{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:27:25Z","timestamp":1725906445378},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319647005"},{"type":"electronic","value":"9783319647012"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64701-2_49","type":"book-chapter","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T08:56:55Z","timestamp":1500973015000},"page":"623-631","source":"Crossref","is-referenced-by-count":0,"title":["Improving Alert Accuracy for Smart Vehicles"],"prefix":"10.1007","author":[{"given":"Chia-Mei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Gu-Hsin","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Yen-Chih","family":"Kuo","sequence":"additional","affiliation":[]},{"given":"Tan-Ho","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,26]]},"reference":[{"unstructured":"UTMS Society of Japan, Traffic Control System. \nhttp:\/\/www.utms.or.jp\/english\/cont\/index.html","key":"49_CR1"},{"unstructured":"VANET\/ITS Website, VANET\/ITS initiatives\/projects. \nhttp:\/\/neo.lcc.uma.es\/staff\/jamal\/vanet\/?q=node\/3","key":"49_CR2"},{"key":"49_CR3","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1109\/TITS.2014.2342271","volume":"16","author":"J Petit","year":"2015","unstructured":"Petit, J., Shladover, S.E.: Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 16, 546\u2013556 (2015). doi:\n10.1109\/TITS.2014.2342271","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"unstructured":"Thompson, C.: The Jeep hack was only the beginning of smart car breaches (2015). \nhttp:\/\/www.businessinsider.com\/smart-vehicles-are-vulnerable-to-hackers-2015-7","key":"49_CR4"},{"unstructured":"McGoogan, C.: BMW, Audi and Toyota cars can be unlocked and started with hacked radios (2016). \nhttp:\/\/www.telegraph.co.uk\/technology\/2016\/03\/23\/hackers-can-unlock-and-start-dozens-of-high-end-cars-through-the\/","key":"49_CR5"},{"key":"49_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2014.02.020","volume":"44","author":"RG Engoulou","year":"2014","unstructured":"Engoulou, R.G., Bella\u00efche, M., Pierre, S., Quintero, A.: VANET security surveys. Comput. Commun. 44, 1\u201313 (2014)","journal-title":"Comput. Commun."},{"key":"49_CR7","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.vehcom.2014.05.001","volume":"1","author":"MN Mejri","year":"2014","unstructured":"Mejri, M.N., Ben-Othman, J., Hamdi, M.: Survey on VANET security challenges and possible cryptographic solutions. Veh. Commun. 1, 53\u201366 (2014). doi:\n10.1016\/j.vehcom.2014.05.001","journal-title":"Veh. Commun."},{"key":"49_CR8","first-page":"45","volume":"14","author":"AP Jadhao","year":"2013","unstructured":"Jadhao, A.P., Chaudhari, D.N.: A novel approach for security aware topological based routing protocol in vehicular ad hoc network. Int. J. Sci. Eng. Res. 14, 45\u201351 (2013)","journal-title":"Int. J. Sci. Eng. Res."},{"unstructured":"Da Cunha, F.D., Boukerche, A., Villas, L., Viana, A.C., Loureiro, A.A.: Data communication in VANETs: a survey, challenges and applications. Research report RR-8498, INRIA Saclay, INIRA (2014)","key":"49_CR9"},{"key":"49_CR10","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-81-322-2250-7_2","volume-title":"Information Systems Design and Intelligent Applications","author":"U Khan","year":"2015","unstructured":"Khan, U., Agrawal, S., Silakari, S.: A detailed survey on misbehavior node detection techniques in vehicular ad hoc networks. In: Mandal, J.K., Satapathy, S.C., Sanyal, M.K., Sarkar, P.P., Mukhopadhyay, A. (eds.) Information Systems Design and Intelligent Applications. AISC, vol. 339, pp. 11\u201319. Springer, New Delhi (2015). doi:\n10.1007\/978-81-322-2250-7_2"},{"doi-asserted-by":"publisher","unstructured":"Ruj, S., Cavenaghi, M.A., Huang, Z., Nayak, A., Stojmenovic, I.: On data-centric misbehavior detection in VANETs. In: Vehicular Technology Conference (VTC Fall). IEEE, pp. 1\u20135 (2011). doi:\n10.1109\/VETECF.2011.6093096","key":"49_CR11","DOI":"10.1109\/VETECF.2011.6093096"},{"doi-asserted-by":"publisher","unstructured":"Ghaleb, F.A., Razzaque, M.A., Zainal, A.: Mobility pattern based misbehavior detection in vehicular adhoc networks to enhance safety. In: International Conference on Connected Vehicles and Expo (ICCVE). IEEE, pp. 894\u2013901 (2014). doi:\n10.1109\/ICCVE.2014.7297684","key":"49_CR12","DOI":"10.1109\/ICCVE.2014.7297684"},{"doi-asserted-by":"publisher","unstructured":"Sedjelmaci, H., Bouali, T., Senouci, S.M.: Detection and prevention from misbehaving intruders in vehicular networks. In: Global Communications Conference (GLOBECOM). IEEE, pp. 39\u201344 (2014). doi:\n10.1109\/GLOCOM.2014.7036781","key":"49_CR13","DOI":"10.1109\/GLOCOM.2014.7036781"},{"key":"49_CR14","first-page":"29","volume":"44","author":"CY Li","year":"2014","unstructured":"Li, C.Y., Liu, Y.L., Wang, L.M.: Intrusion detection scheme based on traffic scenarios in vehicular ad-hoc networks. J. Shandong Univ. (Eng. Sci.) 44, 29\u201334 (2014)","journal-title":"J. Shandong Univ. (Eng. Sci.)"},{"doi-asserted-by":"publisher","unstructured":"Barnwal, R.P., Ghosh, S.K.: Heartbeat message based misbehavior detection scheme for vehicular ad-hoc networks. In: Third International Conference on Connected Vehicles and Expo (ICCVE). IEEE, pp. 29\u201334 (2012). doi:\n10.1109\/ICCVE.2012.14","key":"49_CR15","DOI":"10.1109\/ICCVE.2012.14"},{"doi-asserted-by":"publisher","unstructured":"Harit, S.K., Singh, G., Tyagi, N.: Fox-hole model for data-centric misbehaviour detection in vanets. In: Computer and Communication Technology (ICCCT). IEEE, pp. 271\u2013277 (2012). doi:\n10.1109\/ICCCT.2012.62","key":"49_CR16","DOI":"10.1109\/ICCCT.2012.62"},{"doi-asserted-by":"publisher","unstructured":"Grover, J., Gaur, M.S., Laxmi, V., Tiwari, R.K.: Detection of incorrect position information using speed and time span verification in VANET. In: Fifth International Conference on Security of Information and Networks. ACM, pp. 53\u201359 (2012). doi:\n10.1145\/2388576.2388583","key":"49_CR17","DOI":"10.1145\/2388576.2388583"},{"doi-asserted-by":"publisher","unstructured":"Huang, D., Williams, S.A., Shere, S.: Cheater detection in vehicular networks. In: 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, pp. 193\u2013200 (2012). doi:\n10.1109\/TrustCom.2012.103","key":"49_CR18","DOI":"10.1109\/TrustCom.2012.103"},{"doi-asserted-by":"publisher","unstructured":"Wei, Y.C., Chen, Y.M.: An efficient trust management system for balancing the safety and location privacy in VANETs. In: 11th International Conference on trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, pp. 393\u2013400 (2012). doi:\n10.1109\/TrustCom.2012.79","key":"49_CR19","DOI":"10.1109\/TrustCom.2012.79"},{"key":"49_CR20","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1016\/j.adhoc.2010.02.008","volume":"8","author":"M Ghosh","year":"2010","unstructured":"Ghosh, M., Varghese, A., Gupta, A., Kherani, A.A., Muthaiah, S.N.: Detecting misbehaviors in VANET with integrated root-cause analysis. Ad Hoc Netw. 8, 778\u2013790 (2010). doi:\n10.1016\/j.adhoc.2010.02.008","journal-title":"Ad Hoc Netw."},{"doi-asserted-by":"publisher","unstructured":"Kim, T.H.J., Studer, A., Dubey, R., Zhang, X., Perrig, A., Bai, F., Bellur, B., Iyer, A.: Vanet alert endorsement using multi-source filters. In: Seventh ACM International Workshop on VehiculAr InterNETworking. ACM, pp. 51\u201360 (2010). doi:\n10.1145\/1860058.1860067","key":"49_CR21","DOI":"10.1145\/1860058.1860067"},{"key":"49_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/978-3-642-12963-6_31","volume-title":"NETWORKING 2010","author":"A Vulimiri","year":"2010","unstructured":"Vulimiri, A., Gupta, A., Roy, P., Muthaiah, S.N., Kherani, A.A.: Application of secondary information for misbehavior detection in VANETs. In: Crovella, M., Feeney, L.M., Rubenstein, D., Raghavan, S.V. (eds.) NETWORKING 2010. LNCS, vol. 6091, pp. 385\u2013396. Springer, Heidelberg (2010). doi:\n10.1007\/978-3-642-12963-6_31"},{"doi-asserted-by":"publisher","unstructured":"Ghosh, M., Varghese, A., Kherani, A.A., Gupta, A.: Distributed misbehavior detection in VANETs. In: Wireless Communications and Networking Conference. IEEE, pp. 1\u20136 (2009). doi:\n10.1109\/WCNC.2009.4917675","key":"49_CR23","DOI":"10.1109\/WCNC.2009.4917675"},{"doi-asserted-by":"publisher","unstructured":"Abuelela, M., Olariu, S.: Automatic incident detection in VANETs: a Bayesian approach. In: Vehicular Technology Conference. IEEE, pp. 1\u20135 (2009). doi:\n10.1109\/VETECS.2009.5073411","key":"49_CR24","DOI":"10.1109\/VETECS.2009.5073411"},{"unstructured":"Institute of Transportation Systems, SUMO \u2013 Simulation of Urban Mobility. \nhttp:\/\/www.dlr.de\/ts\/en\/desktopdefault.aspx\/tabid-9883\/16931_read-41000\/","key":"49_CR25"},{"unstructured":"Taiwan Area National Freeway Bureau, MOTOC R.O.C., Traffic Load Statistics. \nhttps:\/\/www.freeway.gov.tw\/Upload\/200804\/6.pdf","key":"49_CR26"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64701-2_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T09:13:08Z","timestamp":1500973988000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64701-2_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319647005","9783319647012"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64701-2_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}