{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:45:58Z","timestamp":1742913958935,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030660291"},{"type":"electronic","value":"9783030660307"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-66030-7_2","type":"book-chapter","created":{"date-parts":[[2020,12,19]],"date-time":"2020-12-19T21:12:26Z","timestamp":1608412346000},"page":"15-24","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards an Extensible Security Monitoring Architecture for Vehicular Networks"],"prefix":"10.1007","author":[{"given":"Amir Teshome","family":"Wonjiga","sequence":"first","affiliation":[]},{"given":"Marc","family":"Lacoste","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,20]]},"reference":[{"unstructured":"5G-Croco Project, https:\/\/5gcroco.eu\/","key":"2_CR1"},{"unstructured":"ETSI EN 102 637\u20132: ITS; Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service","key":"2_CR2"},{"unstructured":"ETSI EN 102 637\u20133: ITS; Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic Service","key":"2_CR3"},{"unstructured":"ETSI GS ZSM 002: Zero-touch network and Service Management (ZSM); Reference Architecture. V1.1.1 (2019)","key":"2_CR4"},{"unstructured":"INSPIRE-5GPlus: 5G Security: Current Status and Future Trends. D2.1 (2019)","key":"2_CR5"},{"doi-asserted-by":"crossref","unstructured":"Arfaoui, G., et al.: Security and resilience in 5G: current challenges and future directions. In: IEEE Trustcom\/BigDataSE\/ICESS, pp. 1010\u20131015 (2017)","key":"2_CR6","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.345"},{"doi-asserted-by":"crossref","unstructured":"Blanc, G., et al.: Towards a 5G security architecture: articulating software-defined security and security as a service. In: ARES, pp. 1\u20138 (2018)","key":"2_CR7","DOI":"10.1145\/3230833.3233251"},{"key":"2_CR8","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-981-15-3750-9_8","volume-title":"Vehicular Ad-hoc Networks for Smart Cities","author":"P Boos","year":"2020","unstructured":"Boos, P., Lacoste, M.: Networks of trusted execution environments for data protection in cooperative vehicular systems. In: Laouiti, A., Qayyum, A., Mohamad Saad, M.N. (eds.) Vehicular Ad-hoc Networks for Smart Cities. AISC, vol. 1144, pp. 99\u2013109. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-3750-9_8"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"107099","DOI":"10.1016\/j.comnet.2020.107099","volume":"169","author":"WB Jaballah","year":"2020","unstructured":"Jaballah, W.B., Conti, M., Lal, C.: Security and design requirements for software-defined VANETs. Comput. Netw. 169, 107099 (2020)","journal-title":"Comput. Netw."},{"issue":"3","key":"2_CR10","first-page":"4460","volume":"6","author":"J Kang","year":"2018","unstructured":"Kang, J., et al.: Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 6(3), 4460\u20134670 (2018)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"2_CR11","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","volume":"22","author":"R Khan","year":"2019","unstructured":"Khan, R., et al.: A survey on security and privacy of 5G technologies: potential solutions, recent advancements, and future directions. IEEE Commun. Surv. Tutorials 22(1), 196\u2013248 (2019)","journal-title":"IEEE Commun. Surv. Tutorials"},{"unstructured":"Le Lann, G.: Cyberphysical Constructs and Concepts for Fully Automated Networked Vehicles. Research Report RR-9297, INRIA Paris-Rocquencourt (2019)","key":"2_CR12"},{"doi-asserted-by":"crossref","unstructured":"Liyanage, M., et al.: Software defined monitoring (SDM) for 5G mobile backhaul networks. In: IEEE LANMAN, pp. 1\u20136 (2017)","key":"2_CR13","DOI":"10.1109\/LANMAN.2017.7972144"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/978-3-030-31831-4_43","volume-title":"Ad-Hoc, Mobile, and Wireless Networks","author":"A Garc\u00eda Olmos","year":"2019","unstructured":"Garc\u00eda Olmos, A., V\u00e1zquez-Gallego, F., Sedar, R., Samoladas, V., Mira, F., Alonso-Zarate, J.: An automotive cooperative collision avoidance service based on mobile edge computing. In: Palattella, M.R., Scanzio, S., Coleri Ergen, S. (eds.) ADHOC-NOW 2019. LNCS, vol. 11803, pp. 601\u2013607. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-31831-4_43"},{"issue":"2","key":"2_CR15","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/MVT.2018.2813422","volume":"13","author":"V Ortega","year":"2018","unstructured":"Ortega, V., et al.: Trusted 5G vehicular networks: blockchains and content-centric networking. IEEE Veh. Technol. Mag. 13(2), 121\u2013127 (2018)","journal-title":"IEEE Veh. Technol. Mag."},{"doi-asserted-by":"crossref","unstructured":"Ray, S., et al.: Extensibility in automotive security: current practice and challenges. In: 54th ACM\/EDAC\/IEEE DAC, pp. 1\u20136 (2017)","key":"2_CR16","DOI":"10.1145\/3061639.3072952"},{"key":"2_CR17","series-title":"EAI\/Springer Innovations in Communication and Computing","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/978-3-030-12842-5_12","volume-title":"Recent Advances in Network Simulation","author":"R Riebl","year":"2019","unstructured":"Riebl, R., Obermaier, C., G\u00fcnther, H.-J.: Artery: large scale simulation environment for ITS applications. In: Virdis, A., Kirsche, M. (eds.) Recent Advances in Network Simulation. EICC, pp. 365\u2013406. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-12842-5_12"},{"doi-asserted-by":"crossref","unstructured":"Sairam, A.S., Garg, A.: Detecting semantic attacks in intelligent transport system. In: 4th IEEE ICITE, pp. 185\u2013189 (2019)","key":"2_CR18","DOI":"10.1109\/ICITE.2019.8880173"},{"issue":"3","key":"2_CR19","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/MNET.2017.1700206","volume":"32","author":"W Shi","year":"2018","unstructured":"Shi, W., et al.: Drone assisted vehicular networks: architecture, challenges and opportunities. IEEE Netw. 32(3), 130\u2013137 (2018)","journal-title":"IEEE Netw."},{"unstructured":"Wasicek, A., et al.: Context-aware intrusion detection in automotive control systems. In: Proceedings 5th ESCAR USA Conference, pp. 21\u201322 (2017)","key":"2_CR20"},{"doi-asserted-by":"crossref","unstructured":"Wonjiga, A.T., Peisert, S., Rilling, L., Morin, C.: Blockchain as a trusted component in cloud SLA verification. In: 12th IEEE\/ACM UCC, pp. 93\u2013100 (2019)","key":"2_CR21","DOI":"10.1145\/3368235.3368872"},{"issue":"2","key":"2_CR22","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/JIOT.2018.2836144","volume":"6","author":"Z Yang","year":"2019","unstructured":"Yang, Z., et al.: Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 6(2), 1495\u20131505 (2019)","journal-title":"IEEE Internet Things J."},{"unstructured":"Ylianttila, M., et al.: 6G white paper: research challenges for trust, security and privacy. arXiv preprint arXiv:2004.11665 (2020)","key":"2_CR23"},{"issue":"1","key":"2_CR24","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MCOMSTD.001.1900044","volume":"4","author":"S Zeadally","year":"2020","unstructured":"Zeadally, S., et al.: Vehicular communications for ITS: standardization and challenges. IEEE Commun. Stan. Mag. 4(1), 11\u201317 (2020)","journal-title":"IEEE Commun. Stan. Mag."},{"issue":"4","key":"2_CR25","doi-asserted-by":"publisher","first-page":"2087","DOI":"10.1109\/TII.2017.2674661","volume":"13","author":"M Zhang","year":"2017","unstructured":"Zhang, M., et al.: SafeDrive: online driving anomaly detection from large-scale vehicle data. IEEE Trans. Ind. Inform. 13(4), 2087\u20132096 (2017)","journal-title":"IEEE Trans. Ind. Inform."}],"container-title":["Lecture Notes in Computer Science","Communication Technologies for Vehicles"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-66030-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,19]],"date-time":"2020-12-19T21:12:40Z","timestamp":1608412360000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-66030-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030660291","9783030660307"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-66030-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"20 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Nets4Cars\/Nets4Trains\/Nets4Aircraft","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Communication Technologies for Vehicles","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bordeaux","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nets4cars2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nets4workshop.sciencesconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"sciencesconf.org","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"82% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}