{"id":"https://openalex.org/W4414667427","doi":"https://doi.org/10.1002/spy2.70109","title":"Enhancing VANET Security Using a Hybrid Model of Deep Learning and Homomorphic Encryption","display_name":"Enhancing VANET Security Using a Hybrid Model of Deep Learning and Homomorphic Encryption","publication_year":2025,"publication_date":"2025-09-30","ids":{"openalex":"https://openalex.org/W4414667427","doi":"https://doi.org/10.1002/spy2.70109"},"language":"en","primary_location":{"id":"doi:10.1002/spy2.70109","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70109","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027969797","display_name":"Haythem Hayouni","orcid":"https://orcid.org/0000-0003-3340-6165"},"institutions":[{"id":"https://openalex.org/I54316950","display_name":"University of Jendouba","ror":"https://ror.org/000g0zm60","country_code":"TN","type":"education","lineage":["https://openalex.org/I54316950"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Haythem Hayouni","raw_affiliation_strings":["IT Department Higher Institute of Computer Science of Kef, University of Jendouba  Jendouba Tunisia"],"raw_orcid":"https://orcid.org/0000-0003-3340-6165","affiliations":[{"raw_affiliation_string":"IT Department Higher Institute of Computer Science of Kef, University of Jendouba  Jendouba Tunisia","institution_ids":["https://openalex.org/I54316950"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5027969797"],"corresponding_institution_ids":["https://openalex.org/I54316950"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":0.6531,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.75111123,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"8","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.796500027179718},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5461999773979187},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.519599974155426},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5008000135421753},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.48890000581741333},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4603999853134155},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.4059999883174896},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.36480000615119934}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.796500027179718},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7871000170707703},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5461999773979187},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.519599974155426},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5008000135421753},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.48890000581741333},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4603999853134155},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41100001335144043},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4059999883174896},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3711000084877014},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3684000074863434},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.365200012922287},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.36480000615119934},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.3483000099658966},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.34290000796318054},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.34139999747276306},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.3271999955177307},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.32420000433921814},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.30649998784065247},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.303600013256073},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2939000129699707},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.289900004863739},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.2888000011444092},{"id":"https://openalex.org/C47796450","wikidata":"https://www.wikidata.org/wiki/Q508378","display_name":"Intelligent transportation system","level":2,"score":0.26739999651908875},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.2567000091075897}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/spy2.70109","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70109","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2308890454","https://openalex.org/W3215217041","https://openalex.org/W4287092816","https://openalex.org/W4319963378","https://openalex.org/W4388191027","https://openalex.org/W4388775458","https://openalex.org/W4396521014","https://openalex.org/W4399732056","https://openalex.org/W4404698069","https://openalex.org/W4405907950","https://openalex.org/W4406137950","https://openalex.org/W4408372351","https://openalex.org/W4409125068","https://openalex.org/W4410243371","https://openalex.org/W4410746706","https://openalex.org/W4411091441","https://openalex.org/W4411217558","https://openalex.org/W4411930119","https://openalex.org/W4412085830","https://openalex.org/W4412707797","https://openalex.org/W4412999985"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"Vehicular":[1],"Ad":[2],"Hoc":[3],"Networks":[4],"(VANETs)":[5],"play":[6],"a":[7,24,47,71,119],"pivotal":[8],"role":[9],"in":[10,159],"enabling":[11,104],"intelligent":[12],"transportation":[13],"systems,":[14],"yet":[15],"their":[16],"decentralized":[17,99],"and":[18,37,58,63,82,89,128,147,167],"dynamic":[19],"nature":[20],"exposes":[21],"them":[22],"to":[23,78,111,163],"wide":[25],"range":[26],"of":[27],"cyber":[28],"threats,":[29],"including":[30],"Sybil":[31],"attacks,":[32,35],"black":[33],"hole":[34],"replay,":[36],"message":[38],"spoofing.":[39],"To":[40,115],"address":[41],"these":[42],"vulnerabilities,":[43],"we":[44],"propose":[45],"HyDra\u2010VANET,":[46],"novel":[48],"hybrid":[49],"security":[50],"framework":[51],"that":[52,151],"integrates":[53],"deep":[54],"learning,":[55,57],"federated":[56],"homomorphic":[59,122],"encryption":[60,123],"for":[61],"robust":[62],"privacy\u2010preserving":[64],"intrusion":[65,156],"detection.":[66,95],"At":[67],"the":[68,109],"vehicle":[69],"level,":[70],"convolutional\u2013recurrent":[72],"neural":[73],"network":[74],"(CRNN)":[75],"is":[76],"employed":[77],"extract":[79],"both":[80],"spatial":[81],"temporal":[83],"patterns":[84],"from":[85],"real\u2010time":[86],"vehicular":[87],"communication":[88,168],"telemetry":[90],"data,":[91],"ensuring":[92],"accurate":[93],"anomaly":[94],"Federated":[96],"learning":[97],"coordinates":[98],"model":[100],"training":[101],"across":[102],"vehicles,":[103],"collaborative":[105],"intelligence":[106],"while":[107],"eliminating":[108],"need":[110],"share":[112],"raw":[113],"data.":[114],"further":[116],"enhance":[117],"privacy,":[118],"lightweight":[120],"lattice\u2010based":[121],"scheme":[124],"allows":[125],"encrypted":[126],"inference":[127],"secure":[129],"aggregation,":[130],"preventing":[131],"sensitive":[132],"information":[133],"leakage":[134],"at":[135],"intermediate":[136],"nodes":[137],"such":[138],"as":[139],"roadside":[140],"units.":[141],"Experimental":[142],"evaluation":[143],"using":[144],"multiple":[145],"datasets":[146],"adversarial":[148,164],"scenarios":[149],"demonstrates":[150],"HyDra\u2010VANET":[152],"significantly":[153],"outperforms":[154],"baseline":[155],"detection":[157,160],"systems":[158],"accuracy,":[161],"resilience":[162],"manipulation,":[165],"scalability,":[166],"efficiency.":[169]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-19T23:35:23.961156","created_date":"2025-10-10T00:00:00"}
