{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T07:05:38Z","timestamp":1774767938923,"version":"3.50.1"},"reference-count":100,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000144","name":"National Science Foundation: Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["1743490"],"award-info":[{"award-number":["1743490"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Intell. Transport. Syst. Mag."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/mits.2019.2898973","type":"journal-article","created":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T19:35:45Z","timestamp":1558467345000},"page":"181-196","source":"Crossref","is-referenced-by-count":144,"title":["Security and Privacy Issues in Intelligent Transportation Systems: Classification and Challenges"],"prefix":"10.1109","volume":"13","author":[{"given":"Dalton","family":"Hahn","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3126-8945","authenticated-orcid":false,"given":"Arslan","family":"Munir","sequence":"additional","affiliation":[]},{"given":"Vahid","family":"Behzadan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.02.020"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2017.2657379"},{"key":"ref33","first-page":"6","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"0","journal-title":"Proc 20th USENIX Conf Security"},{"key":"ref32","first-page":"21","article-title":"Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study","author":"rouf","year":"0","journal-title":"Proc 19th USENIX Conf Security"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2007.894193"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4271\/11-01-02-0004"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2016.2578706"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MTITS.2017.8005671"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2017.2726764"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2015.2503342"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7498068"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2327587"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.trf.2007.03.003"},{"key":"ref20","article-title":"Green lights forever: analyzing the security of traffic infrastructure","author":"ghena","year":"0","journal-title":"Proceedings of the USENIX Workshop on Offensive Technologies"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7368833"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2366512"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2010.2060218"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2011.6083087"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2158001"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2016.7795984"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2017.2684981"},{"key":"ref50","year":"2018","journal-title":"E Commission Cooperative ITS for mobility in European cities (CIMEC)"},{"key":"ref51","year":"2018","journal-title":"E Commission Cooperative connected and automated mobility (CCAM)"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/120626"},{"key":"ref58","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.51"},{"key":"ref56","article-title":"Models and framework for adversarial attacks on complex adaptive systems","author":"behzadan","year":"2017"},{"key":"ref55","year":"2017","journal-title":"E T S Council Briefing cooperative intelligent transport systems (C-ITS)"},{"key":"ref54","year":"2018","journal-title":"E Commission Innovating for the transport of the future"},{"key":"ref53","year":"2018","journal-title":"E Commission H2020 transport intelligent transport systems"},{"key":"ref52","author":"debby bezzina","year":"2015","journal-title":"Safety Pilot Model Deployment Test Conductor Team Report"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.05.001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICVES.2017.7991901"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MTITS.2017.8005660"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2016.2640738"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28183-4_1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2001.948835"},{"key":"ref49","author":"wachter","year":"2016","journal-title":"CAREER multi-resolution model and context aware information networking for cooperative vehicle efficiency and safety systems"},{"key":"ref7","article-title":"Vehicle security: risk assessment in transportation","author":"kelarestaghi","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2132790"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3232824"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.003"},{"key":"ref48","author":"balan","year":"2016","journal-title":"PFI BIC-A smart service system for traffic incident management enabled by large-data innovations (TIMELI)"},{"key":"ref47","article-title":"Oversee a secure and open communication and runtime platform for innovative automotive applications","author":"groll","year":"0","journal-title":"Proc 7th Embedded Security in Cars Conf"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287752"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.03.006"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2162864"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ComComAp.2012.6154869"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5170-5_1"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_7"},{"key":"ref71","article-title":"Deep reinforcement learning: an overview","author":"li","year":"2017"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62416-7_19"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2017.8072001"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2017.7995256"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462114"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2012.48"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983243"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.03.067"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2015905768"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3032970.3032983"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2171033"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.23919\/ELINFOCOM.2018.8330663"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2011.08.002"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2010.5437115"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1057-6"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2017.8275631"},{"key":"ref68","first-page":"98","article-title":"A fine-grained privacy preserving protocol over attribute based access control for VANETs","volume":"6","author":"nkenyereye","year":"2015","journal-title":"JoWUA"},{"key":"ref2","year":"2017","journal-title":"BT CityVerve Portal"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"ref1","year":"2017","journal-title":"Smart Cities"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00021"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61350-501-4.ch007"},{"key":"ref93","article-title":"Adversarial reinforcement learning framework for benchmarking collision avoidance mechanisms in autonomous vehicles","author":"behzadan","year":"2018"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6863131"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/2069000.2069020"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133627"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1080\/03081060.2015.1127537"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2011.5986166"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.208"},{"key":"ref10","year":"2016","journal-title":"Dedicated Short Range Communications (DSRC) Message Set Dictionary"},{"key":"ref11","author":"bayarou","year":"2008","journal-title":"E-safety vehicle intrusion protected applications"},{"key":"ref12","author":"wollinger","year":"2010","journal-title":"OVERSEE - open vehicular secure platform"},{"key":"ref13","author":"de fuentes","year":"2010","journal-title":"Overview of Security Issues in Vehicular Ad-hoc Networks"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSAE.2012.6272951"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2883057"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"key":"ref17","year":"2018","journal-title":"Pew Research Mobile fact sheet"},{"key":"ref81","author":"vanhoef","year":"0","journal-title":"WiFuzz detecting and exploiting logical flaws in the Wi-Fi cryptographic handshake"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6384464"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ISC2.2018.8656789"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/s150614116"},{"key":"ref83","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195124415.001.0001","author":"mitchell","year":"2009","journal-title":"Complexity A Guided Tour"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/910\/1\/012070"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31912-9_20"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444938"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"ref87","article-title":"Cyber-physical attacks on UAS networks-challenges and open research problems","author":"behzadan","year":"2017"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2846741"}],"container-title":["IEEE Intelligent Transportation Systems Magazine"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/5117645\/9336746\/8686209-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5117645\/9336746\/08686209.pdf?arnumber=8686209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T10:25:30Z","timestamp":1721298330000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8686209\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":100,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/mits.2019.2898973","relation":{},"ISSN":["1939-1390","1941-1197"],"issn-type":[{"value":"1939-1390","type":"print"},{"value":"1941-1197","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}