{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:01:39Z","timestamp":1775667699905,"version":"3.50.1"},"reference-count":243,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2022,5,15]],"date-time":"2022-05-15T00:00:00Z","timestamp":1652572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,5,15]],"date-time":"2022-05-15T00:00:00Z","timestamp":1652572800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,15]],"date-time":"2022-05-15T00:00:00Z","timestamp":1652572800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100011710","name":"Science and Technology Project of the Shaanxi Provincial Science and Technology Department, China","doi-asserted-by":"publisher","award":["2019ZDLGY07-08"],"award-info":[{"award-number":["2019ZDLGY07-08"]}],"id":[{"id":"10.13039\/501100011710","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scientific Research Program Funded by Shaanxi Provincial Education Department, China","award":["21JP115"],"award-info":[{"award-number":["21JP115"]}]},{"name":"Special Funds for Construction of Key Disciplines in Universities in Shaanxi, China"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,5,15]]},"DOI":"10.1109\/jiot.2021.3130054","type":"journal-article","created":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T21:40:29Z","timestamp":1637703629000},"page":"7572-7595","source":"Crossref","is-referenced-by-count":146,"title":["Autonomous Driving Security: State of the Art and Challenges"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9829-8025","authenticated-orcid":false,"given":"Cong","family":"Gao","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Xi&#x2019;an University of Posts and Telecommunications, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5074-2817","authenticated-orcid":false,"given":"Geng","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xi&#x2019;an University of Posts and Telecommunications, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5864-4675","authenticated-orcid":false,"given":"Weisong","family":"Shi","sequence":"additional","affiliation":[{"name":"College of Engineering, Wayne State University, Detroit, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3731-4049","authenticated-orcid":false,"given":"Zhongmin","family":"Wang","sequence":"additional","affiliation":[{"name":"Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing, Xi&#x2019;an University of Posts and Telecommunications, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7812-4199","authenticated-orcid":false,"given":"Yanping","family":"Chen","sequence":"additional","affiliation":[{"name":"Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing, Xi&#x2019;an University of Posts and Telecommunications, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2016.2583491"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2948775"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800533"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2200\/s00787ed1v01y201707csl009"},{"key":"ref5","volume-title":"Apollo.","year":"2021"},{"key":"ref6","first-page":"1","article-title":"ROS: An open-source robot operating system","volume-title":"Proc. IEEE Int. Conf. Robot. Autom. (ICRA) Workshop Open Source Softw.","author":"Quigley"},{"key":"ref7","volume-title":"Fending Off Future Attacks by Reducing Attack Surface.","author":"Howard","year":"2003"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.21236\/ADA458115"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.21236\/ADA476977"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8_1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1179494.1179497"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.07.008"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100162"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2017.9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2995306.2995311"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.148"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/app9235101"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5220\/0005550003170326"},{"key":"ref20","first-page":"447","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume-title":"Proc. 20th USENIX Security Symp. (USENIX Security 11)","volume":"4","author":"Checkoway"},{"key":"ref21","volume-title":"Research Summary of the Intel Automotive Security Research Workshops.","year":"2016"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3000797"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994499"},{"key":"ref24","article-title":"Characterization of potential security threats in modern automobiles: A composite modeling approach","author":"McCarthy","year":"2014"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ITST.2009.5399279"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2342271"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2984553"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/s151229795"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660336"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2017.2749181"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2012.6232219"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IRC.2019.00122"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2867917"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2010.0110"},{"key":"ref35","article-title":"Design space of behaviour planning for autonomous driving","author":"Ilievski","year":"2019","journal-title":"arXiv:1908.07931"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2280-7"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2015.09.011"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1115\/DSCC2017-5209"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.23919\/ICCAS50221.2020.9268341"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2018.1700087"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2011.08.005"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/3ICT.2018.8855773"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00131"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3043716"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3004275"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1080\/16864360.2017.1419638"},{"key":"ref47","first-page":"995","article-title":"Remote attacks on automated vehicles sensors: Experiments on camera and LiDAR","volume-title":"Proc. Black Hat Europe","volume":"11","author":"Petit"},{"key":"ref48","article-title":"Standard detectors aren\u2019t (currently) fooled by physical adversarial stop signs","author":"Lu","journal-title":"arXiv:1710.03337"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3011690"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00076"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00040"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294422"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI49217.2020.00-11"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC48522.2020.9200945"},{"key":"ref55","first-page":"1","article-title":"CARLA: An open urban driving simulator","volume-title":"Proc. Conf. Robot Learn. (PMLR)","author":"Dosovitskiy"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2672541"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.3390\/rs10020205"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2535898"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.52"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/S1665-6423(15)30004-3"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2754414"},{"key":"ref62","article-title":"Prediction-based GNSS spoofing attack detection for autonomous vehicles","author":"Dasgupta","year":"2020","journal-title":"arXiv:2010.11722"},{"key":"ref63","article-title":"A commute in data: The comma2k19 dataset","author":"Schafer","year":"2018","journal-title":"arXiv:1812.05752"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.33012\/2020.17687"},{"key":"ref65","article-title":"A reinforcement learning approach for GNSS spoofing attack detection of autonomous vehicles","author":"Dasgupta","year":"2021","journal-title":"arXiv:2108.08628"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00803"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.3390\/s18051305"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.3390\/app11146321"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s12239-010-0050-0"},{"key":"ref70","first-page":"109","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicles","volume-title":"Proc. Def Con","volume":"24","author":"Yan"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355132"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/SECON52354.2021.9491590"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s38314-018-0029-6"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2018.8690734"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rsn.2017.0114"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928000"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3076287"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_22"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"key":"ref80","first-page":"877","article-title":"Towards robust LiDAR-based perception in autonomous driving: General black-box adversarial sensor attack and countermeasures","volume-title":"Proc. 29th USENIX Security Symp. (USENIX Security)","author":"Sun"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI44817.2019.9002737"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6248074"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453106"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3469261.3469406"},{"issue":"1","key":"ref85","first-page":"160","article-title":"Integrating autonomous vehicle safety and security analysis using STPA method and the six-step model","volume":"11","author":"Sabaliauskaite","year":"2018","journal-title":"Int. J. Adv. Security"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ChiCC.2016.7554385"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/1763934"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.3390\/s19153306"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ETS48528.2020.9131580"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288899"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TRA.2002.802930"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2005.1545467"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2008.4651213"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.18260\/p.24361"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEI.2015.7352578"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.18178\/ijmerr.5.1.47-51"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/3029798.3038437"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1117\/12.2016189"},{"key":"ref99","article-title":"SROS: Securing ROS over the wire, in the graph, and through the kernel","author":"White","year":"2016","journal-title":"arXiv:1611.07060"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3016961"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2019.8813784"},{"key":"ref102","first-page":"1","article-title":"Contributions of the EU projects UnCoVerCPS and enable-S3 to highly automated driving in conflict situations","volume-title":"Proc. Annu. Conf. Amer. Assoc. Electrodiagnostic Technol.","author":"He\u00df"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/IV47402.2020.9304810"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2003.1203555"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIS.2008.4717890"},{"key":"ref106","article-title":"Security and performance considerations in ROS2: A balancing act","author":"Kim","year":"2018","journal-title":"arXiv:1809.09566"},{"key":"ref107","volume-title":"DDS Security","year":"2018"},{"key":"ref108","volume-title":"Autoware.","year":"2021"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/SAUPEC\/RobMech\/PRASA48453.2020.9041020"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1177\/1729881418770011"},{"key":"ref111","volume-title":"Software system integration with connext DDS professional.","year":"2021"},{"key":"ref112","volume-title":"eProsima fast DDS.","year":"2021"},{"key":"ref113","volume-title":"Data distribution service.","year":"2021"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2018.00043"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/2968478.2968502"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2895109"},{"key":"ref117","article-title":"ROS2 prevalance and security","author":"Lawrence","year":"2020"},{"key":"ref118","article-title":"Introduction to the controller area network (CAN)","author":"Corrigan","year":"2002"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2937097"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.4271\/2017-01-1372"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2019.2899062"},{"key":"ref122","first-page":"1","article-title":"Remote exploitation of an unaltered passenger vehicle","volume-title":"Proc. Black Hat USA","volume":"91","author":"Miller"},{"key":"ref123","volume-title":"The Jeep hackers are back to prove car hacking can get much worse.","author":"Greenberg","year":"2016"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2016.7815711"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.3390\/s100201141"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2915983"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2009.5164434"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746276"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2304139"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2014.7030108"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2351612"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/WCICSS.2015.7420322"},{"key":"ref135","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","volume-title":"Proc. 25th USENIX Security Symp. (USENIX Security)","author":"Cho"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995934"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.20"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.005"},{"key":"ref140","article-title":"CAN with flexible data-rate specification version 1.0","author":"Global","year":"2012"},{"key":"ref142","first-page":"1","article-title":"CAN with flexible data-rate","volume-title":"Proc. 13th Int. CAN Conf. (ICC)","author":"Hartwich"},{"key":"ref143","article-title":"CAN specification version 2.0","volume-title":"Bosch Global","year":"1991"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2519464"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3000783"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.2979457"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3061746"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2953722"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2851939"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2016.24"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427278"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16874-2_6"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.01.002"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1002\/sec.679"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2308215"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2833849"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0431-x"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2375555"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-016-0200-4"},{"key":"ref160","first-page":"1","article-title":"On the use of low-cost IMUs for GNSS spoofing detection in vehicular applications","volume-title":"Proc. Int. Tech. Symp. Navig. Timing (ITSNT)","author":"Curran"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2018.8631600"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2231792"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2018.00050"},{"issue":"2","key":"ref164","first-page":"2","article-title":"The Tesla broadcast authentication protocol","volume":"5","author":"Perrig","year":"2002","journal-title":"RSA CryptoBytes"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2009.6388411"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2826518"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2869399"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2948382"},{"issue":"22","key":"ref169","first-page":"45","article-title":"Security attacks with an effective solution for DoS attacks in VANET","volume":"66","author":"Malla","year":"2013","journal-title":"Int. J. Comput. Appl."},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1259-2"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2009.787"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2017.8229856"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-011-0789-y"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2016.09.001"},{"issue":"1","key":"ref175","first-page":"1","article-title":"LI-AODV: Lifetime improving AODV routing for detecting and removing black-hole attack from VANET","volume":"95","author":"Abdulkader","year":"2017","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.12.006"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2015.01.003"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.05.001"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/CSAE.2012.6272951"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601954"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1506"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2494017"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919973"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2007.4437823"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2018.8628321"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2294032"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2007.4428740"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2018.8689228"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2007.4428742"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.08.019"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2634623"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2015.7391111"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"issue":"1","key":"ref194","first-page":"301","article-title":"VANET: Security attacks and its possible solutions","volume":"3","author":"Rawat","year":"2012","journal-title":"J. Inf. Oper. Manag."},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9400-5"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2004.1404672"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2011.02.001"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-287-158-9_5"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.03.006"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.05.001"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2012.11.06"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2016.7813797"},{"issue":"4","key":"ref205","first-page":"457","article-title":"Impact of jamming attack in vehicular ad hoc networks","volume":"4","author":"Rawat","year":"2015","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2645478"},{"issue":"5","key":"ref207","first-page":"2995","article-title":"Classification of attacks in vehicular ad hoc network (VANET)","volume":"16","author":"Sumra","year":"2013","journal-title":"Information"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60960-042-6.ch056"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.02.002"},{"issue":"5","key":"ref210","first-page":"351","article-title":"On the security of a secure batch verification with group testing for VANET","volume":"16","author":"Jianhong","year":"2014","journal-title":"Int. J. Netw. Security"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473820"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.9790\/0661-0332838"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2423915"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24660-2_14"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2015.07.011"},{"key":"ref217","volume-title":"Network simulator version 2","year":"2021"},{"key":"ref218","volume-title":"Network simulator version 3","year":"2021"},{"key":"ref219","volume-title":"OMNeT++.","year":"2021"},{"key":"ref220","volume-title":"Glomosim.","year":"2021"},{"key":"ref221","volume-title":"Simulation of urban mobility (SUMO).","year":"2021"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161084"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1145\/1374512.1374522"},{"key":"ref224","volume-title":"Matrix Laboratory (MATLAB)","year":"2021"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3028368"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106717"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC48107.2020.9148566"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2836144"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3044296"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3014229"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2940148"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.07.060"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2972923"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5627497"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8757184"},{"key":"ref236","volume-title":"Tesla model s driver killed in Williston Florida.","year":"2016"},{"key":"ref237","volume-title":"Tesla autopilot makes model 3 crash into overturned truck.","author":"Manson","year":"2020"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2019.06.008"},{"key":"ref239","volume-title":"Preliminary report highway: hwy18mh010.","year":"2018"},{"key":"ref240","volume-title":"Hackers remotely kill a jeep on the highway\u2014With me in it.","author":"Greenberg","year":"2015"},{"key":"ref241","volume-title":"Tesla-stealing hack is about much more than Tesla.","author":"Morris","year":"2016"},{"key":"ref242","volume-title":"Cyber pro charged with GoGet hacking.","author":"Sadler","year":"2018"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787502"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527976"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9770336\/09625017.pdf?arnumber=9625017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:56:29Z","timestamp":1705020989000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9625017\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,15]]},"references-count":243,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3130054","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,15]]}}}