{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T12:23:12Z","timestamp":1765369392469,"version":"3.37.3"},"reference-count":134,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100010418","name":"Institute for Information and communications Technology Promotion","doi-asserted-by":"publisher","award":["MSIT 2014-0-00065"],"award-info":[{"award-number":["MSIT 2014-0-00065"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2013K1A1A2A02078326"],"award-info":[{"award-number":["NRF-2013K1A1A2A02078326"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2875890","type":"journal-article","created":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T18:25:34Z","timestamp":1539627934000},"page":"60570-60585","source":"Crossref","is-referenced-by-count":22,"title":["Named Data Networking\u2019s Intrinsic Cyber-Resilience for Vehicular CPS"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1764-7703","authenticated-orcid":false,"given":"Safdar Hussain","family":"Bouk","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1381-5095","authenticated-orcid":false,"given":"Syed Hassan","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Rasheed","family":"Hussain","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2304-7106","authenticated-orcid":false,"given":"Yongsoon","family":"Eun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Real-time detection and estimation of denial of service attack in connected vehicle systems","author":"biron","year":"0","journal-title":"IEEE Trans Intell Transp Syst"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/LCOMM.2013.102213.132056"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/ACCESS.2017.2768499"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/DSNW.2013.6615528"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/EIConRus.2018.8317048"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1016\/j.vehcom.2017.01.002"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.3233\/JCS-2007-15103"},{"year":"2018","author":"ballal","journal-title":"Bumper to bumper Detecting and mitigating DoS and DDoS attacks on the cloud Part 1","key":"ref36"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1155\/2018\/2874509"},{"year":"2017","author":"islam","journal-title":"Cybersecurity attacks in vehicle-to-infrastructure (V2I) applications and their prevention","key":"ref34"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ICCPS.2016.7479122"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1049\/iet-cps.2016.0017"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/MVT.2017.2669348"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/2018584.2018586"},{"year":"2016","author":"greenberg","journal-title":"The jeep hackers are back to prove car hacking can get much worse","key":"ref22"},{"year":"2018","author":"o\u2019donnell","journal-title":"Volkswagen cars open to remote hacking researchers warn","key":"ref21"},{"year":"2017","author":"walford","journal-title":"A Brief History of Car Hacking 2010 to the Present","key":"ref24"},{"year":"2015","author":"greenberg","journal-title":"Hackers remotely kill a jeep on the highwaywith me in it","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref101","DOI":"10.1109\/TrustCom.2016.0100"},{"key":"ref26","first-page":"7","article-title":"Green lights forever: Analyzing the security of traffic infrastructure","author":"ghena","year":"2014","journal-title":"Proceedings of USENIX Workshop on Offensive Technologies (WOOT)"},{"doi-asserted-by":"publisher","key":"ref100","DOI":"10.1109\/CC.2018.8398508"},{"year":"2014","author":"cerrudo","journal-title":"Hacking us traffic control systems","key":"ref25"},{"key":"ref50","first-page":"210","article-title":"An analytical study of routing attacks in vehicular ad-hoc networks (VANETs)","volume":"3","author":"sirola","year":"2014","journal-title":"Int J Comput Sci Eng"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1109\/VTCSpring.2017.8108460"},{"key":"ref59","first-page":"6","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proc 20th USENIX Conf Security"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1109\/SP.2010.34"},{"key":"ref57","first-page":"993","article-title":"A practical wireless attack on the connected car and security protocol for in-vehicle CAN","volume":"16","author":"woo","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1109\/AICCSA.2017.42"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1145\/3064814.3064816"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1007\/978-3-540-87698-4_21"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1145\/3123779.3123794"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.7763\/JACN.2015.V3.155"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1007\/978-3-319-60876-1_9"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/MVT.2017.2736344"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.cose.2013.11.003"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TITS.2017.2665968"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/JIOT.2017.2703172"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/AHS.2017.8046365"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1016\/j.eij.2016.11.003"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1049\/ic.2016.0022"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/CDC.2016.7798445"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/VTCSpring.2015.7145917"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/CNS.2015.7346845"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/ICPHYS.2018.8390808"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/ICCSNT.2013.6967062"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/TVT.2013.2257188"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/TDSC.2015.2399297"},{"year":"2010","journal-title":"Intelligent Transport Systems (ITS) Security Threat Vulnerability and Risk Analysis (TVRA)","key":"ref44"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/CSAE.2012.6272951"},{"year":"2015","author":"yu","article-title":"Name-based access control","key":"ref127"},{"doi-asserted-by":"publisher","key":"ref126","DOI":"10.1109\/MCOM.2017.1601137"},{"doi-asserted-by":"publisher","key":"ref125","DOI":"10.1109\/INFCOMW.2014.6849267"},{"doi-asserted-by":"publisher","key":"ref124","DOI":"10.1109\/LCOMM.2015.2451647"},{"key":"ref73","first-page":"546","article-title":"Potential cyberattacks on automated vehicles","volume":"16","author":"petit","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"doi-asserted-by":"publisher","key":"ref72","DOI":"10.1049\/iet-its.2015.0072"},{"doi-asserted-by":"publisher","key":"ref129","DOI":"10.1145\/3125719.3132102"},{"doi-asserted-by":"publisher","key":"ref71","DOI":"10.1109\/JIOT.2018.2820039"},{"year":"2015","author":"shang","article-title":"NNDN-ACE: Access control for constrained environments over named data networking","key":"ref128"},{"doi-asserted-by":"publisher","key":"ref70","DOI":"10.1109\/TITS.2018.2818888"},{"doi-asserted-by":"publisher","key":"ref76","DOI":"10.1109\/ICCPS.2018.00043"},{"doi-asserted-by":"publisher","key":"ref130","DOI":"10.1109\/JPROC.2015.2460697"},{"year":"2018","journal-title":"NDN Packet Format Specification 0 2-2 Documentation","key":"ref77"},{"year":"2017","journal-title":"Cyber Security and Resilience of Smart Cars Good Practices and Recommendations","key":"ref74"},{"year":"2017","author":"biron","article-title":"A resilient control approach to secure cyber physical systems (CPS) with an application on connected vehicles","key":"ref75"},{"doi-asserted-by":"publisher","key":"ref133","DOI":"10.1145\/2810156.2810176"},{"doi-asserted-by":"publisher","key":"ref134","DOI":"10.1145\/3125719.3132092"},{"doi-asserted-by":"publisher","key":"ref131","DOI":"10.1145\/1658978.1658980"},{"doi-asserted-by":"publisher","key":"ref78","DOI":"10.1109\/INFCOMW.2016.7562050"},{"doi-asserted-by":"publisher","key":"ref132","DOI":"10.1145\/2018584.2018601"},{"doi-asserted-by":"publisher","key":"ref79","DOI":"10.1145\/2677046.2677049"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1109\/CDC.2010.5718158"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1145\/2185505.2185514"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1145\/1952982.1952995"},{"key":"ref63","first-page":"1160","article-title":"Optimal data integrity attack on actuators in cyber-physical systems","author":"wu","year":"2016","journal-title":"Proc Amer Control Conf (ACC)"},{"doi-asserted-by":"publisher","key":"ref64","DOI":"10.1109\/CCNC.2017.7983125"},{"doi-asserted-by":"publisher","key":"ref65","DOI":"10.1109\/TVT.2018.2845744"},{"year":"2017","author":"lim","journal-title":"Data integrity threats and countermeasures in railway spot transmission systems","key":"ref66"},{"doi-asserted-by":"publisher","key":"ref67","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref68","first-page":"15","article-title":"Relay attacks on passive keyless entry and start systems in modern cars","author":"francillon","year":"2011","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"year":"2018","author":"avatefipour","journal-title":"State-of-the-art survey on in-vehicle network communication (CAN-Bus) security and vulnerabilities","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref69","DOI":"10.1109\/FSKD.2012.6234155"},{"year":"2015","author":"goodman","journal-title":"Future Crimes Everything Is Connected Everyone Is Vulnerable and What We Can Do About It","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref109","DOI":"10.1109\/TIFS.2016.2574307"},{"doi-asserted-by":"publisher","key":"ref95","DOI":"10.1145\/3125719.3132104"},{"doi-asserted-by":"publisher","key":"ref108","DOI":"10.1016\/j.comnet.2015.01.020"},{"doi-asserted-by":"publisher","key":"ref94","DOI":"10.1109\/ICCCN.2017.8038461"},{"doi-asserted-by":"publisher","key":"ref107","DOI":"10.1109\/LCN.2015.7366286"},{"doi-asserted-by":"publisher","key":"ref93","DOI":"10.1109\/ICCW.2018.8403579"},{"doi-asserted-by":"publisher","key":"ref106","DOI":"10.1109\/ICC.2012.6363885"},{"doi-asserted-by":"publisher","key":"ref92","DOI":"10.1109\/MILCOM.2017.8170763"},{"key":"ref105","first-page":"2426","article-title":"Enhancing cache robustness for content-centric networking","author":"xie","year":"2012","journal-title":"Proc IEEE InfoCom"},{"doi-asserted-by":"publisher","key":"ref91","DOI":"10.1109\/NCA.2017.8171325"},{"doi-asserted-by":"publisher","key":"ref104","DOI":"10.23919\/INM.2017.7987266"},{"doi-asserted-by":"publisher","key":"ref90","DOI":"10.1109\/GLOCOM.2016.7841526"},{"doi-asserted-by":"publisher","key":"ref103","DOI":"10.1109\/INFCOMW.2016.7562065"},{"doi-asserted-by":"publisher","key":"ref102","DOI":"10.1016\/j.comnet.2013.07.034"},{"doi-asserted-by":"publisher","key":"ref111","DOI":"10.1145\/2378956.2378966"},{"doi-asserted-by":"publisher","key":"ref112","DOI":"10.1109\/ICTC.2012.6387155"},{"doi-asserted-by":"publisher","key":"ref110","DOI":"10.1109\/LCN.2017.35"},{"doi-asserted-by":"publisher","key":"ref98","DOI":"10.1145\/3125719.3132090"},{"doi-asserted-by":"publisher","key":"ref99","DOI":"10.1109\/COMST.2017.2749508"},{"doi-asserted-by":"publisher","key":"ref96","DOI":"10.1145\/2810156.2810170"},{"doi-asserted-by":"publisher","key":"ref97","DOI":"10.1145\/3125719.3125724"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/WAINA.2014.146"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/s11036-014-0499-6"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/COMST.2015.2410831"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/978-3-319-44494-9_2"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/MCOM.2014.6871677"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ECC.2015.7330811"},{"doi-asserted-by":"publisher","key":"ref118","DOI":"10.1155\/2016\/1353290"},{"year":"0","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref82","DOI":"10.1109\/SURV.2013.031413.00127"},{"doi-asserted-by":"publisher","key":"ref117","DOI":"10.1109\/TVT.2016.2558650"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TITS.2012.2183366"},{"doi-asserted-by":"publisher","key":"ref81","DOI":"10.1016\/j.jnca.2017.12.013"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/2656877.2656887"},{"key":"ref84","first-page":"1","article-title":"Interest flooding attack and countermeasures in named data networking","author":"afanasyev","year":"2013","journal-title":"Proc IFIP Netw Conf"},{"doi-asserted-by":"publisher","key":"ref119","DOI":"10.1109\/LCOMM.2015.2508798"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/1658939.1658941"},{"doi-asserted-by":"publisher","key":"ref83","DOI":"10.1109\/LCN.2013.6761300"},{"doi-asserted-by":"publisher","key":"ref114","DOI":"10.1109\/ICCChina.2015.7448754"},{"key":"ref113","article-title":"Andana: Anonymous named data networking application","author":"dibenedetto","year":"2012","journal-title":"Proc 19th Annu Netw Distrib Syst Secur Symp (NDSS)"},{"doi-asserted-by":"publisher","key":"ref116","DOI":"10.1145\/2542095.2542108"},{"doi-asserted-by":"publisher","key":"ref80","DOI":"10.1109\/INFCOMW.2015.7179398"},{"doi-asserted-by":"publisher","key":"ref115","DOI":"10.1145\/3125719.3125723"},{"doi-asserted-by":"publisher","key":"ref120","DOI":"10.1109\/TITS.2017.2768329"},{"doi-asserted-by":"publisher","key":"ref89","DOI":"10.1109\/INFCOMW.2015.7179364"},{"doi-asserted-by":"publisher","key":"ref121","DOI":"10.1109\/MCOM.2017.1600230CM"},{"doi-asserted-by":"publisher","key":"ref122","DOI":"10.1109\/WoWMoM.2015.7158165"},{"doi-asserted-by":"publisher","key":"ref123","DOI":"10.1109\/LCOMM.2016.2642194"},{"key":"ref85","first-page":"963","article-title":"Decoupling malicious interests from pending interest table to mitigate interest flooding attacks","author":"wang","year":"2013","journal-title":"Proc IEEE GLOBECOM Workshops (GC Wkshps)"},{"doi-asserted-by":"publisher","key":"ref86","DOI":"10.1109\/ICCCN.2017.8038367"},{"doi-asserted-by":"publisher","key":"ref87","DOI":"10.1109\/ICCCN.2013.6614127"},{"doi-asserted-by":"publisher","key":"ref88","DOI":"10.1109\/INFCOMW.2013.6970722"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08492520.pdf?arnumber=8492520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:14:50Z","timestamp":1642004090000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8492520\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":134,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2875890","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}