{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T02:54:54Z","timestamp":1771037694041,"version":"3.50.1"},"reference-count":108,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3009336","type":"journal-article","created":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T20:50:04Z","timestamp":1594759804000},"page":"133015-133033","source":"Crossref","is-referenced-by-count":17,"title":["Why is Internet of Autonomous Vehicles not as Plug and Play as We Think ? Lessons to Be Learnt From Present Internet and Future Directions"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3332-889X","authenticated-orcid":false,"given":"Sameer","family":"Qazi","sequence":"first","affiliation":[{"name":"College of Engineering, PAF Karachi Institute of Economics and Technology, Karachi, Pakistan"}]},{"given":"Farah","family":"Sabir","sequence":"additional","affiliation":[{"name":"College of Engineering, PAF Karachi Institute of Economics and Technology, Karachi, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1537-5502","authenticated-orcid":false,"given":"Bilal A.","family":"Khawaja","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Engineering, Islamic University of Madinah, Madinah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8490-4426","authenticated-orcid":false,"given":"Syed Muhammad","family":"Atif","sequence":"additional","affiliation":[{"name":"College of Engineering, PAF Karachi Institute of Economics and Technology, Karachi, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7575-0557","authenticated-orcid":false,"given":"Muhammad","family":"Mustaqim","sequence":"additional","affiliation":[{"name":"Department of Electronic and Power Engineering (EPE), PN-Engineering College (PNEC), National University of Sciences and Technology (NUST), Karachi, Pakistan"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2018.8408275"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2018.2873895"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCRE.2019.8724158"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2018.8500614"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.23919\/SICE.2019.8859745"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3141\/1856-19"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.23919\/ChiCC.2018.8483514"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2019.8813792"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CAVS.2019.8887832"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TMECH.2019.2942769"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21543"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2890418"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21609"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3296874"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29222-4_38"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21918"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513036"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2132790"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAE.2016.7810164"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/s110100661"},{"key":"ref100","article-title":"Long short-term memory neural networks for false information attack detection in software-defined in-vehicle network","author":"khan","year":"2019","journal-title":"arXiv 1906 10203"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4407229"},{"key":"ref50","author":"tachikawa","year":"2001","journal-title":"Dedicated Short-Range Communications for ITS&#x2014;Trends in Research Development and Standardization"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2749459"},{"key":"ref59","first-page":"114","article-title":"A vehicle-to-vehicle communication protocol for cooperative collision warning","author":"yang","year":"2004","journal-title":"Proc Mobiquitous"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2665968"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2302386"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2019.8730679"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE.2015.89"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845099"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2018.8580751"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/4617451"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2018.00038"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.03.052"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/24751839.2017.1295601"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2603219"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1752","DOI":"10.1109\/TNET.2009.2022157","article-title":"Drafting behind Akamai: Inferring network conditions based on CDN redirections","volume":"17","author":"su","year":"2009","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718793586"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/506147.506153"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.897959"},{"key":"ref46","first-page":"272","article-title":"Merging of connected and automated vehicles at roundabout using model predictive control","author":"nor","year":"2018","journal-title":"Proc 57th Annu Conf Soc Instrum Control Eng Jpn (SICE)"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2018.2804162"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.08.008"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2342271"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2018.9010073"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.1993.327519"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2018.2873899"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CAVS.2019.8887797"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/25.69966"},{"key":"ref72","article-title":"Vehicle traffic light control using SARSA","author":"thorpe","year":"1997"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819610"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1613\/jair.2502"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2012.06.1309"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626309"},{"key":"ref74","first-page":"67","article-title":"SCATS: The Sydney coordinated adaptive traffic system-principles, methodology, algorithms","author":"lowrie","year":"0"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2012.03.004"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2017.2743202"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0149607"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6194400"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2105230"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2006.343641"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/1290168.1290171"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2007.4317952"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2014.2336271"},{"key":"ref66","author":"knight","year":"2013","journal-title":"Driverless Cars are Further Away than you Think"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2014.02.018"},{"key":"ref68","year":"2015","journal-title":"Google Self-Driving Car Project"},{"key":"ref2","author":"koslowski","year":"2013","journal-title":"Forget the Internet of Things Here Comes the Internet of Cars"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2178836"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803166"},{"key":"ref95","volume":"27","author":"perlroth","year":"2017","journal-title":"Cyberattack Hits Ukraine Then Spreads Internationally"},{"key":"ref108","year":"2019","journal-title":"Global Automotive Cybersecurity Report"},{"key":"ref94","article-title":"On board diagnostics: Risks and vulnerabilities of the connected vehicle","author":"klinedinst","year":"2016"},{"key":"ref107","article-title":"Traffic networks are vulnerable to disinformation attacks","author":"waniek","year":"2020","journal-title":"arXiv 2003 03723"},{"key":"ref93","first-page":"3","article-title":"This car runs on code","volume":"46","author":"charette","year":"2009","journal-title":"IEEE Spectr"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.100.012316"},{"key":"ref92","first-page":"1171","article-title":"Privacy in autonomous vehicles","volume":"52","author":"glancy","year":"2012","journal-title":"Santa Clara Law Review"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/3ICT.2019.8910310"},{"key":"ref91","year":"2019","journal-title":"Cybersecurity for Connected and Autonomous Vehicles Considerations and Opportunities for Growth"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.3390\/computers5030016"},{"key":"ref90","first-page":"359","article-title":"On the road: Reflections on the security of vehicular communication systems","author":"papadimitratos","year":"2008","journal-title":"Proc IEEE Int Conf Veh Electron Saf"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2017.7889391"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0188760"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.102213.132056"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2669348"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE.2015.1"},{"key":"ref97","first-page":"66","article-title":"Simulated attacks on CAN buses: Vehicle virus","author":"nilsson","year":"2008","journal-title":"Proc IASTED Int Conf Commun Syst Netw"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1273445.1273449"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PHOSST.2013.6614478"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.7249\/RR443-2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s40534-016-0117-3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970118"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2834392"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2014.6969789"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/1005686.1005723"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2018.2848342"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159933"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00018"},{"key":"ref84","author":"varghese","year":"2005","journal-title":"Network Algorithmics An Interdisciplinary Approach to Designing Fast Networked Devices"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766654"},{"key":"ref83","first-page":"862","article-title":"The mathematics of traffic in networks","volume":"1","author":"kelly","year":"2008"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1109\/TNET.2006.880179","article-title":"On selfish routing in Internet-like environments","volume":"14","author":"qiu","year":"2006","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6882305"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2872753"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2966125"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2949149"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2921522"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09139922.pdf?arnumber=9139922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T19:57:09Z","timestamp":1662667029000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9139922\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":108,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3009336","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}