{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T15:48:09Z","timestamp":1776181689278,"version":"3.50.1"},"reference-count":126,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100008316","name":"Baden-W\u00fcrttemberg Stiftung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008316","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/comst.2018.2873088","type":"journal-article","created":{"date-parts":[[2019,1,30]],"date-time":"2019-01-30T21:11:34Z","timestamp":1548882694000},"page":"779-811","source":"Crossref","is-referenced-by-count":221,"title":["Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3280-1825","authenticated-orcid":false,"given":"Rens Wouter","family":"van der Heijden","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4192-0327","authenticated-orcid":false,"given":"Stefan","family":"Dietzel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2068-6738","authenticated-orcid":false,"given":"Tim","family":"Leinmuller","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3800-8369","authenticated-orcid":false,"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689252"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689253"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2752798"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409955"},{"key":"ref31","year":"2011"},{"key":"ref30","article-title":"Dedicated short range communications (DSRC) message set dictionary","year":"2009"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15103"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090202"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2016.7880850"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2016.12.004"},{"key":"ref28","year":"2010"},{"key":"ref27","year":"2011"},{"key":"ref29","article-title":"Vehicle information exchange needs for mobility applications exchange","author":"mcgurrin","year":"2012"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2897166"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2015.0072"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.11.001"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.03.006"},{"key":"ref23","first-page":"7","article-title":"VANet security challenges and solutions: A survey","volume":"7","author":"hasrouny","year":"2017","journal-title":"Veh Commun"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2480244"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689254"},{"key":"ref100","first-page":"166","article-title":"Intrusion detection in VANETs through verification of vehicle movement data","author":"bi\u00dfmeyer","year":"2010","journal-title":"Proc IEEE Veh Netw Conf (VNC)"},{"key":"ref25","article-title":"Survey on misbehavior detection in cooperative intelligent transportation systems","author":"van der heijden","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940525"},{"key":"ref59","first-page":"38","article-title":"Limits on revocation in VANETs","author":"liu","year":"2010","journal-title":"Proc Int Conf on Applied Cryptography and Network Security (ACNS)"},{"key":"ref58","first-page":"21","article-title":"Optimal revocations in ephemeral networks: A game-theoretic framework","author":"bilogrevic","year":"2010","journal-title":"Proc Int Symp Model Optim Mobile Ad-Hoc Wireless Netw (WiOpt)"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2833849"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481346"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2007.4437823"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.07.006"},{"key":"ref53","first-page":"106","article-title":"Removal of misbehaving insiders in anonymous VANETs","author":"zhuo","year":"2009","journal-title":"Proc ACM Annu Int Conf Model Anal Simul Wireless Mobile Syst (MSWiM)"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071006"},{"key":"ref40","year":"2013"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6423187"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2817552"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2781539"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120028"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2835373","article-title":"Reputation systems evaluation survey","volume":"48","author":"koutrouli","year":"2015","journal-title":"ACM Comput Surveys"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2007.340489"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.39"},{"key":"ref46","first-page":"251","article-title":"The Sybil attack","author":"douceur","year":"2002","journal-title":"Peer-to-Peer Systems IPTPS 2002"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2345420"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2722688"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94785-3_4"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2307888.2307915"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2013.6509896"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/WC-M.2006.250352"},{"key":"ref43","article-title":"Digital signature standard","year":"2013"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/3001836"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2681698"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2015.06.008"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4625802"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1593277"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2011.6117119"},{"key":"ref70","first-page":"1","article-title":"Verifying mobility data under privacy considerations in Car-to-X communication","author":"st\u00fcbing","year":"2010","journal-title":"17th ITS World Congr"},{"key":"ref76","first-page":"83","article-title":"In VANETs we trust? Characterizing RF jamming in vehicular networks","author":"pu\u00f1al","year":"2012","journal-title":"Proc 9th ACM Int Workshop Veh Inter Netw Syst Appl (VANET)"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2009.48"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2010.5503946"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425381"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110308"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.263"},{"key":"ref60","first-page":"162","article-title":"Simulation of attacks and corresponding driver behavior in vehicular ad hoc networks with VSimRTI","author":"bi\u00dfmeyer","year":"2011","journal-title":"4th Int'l ICST Conf on Simulation Tools and Techniques (SimuTools)"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.11.010"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2008.ECP.63"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2011.30"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.71"},{"key":"ref65","first-page":"73","article-title":"Central misbehavior evaluation for VANETs based on mobility data plausibility","author":"bi\u00dfmeyer","year":"2012","journal-title":"Proc 9th ACM Int Workshop Veh Inter Netw Syst Appl (VANET)"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2010.5506126"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737583"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2007.4428742"},{"key":"ref2","first-page":"546","article-title":"Potential cyberattacks on automated vehicles","volume":"16","author":"petit","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/1160972.1160974"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.120"},{"key":"ref109","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1145\/2939918.2939920","article-title":"Secure motion verification using the doppler effect","author":"sch\u00e4fer","year":"2016","journal-title":"Proc ACM Conf Sec Privacy Wireless Mobile Netw (WiSec)"},{"key":"ref95","first-page":"11","article-title":"A novel framework for efficient mobility data verification in vehicular ad-hoc networks","volume":"10","author":"jaeger","year":"2011","journal-title":"Int J Intell Transp Syst Res"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2011.12"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.01.009"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/AINS.2017.8270417"},{"key":"ref93","first-page":"1","article-title":"Vehicle behavior analysis to enhance security in VANETs","author":"schmidt","year":"2008","journal-title":"Proc 4th Workshop Veh Veh Commun"},{"key":"ref106","first-page":"644","article-title":"Machine learning approach for multiple misbehavior detection in VANET","volume":"192","author":"grover","year":"2011","journal-title":"Advances in Computing and Communications ACC 2011"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1002\/sec.56"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6115558"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228654"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5395780"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093096"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023881"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/2070425.2070450"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161075"},{"key":"ref112","first-page":"1","article-title":"Enhanced position verification for VANETs using subjective logic","author":"van der heijden","year":"2016","journal-title":"Proc 84th Veh Technol Conf (VTC-Fall)"},{"key":"ref110","first-page":"1","article-title":"Intrusion detection in VANETs","author":"leinm\u00fcller","year":"2004","journal-title":"Proc 12th IEEE Int Conf Netw Protocols (ICNP)"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2017.8317883"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.02.008"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2012.6407448"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE.2012.14"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2410831"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2017.8275598"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2008.44"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24230-9_2"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1569","DOI":"10.1016\/j.comcom.2004.07.002","article-title":"Anomaly detection methods in wired networks: A survey and taxonomy","volume":"27","author":"est\u00e9vez-tapiador","year":"2004","journal-title":"Comput Commun"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00017-6"},{"key":"ref118","year":"2011"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"ref82","first-page":"1","article-title":"Proof-of-relevance: Filtering false data via authentic consensus in vehicle ad-hoc networks","author":"cao","year":"2008","journal-title":"Proc IEEE INFOCOM Workshops"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2009.33"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2496147"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.180"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1116"},{"key":"ref84","first-page":"1","article-title":"Cooperative position verification&#x2014;Defending against roadside attackers 2.0","author":"leinm\u00fcller","year":"2010","journal-title":"17th ITS World Congr"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2011.08.002"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2709310"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998440"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159943"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/JCSSE.2017.8025908"},{"key":"ref115","first-page":"602","article-title":"Misbehavior detection based on ensemble learning in VANET","author":"grover","year":"2012","journal-title":"Advanced Computing Networking and Security ADCONS 2011"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2010.5437115"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177698950"},{"key":"ref121","first-page":"1","article-title":"VeReMi: A dataset for comparable evaluation of misbehavior detection in VANETs","author":"van der heijden","year":"2018","journal-title":"Proc 14th EAI Int Conf Security Privacy Commun Netw (SecureComm)"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2007.4496924"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2495297"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/1860058.1860067"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2011.6117120"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741879"},{"key":"ref88","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"shafer","year":"1976","journal-title":"A Mathematical Theory of Evidence"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/8649699\/08477005.pdf?arnumber=8477005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:52:59Z","timestamp":1657745579000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8477005\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":126,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/comst.2018.2873088","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}