Next Article in Journal
Visual and Haptic Guidance for Enhancing Target Search Performance in Dual-Task Settings
Previous Article in Journal
Securing Edge Devices: Malware Classification with Dual-Attention Deep Network
 
 
Article
Peer-Review Record

Intelligent Transportation System Technologies, Challenges and Security

Appl. Sci. 2024, 14(11), 4646; https://doi.org/10.3390/app14114646
by İsa Avcı 1,* and Murat Koca 2
Reviewer 1: Anonymous
Reviewer 2:
Reviewer 3: Anonymous
Appl. Sci. 2024, 14(11), 4646; https://doi.org/10.3390/app14114646
Submission received: 9 April 2024 / Revised: 11 May 2024 / Accepted: 15 May 2024 / Published: 28 May 2024
(This article belongs to the Section Transportation and Future Mobility)

Round 1

Reviewer 1 Report

Comments and Suggestions for Authors

This manuscript presents a comprehensive review of the developments, technologies, and security challenges associated with Intelligent Transportation Systems (ITS). The authors, İsa Avcı and Murat Koca, have collated an extensive amount of relevant literature to discuss the evolution of ITS, the technological underpinnings, and the pertinent security concerns. The paper is well-organized into sections covering the history, applications, communication technologies, and security measures of ITS, with a notable focus on cyber-security issues.

The paper thoroughly covers a wide range of topics related to ITS. It includes historical perspectives, current technologies, and future challenges which provide a holistic view of the subject matter. The organization of the paper facilitates easy navigation through different aspects of ITS technologies. Each section is clearly defined and contributes to building a coherent narrative around the capabilities and challenges of ITS.

 

While I enjoyed reading it, some matters must be addressed before recommendation for acceptance:

1.      To enhance the introduction of the paper, it should include a wider range of cyber security issues in the 21th century, such as quantum internet and quantum communication, such as these references:

-       Faruk, Md Jobair Hossain, et al. "A review of quantum cybersecurity: threats, risks and opportunities." 2022 1st International Conference on AI in Cybersecurity (ICAIC). IEEE, 2022.

-       Rozenman, Georgi Gary, et al. "The quantum internet: A synergy of quantum information technologies and 6G networks." IET Quantum Communication 4.4 (2023): 147-166.

-       Kaur, Jagpreet, and K. R. Ramkumar. "The recent trends in cyber security: A review." Journal of King Saud University-Computer and Information Sciences 34.8 (2022): 5766-5781.

-       Raheman, Fazal. "The future of cybersecurity in the age of quantum computers." Future Internet 14.11 (2022): 335.

2.      All the figures lack a firm and informative caption. Statements such as “ITS applications” or “. ITS physical architecture” cannot explain what is shown in the figure, you need to provide an extended caption for all the figures.

3.      The second chapter “Intelligent Transportation Systems” contains some redundancy in terms of the benefits listed (e.g., safety and minimizing errors) which could be consolidated to improve clarity and conciseness. There is a slight repetition of the concept of using information and communication technology which could be streamlined. The description could be significantly strengthened by including specific examples or case studies that illustrate the benefits and applications of ITS. For instance, mentioning a particular city or transport system that has successfully integrated ITS could provide a concrete context for the claims made.

4.      The use of technical terms and acronyms (ITS, ICT) is not consistently explained, which might alienate readers who are not specialists in this field.

5.      While the conclusion provides general recommendations for future research and system improvements, it lacks specificity. Details on how these improvements can be practically achieved or examples of potential methodologies could significantly enhance the impact and practical value of the recommendations. Also, the use of lengthy sentences with multiple clauses makes the conclusion somewhat difficult to follow. Simplifying these into shorter, more direct sentences could improve readability.

 

Comments on the Quality of English Language

Moderate editing of English language required

Author Response

Dear Revie

Author Response File: Author Response.pdf

Reviewer 2 Report

Comments and Suggestions for Authors

The article is dedicated to reviewing the current state of development of Intelligent Transportation Systems. The article's topic is relevant, and it is written in an easily understandable manner. The illustrations in the article are of acceptable quality. The article cites 39 sources, some of which are not current. The References section is poorly formatted.

Regarding the content of the article, the following observations and recommendations can be formulated:

1. Currently, Intelligent Transportation Systems are actively evolving. Their functioning relies on the creation of telecommunications systems enabling vehicles to exchange information with external devices (Vehicle-to-Everything, V2X). Vehicles gather information through various sensors, radars, lidars, and cameras. To facilitate autonomous driving and platooning, it's essential to enable information exchange among different vehicles. Information exchange can also occur with elements of road infrastructure, enhancing safety by transmitting warning messages. Additionally, there are numerous applications enhancing driving convenience, safety, reducing traffic congestion, and providing various entertainment services. The diversity of applications entails different requirements for delays, reliability, and wireless data transmission speed. However, apart from network performance requirements, it is often crucial for the transmitted data to be secured. I would then provide a brief overview of the main mechanisms of the IEEE 1609.2 standard, which describes methods for securing information in transport networks built on Wi-Fi technology. This is just a preamble to the description of the V2X technology, which the authors mentioned in Table 1 and briefly touched upon in several places in the main body of the article. The terms "briefly" and "declaratively" can be considered the guiding principles followed by the authors. As a result, the article is perceived as a large abstract and lacks specific descriptive information on the particular technology mentioned in Table 1.

2. Most of the technologies mentioned in Table 1 rely on profiled standards that overlap. However, the article does not discuss the standards, the extent of their overlap, nor provide a summary regarding this fact.

3. Technologies are implemented through profiled algorithms. However, the article does not mention or analyze these algorithms.

4. Information security is a comprehensive metric measured for specific technologies. How this is implemented for the technologies mentioned in Table 1 is not addressed by the authors.

5. A good review article should conclude with at least a descriptive presentation of current issues in the context of the phenomenon studied. This aspect is missing in the article.

Author Response

Dear Rewiever,

We added and revised paper.

Author Response File: Author Response.pdf

Reviewer 3 Report

Comments and Suggestions for Authors

This paper provides a overview of Intelligent Transportation Systems (ITS), including its architecture, applications, communication technologies, and the impact of innovative technologies on ITS. The paper also discusses the security challenges and measures for ITS. However, the paper still has the following problems:

 

The paper does not summarize the ideas well. At the same time, there is a lack of summary and induction of the literature. You should put forward your own opinions appropriately.

 

The descriptions accompanying figures and tables need substantial improvement in order to enhance reader comprehension of the presented data effectively.

 

The resolution of the figures requires significant enhancement. Clear figures are essential for enhancing the quality of your paper and facilitating readers' comprehension.

 

Expression of contribution is insufficient. The expression of contribution is not good enough. It only states what the article does, but does not clearly express the innovation of the article. It should be refined and rewritten.

 

Conclusion writing is inadequate. There is no good way to summarize the full text and express your opinions.

 

Can you provide more details on the implementation of the proposed security measures? How can these measures be practically implemented in ITS systems?

 

It would be valuable to include comparisons or discussions with existing solutions and widely-known baselines in the field of ITS security. Can you provide more insights into the advantages and disadvantages of the proposed security measures compared to existing solutions?

Comments on the Quality of English Language

English needs to be improved by correcting tense and grammatical errors.

 

Author Response

Dear Rewiever,

We added and revised paper.

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

Comments and Suggestions for Authors

Unfortunately, the authors did not implement my suggestions, the manuscript can’t be recommended for publication under these circumstances.

 

 

1.     Introduction Enhancement:

 

Expand on the quantum cyber security issues mentioned by including potential threats and benefits in more detail, referencing recent breakthroughs or ongoing research projects.

 

 

-       "A review of quantum cybersecurity: threats, risks and opportunities." 2022 1st International Conference on AI in Cybersecurity (ICAIC). IEEE, 2022.

-       "The quantum internet: A synergy of quantum information technologies and 6G networks." IET Quantum Communication 4.4 (2023): 147-166.

-        "The recent trends in cyber security: A review." Journal of King Saud University-Computer and Information Sciences 34.8 (2022): 5766-5781

 

2.     Figure Captions:

Each figure should have a detailed caption that explains not only what is being shown but also why it is important. Consider including the relevance of each figure in relation to the text it accompanies. Each figure should be reproduced with permission with the original resolution. Not a low-resolution screenshot.

 

3.     Use captions to highlight significant aspects of the figures, such as trends, anomalies, or critical insights that support your arguments.

4.     Consolidation and Streamlining of Content:

Avoid redundancy by merging similar points and removing repetitive statements. This will make your arguments stronger and more concise.

5.     Real-world Applications and Examples:

Strengthen the sections on ITS by adding more case studies and examples from different regions or cities that have successfully implemented ITS technologies.

 

Comments on the Quality of English Language

Moderate editing of English language required

Author Response

Thank you helping and understanding. I hope to accept it.

Author Response File: Author Response.pdf

Reviewer 2 Report

Comments and Suggestions for Authors

I formulated the following comments to the previous version of the article:

1. Currently, Intelligent Transportation Systems are actively evolving. Their functioning relies on the creation of telecommunications systems enabling vehicles to exchange information with external devices (Vehicle-to-Everything, V2X). Vehicles gather information through various sensors, radars, lidars, and cameras. To facilitate autonomous driving and platooning, it's essential to enable information exchange among different vehicles. Information exchange can also occur with elements of road infrastructure, enhancing safety by transmitting warning messages. Additionally, there are numerous applications enhancing driving convenience, safety, reducing traffic congestion, and providing various entertainment services. The diversity of applications entails different requirements for delays, reliability, and wireless data transmission speed. However, apart from network performance requirements, it is often crucial for the transmitted data to be secured. I would then provide a brief overview of the main mechanisms of the IEEE 1609.2 standard, which describes methods for securing information in transport networks built on Wi-Fi technology. This is just a preamble to the description of the V2X technology, which the authors mentioned in Table 1 and briefly touched upon in several places in the main body of the article. The terms "briefly" and "declaratively" can be considered the guiding principles followed by the authors. As a result, the article is perceived as a large abstract and lacks specific descriptive information on the particular technology mentioned in Table 1.

2. Most of the technologies mentioned in Table 1 rely on profiled standards that overlap. However, the article does not discuss the standards, the extent of their overlap, nor provide a summary regarding this fact.

3. Technologies are implemented through profiled algorithms. However, the article does not mention or analyze these algorithms.

4. Information security is a comprehensive metric measured for specific technologies. How this is implemented for the technologies mentioned in Table 1 is not addressed by the authors.

5. A good review article should conclude with at least a descriptive presentation of current issues in the context of the phenomenon studied. This aspect is missing in the article.

The authors responded to all my comments. I found their answers quite convincing. I support the publication of the current version of the article. I wish the authors creative success.

Author Response

Thank you for suggestions and helping

Reviewer 3 Report

Comments and Suggestions for Authors

The paper does not summarize these ideas well. At the same time, there is a lack of summary and induction of the literature. You should express your opinion appropriately.

The resolution of the images needs to be significantly improved. Clear images are crucial to improving the quality of your paper and promoting reader understanding. This problem is always present in the paper.

 

Comments on the Quality of English Language

English needs proper polish.

Author Response

Thank you for your recommendation and help. I hope you accept our manuscript.

 

Author Response File: Author Response.pdf

Round 3

Reviewer 3 Report

Comments and Suggestions for Authors

The author actually made a lot of changes to the article. I don't have any more questions.

But there is one more problem with the article that I hope will be revised in subsequent publications:

The resolution of the images in the paper is so low that it is difficult to see the content and text within the images. Increasing the resolution of the images would benefit the quality of the paper.

Back to TopTop