{"id":"https://openalex.org/W4414871437","doi":"https://doi.org/10.1109/jiot.2025.3618153","title":"PQ-V2X: A Novel Postquantum Cryptographic Dataset for Secure Vehicular Communications","display_name":"PQ-V2X: A Novel Postquantum Cryptographic Dataset for Secure Vehicular Communications","publication_year":2025,"publication_date":"2025-10-06","ids":{"openalex":"https://openalex.org/W4414871437","doi":"https://doi.org/10.1109/jiot.2025.3618153"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3618153","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3618153","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088680310","display_name":"Shimaa Abdelnaby AbdelHakeem","orcid":"https://orcid.org/0000-0001-8945-8664"},"institutions":[{"id":"https://openalex.org/I163753206","display_name":"Chungbuk National University","ror":"https://ror.org/02wnxgj78","country_code":"KR","type":"education","lineage":["https://openalex.org/I163753206"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Shimaa A. Abdel Hakeem","raw_affiliation_strings":["School of Electronics Engineering, Chungbuk National University, Cheongju, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Electronics Engineering, Chungbuk National University, Cheongju, South Korea","institution_ids":["https://openalex.org/I163753206"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032247984","display_name":"HyungWon Kim","orcid":"https://orcid.org/0000-0003-2602-2075"},"institutions":[{"id":"https://openalex.org/I163753206","display_name":"Chungbuk National University","ror":"https://ror.org/02wnxgj78","country_code":"KR","type":"education","lineage":["https://openalex.org/I163753206"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"HyungWon Kim","raw_affiliation_strings":["School of Electronics Engineering, Chungbuk National University, Cheongju, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Electronics Engineering, Chungbuk National University, Cheongju, South Korea","institution_ids":["https://openalex.org/I163753206"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5088680310"],"corresponding_institution_ids":["https://openalex.org/I163753206"],"apc_list":null,"apc_paid":null,"fwci":0.7124,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.76866736,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"12","issue":"24","first_page":"53704","last_page":"53729"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9765999913215637,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9688000082969666,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.7389000058174133},{"id":"https://openalex.org/keywords/suite","display_name":"Suite","score":0.6912000179290771},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6696000099182129},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6682999730110168},{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.5982999801635742},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.5313000082969666}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8539000153541565},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.7389000058174133},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.6912000179290771},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6696000099182129},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6682999730110168},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.5982999801635742},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.5313000082969666},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4634999930858612},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38440001010894775},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.37209999561309814},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.36340001225471497},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.3571999967098236},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.33649998903274536},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2921000123023987},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.2685999870300293},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.26510000228881836},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.251800000667572}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3618153","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3618153","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1965455100","https://openalex.org/W2792045232","https://openalex.org/W2891251289","https://openalex.org/W2892564986","https://openalex.org/W2897238154","https://openalex.org/W2959120033","https://openalex.org/W2964314709","https://openalex.org/W2979202956","https://openalex.org/W3005378045","https://openalex.org/W3016409148","https://openalex.org/W3023478445","https://openalex.org/W3038409683","https://openalex.org/W3103244252","https://openalex.org/W3135435077","https://openalex.org/W3173693125","https://openalex.org/W4233640149","https://openalex.org/W4296842505","https://openalex.org/W4309763694","https://openalex.org/W4327661625","https://openalex.org/W4378976995","https://openalex.org/W4400904554","https://openalex.org/W4402754022","https://openalex.org/W4404032023","https://openalex.org/W4406321387","https://openalex.org/W4409236131","https://openalex.org/W4410116685","https://openalex.org/W4410491682","https://openalex.org/W4410638774"],"related_works":[],"abstract_inverted_index":{"Quantum":[0],"computing":[1],"threatens":[2],"the":[3,73,100,120,130],"cryptographic":[4,25],"foundations":[5],"of":[6,122],"Vehicle-to-Everything":[7],"(V2X)":[8],"security.":[9],"We":[10,61],"present":[11],"PQ-V2X,":[12],"a":[13],"large-scale":[14],"dataset":[15,34,133],"and":[16,29,47,59,68,71,142,146],"benchmarking":[17],"suite":[18],"for":[19],"post-quantum":[20],"intrusion":[21],"detection":[22,87],"that":[23],"integrates":[24],"artifacts,":[26],"vehicular":[27],"mobility,":[28,141],"zone-aware":[30,123],"channel":[31],"conditions.":[32],"The":[33],"comprises":[35],"five":[36],"million":[37],"labeled":[38],"records":[39],"spanning":[40],"23":[41],"attack":[42],"types":[43],"across":[44],"post-quantum,":[45],"hybrid,":[46],"classical":[48],"families,":[49],"including":[50],"10.05%":[51],"real":[52],"traces":[53],"generated":[54],"from":[55,106],"Kyber,":[56],"Dilithium,":[57],"Falcon,":[58],"SPHINCS+.":[60],"evaluate":[62],"ten":[63],"machine-learning":[64],"models":[65,98],"under":[66],"synthetic":[67],"hybrid":[69,139],"settings":[70],"introduce":[72],"<italic":[74],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[75],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Detection":[76],"Efficiency\u2013Resource":[77],"(DER)</i>":[78],"metric":[79],"to":[80,108,127,134,150],"capture":[81],"accuracy\u2013cost":[82],"trade-offs.":[83],"LightGBM":[84],"attains":[85],"perfect":[86],"with":[88],"high":[89],"DER":[90],"while":[91],"training":[92],"substantially":[93],"faster":[94],"than":[95],"CatBoost;":[96],"non-boosted":[97],"close":[99],"classical\u2013quantum":[101],"gap":[102],"as":[103],"data":[104,145],"scales":[105],"100K":[107],"200K,":[109],"though":[110],"SPHINCS+-based":[111],"vectors":[112],"remain":[113],"challenging.":[114],"Tunnel":[115],"zones":[116],"amplify":[117],"risk,":[118],"underscoring":[119],"value":[121],"features.":[124],"PQ-V2X":[125],"is,":[126],"our":[128],"knowledge,":[129],"first":[131],"V2X":[132],"combine":[135],"NIST":[136],"PQC":[137],"traces,":[138],"threats,":[140],"resource-aware":[143],"benchmarking;":[144],"code":[147],"are":[148],"released":[149],"enable":[151],"reproducible,":[152],"quantum-resilient":[153],"IDS":[154],"research.":[155]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-04T08:04:53.788161","created_date":"2025-10-10T00:00:00"}
