{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:58:46Z","timestamp":1742993926410,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":41,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811617805"},{"type":"electronic","value":"9789811617812"}],"license":[{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-1781-2_48","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T15:05:30Z","timestamp":1631199930000},"page":"535-544","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Security Concerns and Countermeasures Towards V2V and Autonomous Cars"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1523-0856","authenticated-orcid":false,"given":"Huu Phuoc Dai","family":"Nguyen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9139-736X","authenticated-orcid":false,"given":"Rajnai","family":"Zolt\u00e1n","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"key":"48_CR1","unstructured":"Arbib J, Seba T (2017) Rethinking transportation 2020\u20132030, p 70. https:\/\/static1.squarespace.com\/static\/585c3439be65942f022bbf9b\/t\/591a2e4be6f2e1c13df930c5\/1494888038959\/RethinkX+Report_051517.pdf"},{"key":"48_CR2","unstructured":"Neil M, Pedersen J, Spring S (2011) Security and critical infrastructure protection progress 275"},{"key":"48_CR3","doi-asserted-by":"crossref","unstructured":"Kim S, Lee I (2014) A secure and efficient vehicle to vehicle communication scheme using bloom filter in VANETs 8(2):9\u201324","DOI":"10.14257\/ijsia.2014.8.2.02"},{"key":"48_CR4","unstructured":"Watson T, Maple C (2017) Cyber security standards and issues in V2X communications 1 Ivan Ivanov, 2 Sang-Woo 9:2\u20137. http:\/\/www.worldresearchlibrary.org\/up_proc\/pdf\/722-14918904992-7.pdf"},{"key":"48_CR5","doi-asserted-by":"publisher","unstructured":"Nguyen HPD, Zolt\u00e1n R (2018) The current security challenges of vehicle communication in the future transportation system. In: SISY 2018 - IEEE 16th International Symposium on Intelligent System and Informatics, Proceedings, pp 161\u2013165. https:\/\/doi.org\/10.1109\/SISY.2018.8524773","DOI":"10.1109\/SISY.2018.8524773"},{"key":"48_CR6","unstructured":"NHTSA (2014) What are the advantages of V2V?, pp 1\u20134"},{"key":"48_CR7","unstructured":"Yeomans G (2014) Autonomous vehicles - handing over control: opportunities and risks for insurance, Lloyd\u2019s, pp 1\u201327"},{"key":"48_CR8","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1613\/jair.301","volume":"2014","author":"T Litman","year":"2014","unstructured":"Litman T (2014) Autonomous vehicle implementation predictions: implications for transport planning. Transp Res Board Annu Meet 2014:36\u201342. https:\/\/doi.org\/10.1613\/jair.301","journal-title":"Transp Res Board Annu Meet"},{"key":"48_CR9","doi-asserted-by":"crossref","unstructured":"Anderson J, Kalra N, Stanley K, Sorensen P, Samaras C, Oluwatola O (2016) Autonomous vehicle technology: a guide for policymakers","DOI":"10.7249\/RR443-2"},{"key":"48_CR10","unstructured":"Corrigan S (2016) Introduction to the Controller Area Network (CAN). In: Texas instruments, August 2002, pp 1\u201317"},{"issue":"1","key":"48_CR11","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.ress.2010.06.026","volume":"96","author":"T Hoppe","year":"2011","unstructured":"Hoppe T, Kiltz S, Dittmann J (2011) Security threats to automotive CAN networks\u2014practical examples and selected short-term countermeasures. Reliab Eng Syst Saf 96(1):11\u201325. https:\/\/doi.org\/10.1016\/j.ress.2010.06.026","journal-title":"Reliab Eng Syst Saf"},{"key":"48_CR12","unstructured":"Van Herrewege A, Singelee D, Verbauwhede I (2011) CANAuth - a simple, backward compatible broadcast authentication protocol for CAN bus. In: ECRYPT workshop on lightweight cryptography, November 2011, pp 299\u2013235. http:\/\/www.uclouvain.be\/crypto\/ecrypt_lc11\/static\/post_proceedings.pdf"},{"key":"48_CR13","unstructured":"Dai NHP, Zolt\u00e1n R (2012) The obstacles of autonomous cars before taking the wheel in the future 91(5)"},{"issue":"4","key":"48_CR14","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1177\/004057368303900411","volume":"39","author":"I Rouf","year":"2010","unstructured":"Rouf I et al (2010) Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study. Proc. USENIX Secur. Symp. 39(4):11\u201313. https:\/\/doi.org\/10.1177\/004057368303900411","journal-title":"Proc. USENIX Secur. Symp."},{"key":"48_CR15","doi-asserted-by":"publisher","unstructured":"Seifert S, Obermaisser R (2014) Secure automotive gateway - secure communication for future cars. In: Proc. - 2014 12th IEEE international conference on industrial informatics, INDIN 2014, pp 213\u2013220. https:\/\/doi.org\/10.1109\/INDIN.2014.6945510","DOI":"10.1109\/INDIN.2014.6945510"},{"key":"48_CR16","doi-asserted-by":"publisher","unstructured":"Mastakar G (2012) Experimental security analysis of a modern automobile. In: IEEE symposium on security and privacy, pp 1\u201316. https:\/\/doi.org\/10.1109\/SP.2010.34","DOI":"10.1109\/SP.2010.34"},{"key":"48_CR17","doi-asserted-by":"publisher","unstructured":"Wolf M, Gendrullis T (2012) Design, implementation, and evaluation of a vehicular hardware security module. In: Lecture notes in computer science (including Subseries Lecture notes in artificial intelligence and Lecture notes in bioinformatics). LNCS, vol 7259, pp 302\u2013318. https:\/\/doi.org\/10.1007\/978-3-642-31912-9_20","DOI":"10.1007\/978-3-642-31912-9_20"},{"key":"48_CR18","unstructured":"Adaptive cruise control system. https:\/\/en.wikipedia.org\/wiki\/Autonomous_cruise_control_system"},{"issue":"6","key":"48_CR19","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/MCOM.2015.7120028","volume":"53","author":"M Amoozadeh","year":"2015","unstructured":"Amoozadeh M et al (2015) Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Commun Mag 53(6):126\u2013132. https:\/\/doi.org\/10.1109\/MCOM.2015.7120028","journal-title":"IEEE Commun Mag"},{"key":"48_CR20","doi-asserted-by":"publisher","unstructured":"Rao A, Sangwan A, Kherani AA, Varghese A, Bellur B, Shorey R (2007) Secure V2V communication with certificate revocations. In: 2007 mobile networking for vehicular environments movE, pp 127\u2013132. https:\/\/doi.org\/10.1109\/MOVE.2007.4300817","DOI":"10.1109\/MOVE.2007.4300817"},{"key":"48_CR21","doi-asserted-by":"publisher","unstructured":"Hasbullah H, Soomro IA, Ab Manan JL (2010) Denial of service (DOS) attack and its possible solutions in VANET. World Acad Sci Eng Technol 65(5):411\u2013415. https:\/\/doi.org\/10.5281\/zenodo.1085740","DOI":"10.5281\/zenodo.1085740"},{"key":"48_CR22","unstructured":"Lin X, Member S, Sun X, Ho P, Shen XS, Member S, GSIS\u202f: a secure and privacy preserving protocol for vehicular communications XX(Xx):1\u201314"},{"issue":"2","key":"48_CR23","doi-asserted-by":"publisher","first-page":"134","DOI":"10.7763\/JACN.2015.V3.155","volume":"3","author":"B Lipi\u0144ski","year":"2015","unstructured":"Lipi\u0144ski B, Mazurczyk W, Szczypiorski K, \u015amietanka P (2015) Towards effective security framework for vehicular ad-hoc networks. J Adv Comput Netw 3(2):134\u2013140. https:\/\/doi.org\/10.7763\/JACN.2015.V3.155","journal-title":"J Adv Comput Netw"},{"key":"48_CR24","doi-asserted-by":"publisher","unstructured":"Garip MT, Gursoy ME, Reiher P, Gerla M (2015) Congestion attacks to autonomous cars using vehicular botnets. In: NDSS Symposium 2015, pp 1\u20139. https:\/\/doi.org\/10.14722\/sent.2015.23001","DOI":"10.14722\/sent.2015.23001"},{"key":"48_CR25","unstructured":"Onishi H (2012) Paradigm change of vehicle cyber security. In: 2012 4th International conference on cyber conflict (CYCON), pp 1\u201311"},{"key":"48_CR26","unstructured":"Hackers hitch cars. http:\/\/www.latimes.com\/business\/autos\/la-fi-hy-car-hacking-20150914-story.html"},{"key":"48_CR27","doi-asserted-by":"publisher","unstructured":"B\u00e9csi T, Aradi S, G\u00e1sp\u00e1r P (2015) Security issues and vulnerabilities in connected car systems. In: 2015 international conference on models and technologies for intelligent transportation system MT-ITS 2015, April 2016, pp 477\u2013482. https:\/\/doi.org\/10.1109\/MTITS.2015.7223297","DOI":"10.1109\/MTITS.2015.7223297"},{"key":"48_CR28","doi-asserted-by":"publisher","unstructured":"Douceur JR (2002) The Sybil attack, pp 251\u2013260. https:\/\/doi.org\/10.1007\/3-540-45748-8_24","DOI":"10.1007\/3-540-45748-8_24"},{"key":"48_CR29","doi-asserted-by":"publisher","unstructured":"Guette G, Bryce C (2008) Using TPMs to secure Vehicular Ad-Hoc Networks (VANETs). In: Lecture notes in computer science (including Subseries Lecture notes in artificial intelligence and Lecture notes in bioinformatics). LNCS, vol 5019, pp 106\u2013116. https:\/\/doi.org\/10.1007\/978-3-540-79966-5_8","DOI":"10.1007\/978-3-540-79966-5_8"},{"key":"48_CR30","unstructured":"Halabi Hasbullah JAM, Soomro A (2010) Denial of Service (DOS) attack and its possible solution in VANET 4(5):813\u2013817"},{"key":"48_CR31","doi-asserted-by":"crossref","unstructured":"Raghuwanshi V, Jain S (2015) Denial of service attack in VANET: a survey. Int J Eng Trends Technol 28(1):15\u201320. http:\/\/www.ijettjournal.org","DOI":"10.14445\/22315381\/IJETT-V28P204"},{"issue":"1","key":"48_CR32","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MITP.2004.1265539","volume":"6","author":"J Blum","year":"2004","unstructured":"Blum J, Eskandarian A (2004) The threat of intelligent collisions. IT Prof 6(1):24\u201329. https:\/\/doi.org\/10.1109\/MITP.2004.1265539","journal-title":"IT Prof"},{"issue":"1","key":"48_CR33","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s13398-014-0173-7.2","volume":"3","author":"A Rawat","year":"2014","unstructured":"Rawat A, Sharma S, Sushil R (2014) Vanet: security attacks and its possible solutions. J Inf Oper Manag 3(1):301\u2013304. https:\/\/doi.org\/10.1007\/s13398-014-0173-7.2","journal-title":"J Inf Oper Manag"},{"key":"48_CR34","unstructured":"Petit J, Stottelaar B, Feiri M, Kargl F (2015) Remote attacks on automated vehicles sensors: experiments on camera and LiDAR, pp 1\u201313, pp. 1\u201313. Blackhat.com. https:\/\/www.blackhat.com\/docs\/eu-15\/materials\/eu-15-Petit-Self-Driving-And-Connected-Cars-Fooling-Sensors-And-Tracking-Drivers-wp1.pdf."},{"issue":"2","key":"48_CR35","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1109\/TITS.2010.2043431","volume":"11","author":"L Bai","year":"2010","unstructured":"Bai L, Wang Y (2010) A sensor fusion framework using multiple particle filters for video-based navigation. IEEE Trans Intell Transp Syst 11(2):348\u2013358. https:\/\/doi.org\/10.1109\/TITS.2010.2043431","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"6","key":"48_CR36","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1109\/TSMCB.2012.2228639","volume":"43","author":"H Kong","year":"2013","unstructured":"Kong H, Akakin HC, Sarma SE (2013) A generalized laplacian of gaussian filter for blob detection and its applications. IEEE Trans. Cybern. 43(6):1719\u20131733. https:\/\/doi.org\/10.1109\/TSMCB.2012.2228639","journal-title":"IEEE Trans. Cybern."},{"issue":"4","key":"48_CR37","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.1109\/TITS.2011.2143410","volume":"12","author":"CG Keller","year":"2011","unstructured":"Keller CG, Enzweiler M, Rohrbach M, Llorca DF, Schn\u00f6rr C, Gavrila DM (2011) The benefits of dense stereo for pedestrian detection. IEEE Trans Intell Transp Syst 12(4):1096\u20131106","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"48_CR38","doi-asserted-by":"publisher","unstructured":"Leinmuller T, Schoch E, Maihofer C (2007) Security requirements and solution concepts in vehicular ad hoc networks. In: 2007 fourth annual conference on wireless demand network systems and services, pp 84\u201391. https:\/\/doi.org\/10.1109\/WONS.2007.340489","DOI":"10.1109\/WONS.2007.340489"},{"key":"48_CR39","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1111\/j.1523-1755.2002.kid554.x","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya M, Raya M, Hubaux J, Hubaux J (2007) Securing vehicular ad hoc networks. J Comput Secur 15:39\u201368. https:\/\/doi.org\/10.1111\/j.1523-1755.2002.kid554.x","journal-title":"J Comput Secur"},{"key":"48_CR40","unstructured":"Raya M, Hubaux JP (2005) Security aspects of inter-vehicle communications. Swiss Transp. Res. Conf. http:\/\/en.scientificcommons.org\/22427989"},{"issue":"9","key":"48_CR41","doi-asserted-by":"publisher","first-page":"1052","DOI":"10.1063\/1.106441","volume":"60","author":"M Ziari","year":"1992","unstructured":"Ziari M, Steier WH, Ranon PM, Trivedi S, Klein MB (1992) Photorefractivity in vanadium-doped ZnTe. Appl Phys Lett 60(9):1052\u20131054. https:\/\/doi.org\/10.1063\/1.106441","journal-title":"Appl Phys Lett"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-1781-2_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T17:01:16Z","timestamp":1644339676000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-1781-2_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,10]]},"ISBN":["9789811617805","9789811617812"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-1781-2_48","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,10]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}