Liu
Summary: This paper proposes a lightweight conditional privacy-preserving authentication (CPPA) scheme based on elliptic curve cryptography, where vehicles generate pseudonyms and public/private key pairs by themselves to avoid key escrow issues. It also utilizes a fog computing model that supports mobility, low latency, and location awareness to improve vehicular communication efficiency and reduce storage overhead efficiently.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Engineering, Civil
Chao Lin, Debiao He, Xinyi Huang, Neeraj Kumar, Kim-Kwang Raymond Choo
Summary: While VANETs have the potential to improve driver safety and traffic management efficiency, security and privacy issues persist. This paper proposes a novel BCPPA protocol based on Ethereum blockchain to address these challenges, providing effective certificate management and reducing the need for storing a large number of private keys. The protocol supports batch verification and meets security requirements, demonstrated through implementation in the Ethereum test network and simulations showing feasibility in milliseconds.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2021)
Article
Computer Science, Information Systems
Ying Cai, Hao Zhang, Yuguang Fang
Summary: Vehicular ad hoc networks aim to improve transportation systems by leveraging information technology, but face serious privacy concerns due to potential leakage. A novel conditional privacy protection scheme based on ring signcryption was designed to address these issues, showing advantages over existing solutions through security analysis and experiments.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Yuhan Yang, Lijun Wei, Jing Wu, Chengnian Long, Bo Li
Summary: This article proposes a multi-domain vehicular authentication architecture by introducing blockchain technology to establish distributed trust and share cross-domain information among multiple administrative domains. To guarantee anonymity and traceability, a pseudonym-based privacy-preserving authentication method is proposed. The scheme designs a two-phase pseudonym distribution mechanism with the assistance of a roadside unit (RSU) proxy.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Houda Amari, Zakaria Abou El Houda, Lyes Khoukhi, Lamia Hadrich Belguith
Summary: Intelligent Transportation System (ITS) is now a crucial part of daily human life. Vehicular Ad hoc Networks (VANETs) have emerged as a promising component of ITS, promising to enhance transport efficiency, passenger safety, and comfort through the exchange of traffic and infotainment information. VANETs have adopted new paradigms such as Cloud, SDN, Fog computing, Blockchain, and AI techniques to provide strategic and secure communications, improving their reliability.
Article
Computer Science, Information Systems
Tarak Nandy, Mohd Yamani Idna Idris, Rafidah Md Noor, Ashok Kumar Das, Xiong Li, Norjihan Abdul Ghani, Sananda Bhattacharyya
Summary: A lightweight and secure authentication protocol (ELSAP) for V2V communication in VANETs has been developed, enhancing network feasibility and reducing message transfer during authentication through self-authentication. The proposed protocol also allows two or more vehicles to perform secure mutual authentication, proven by Burrow-Abadi-Needham (BAN) logic. Security analysis and comparison tools like AVISPA confirm the protocol's ability to withstand current threats, with improved communication and computational cost efficiency compared to previous schemes.
COMPUTER COMMUNICATIONS
(2021)
Article
Computer Science, Artificial Intelligence
Shaji K. A. Theodore, K. Rajiv Gandhi, V Palanisamy
Summary: Vehicular ad hoc network (VANET) is a commonly used network in intelligent transportation systems (ITS) that enables the exchange of traffic data between vehicles and their surrounding environment for improved driving experience. This paper proposes a new lightweight authentication and privacy-preserving protocol to enhance safety in VANET.
COMPLEX & INTELLIGENT SYSTEMS
(2023)
Article
Engineering, Electrical & Electronic
Quanrun Li, Debiao He, Zhichao Yang, Qi Xie, Kim-Kwang Raymond Choo
Summary: This paper proposes a lattice-based conditional privacy-preserving authentication protocol for VANETs, aiming to achieve mutual authentication and privacy protection simultaneously. The potential utility of the protocol is demonstrated by evaluating its performance.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2022)
Article
Computer Science, Theory & Methods
Mohammad Sadegh Azhdari, Ali Barati, Hamid Barati
Summary: This paper proposes a fuzzy logic-based routing method with authentication capability in vehicular ad hoc networks. The method achieves superior performance in terms of end-to-end delay, packet collision, packet delivery rate, but slightly increases routing overhead.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2022)
Article
Telecommunications
A. Ganesh, S. Ayyasamy, N. M. Saravana Kumar
Summary: VANETs, a technology where vehicles act as mobile nodes to form a communication network, faces new risks to road safety with the adoption of dynamic safety applications. In response, researchers propose an enhanced security protocol AESP-VANET, utilizing fuzzy systems and improved cuckoo algorithm to intelligently select the most stable and optimal communication paths. The protocol shows significant improvements in throughput, overhead, and other parameters, aiming to enhance the efficiency of VANETs.
WIRELESS PERSONAL COMMUNICATIONS
(2021)
Article
Engineering, Electrical & Electronic
Jiangwei Xu, Liangliang Wang, Mi Wen, Yu Long, Kefei Chen
Summary: This study proposes a novel low-latency message authentication scheme based on distributed authentication and message priority. It achieves the minimum verification latency of messages through cooperation between RSU and cooperative vehicles and designs a message priority strategy to prioritize the verification of urgent messages. The scheme works well in high-density traffic scenarios and is more suitable for securing emergency messages with ultra-low latency requirements.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Engineering, Multidisciplinary
JoonYoung Lee, GeonHwan Kim, Ashok Kumar Das, YoungHo Park
Summary: VANET and IoV technologies are crucial for smart city systems, with V2V communication ensuring traffic system management and road safety. A lightweight protocol is proposed for regional segmentation management and overhead resolution, utilizing mutual authentication and honey_list technology for security.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2021)
Article
Computer Science, Hardware & Architecture
Pankaj Kumar, Hari Om
Summary: Vehicular ad hoc network (VANET) is crucial in smart cities, but security and privacy issues during communication pose threats. Existing protocols fail to meet requirements, hence this paper proposes a new authentication protocol for VANET, addressing forward/backward secrecy and desynchronization attacks effectively.
JOURNAL OF SUPERCOMPUTING
(2022)
Article
Telecommunications
Abir Mchergui, Tarek Moulahi, Sherali Zeadally
Summary: Advancements in communications, smart transportation systems, and computer systems have opened up new possibilities for intelligent solutions in traffic safety and convenience. Artificial Intelligence (AI) is currently being utilized in the field of Vehicular Ad hoc NETworks (VANETs) to enhance conventional data-driven methods and improve passenger comfort, safety, and road experience.
VEHICULAR COMMUNICATIONS
(2022)
Article
Computer Science, Information Systems
Edgar Batista, Agusti Solanas
Summary: The article introduces the concept of Privacy-Preserving Process Mining (PPPM) and presents a novel privacy-preserving technique u-PPPM to protect personal privacy while minimizing information loss. Experimental results demonstrate the feasibility of this technique in real settings.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2021)
Review
Chemistry, Multidisciplinary
Juvenal Machin, Edgar Batista, Antoni Martinez-Balleste, Agusti Solanas
Summary: This article discusses the concept of cognitive cities and their importance in the field of information security and privacy. It emphasizes the reliance of cognitive cities on artificial intelligence and the critical issues of privacy and security in sharing citizens' data. The article also highlights the need for further research in addressing the challenges and proposing solutions in this emerging field.
APPLIED SCIENCES-BASEL
(2021)
Article
Chemistry, Analytical
Maria Ferre, Edgar Batista, Agusti Solanas, Antoni Martinez-Balleste
Summary: Prolonged stays in the Intensive Care Units can lead to Post-Intensive Care Syndrome, for which Early Mobilisation has been proposed as a beneficial technique. However, the appropriate application of Early Mobilisation programs requires overcoming resource scarcity, and Information and Communication Technologies play a key role in this aspect.
Article
Multidisciplinary Sciences
Armando Maya-Lopez, Fran Casino, Agusti Solanas
Summary: The collection of personal data is increasing rapidly, leading to privacy risks. To address this, various techniques have been proposed, with microaggregation being a popular method. This article introduces a heuristic solution inspired by the Traveling Salesman Problem and the optimal univariate microaggregation solution to tackle the multivariate microaggregation problem efficiently and effectively.
Article
Chemistry, Analytical
Edgar Batista, M. Angels Moncusi, Pablo Lopez-Aguilar, Antoni Martinez-Balleste, Agusti Solanas
Summary: The deployment of smart health systems, enabled by miniaturised electronic devices and fast data networks, enhances medical services and people's welfare while reducing healthcare expenditure and waiting times. However, the complexity and variety of devices and systems involved pose challenging considerations from security and privacy perspectives.
Article
Computer Science, Information Systems
Edgar Batista, Antoni Martinez-Balleste, Agusti Solanas
Summary: The proper utilization of process mining techniques with large amounts of event data can lead to the discovery, monitoring, and improvement of business processes, enabling the development of more efficient business intelligence systems. However, privacy concerns arising from personal and confidential information within event data have not been adequately addressed in the field of process mining. This article presents a novel privacy-preserving process mining method called k-PPPM, which utilizes microaggregation techniques to achieve k-anonymity and protects targeted individuals from re-identification through attacks based on process model analysis and location-oriented attacks.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2022)
Review
Chemistry, Analytical
Pablo Lopez-Aguilar, Edgar Batista, Antoni Martinez-Balleste, Agusti Solanas
Summary: Intelligent transportation systems will be crucial in future smart cities, with railway transportation gaining attention as a promising solution for mobility challenges in large urban areas. Despite the benefits of digitization, the complexity of railway transportation presents significant security and privacy challenges.
Proceedings Paper
Computer Science, Interdisciplinary Applications
Pablo Lopez-Aguilar, Constantinos Patsakis, Agusti Solanas
Summary: In recent years, phishing attacks have become prominent and increasingly successful. Existing anti-phishing strategies focus on raising awareness and training users to identify risks, but often overlook individual psychological traits. This article examines extraversion as a personality trait and finds that, despite many studies showing a positive correlation between extraversion and susceptibility to phishing attacks, there is no consensus supported by established psychological theories. The lack of consensus is attributed to the use of non-representative samples, non consideration of contextual factors, and reliance on self-reported personality tests, which result in limited reproducibility and data inconsistencies.
2022 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH, ECRIME
(2022)
Review
Social Sciences, Interdisciplinary
Fran Casino, Claudia Pina, Pablo Lopez-Aguilar, Edgar Batista, Agusti Solanas, Constantinos Patsakis
Summary: This article analyzes the current state of cross-border criminal investigations, considering the challenges and drawbacks, and proposes solutions to facilitate collaboration among different stakeholders.
JOURNAL OF CYBERSECURITY
(2022)
Proceedings Paper
Computer Science, Information Systems
Imanol Picallo, Hicham Klaina, Peio Lopez-Iturri, Jose Javier Astrain, Mikel Celaya-Echarri, Leyre Azpilicueta, Ana Alejos, Asier Perallos, Agusti Solanas, Francisco Falcone
Summary: This work analyzes the intra-wagon connectivity in the Internet of Things, focusing on different wireless communication system requirements. It considers the use of standards like 802.11 ah, Bluetooth Low Energy, and 5G new radio spectrum, and utilizes a deterministic 3D Ray Launching algorithm to provide precise characterizations of various parameters.
COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND WIRELESS INTERNET
(2022)
Review
Computer Science, Information Systems
Fran Casino, Thomas K. Dasaklis, Georgios P. Spathoulas, Marios Anagnostopoulos, Amrita Ghosal, Istvan Borocz, Agusti Solanas, Mauro Conti, Constantinos Patsakis
Summary: Digital forensics plays a critical role in cybersecurity and has garnered significant attention from researchers and practitioners. However, existing research articles have mostly focused on specific domains within digital forensics, lacking a global perspective. To address this gap, we conducted a qualitative review of relevant studies, identified main topics and challenges, and emphasized technical, procedural, and ethical issues.
Proceedings Paper
Computer Science, Interdisciplinary Applications
Pablo Lopez-Aguilar, Agusti Solanas
Summary: The COVID19 pandemic has provided opportunities for cyber-criminals to conduct phishing attacks, with the effectiveness of protective measures taken by companies still uncertain. While the Big-Five personality traits model may play a role in countering cybercrime, the correlation between phishing susceptibility and neuroticism remains inconclusive, possibly due to non-representative samples and lack of homogeneity in studies.
2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021)
(2021)
Proceedings Paper
Computer Science, Interdisciplinary Applications
Montse Garcia-Famoso, M. Angels Moncusi, Agusti Solanas
Summary: This paper approaches the concept of intrinsic capacity from an engineering perspective, proposing a data-warehouse-inspired architecture to tackle the lack of holistic solutions in assessing intrinsic capacity automatically. It also discusses the main challenges that need to be studied in the future.
2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021)
(2021)
Proceedings Paper
Computer Science, Interdisciplinary Applications
Mary Carlota Bernal, Antoni Martinez-Balleste, Agusti Solanas
Summary: Understanding human ageing is crucial for healthcare improvement and increasing life expectancy and quality of life. This paper identifies and discusses 28 datasets used in the study of human ageing, providing researchers with an organized reference point and increasing visibility in the field.
2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021)
(2021)
Article
Computer Science, Information Systems
Athanasios Zigomitros, Fran Casino, Agusti Solanas, Constantinos Patsakis