{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:51:17Z","timestamp":1762005077789,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030166564"},{"type":"electronic","value":"9783030166571"}],"license":[{"start":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T00:00:00Z","timestamp":1555027200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-16657-1_60","type":"book-chapter","created":{"date-parts":[[2019,4,11]],"date-time":"2019-04-11T20:04:30Z","timestamp":1555013070000},"page":"641-652","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Misbehavior Detection in C-ITS Using Deep Learning Approach"],"prefix":"10.1007","author":[{"given":"Pranav Kumar","family":"Singh","sequence":"first","affiliation":[]},{"given":"Manish Kumar","family":"Dash","sequence":"additional","affiliation":[]},{"given":"Paritosh","family":"Mittal","sequence":"additional","affiliation":[]},{"given":"Sunit Kumar","family":"Nandi","sequence":"additional","affiliation":[]},{"given":"Sukumar","family":"Nandi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,12]]},"reference":[{"key":"60_CR1","doi-asserted-by":"crossref","unstructured":"Hsiao, H.C., Studer, A., Dubey, R., Shi, E., Perrig, A.: Efficient and secure threshold-based event validation for VANETs. In: Proceedings of the Fourth ACM Conference on Wireless Network Security, pp. 163\u2013174. ACM (2011)","DOI":"10.1145\/1998412.1998440"},{"key":"60_CR2","doi-asserted-by":"crossref","unstructured":"Rawat, D.B., Bista, B.B., Yan, G., Weigle, M.C.: Securing vehicular ad-hoc networks against malicious drivers: a probabilistic approach. In: International Conference on Complex, Intelligent and Software Intensive Systems (CISIS), pp. 146\u2013151. IEEE (2011)","DOI":"10.1109\/CISIS.2011.30"},{"key":"60_CR3","unstructured":"Leinm\u00fcller, T., Schmidt, R.K., Held, A.: Cooperative position verification-defending against roadside attackers 2.0. In: Proceedings of 17th ITS World Congress, pp. 1\u20138 (2010)"},{"key":"60_CR4","doi-asserted-by":"crossref","unstructured":"Zhuo, X., Hao, J., Liu, D., Dai, Y.: Removal of misbehaving insiders in anonymous VANETs. In: Proceedings of the 12th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 106\u2013115. ACM (2009)","DOI":"10.1145\/1641804.1641824"},{"key":"60_CR5","unstructured":"Bilogrevic, I., Manshaei, M.H., Raya, M., Hubaux, J.P.: Optimal revocations in ephemeral networks: a game-theoretic framework. In: 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), pp. 21\u201330. IEEE (2010)"},{"key":"60_CR6","unstructured":"Stubing, H., Jaeger, A., Schmidt, C., Huss, S.A.: Verifying mobility data under privacy considerations in Car-to-X communication. In: 17th ITS World CongressITS JapanITS AmericaERTICO (2010)"},{"key":"60_CR7","doi-asserted-by":"crossref","unstructured":"St\u00fcbing, H., Firl, J., Huss, S.A.: A two-stage verification process for Car-to-X mobility data based on path prediction and probabilistic maneuver recognition. In: Vehicular Networking Conference (VNC), pp. 17\u201324. IEEE (2011)","DOI":"10.1109\/VNC.2011.6117119"},{"key":"60_CR8","doi-asserted-by":"crossref","unstructured":"Grover, J., Laxmi, V., Gaur, M.S.: Misbehavior detection based on ensemble learning in VANET. In: International Conference on Advanced Computing, Networking and Security, pp. 602\u2013611. Springer (2011)","DOI":"10.1007\/978-3-642-29280-4_70"},{"key":"60_CR9","doi-asserted-by":"crossref","unstructured":"Grover, J., Prajapati, N.K., Laxmi, V., Gaur, M.S.: Machine learning approach for multiple misbehavior detection in VANET. In: International Conference on Advances in Computing and Communications, pp. 644\u2013653. Springer (2011)","DOI":"10.1007\/978-3-642-22720-2_68"},{"key":"60_CR10","unstructured":"van\u00a0der Heijden, R.W., Dietzel, S., Leinm\u00fcller, T., Kargl, F.: Survey on misbehavior detection in cooperative intelligent transportation systems. arXiv preprint arXiv:1610.06810 (2016)"},{"key":"60_CR11","doi-asserted-by":"crossref","unstructured":"Khan, U., Agrawal, S., Silakari, S.: A detailed survey on misbehavior node detection techniques in vehicular ad hoc networks. In: Information Systems Design and Intelligent Applications, pp. 11\u201319. Springer (2015)","DOI":"10.1007\/978-81-322-2250-7_2"},{"key":"60_CR12","doi-asserted-by":"crossref","unstructured":"Hamieh, A., Ben-Othman, J., Mokdad, L.: Detection of radio interference attacks in VANET. In: Global Telecommunications Conference, GLOBECOM 2009, pp. 1\u20135. IEEE (2009)","DOI":"10.1109\/GLOCOM.2009.5425381"},{"key":"60_CR13","doi-asserted-by":"crossref","unstructured":"Studer, A., Luk, M., Perrig, A.: Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs. In: Third International Conference on Security and Privacy in Communications Networks and the Workshops, pp. 422\u2013432. IEEE (2007)","DOI":"10.1109\/SECCOM.2007.4550363"},{"key":"60_CR14","doi-asserted-by":"crossref","unstructured":"Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pp. 29\u201337. ACM (2004)","DOI":"10.1145\/1023875.1023881"},{"issue":"7","key":"60_CR15","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1016\/j.adhoc.2010.02.008","volume":"8","author":"M Ghosh","year":"2010","unstructured":"Ghosh, M., Varghese, A., Gupta, A., Kherani, A.A., Muthaiah, S.N.: Detecting misbehaviors in VANET with integrated root-cause analysis. Ad Hoc Netw. 8(7), 778\u2013790 (2010)","journal-title":"Ad Hoc Netw."},{"key":"60_CR16","doi-asserted-by":"crossref","unstructured":"Vulimiri, A., Gupta, A., Roy, P., Muthaiah, S.N., Kherani, A.A.: Application of secondary information for misbehavior detection in VANETs. In: International Conference on Research in Networking, pp. 385\u2013396. Springer (2010)","DOI":"10.1007\/978-3-642-12963-6_31"},{"key":"60_CR17","doi-asserted-by":"publisher","first-page":"3491","DOI":"10.1109\/ACCESS.2017.2782159","volume":"6","author":"G Loukas","year":"2018","unstructured":"Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., Gan, D.: Cloud-based cyber-physical intrusion detection for vehicles using deep learning. IEEE Access 6, 3491\u20133508 (2018)","journal-title":"IEEE Access"},{"key":"60_CR18","first-page":"7","volume":"7","author":"H Hasrouny","year":"2017","unstructured":"Hasrouny, H., Samhat, A.E., Bassil, C., Laouiti, A.: Vanet security challenges and solutions: a survey. Veh. Commun. 7, 7\u201320 (2017)","journal-title":"Veh. Commun."},{"key":"60_CR19","first-page":"1","volume":"99","author":"B Brecht","year":"2018","unstructured":"Brecht, B., Therriault, D., Weimerskirch, A., Whyte, W., Kumar, V., Hehn, T., Goudy, R.: A security credential management system for V2X communications. IEEE Trans. Intell. Transp. Syst. 99, 1\u201322 (2018)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"60_CR20","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0893-6080(91)90009-T","volume":"4","author":"K Hornik","year":"1991","unstructured":"Hornik, K.: Approximation capabilities of multilayer feedforward networks. Neural Netw. 4(2), 251\u2013257 (1991)","journal-title":"Neural Netw."},{"key":"60_CR21","unstructured":"Olah, C.: Understanding LSTM networks. GITHUB blog (2015)"},{"key":"60_CR22","unstructured":"Behrisch, M., Bieker, L., Erdmann, J., Krajzewicz, D.: Sumo-simulation of urban mobility: an overview. In: The Third International Conference on Advances in System Simulation. ThinkMind (2011)"},{"key":"60_CR23","unstructured":"Liang, X., Du, X., Wang, G., Han, Z.: Deep reinforcement learning for traffic light control in vehicular networks. arXiv preprint arXiv:1803.11115 (2018)"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-16657-1_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T07:08:52Z","timestamp":1707980932000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-16657-1_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,12]]},"ISBN":["9783030166564","9783030166571"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-16657-1_60","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,4,12]]},"assertion":[{"value":"12 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA 2018","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vellore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}