Mobile QR Code QR CODE

REFERENCES

1 
Shladover S. E. , 2017, Connected and automated vehicle systems: Introduction and overview, Journal of Intelligent Transportation Systems, Vol. 22, No. 3, pp. 190-200DOI
2 
Elliott D. , Keen W. , Miao L. , 2019, Recent advances in connected and automated vehicles, journal of traffic and transportation engineering (English edition), Vol. 6, No. 2, pp. 109-131DOI
3 
Matin A. , Dia H. , 2022, Impacts of connected and automated vehicles on road safety and efficiency: A systematic literature review, IEEE Transactions on Intelligent Transportation Systems, Vol. 24, No. 3, pp. 2705-2736Google Search
4 
Liu W. , Hua M. , Deng Z. , Meng Z. , Huang Y. , Hu C. , Song S. , Gao L. , Liu C. , Shuai B. , Khajepour A. , Xiong L. , Xia X. , 2023, A systematic survey of control techniques and applications in connected and automated vehicles, IEEE Internet of Things Journal, Vol. 10, No. 24, pp. 21892-21916DOI
5 
Vahidi A. , Sciarretta A. , 2018, Energy saving potentials of connected and automated vehicles, Transportation Research Part C: Emerging Technologies, Vol. 95, pp. 822-843DOI
6 
Li J. , Fotouhi A. , Liu Y. , Zhang Y. , Chen Z. , 2024, Review on eco-driving control for connected and automated vehicles, Renewable and Sustainable Energy Reviews, Vol. 189, pp. 114025DOI
7 
Tamang L. D. , Kim B. W. , 2021, Optical camera communication for vehicular applications: A survey, IEIE Transactions on Smart Processing and Computing, Vol. 10, No. 2, pp. 136-145DOI
8 
Kenney J. B. , 2011, Dedicated short-range communications (DSRC) standards in the United States, Proc. IEEE, Vol. 99, No. 7, pp. 1162-1182DOI
9 
Garcia M. H. C. , Molina-Galan A. , Boban M. , Gozalvez J. , Coll-Perales B. , Sahin T. , Kousaridas A. , 2021, A tutorial on 5G NR V2X communications, IEEE Communications Surveys & Tutorials, Vol. 23, No. 3, pp. 1972-2026DOI
10 
Jellid K. , Mazri T. , 2020, DSRC vs LTE V2X for autonomous vehicle connectivity, Proc. International Conference on Smart City Applications (SCA), pp. 381-394Google Search
11 
Elbery A. , Sorour S. , Hassanein H. , Sediq A. B. , Abou-zeid H. , 2021, To dsrc or 5g? a safety analysis for connected and autonomous vehicles, Proc. Global Communications Conference (GLOBECOM), pp. 1-6Google Search
12 
Clancy J. , Mullins D. , Deegan B. , Horgan J. , Ward E. , Eising C. , Denny P. , Jones E. , Glavin M. , 2024, Wireless access for V2X communications: Research, challenges and opportunities, IEEE Communications Surveys & Tutorials, Vol. 26, No. 3, pp. 2082-2119DOI
13 
Yelure B. , Patokar A. , Patil S. , Mawale R. , Nemade S. , Gaikwad V. , 2024, Impact and Analysis of Attacks on Routing Protocols in Vehicular Ad hoc Network (VANET): Assessing Security Threats, IEIE Transactions on Smart Processing & Computing, Vol. 13, No. 3, pp. 294-302DOI
14 
Gupta S. , Maple C. , Passerone R. , 2023, An investigation of cyber-attacks and security mechanisms for connected and autonomous vehicles, IEEE Access, Vol. 11, pp. 90641-90669DOI
15 
Wang Z. , Wei H. , Wang J. , Zeng X. , Chang Y. , 2022, Security issues and solutions for connected and autonomous vehicles in a sustainable city: A survey, Sustainability, Vol. 14, No. 19, pp. 12409DOI
16 
Sadaf M. , Iqbal Z. , Javed A. R. , Saba I. , Krichen M. , Majeed S. , Raza A. , 2023, Connected and automated vehicles: Infrastructure, applications, security, critical challenges, and future aspects, Technologies, Vol. 11, No. 5, pp. 117DOI
17 
Daemen J. , Rijmen V. , 1998, Aes proposal: Rijndael, Proc. Advanced Encryption Standard Candidate ConferenceGoogle Search
18 
Bernstein D. J. , 2008, ChaCha, a variant of Salsa20, Workshop record of SASC, Vol. 8, No. 1, pp. 3-5Google Search
19 
Kwak M. , Lee T. H. , Lee D. H. , Kim T.-H. , Kim Y. , 2025, An Area-Efficient ChaCha20 Hardware Accelerator Design for Secure and Real-Time Communication in CAVs, Proc. International Conference on Ubiquitous and Future Networks (ICUFN)Google Search
20 
Henzen L. , Carbognani F. , Felber N. , Fichtner W. , 2008, VLSI hardware evaluation of the stream ciphers Salsa20 and ChaCha, and the compression function Rumba, Proc. International Conference on Signals, Circuits and Systems (SCS), pp. 1-5Google Search
21 
Mozaffari-Kermani M. , Azarderakhsh R. , Aghaie A. , 2016, Fault detection architectures for post-quantum cryptographic stateless hash-based secure signatures benchmarked on ASIC, ACM Transactions on Embedded Computing Systems, Vol. 16, No. 2, pp. 1-19DOI
22 
Serrano R. , Sarmiento M. , Duran C. , Hoang T. , Pham C. , 2022, A 3.65 Gb/s Area-Efficiency ChaCha20 Cryptocore, Proc. International SoC Design Conference (ISOCC), pp. 79-80Google Search
23 
Le V. T. D. , Pham H. L. , Tran T. H. , Duong T. S. , Nakashima Y. , 2023, High-efficiency Reconfigurable Crypto Accelerator Utilizing Innovative Resource Sharing and Parallel Processing, Proc. International Symposium on Embedded Multicore/Many-core Systems-on-Chip (MCSoC), pp. 576-583Google Search
24 
Rashidi B. , 2024, High-Performance Hardware Structure of ChaCha20 Stream Cipher Based on Sparse Parallel Prefix Adder, International Journal of Circuit Theory and Applications, Vol. 53, No. 5, pp. 2947-2957DOI
25 
Dani V. , 2023, Implementing ChaCha20: analysis on performance, resource utilization and side-channel protectionGoogle Search
26 
Pammu A. A. , Ho W. , Chong K. , Gwee B. , 2018, A high throughput and secure authentication-encryption AES-CCM algorithm on asynchronous multicore processor, IEEE Transactions on Information Forensics and Security, Vol. 14, No. 4, pp. 1023-1036Google Search
27 
Nannipieri P. , Matteo S. D. , Baldanzi L. , Crocetti L. , Zulberti L. , Saponara S. , Fanucci L. , 2021, VLSI design of Advanced-Features AES CryptoProcessor in the framework of the European Processor Initiative, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 30, No. 2, pp. 177-186Google Search
28 
Deng Q. , Li T. , Wang H. , Wang Y. , 2024, A pipelined hardware implementation of AES with S-box based on right-skewed ECA, Proc. International Conference on Electronics, Computers and Communication Technology (CECCT), pp. 32-36Google Search
29 
Lee Y. , Kang J. , Lee J. , 2025, A Lightweight AES-256 Accelerator Design through Processing Order Optimization for Low-cost Hardware Security, Journal of Semiconductor Technology and Science, Vol. 25, No. 4, pp. 406-413DOI
30 
Ueno R. , Morioka S. , Miura N. , Matsuda K. , Nagata M. , Bhasin S. , Mathieu Y. , Graba T. , Danger J.-L. , Homma N. , 2019, High throughput/gate AES hardware architectures based on datapath compression, IEEE Transactions on Computers, Vol. 69, No. 4, pp. 534-548Google Search
31 
Lee D. , Kwak M. , Lee J. , Kim B. , Kim Y. , 2022, A Light-Weight AES Design using LFSR-based S-Box for IoT Applications, IEIE Transactions on Smart Processing & Computing, Vol. 11, No. 2, pp. 140-148Google Search
32 
Choi I. , Kim J.-H. , 2016, Area-Optimized Multi-Standard AES-CCM Security Engine for IEEE 802.15. 4/802.15. 6, Journal of Semiconductor Technology and Science, Vol. 16, No. 3, pp. 293-299DOI
33 
Baik J. , Kim Y. , 2022, A High-Throughput and Energy-Efficient SHA-256 Design using Approximate Arithmetic, IEIE Transactions on Smart Processing & Computing, Vol. 11, No. 5, pp. 385-391DOI
34 
Kong W. , Choi P. , Kim D. K. , 2020, Hardware Implementation of Lightweight Block Ciphers for IoT Sensors, Journal of Semiconductor Technology and Science, Vol. 20, No. 4, pp. 391-389DOI
35 
Jeong C. , Kim Y. , 2017, Efficient FPGA Implementation of AES-CCM for IEEE 1609.2 Vehicle Communications Security, IEIE Transactions on Smart Processing & Computing, Vol. 6, No. 2, pp. 133-139DOI
36 
Yu H. , Kim Y. , 2020, New RSA Encryption Mechanism Using One-Time Encryption Keys and Unpredictable Bio-Signal for Wireless Communication Devices, Electronics, Vol. 9, No. 2, pp. 1-12DOI
37 
Lee D. , Kim Y. , 2021, Design of a Light-Weight Key Scheduler for AES using LFSR for IoT Applications, Proc. IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), pp. 1-2Google Search
38 
2025, LibsodiumGoogle Search
39 
Bauder M. , Festag A. , Kubjatko T. , Schweiger H. , 2024, Data accuracy in Vehicle-to-X cooperative awareness messages: An experimental study for the first commercial deployment of C-ITS in Europe, Vehicular Communications, Vol. 47, pp. 100744DOI
40 
Sarangi S. , Baas B. , 2021, DeepScaleTool: A tool for the accurate estimation of technology scaling in the deep-submicron era, Proc. International Symposium on Circuits and Systems (ISCAS), pp. 1-5Google Search
41 
Chen Y. , Chang B. , Yang C. , Chiueh T. , 2021, A high-throughput FPGA accelerator for short-read mapping of the whole human genome, IEEE Transactions on Parallel and Distributed Systems, Vol. 32, No. 6DOI