Smart Transportation Systems: Architecture, Enabling Technologies, and Open Issues

  • Hansong Xu
  • Jie Lin
  • Wei YuEmail author
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)


With the development of smart sensors, smart vehicles, and vehicular communication technologies, the smart transportation system is proposed and considered to be the future of the transportation critical infrastructure system, aiming to improve traffic efficiency, safety, and security. All vehicles and roadside infrastructures will be deployed with integrated smart sensors and communication units in order that traffic states can be measured and shared via vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication networks. With the smart transportation system, diversified services can be provided to customers, including traffic and transportation management, safety management, and others. In addition, the optimal travel for users (e.g., drivers) can be achieved, travel safety can be realized, and road congestion can be reduced in the smart transportation system. Nonetheless, security issues, including illegal access, attacks, unauthorized information sharing, and so on, become challenging in the smart transportation system. In order to understand smart transportation systems such that techniques can be designed to make them secure, this chapter conducts a review of smart transportation systems with respect to architecture, enabling technologies, and open issues. To be specific, a three-layer architecture is first presented for the smart transportation system, including the physical layer, communication layer, and service layer. Then, the detailed components and enabling technologies in each layer are described. Finally, we present some open issues related to security, big data, performance, and evaluation platforms in the smart transportation system.



This work was supported in part by US National Science Foundation (NSF) under grant: CNS 1350145 and USM Wilson H. Elkins Professorship fund. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the agencies.


  1. 1.
    Abbassi, S.H., Qureshi, I.M., & Abbasi, H. (2014). Performance of uni-directional road side units in vehicular adhoc networks. In: Proceedings of World Congress on Computer Applications and Information Systems (WCCAIS).Google Scholar
  2. 2.
    Abdelgader, A., & Lenan, W. (2014). The physical layer of the ieee 802.11 p wave communication standard: the specifications and challenges. In: Proceedings of the world congress on engineering and computer science.Google Scholar
  3. 3.
    Ahmed-Zaid, F., Bai, F., Bai, S., Basnayake, C., Bellur, B., Brovold, S., Brown, G., et al. (2011). Vehicle safety communications–applications (vsc-a) final report: appendix volume 1 system design and objective test. Technical Report.Google Scholar
  4. 4.
    Al-kahtani, M.S. (2012). Survey on security attacks in vehicular ad hoc networks (vanets). In: Proceedings of 6th International Conference on Signal Processing and Communication Systems (ICSPCS).Google Scholar
  5. 5.
    Al-Rabayah, M., & Malaney, R. (2010). A new hybrid location-based ad hoc routing protocol. In Proceedings of ieee global telecommunications conference (GLOBECOM).Google Scholar
  6. 6.
    Al-Rabayah, M., & Malaney, R. (2012). A new scalable hybrid routing protocol for vanets. IEEE Transactions on Vehicular Technology (TVT), 61(6), 2625–2635.CrossRefGoogle Scholar
  7. 7.
    Altayeb, M., & Mahgoub, I. (2013). A survey of vehicular ad hoc networks routing protocols. International Journal of Innovation and Applied Studies, 3(3), 829–846.Google Scholar
  8. 8.
    An, S.H., Lee, B.H., & Shin, D.R. (2011). A survey of intelligent transportation systems. In Proceedings of third international conference on computational intelligence, communication systems and networks (CICSyN).Google Scholar
  9. 9.
    Anagnostopoulos, P., Papapanagiotakis, G., & Gonos, F., (1992). Pan-drive: A vehicle navigation and route guidance system. In Proceedings of the 3rd International Conference on Vehicle Navigation and Information Systems.Google Scholar
  10. 10.
    Chahbi, I., Ben Amara, D., & Belghith, A., (2013). A novel route guidance algorithm using beamforming techniques for vehicular networks. In Proceedings of IEEE 38th conference on local computer networks workshops (LCN Workshops).Google Scholar
  11. 11.
    Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., et al. (2011). Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of 20th USENIX security symposium (SEC).Google Scholar
  12. 12.
    Chen, W., Guha, R. K., Kwon, T. J., Lee, J., & Hsu, Y. Y. (2011). A survey and challenges in routing and data dissemination in vehicular ad hoc networks. Wireless Communications and Mobile Computing, 11(7), 787–795.CrossRefGoogle Scholar
  13. 13.
    Chen, Z., Xu, G., Mahalingam, V., Ge, L., Nguyen, J., Yu, W., & Lu, C. (2016). A cloud computing based network monitoring and threat detection system for critical infrastructures. International journal of big data research (elsevier)-special issue on big data from networking perspective  3:10–23.Google Scholar
  14. 14.
    Deng, H., Zeng, Q.A., & Agrawal, D.P. (2003). Svm-based intrusion detection system for wireless ad hoc networks. In Proceedings of IEEE 58th vehicular technology conference, VTC 2003-Fall.Google Scholar
  15. 15.
    Ding, J. W., Wang, C. F., Meng, F. H., & Wu, T. Y. (2010). Real-time vehicle route guidance using vehicle-to-vehicle communication. IET Communications, 4(7), 870–883.MathSciNetCrossRefGoogle Scholar
  16. 16.
    Djojo, M., & Karyono, K. (2013). Computational load analysis of dijkstra, a*, and floyd-warshall algorithms in mesh network. In Proceedings of IEEE international conference on robotics, biomimetics, and intelligent computational systems (ROBIONETICS).Google Scholar
  17. 17.
    Dong, W., Vu, H., & Vo, Q. (2011). Real time route guidance with correlated link cost. In Proceedings of IEEE 14th international conference on intelligent transportation systems (ITSC).Google Scholar
  18. 18.
    D’Orey, P., & Ferreira, M. (2014). Its for sustainable mobility: A survey on applications and impact assessment tools. IEEE Transactions on Intelligent Transportation Systems, 15(2), 477–493.CrossRefGoogle Scholar
  19. 19.
    Ekedebe, N., Lu, C., & Yu, W. (2015). On experimental evaluation of intelligent transportation system (its) safety and traffic efficiency. In Proceedings of IEEE international conference on communication (ICC).Google Scholar
  20. 20.
    Elkosantini, S., & Darmoul, S. (2013). Intelligent public transportation systems: A review of architectures and enabling technologies. In Proceedings of international conference on advanced logistics and transport (ICALT).Google Scholar
  21. 21.
    Ezell, S. (2010). Explaining international it application leadership: Intelligent transportation systems.Google Scholar
  22. 22.
    Faezipour, M., Nourani, M., Saeed, A., & Addepalli, S. (2012). Progress and challenges in intelligent vehicle area networks. Communication of ACM, 55(2), 90–100.CrossRefGoogle Scholar
  23. 23.
    Fallah, Y. P., Nasiriani, N., & Krishnan, H. (2016). Stable and fair power control in vehicle safety networks. IEEE Transactions on Vehicular Technology, 65(3), 1662–1675.CrossRefGoogle Scholar
  24. 24.
    Fan, D., & Shi, P. (2010). Improvement of dijkstra’s algorithm and its application in route planning. In Proceedings of seventh international conference on fuzzy systems and knowledge discovery (FSKD).Google Scholar
  25. 25.
    Festag, A. (2015). Standards for vehicular communication-from ieee 802.11 p to 5g. e & i. Elektrotechnik und Informationstechnik, 132(7), 409–416.CrossRefGoogle Scholar
  26. 26.
    Gillani, S.A., Shah, P.A., Qayyum, A., & Hasbullah, H.B. (2015). Mac layer challenges and proposed protocols for vehicular ad-hoc networks. In Vehicular ad-hoc networks for smart cities, Springer, pp. 3–13.Google Scholar
  27. 27.
    Google (2016). Google self-driving car. In
  28. 28.
    Goyal, M.K., Verma, Y.K., Bassi, P., & Misra, P.K. (2013). Performance analysis of ad hoc on-demand distance vector routing and dynamic source routing using ns2 simulation. In Mobile communication and power engineering, Springer, pp. 390–396.Google Scholar
  29. 29.
    Greenberg, A. (2015). After jeep hack, chrysler recalls 1.4 m vehicles for bug fix.
  30. 30.
    Hadded, M., Muhlethaler, P., Laouiti, A., Zagrouba, R., & Saidane, L. A. (2015). Tdma-based mac protocols for vehicular ad hoc networks: A survey, qualitative analysis, and open research issues. IEEE Communications Surveys & Tutorials, 17(4), 2461–2492.CrossRefGoogle Scholar
  31. 31.
    Harding, J., Powell, G., Yoon, R., Fikentscher, J., Doyle, C., Sade, D., Lukuc, M. et al. (2014). Vehicle-to-vehicle communications: Readiness of v2v technology for application. Technical Report.Google Scholar
  32. 32.
    Hartenstein, H., & Laberteaux, L. (2008). A tutorial survey on vehicular ad hoc networks. IEEE Communications Magazine, 46(6), 164–171.CrossRefGoogle Scholar
  33. 33.
    Hematian, A., Yu, W., Lu, C., Griffith, D., & Golmie, N. (2016). Clustering-based device-to-device communication to support diverse applications. In Proceedings of ACM International Conference on Reliable & Convergent Systems (RACS).Google Scholar
  34. 34.
    Hu, L., Eichinger, J., Dillinger, M., Botsov, M., & Gozalvez, D. (2016). Unified device-to-device communications for low-latency and high reliable vehicle-to-x services. In Proceedings of IEEE Vehicular Technology Conference (VTC Spring), 2016 IEEE 83rd.Google Scholar
  35. 35.
    Huang, Y., Yang, X., Yang, S., Yu, W., & Fu, X. (2011). A cross-layer approach handling link asymmetry for wireless mesh access networks. IEEE Transactions on Vehicular Technology (TVT), 60(3), 1045–1058.CrossRefGoogle Scholar
  36. 36.
    Jarupan, B., & Ekici, E. (2011). A survey of cross-layer design for vanets. Ad Hoc Networks, 9(5), 966–983.CrossRefGoogle Scholar
  37. 37.
    Ji, S., Kim, J., & You, C. (2015). An efficient directional mac protocol for vehicular ad-hoc networks. Journal of the Institute of Electronics and Information Engineers, 52(4), 9–16.CrossRefGoogle Scholar
  38. 38.
    Jiang, D., & Delgrossi, L. (2008). Ieee 802.11 p: Towards an international standard for wireless access in vehicular environments. In Proceedings of ieee vehicular technology conference, 2008. VTC Spring 2008. IEEE.Google Scholar
  39. 39.
    Jo, Y., & Jeong, J. (2016). Rpa: Road-side units placement algorithm for multihop data delivery in vehicular networks. In Proceedings of 30th international conference on advanced information networking and applications workshops (WAINA).Google Scholar
  40. 40.
    Karagiannis, G., Altintas, O., Ekici, E., Heijenk, G., Jarupan, B., Lin, K., et al. (2011). Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys & Tutorials, 13(4), 584–616.CrossRefGoogle Scholar
  41. 41.
    Karp, B., & Kung, H.T. (2000). Gpsr: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (ACM).Google Scholar
  42. 42.
    Kastell, K. (2014). Security requirements in communication networks for transportation systems. In Proceedings of 16th international conference on transparent optical networks (ICTON).Google Scholar
  43. 43.
    Kenney, J. B. (2011). Dedicated short-range communications (dsrc) standards in the united states. Proceedings of the IEEE, 99(7), 1162–1182.CrossRefGoogle Scholar
  44. 44.
    Khanjary, M., & Hashemi, S. (2012). Route guidance systems: Review and classification. In Proceedings of 6th euro american conference on telematics and information systems (EATIS).Google Scholar
  45. 45.
    Khanjary, M., Faez, K., Meybodi, M., & Sabaei, M. (2011). Persiangulf: an autonomous combined traffic signal controller and route guidance system. In Proceedings of IEEE vehicular technology conference (VTC Fall).Google Scholar
  46. 46.
    Khosroshahi, A., Keshavarzi, P., KoozehKanani, & Z., Sobhi, J. (2011). Acquiring real time traffic information using vanet and dynamic route guidance. In Proceedings of IEEE 2nd International Conference on Computing, Control and Industrial Engineering (CCIE).Google Scholar
  47. 47.
    Kim, D., Velasco, Y., Yang, Z., Wang, W., Hussain, R., & Uma, R.N. (2016). Cost effective mobile and static road side unit deployment for vehicular adhoc networks. In Proceedings of international conference on computing, networking and communications (ICNC).Google Scholar
  48. 48.
    Kim, R., Lim, H., & Krishnamachari, B. (2015). Prefetching-based data dissemination in vehicular cloud systems. IEEE Transactions on Vehicular Technology (TVT) PP(99):1–1.Google Scholar
  49. 49.
    Klaus Finkenzeller, D.M. (2010). RFID Handbook: fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication, 3rd edn. Wiley.Google Scholar
  50. 50.
    Kleberger, P., Olovsson, T., & Jonsson, E. (2011). Security aspects of the in-vehicle network in the connected car. In Proceedings of IEEE intelligent vehicles symposium (IV).Google Scholar
  51. 51.
    Knapp, A. (2011). Nevada passes law authorizing driverless cars. In: Forbes.Google Scholar
  52. 52.
    Kukreja, D., Dhurandher, S. K., & Reddy, B. (2015). Enhancing the security of dynamic source routing protocol using energy aware and distributed trust mechanism in manets. In Intelligent distributed computing (pp. 83–94). Springer.Google Scholar
  53. 53.
    Kumar, P. N., et al. (2013). A novel method to avoid stale route cache problem of dynamic source routing protocol for mobile ad hoc network. In Proceedings of the IEEE International Conference On Current Trends in Engineering and Technology (ICCTET).Google Scholar
  54. 54.
    Kurihara, T. (2013). Dedicated short range communication working group.
  55. 55.
    LeLann, G. (2015). Safety in vehicular networks–on the inevitability of short-range directional communications. In Proceedings of the International Conference on Ad-Hoc Networks and Wireless (Springer).Google Scholar
  56. 56.
    Leontiadis, I., Marfia, G., Mack, D., Pau, G., Mascolo, C., & Gerla, M. (2011). On the effectiveness of an opportunistic traffic management system for vehicular networks. IEEE Transactions on Intelligent Transportation Systems, 12(4), 1537–1548.CrossRefGoogle Scholar
  57. 57.
    Li, C., Anavatti, S., & Ray, T. (2014). Analytical hierarchy process using fuzzy inference technique for real-time route guidance system. IEEE Transactions on Intelligent Transportation Systems, 15(1), 84–93.CrossRefGoogle Scholar
  58. 58.
    Li, F., & Wang, Y. (2007). Routing in vehicular ad hoc networks: A survey. IEEE Vehicular Technology Magazine, 2(2), 12–22.CrossRefGoogle Scholar
  59. 59.
    Li, S. (2012). A survey of urban traffic coordination controls in intelligent transportation systems. In Proceedings of the IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI).Google Scholar
  60. 60.
    Li, W., & Song, H. (2016). Art: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 960–969.CrossRefGoogle Scholar
  61. 61.
    Li, W., Joshi, A., & Finin, T. (2010). Coping with node misbehaviors in ad hoc networks: A multi-dimensional trust management approach. In Proceedings of the Eleventh International Conference on Mobile Data Management.Google Scholar
  62. 62.
    Lin, J., & Yu, W. (2014). Yang X (2016a) On false data injection attack against multistep electricity price in electricity market in smart grid. IEEE Transactions on Parallel and Distributed Systems (TPDS), 27, 286–302.CrossRefGoogle Scholar
  63. 63.
    Lin, J., Yu, W., Yang, X., Yang, Q., Fu, X., & Zhao, W. (2016b). A real-time en-route route guidance decision scheme for transportation-based cyber-physical systems. IEEE Transactions on Vehicular Technology (TVT) PP(99), 1–1.Google Scholar
  64. 64.
    Lin, J., Yu, W., Zhang, N., Yang, X., & Ge, L. (2017). On data integrity attack against route guidance in transportation-based cyber-physical systems. In Proceedings of Annual IEEE Consumer Communications and Networking (CCNC).Google Scholar
  65. 65.
    Liu, J., Wan, J., Wang, Q., Zeng, B., & Fang, S. (2016). A time-recordable cross-layer communication protocol for the positioning of vehicular cyber-physical systems. Future Generation Computer Systems, 56, 438–448.CrossRefGoogle Scholar
  66. 66.
    Liu, Y., Tian, B., Chen, S., Zhu, F., Wang, K. (2013). A survey of vision-based vehicle detection and tracking techniques in its. In Proceedings of the IEEE International Conference on Vehicular Electronics and Safety (ICVES).Google Scholar
  67. 67.
    Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom).Google Scholar
  68. 68.
    Mello, L. D., & Kubota, L. T. (2002). Review of the use of biosensors as analytical tools in the food and drink industries. Food Chemistry  77(2), 237–256.
  69. 69.
    MirEmail, Z. H., & Filali, F. (2014). Lte and ieee 802.11p for vehicular networking: a performance evaluation. EURASIP Journal on Wireless Communications and Networking, 2014(89).Google Scholar
  70. 70.
    Mittag, J., Papanastasiou, S., Hartenstein, H., & Strom, E. G. (2011). Enabling accurate cross-layer phy/mac/net simulation studies of vehicular communication networks. Proceedings of the IEEE, 99(7), 1311–1326.CrossRefGoogle Scholar
  71. 71.
    Morais, A., & Cavalli, A. (2012). A distributed intrusion detection scheme for wireless ad hoc networks. In Proceedings of the 27th Annual ACM Symposium on Applied Computing.Google Scholar
  72. 72.
    Morgan, Y. L. (2010). Notes on dsrc & wave standards suite: Its architecture, design, and characteristics. IEEE Communications Surveys & Tutorials, 12(4), 504–518.CrossRefGoogle Scholar
  73. 73.
    Mostefaoui, A., Melkemi, M., & Boukerche, A. (2014). Localized routing approach to bypass holes in wireless sensor networks. IEEE Transactions on Computers (TC), 63(12), 3053–3065.MathSciNetCrossRefzbMATHGoogle Scholar
  74. 74.
    Nakamura, J. (2005). Image sensors and signal processing for digital still cameras. In Optical science and engineering: CRC Press.Google Scholar
  75. 75.
    Namboodiri, V., & Gao, L. (2007). Prediction-based routing for vehicular ad hoc networks. IEEE Transactions on Vehicular Technology (TV), 56(4), 2332–2345.CrossRefGoogle Scholar
  76. 76.
    Oh, H., Yae, C., Ahn, D., & Cho, H. (1999). 5.8 ghz dsrc packet communication system for its services. In Proceedings of IEEE Vehicular Technology Conference.Google Scholar
  77. 77.
    Owojaiye, G., & Sun, Y. (2012). Focal design issues affecting the deployment of wireless sensor networks for intelligent transport systems. IET Intelligent Transport Systems, 6(4), 432–432.CrossRefGoogle Scholar
  78. 78.
    Pingley, A., Yu, W., Zhang, N., Fu, X., & Zhao, W. (2009). Cap: A context-aware privacy protection system for location-based services. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS).Google Scholar
  79. 79.
    Qing, S., & Xiaofan, W. (2011). An efficient route computation approach for large graphs. In Proceedings of the 30th Chinese Control Conference (CCC).Google Scholar
  80. 80.
    Ratwani, V., & Shah, A. (2015). Network coding and cross-layer approach for reliability and optimization of routing in vanet: A survey. International Journal of Computer Applications, 113(13).Google Scholar
  81. 81.
    Sassi, A., Charfi, F., Kamoun, L., Elhillali, Y., & Rivenq, A. (2014). Ofdm transmission performance evaluation in v2x communication. arXiv:14108039.
  82. 82.
    Schnemann, B. (2016). V2x simulation runtime infrastructure vsimrti: An assessment tool to design smart traffic management systems. Computer Networks, 55(14), 3189–3198.CrossRefGoogle Scholar
  83. 83.
    Sedjelmaci, H., Bouali, T., & Senouci, S. M (2014) Detection and prevention from misbehaving intruders in vehicular networks. In Proceedings of IEEE Global Communications Conference (GLOBECOM).Google Scholar
  84. 84.
    Selamat, A., Zolfpour-Arokhlo, M., Hashim, S., & Selamat, M. (2011). A fast path planning algorithm for route guidance system. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC).Google Scholar
  85. 85.
    Shulman, M., & Deering, R. (2007). Vehicle safety communications in the united states. In Proceedings of the Conference on Experimental Safety Vehicles.Google Scholar
  86. 86.
    Skordylis, A., & Trigoni, N. (2008). Delay-bounded routing in vehicular ad-hoc networks. In Proceedings of the 9th ACM International Symposium on Mobile ad hoc Networking and Computing.Google Scholar
  87. 87.
    Song, Q., & Wang, X. (2011). Efficient routing on large road networks using hierarchical communities. IEEE Transactions on Intelligent Transportation Systems, 12(1), 132–140.CrossRefGoogle Scholar
  88. 88.
    Standards I (2010) 802.11 p-2010-ieee standard for information technology - local and metropolitan area networks-specific requirements-part 1 : Wireless lan medium access control (mac) and physical layer (phy) specifications amendment 6 : Wireless access in vehicular environments. https://www.standardsieeeorg/findstds/standard/80211p-2010html.
  89. 89.
    Studnia, I., Nicomette, V., Alata, E., Deswarte, Y., Kaaniche, M., Laarouchi, Y. (2013). Survey on security threats and protection mechanisms in embedded automotive networks. In Proceedings of 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).Google Scholar
  90. 90.
    Sun, W., Hu, L., Li, P., & Wang, H. (2012). A bi-level optimal control approach to route guidance problem considering travelers’ stochastic compliance. In Proceedings of the of Proceedings of International Conference on Modelling, Identification Control (ICMIC).Google Scholar
  91. 91.
    Tian, D., Yuan, Y., Zhou, J., Wang, Y., Lu, G., Xia, H. (2013). Real-time vehicle route guidance based on connected vehicles. In Proceedings of IEEE International Conference on and IEEE Cyber, Physical and Social Computing.Google Scholar
  92. 92.
    Tielert, T., Jiang, D., Hartenstein, H., & Delgrossi, L. (2013). Joint power/rate congestion control optimizing packet reception in vehicle safety communications. In Proc. of the tenth ACM international workshop on Vehicular inter-networking, systems, and applications (ACM).Google Scholar
  93. 93.
    Torrent-Moreno, M., Mittag, J., Santi, P., & Hartenstein, H. (2009). Vehicle-to-vehicle communication: fair transmit power control for safety-critical information. IEEE Transactions on Vehicular Technology (TVT), 58(7), 3684–3703.CrossRefGoogle Scholar
  94. 94.
    Transportation UDO, (2011). Executive summary national its architecture version 6.1.
  95. 95.
    Tyagi, P., & Dembla, D. (2014). Investigating the security threats in vehicular ad hoc networks (vanets): Towards security engineering for safer on-road transportation. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI).Google Scholar
  96. 96.
    Wang, J., Sun, Y., Liu, Z., Yang, P., Lin, T. (2007a). Route planning based on floyd algorithm for intelligence transportation system. In Proceedings of the IEEE International Conference on Integration Technology (ICIT).Google Scholar
  97. 97.
    Wang, Y., Wu, Y., Liu, Y., Tang, A. (2007b). The application of radio frequency identification technology on tires tracking. In Proceedings of the 2007 IEEE International Conference on Automation and Logistics.Google Scholar
  98. 98.
    Wei, M., & Meng, Y. (2014). Research on the optimal route choice based on improved dijkstra. In Proceedings of IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA).Google Scholar
  99. 99.
    Wu, C., Zhang, X., Dong, Y. (2013). Route guidance systems based on real-time information. In Proceedings of International Conference on Connected Vehicles and Expo (ICCVE).Google Scholar
  100. 100.
    Xu, G., Yu, W., Chen, Z., Zhang, H., Moulema, P., Fu, X., & Lu, C. (2015). A cloud computing based system for cyber security management. International Journal of Parallel, Emergent and Distributed Systems (IJPEDS)  30(1), 29–45.Google Scholar
  101. 101.
    Xu, Q., Mak, T., Ko, J, Sengupta, R. (2004). Vehicle-to-vehicle safety messaging in dsrc. In Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks.Google Scholar
  102. 102.
    Y Z, X Z, S Z, s G. (2012). Intelligent transportation system based on internet of things. In Proceedings of World Automation Congress (WAC).Google Scholar
  103. 103.
    Yan, X., Zhang, H., Wu, C. (2012). Research and development of intelligent transportation systems. In Proceedings of 11th International Symposium on Distributed Computing and Applications to Business, Engineering Science (DCABES).Google Scholar
  104. 104.
    Yang, Q., Lim, A., Li, S., Fang, J., & Agrawal, P. (2010). Acar: Adaptive connectivity aware routing for vehicular ad hoc networks in city scenarios. Mobile Networks and Applications, 15(1), 36–60.CrossRefGoogle Scholar
  105. 105.
    Yang, Q., Yang, J., Yu, W., An, D., Zhang, N., & Zhao, W. (2014). On false data-injection attacks against power system state estimation: Modeling and countermeasures. IEEE Transactions on Parallel and Distributed System (TPDS), 25(3), 717–729.CrossRefGoogle Scholar
  106. 106.
    Yang, X., Lin, J., Yu, W., Moulema, P., Fu, X., & Zhao, W. (2015). A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. IEEE Transactions on Computers (TC), 64(1), 4–18.MathSciNetCrossRefzbMATHGoogle Scholar
  107. 107.
    Ye, P., Chen, C., Zhu, F. (2011). Dynamic route guidance using maximum flow theory and its mapreduce implementation. In Proceedings of 14th International IEEE Conference on Intelligent Transportation Systems (ITSC).Google Scholar
  108. 108.
    Yu, W., Lee, J. (2002). Dsr-based energy-aware routing protocols in ad hoc networks. In Proceedings of IEEE International Conference on Wireless Network (ICWN).Google Scholar
  109. 109.
    Yu, W., Boyer, P.C., Chellappan, S., Xuan, D. (2005). Peer-to-peer system-based active worm attacks: Modeling and analysis. In Proceedings of the IEEE International Conference on Communications (ICC).Google Scholar
  110. 110.
    Yu, W., Wang, X., Calyam, P., Xuan, D., Zhao, W. (2006). On detecting camouflaging worm. In Proceedings of Annual Computer Security Applications Conference (ACSAC).Google Scholar
  111. 111.
    Yu, W., Zhang, N., Fu, X., & Zhao, W. (2010). Self-disciplinary worms: Modeling and countermeasures. IEEE Transactions on Parallel and Distributed Systems (TPDS), 21(10), 1501–1514.CrossRefGoogle Scholar
  112. 112.
    Yu, W., Xu, G., Chen, Z., & Moulema, P. (2013). A cloud computing based architecture for cyber security situation awareness. In: Proceedings of 4th International Workshop on Security and Privacy in Cloud Computing (SPCC).Google Scholar
  113. 113.
    Yu, W., Xu, H., Hematian, A., Griffith, D., & Golmie, N. (2016a). Towards energy efficiency in ultra dense networks. In Proceedings of IEEE International Performance Computing and Communications Conference (IPCCC).Google Scholar
  114. 114.
    Yu, W., Xu, H., Zhang, H., Griffith, D., & Golmie, N. (2016b). Ultra dense networks: State of art and future directions. In Proceedings of IEEE International Conference on Computer Communication and Networks (ICCCN).Google Scholar
  115. 115.
    Zhang, J., Wang, F. Y., Wang, K., Lin, W. H., Xu, X., & Chen, C. (2011). Data-driven intelligent transportation systems: A survey. IEEE Transactions on Intelligent Transportation Systems, 12(4), 1624–1639.CrossRefGoogle Scholar
  116. 116.
    Zhang, R., Li, Z., Feng, C., & Jiang, S. (2012). Traffic routing guidance algorithm based on backpressure with a trade-off between user satisfaction and traffic load. In Proceedings of IEEE Vehicular Technology Conference (VTC Fall).Google Scholar
  117. 117.
    Zhao, J., & Cao, G. (2008). Vadd: Vehicle-assisted data delivery in vehicular ad hoc networks. IEEE transactions on vehicular technology (TVT), 57(3), 1910–1922.CrossRefGoogle Scholar
  118. 118.
    Zhao, K., & Ge, L. (2013). A survey on the internet of things security. In Proceedings of 2013 9th International Conference on Computational Intelligence and Security (CIS).Google Scholar
  119. 119.
    Zhao, M., Walker, J., & Wang, CC. (2012). Security challenges for the intelligent transportation system. In Proceedings of the First International Conference on Security of Internet of Things.Google Scholar
  120. 120.
    Zhao, P., Yang, X., Yu, W., & Fu, X. (2013). A loose virtual clustering based routing for power heterogeneous manets. IEEE Transactions on Vehicular Technology (TVT), 62(5), 2290–2302.CrossRefGoogle Scholar
  121. 121.
    Zheng, B., Li, W., Deng, P., Grardy, L., Zhu, Q., Shankar, N. (2015a). Design and verification for transportation system security. In Proceedings of 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).Google Scholar
  122. 122.
    Zheng, K., Zheng, Q., Chatzimisios, P., Xiang, W., & Zhou, Y. (2015b). Heterogeneous vehicular networking: A survey on architecture, challenges, and solutions. IEEE Communications Surveys & Tutorials, 17(4), 2377–2396.CrossRefGoogle Scholar
  123. 123.
    Zhu, J., & Roy, S. (2003). Mac for dedicated short range communications in intelligent transport system. IEEE Communications Magazine, 41(12), 60–67.CrossRefGoogle Scholar

Copyright information

© The Author(s) 2017

Authors and Affiliations

  1. 1.Towson UniversityTowsonUSA
  2. 2.Xi’an Jiaotong UniversityXi’anPeople’s Republic of China

Personalised recommendations