Araştırma Makalesi
BibTex RIS Kaynak Göster

Akıllı Ulaşım Sistemlerinde Kablosuz İletişim Teknolojileri: Güncel Yaklaşımlar, Güvenlik ve Gizlilik

Yıl 2025, Cilt: 8 Sayı: 1, 24 - 37, 23.06.2025

Öz

Akıllı ulaşım sistemi (Intelligent Transport System-ITS) modern şehirlerin trafiğini daha güvenli, verimli ve sürdürülebilir hale getirmek için geliştirilmiş ileri bir teknolojik çözümdür. Bu çözümün en önemli bir tanesi ise V2X(Vehicle to Everything) teknolojisidir. V2X teknolojisi, araçtan her şeye iletişim, araçların çevrelerindeki akıllı bütün nesneler ile iletişim kurulması adına oluşturulmuştur. Bu sayede gündelik hayattaki trafik güvenliği, verimliliği arttırmakta ve otonom sürüş sistemlerin verimliliğinin arttırılmasına yardımcı olan bir teknolojidir. Bu teknolojiden optimum yararlanabilmek için araçlardan alınan verilerin diğer araç ve nesneler ile paylaşılırken dikkat edilmesi gereken güvenlik, gizlilik ve bütünlük gibi birtakım durumlar söz konusudur. Bu çalışmada V2X ve bunun ilişkili güvenlik ve gizlilik kavramları ele alınarak incelenmiştir. Literatürdeki 29 adet çalışma sistematik olarak incelenerek kıyaslama yoluyla güvenlik ve gizliliğe yönelik bulgular, bilimsel değerlendirmeye dayanan tartışma yoluyla bu çalışmada verilmektedir.

Kaynakça

  • Intelligent Transportation Society of America. “ITS America National V2X Deployment Plan:An Infrastructure&Automaker Colloboration”. Amerika Birleşik Devletleri, 2023.
  • Oka D.K., Nadahalli S., Yost J., Bojanki R.P.“Building Secure Automotive IoT Applications”, Packt Publishing, 2024.
  • Yoshizawa T., Singelée D., Muehlberg J.T., Delbruel S., Taherkordi A., Hughes D., Preneel B. “A Survey of Security and Privacy Issues in V2X Communication Systems”, ACM Computing Surveys,vol 55., no.9, https://doi.org/10.1145/3558052
  • Abboud K, Omar H. Aboubakr, Zhuang W.“Interworking of DSRC and Cellular Network Technologies for V2X Communications: A Survey”, IEEE Transactıons On Vehıcular Technology, vol.65, no.12, pp.9457-9470,2016. doi: 10.1109/TVT.2016.2591558
  • MacHardy Z, Khan A.,Obana K. “V2X Access Technologies: Regulation, Research, and Remaining Challenges”, IEEE Communıcatıons Surveys & Tutorıals, vol. 20, no.3, pp. 1858-1877, 2018. doi: 10.1109/COMST.2018.2808444
  • Zhou H., Xu W., Chen J., Wang W. “Evolutionary V2X Technologies Toward the Internet of Vehicles: Challenges and Opportunities”, Proceedings of the IEEE, vol. 108, no.2, pp. 308-323, 2020. doi: 10.1109/JPROC.2019.2961937
  • Sonklin K., Wang C., Jayalath D., Feng Y. “Connected-Vehicle Data Exchanges and Positioning Computing Based on the Publish-Subscribe Paradigm”, Journal of Computer and Communications, vol. 7, no. 10, pp. 82-93,2019 . doi: 10.4236/jcc.2019.710008
  • Naik G., Choudhury B., Park J. “IEEE 802.11bd & 5G NR V2X: Evolution of Radio Access Technologies for V2X Communications”, IEEE Access, vol.7, pp. 70169-70184, 2019. doi: 10.1109/ACCESS.2019.2919489
  • Hejazi H. , Bokor L. “A Survey on Simulation Efforts of 4G/LTE-based Cellular and Hybrid V2X Communications”, 44th International Conference on Telecommunications and Signal Processing (TSP), pp. 333-339, 26-28 July 2021. doi: 10.1109/TSP52935.2021.9522665
  • Garcia M.H.C., Boban M., Coll-Perales B. “ A Tutorial on 5G NR V2X Communications”, IEEE Communications Surveys & Tutorials, vol.23, no. 3, pp.1972-2026. doi: 10.1109/COMST.2021.3057017
  • Gyawali S., Xu S., Qian Y., Hu R.Q.“Challenges and Solutions for Cellular Based V2X Communications”, IEEE Communıcatıons Surveys & Tutorıals, vol. 23, no. 1, pp. 222-255. doi: 10.1109/COMST.2020.3029723
  • Le T.T.T., Moh S. “Comprehensive Survey of Radio Resource Allocation Schemes for 5G V2X Communications”, IEEE Access, vol. 9, pp. 123117-123133, 2021, doi: 10.1109/ACCESS.2021.3109894
  • Hur D., Lee D., Oh J., Won D., Song C., Cho S. “Survey on Challenges and Solutions of C-V2X: LTE- V2X Communication Technology”, 14h International Conference on Ubiquitous and Future Networks (ICUFN), pp. 639-641, 04-07 July 2023. doi: 10.1109/ICUFN57995.2023.10201105
  • Clancy J., Mullins D., Deegan B., Horgan J., Ward E., Eising C., Denny P., Jones E., Glavin M. “Wireless Access for V2X Communications:Research, Challenges and Opportunities”, IEEE Communications Surveys & Tutorials, vol. 26, no.3, pp.2082-2119. doi: 10.1109/COMST.2024.3384132
  • Gupta M., Benson J., Patwa F., Sandhu R. “Secure V2V and V2I Communication in Intelligent Transportation using Cloudlets”, IEEE Transactions on Services Computing, vol. 15, no. 4, pp.1912-1925. doi: 10.1109/TSC.2020.3025993
  • Yoshizawa T., Preneel B. “Survey of Security Aspect of V2X Standards and Related Issues”, 2019 IEEE Conference on Standards for Communications and Networking (CSCN), 28-30 October 2019. doi: 10.1109/CSCN.2019.8931311
  • Sağlam E.T., Bahtiyar Ş. “A Survey: Security and Privacy in 5G Vehicular Networks”, 2019 4th International Conference on Computer Science and Engineering (UBMK), pp. 108-112, 11-15 September 2019. doi: 10.1109/UBMK.2019.8907026
  • Hasan M., Mohan S., Shimizu T., Lu H. “ Securing Vehicle-to-Everything (V2X) Communication Platforms”, IEEE Transactions on Intelligent Vehicles, vol. 5, no. 4, pp. 693-713. doi: 10.1109/TIV.2020.2987430
  • Saulaiman M.N.E., Kozlovszky M., Csilling Á. “A Survey on Vulnerabilities and Classification of Cyber-Attacks on 5G-V2X”, IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI), Budapest, Hungary, 2021, pp. 000235-000240,doi: 10.1109/CINTI53070.2021.9668440
  • Avcı İ., Özpara C., Özdemir M., Kınacı B.F., Kara S.A. “Akıllı Ulaşım Araçlarında Siber Güvenlik Ve Çok Katmanlı Güvenlik Önlemi”, Akıllı Ulaşım Sistemleri ve Uygulamaları Dergisi, Cilt: 5 Sayı: 1, 22 - 35, doi: 10.51513/jitsa.1034370
  • İsmail T., Touati H., Hajlaoui N., Hadded M., Muhlethaler P., Bouzefrane S., Saidane L.A. “A Comprehensive Survey on Vehicular Communication Security”, Journal of Cyber Security and Mobility, vol. 13, no.5, pp. 1007-1038.
  • Kwak B.II, Woo J.Y., Kim H.K. “Know Your Master: Driver Profiling-based Anti-theft Method”, 14th Annual Conference on Privacy, Security and Trust (PST), pp. 211-218, doi:10.1109/PST.2016.7906929.
  • Rishiwal V., Agarwal U., Alotaibi A., Tanwar S., Yadav P. Yadav M. “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”, IEEE Access, vol. 12, pp. 138763-138788. doi: 10.1109/ACCESS.2024.3467002
  • Rao P.M., Jangirala S., Pedada S., Das A.K., Park Y. “Blockchain Integration for IoT-Enabled V2X Communications: A Comprehensive Survey, Security Issues and Challenges”, IEEE Access, vol. 11, pp. 2169-3536. doi: 10.1109/ACCESS.2023.3281844
  • Sedar R., Kalalas C., Gallego F.V., Alonso L., Zarate J.A. “A Comprehensive Survey of V2X Cybersecurity Mechanisms and Future Research Paths”, IEEE Open Journal of the Communications Society, vol. 4, pp. 325-391. doi: 10.1109/OJCOMS.2023.3239115
  • Wang F., Wang X., Ban J. “Infrastructure-enabled Defense Methods against Data Poisoning Attacks on Traffic State Estimation and Prediction”, Conference in Emerging Technologies in Transportation Systems (TRC-30), paper_id: 107.
  • Gulerte K.H.M, Vargas J.A.R., Da Costa J.P.J., Da Silva A.S., Santos G.A., Wang Y., Müller C.A., Lipps C., De Souse Junior R.T., Filho W.De B.V., Slusallek P., Schotten H.D. “Safeguarding the V2X Pathways: Exploring the Cybersecurity Landscape Through Systematic Review”, IEEE Access, vol. 12, pp. 72871-72895. doi: 10.1109/ACCESS.2024.3402946
  • Gorine A.,Agboile C. “Securing V2X Communication: DDoS Attack Implementation and Mitigation via VEINS Simulation”, International Journal of Multidisciplinary Research and Publications, vol.7, no. 3, pp.61-68.
  • Rohde & Schwarz, “Intelligent Transportation Systems Using IEEE 802.11p: Application Note: R&S FSW, R&S FSV3000, R&S SMW200A, R&S SMBV100A.”, Wan”, Wand L. ve Simon M., 2019.
  • Holma H., Toskala H., Nakamura T. “5G Technology 2nd Edition”, Wiley Press, 2020.
  • “Proximity-based Services (ProSe) UID_580059”, Overview of 3GPP Release 12 v0.2.0”, 3rd Generation Partnership Project.
  • “Enhanced LTE Device to Device Proximity Services”, Release 13 analytical view version Sept. 9th 2015, 3rd Generation Partnership Project.
  • “Study on Multimedia Broadcast Supplement for Public Warning System (PWS)”, Overview of 3GPP Release 14 V0.0.1, 3rd Generation Partnership Project.
  • “Vehicle-to-Everything Communications (V2X) Improvements”, 3rd Generation Partnership Project Technical Specification Group Services and System Aspects 3GPP TR 21.915 V15.0.0, 3rd Generation Partnership Project.
  • “Advanced V2X Support”, 3rd Generation Partnership Project-Technical Specification Group Services and System Aspects 3GPP TR 21.916 V16.2.0, 3rd Generation Partnership Project.
  • “Proximity/D2D/Sidelink related and V2X”, 3rd Generation Partnership Project Technical Specification Group Services and System Aspects 3GPP TR 21.917 V17.0.1, 3rd Generation Partnership Project.
  • “Artificial Intelligence (AI)/Machine Learning (ML)”, 3rd Generation Partnership Project Technical Specification Group Services and System Aspects 3GPP TR 21.918 V1.2.1 , 3rd Generation Partnership Project.
  • Dönmez T.C.M. “Anomaly Detection in Vehicular CAN Bus Using Message Identifier Sequences”, IEEE Access, vol. 9, pp. 136243-136252, 2021, doi: 10.1109/ACCESS.2021.3117038.
  • Lekidis A. “Anomaly detection mechanisms for in-vehicle and V2X systems”, 19th International Conference on Availability, Reliability and Security (ARES '24), Article 100, 1–8. https://doi.org/10.1145/3664476.3671012
  • Tu L., Shi H. “Application and Research of V2X Vehicle Road Collaboration Technology”, 3rd International Conference on Computer, Artificial Intelligence and Control Engineering, pp. 822–829. https://doi.org/10.1145/3672758.3672894
  • Wu F., Yang B. “Research on C-V2X slice random access technology”, 2024 8th International Conference on Digital Signal Processing, pp. 89-95. https://doi.org/10.1145/3653876.365388
  • Lekidis A., Morais H. “Open V2X Management Platform Cyber-Resilience and Data Privacy Mechanisms”, 19th International Conference on Availability, Reliability and Security (ARES '24), article 139, pp.1–8. https://doi.org/10.1145/3664476.3669917
  • Bodei C., Vincezi M.D., Matteucci I. “OLIVE: Flexible, Portable, and Sustainable V2X Multi-Factor Authentication”, 39th ACM/SIGAPP Symposium on Applied Computing (SAC '24), pp. 215–217. https://doi.org/10.1145/3605098.3636102
  • Li Y., Hou R., Lui K.S., Li H. “An MEC-based DoS Attack Detection Mechanism for C-V2X Networks”, 2018 IEEE Global Communications Conference (GLOBECOM), pp. 1-6, doi: 10.1109/GLOCOM.2018.8647323
  • Dolnák I., Litvik J.J. “An overview of DNS security in V2X networks”, 17th International Conference on Emerging eLearning Technologies and Applications (ICETA), Starý Smokovec, pp. 156-159, doi: 10.1109/ICETA48886.2019.9040111.
  • Pagadala A., Ahmed G. “Analysis of DDoS Attacks in 5G Networks”, 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 1-6, doi: 10.1109/ICCCNT56998.2023.10307311.
  • Zheng T.X., Wen Y., Liu H.W., Ju Y., Wang H.M., Wong K.K., Yuan J.“Physical-Layer Security of Uplink mmWave Transmissions in Cellular V2X Networks”, IEEE Transactions on Wireless Communications, vol. 21, no. 11, pp. 9818-9833, Nov. 2022, doi: 10.1109/TWC.2022.3179706
  • Twardokus G., Rahbari H. “Vehicle-to-Nothing? Securing C-V2X Against Protocol-Aware DoS Attacks”, IEEE INFOCOM 2022 - IEEE Conference on Computer Communications, pp. 1629-1638,doi: 10.1109/INFOCOM48880.2022.9796667

Wireless Communication Technologies in Smart Transportation Systems: Current Approaches, Security and Privacy

Yıl 2025, Cilt: 8 Sayı: 1, 24 - 37, 23.06.2025

Öz

Intelligent Transport System (ITS) is an advanced technological solution developed to make the traffic of modern cities safer, more efficient and sustainable. The most important of these solutions is V2X (Vehicle to Everything) technology. V2X technology was created for vehicle-to-everything communication, and for vehicles to communicate with all intelligent objects around them. In this way, it increases traffic safety and efficiency in daily life and is a technology that helps to increase the efficiency of autonomous driving systems. In order to benefit from this technology optimally, there are some situations such as security, confidentiality and integrity that should be taken into consideration when sharing the data received from vehicles with other vehicles and objects. In this study, V2X and its related security and confidentiality concepts are examined. 29 studies in the literature are systematically examined and findings regarding security and confidentiality are given in this study through a discussion based on scientific evaluation.

Kaynakça

  • Intelligent Transportation Society of America. “ITS America National V2X Deployment Plan:An Infrastructure&Automaker Colloboration”. Amerika Birleşik Devletleri, 2023.
  • Oka D.K., Nadahalli S., Yost J., Bojanki R.P.“Building Secure Automotive IoT Applications”, Packt Publishing, 2024.
  • Yoshizawa T., Singelée D., Muehlberg J.T., Delbruel S., Taherkordi A., Hughes D., Preneel B. “A Survey of Security and Privacy Issues in V2X Communication Systems”, ACM Computing Surveys,vol 55., no.9, https://doi.org/10.1145/3558052
  • Abboud K, Omar H. Aboubakr, Zhuang W.“Interworking of DSRC and Cellular Network Technologies for V2X Communications: A Survey”, IEEE Transactıons On Vehıcular Technology, vol.65, no.12, pp.9457-9470,2016. doi: 10.1109/TVT.2016.2591558
  • MacHardy Z, Khan A.,Obana K. “V2X Access Technologies: Regulation, Research, and Remaining Challenges”, IEEE Communıcatıons Surveys & Tutorıals, vol. 20, no.3, pp. 1858-1877, 2018. doi: 10.1109/COMST.2018.2808444
  • Zhou H., Xu W., Chen J., Wang W. “Evolutionary V2X Technologies Toward the Internet of Vehicles: Challenges and Opportunities”, Proceedings of the IEEE, vol. 108, no.2, pp. 308-323, 2020. doi: 10.1109/JPROC.2019.2961937
  • Sonklin K., Wang C., Jayalath D., Feng Y. “Connected-Vehicle Data Exchanges and Positioning Computing Based on the Publish-Subscribe Paradigm”, Journal of Computer and Communications, vol. 7, no. 10, pp. 82-93,2019 . doi: 10.4236/jcc.2019.710008
  • Naik G., Choudhury B., Park J. “IEEE 802.11bd & 5G NR V2X: Evolution of Radio Access Technologies for V2X Communications”, IEEE Access, vol.7, pp. 70169-70184, 2019. doi: 10.1109/ACCESS.2019.2919489
  • Hejazi H. , Bokor L. “A Survey on Simulation Efforts of 4G/LTE-based Cellular and Hybrid V2X Communications”, 44th International Conference on Telecommunications and Signal Processing (TSP), pp. 333-339, 26-28 July 2021. doi: 10.1109/TSP52935.2021.9522665
  • Garcia M.H.C., Boban M., Coll-Perales B. “ A Tutorial on 5G NR V2X Communications”, IEEE Communications Surveys & Tutorials, vol.23, no. 3, pp.1972-2026. doi: 10.1109/COMST.2021.3057017
  • Gyawali S., Xu S., Qian Y., Hu R.Q.“Challenges and Solutions for Cellular Based V2X Communications”, IEEE Communıcatıons Surveys & Tutorıals, vol. 23, no. 1, pp. 222-255. doi: 10.1109/COMST.2020.3029723
  • Le T.T.T., Moh S. “Comprehensive Survey of Radio Resource Allocation Schemes for 5G V2X Communications”, IEEE Access, vol. 9, pp. 123117-123133, 2021, doi: 10.1109/ACCESS.2021.3109894
  • Hur D., Lee D., Oh J., Won D., Song C., Cho S. “Survey on Challenges and Solutions of C-V2X: LTE- V2X Communication Technology”, 14h International Conference on Ubiquitous and Future Networks (ICUFN), pp. 639-641, 04-07 July 2023. doi: 10.1109/ICUFN57995.2023.10201105
  • Clancy J., Mullins D., Deegan B., Horgan J., Ward E., Eising C., Denny P., Jones E., Glavin M. “Wireless Access for V2X Communications:Research, Challenges and Opportunities”, IEEE Communications Surveys & Tutorials, vol. 26, no.3, pp.2082-2119. doi: 10.1109/COMST.2024.3384132
  • Gupta M., Benson J., Patwa F., Sandhu R. “Secure V2V and V2I Communication in Intelligent Transportation using Cloudlets”, IEEE Transactions on Services Computing, vol. 15, no. 4, pp.1912-1925. doi: 10.1109/TSC.2020.3025993
  • Yoshizawa T., Preneel B. “Survey of Security Aspect of V2X Standards and Related Issues”, 2019 IEEE Conference on Standards for Communications and Networking (CSCN), 28-30 October 2019. doi: 10.1109/CSCN.2019.8931311
  • Sağlam E.T., Bahtiyar Ş. “A Survey: Security and Privacy in 5G Vehicular Networks”, 2019 4th International Conference on Computer Science and Engineering (UBMK), pp. 108-112, 11-15 September 2019. doi: 10.1109/UBMK.2019.8907026
  • Hasan M., Mohan S., Shimizu T., Lu H. “ Securing Vehicle-to-Everything (V2X) Communication Platforms”, IEEE Transactions on Intelligent Vehicles, vol. 5, no. 4, pp. 693-713. doi: 10.1109/TIV.2020.2987430
  • Saulaiman M.N.E., Kozlovszky M., Csilling Á. “A Survey on Vulnerabilities and Classification of Cyber-Attacks on 5G-V2X”, IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI), Budapest, Hungary, 2021, pp. 000235-000240,doi: 10.1109/CINTI53070.2021.9668440
  • Avcı İ., Özpara C., Özdemir M., Kınacı B.F., Kara S.A. “Akıllı Ulaşım Araçlarında Siber Güvenlik Ve Çok Katmanlı Güvenlik Önlemi”, Akıllı Ulaşım Sistemleri ve Uygulamaları Dergisi, Cilt: 5 Sayı: 1, 22 - 35, doi: 10.51513/jitsa.1034370
  • İsmail T., Touati H., Hajlaoui N., Hadded M., Muhlethaler P., Bouzefrane S., Saidane L.A. “A Comprehensive Survey on Vehicular Communication Security”, Journal of Cyber Security and Mobility, vol. 13, no.5, pp. 1007-1038.
  • Kwak B.II, Woo J.Y., Kim H.K. “Know Your Master: Driver Profiling-based Anti-theft Method”, 14th Annual Conference on Privacy, Security and Trust (PST), pp. 211-218, doi:10.1109/PST.2016.7906929.
  • Rishiwal V., Agarwal U., Alotaibi A., Tanwar S., Yadav P. Yadav M. “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”, IEEE Access, vol. 12, pp. 138763-138788. doi: 10.1109/ACCESS.2024.3467002
  • Rao P.M., Jangirala S., Pedada S., Das A.K., Park Y. “Blockchain Integration for IoT-Enabled V2X Communications: A Comprehensive Survey, Security Issues and Challenges”, IEEE Access, vol. 11, pp. 2169-3536. doi: 10.1109/ACCESS.2023.3281844
  • Sedar R., Kalalas C., Gallego F.V., Alonso L., Zarate J.A. “A Comprehensive Survey of V2X Cybersecurity Mechanisms and Future Research Paths”, IEEE Open Journal of the Communications Society, vol. 4, pp. 325-391. doi: 10.1109/OJCOMS.2023.3239115
  • Wang F., Wang X., Ban J. “Infrastructure-enabled Defense Methods against Data Poisoning Attacks on Traffic State Estimation and Prediction”, Conference in Emerging Technologies in Transportation Systems (TRC-30), paper_id: 107.
  • Gulerte K.H.M, Vargas J.A.R., Da Costa J.P.J., Da Silva A.S., Santos G.A., Wang Y., Müller C.A., Lipps C., De Souse Junior R.T., Filho W.De B.V., Slusallek P., Schotten H.D. “Safeguarding the V2X Pathways: Exploring the Cybersecurity Landscape Through Systematic Review”, IEEE Access, vol. 12, pp. 72871-72895. doi: 10.1109/ACCESS.2024.3402946
  • Gorine A.,Agboile C. “Securing V2X Communication: DDoS Attack Implementation and Mitigation via VEINS Simulation”, International Journal of Multidisciplinary Research and Publications, vol.7, no. 3, pp.61-68.
  • Rohde & Schwarz, “Intelligent Transportation Systems Using IEEE 802.11p: Application Note: R&S FSW, R&S FSV3000, R&S SMW200A, R&S SMBV100A.”, Wan”, Wand L. ve Simon M., 2019.
  • Holma H., Toskala H., Nakamura T. “5G Technology 2nd Edition”, Wiley Press, 2020.
  • “Proximity-based Services (ProSe) UID_580059”, Overview of 3GPP Release 12 v0.2.0”, 3rd Generation Partnership Project.
  • “Enhanced LTE Device to Device Proximity Services”, Release 13 analytical view version Sept. 9th 2015, 3rd Generation Partnership Project.
  • “Study on Multimedia Broadcast Supplement for Public Warning System (PWS)”, Overview of 3GPP Release 14 V0.0.1, 3rd Generation Partnership Project.
  • “Vehicle-to-Everything Communications (V2X) Improvements”, 3rd Generation Partnership Project Technical Specification Group Services and System Aspects 3GPP TR 21.915 V15.0.0, 3rd Generation Partnership Project.
  • “Advanced V2X Support”, 3rd Generation Partnership Project-Technical Specification Group Services and System Aspects 3GPP TR 21.916 V16.2.0, 3rd Generation Partnership Project.
  • “Proximity/D2D/Sidelink related and V2X”, 3rd Generation Partnership Project Technical Specification Group Services and System Aspects 3GPP TR 21.917 V17.0.1, 3rd Generation Partnership Project.
  • “Artificial Intelligence (AI)/Machine Learning (ML)”, 3rd Generation Partnership Project Technical Specification Group Services and System Aspects 3GPP TR 21.918 V1.2.1 , 3rd Generation Partnership Project.
  • Dönmez T.C.M. “Anomaly Detection in Vehicular CAN Bus Using Message Identifier Sequences”, IEEE Access, vol. 9, pp. 136243-136252, 2021, doi: 10.1109/ACCESS.2021.3117038.
  • Lekidis A. “Anomaly detection mechanisms for in-vehicle and V2X systems”, 19th International Conference on Availability, Reliability and Security (ARES '24), Article 100, 1–8. https://doi.org/10.1145/3664476.3671012
  • Tu L., Shi H. “Application and Research of V2X Vehicle Road Collaboration Technology”, 3rd International Conference on Computer, Artificial Intelligence and Control Engineering, pp. 822–829. https://doi.org/10.1145/3672758.3672894
  • Wu F., Yang B. “Research on C-V2X slice random access technology”, 2024 8th International Conference on Digital Signal Processing, pp. 89-95. https://doi.org/10.1145/3653876.365388
  • Lekidis A., Morais H. “Open V2X Management Platform Cyber-Resilience and Data Privacy Mechanisms”, 19th International Conference on Availability, Reliability and Security (ARES '24), article 139, pp.1–8. https://doi.org/10.1145/3664476.3669917
  • Bodei C., Vincezi M.D., Matteucci I. “OLIVE: Flexible, Portable, and Sustainable V2X Multi-Factor Authentication”, 39th ACM/SIGAPP Symposium on Applied Computing (SAC '24), pp. 215–217. https://doi.org/10.1145/3605098.3636102
  • Li Y., Hou R., Lui K.S., Li H. “An MEC-based DoS Attack Detection Mechanism for C-V2X Networks”, 2018 IEEE Global Communications Conference (GLOBECOM), pp. 1-6, doi: 10.1109/GLOCOM.2018.8647323
  • Dolnák I., Litvik J.J. “An overview of DNS security in V2X networks”, 17th International Conference on Emerging eLearning Technologies and Applications (ICETA), Starý Smokovec, pp. 156-159, doi: 10.1109/ICETA48886.2019.9040111.
  • Pagadala A., Ahmed G. “Analysis of DDoS Attacks in 5G Networks”, 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 1-6, doi: 10.1109/ICCCNT56998.2023.10307311.
  • Zheng T.X., Wen Y., Liu H.W., Ju Y., Wang H.M., Wong K.K., Yuan J.“Physical-Layer Security of Uplink mmWave Transmissions in Cellular V2X Networks”, IEEE Transactions on Wireless Communications, vol. 21, no. 11, pp. 9818-9833, Nov. 2022, doi: 10.1109/TWC.2022.3179706
  • Twardokus G., Rahbari H. “Vehicle-to-Nothing? Securing C-V2X Against Protocol-Aware DoS Attacks”, IEEE INFOCOM 2022 - IEEE Conference on Computer Communications, pp. 1629-1638,doi: 10.1109/INFOCOM48880.2022.9796667
Toplam 48 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Veri Yönetimi ve Veri Bilimi (Diğer)
Bölüm Makaleler
Yazarlar

Bora Uğurlu

Yayımlanma Tarihi 23 Haziran 2025
Gönderilme Tarihi 1 Aralık 2024
Kabul Tarihi 22 Ocak 2025
Yayımlandığı Sayı Yıl 2025 Cilt: 8 Sayı: 1

Kaynak Göster

APA Uğurlu, B. (2025). Akıllı Ulaşım Sistemlerinde Kablosuz İletişim Teknolojileri: Güncel Yaklaşımlar, Güvenlik ve Gizlilik. Veri Bilimi, 8(1), 24-37.



Dergimizin Tarandığı Dizinler (İndeksler)


Academic Resource Index

logo.png

journalseeker.researchbib.com

Google Scholar

scholar_logo_64dp.png

ASOS Index

asos-index.png

Rooting Index

logo.png

www.rootindexing.com

The JournalTOCs Index

journal-tocs-logo.jpg?w=584

www.journaltocs.ac.uk

General Impact Factor (GIF) Index

images?q=tbn%3AANd9GcQ0CrEQm4bHBnwh4XJv9I3ZCdHgQarj_qLyPTkGpeoRRmNh10eC

generalif.com

Directory of Research Journals Indexing

DRJI_Logo.jpg

olddrji.lbp.world/indexedJournals.aspx

I2OR Index

8c492a0a466f9b2cd59ec89595639a5c?AccessKeyId=245B99561176BAE11FEB&disposition=0&alloworigin=1

http://www.i2or.com/8.html



logo.png