{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:51:33Z","timestamp":1775145093496,"version":"3.50.1"},"reference-count":91,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/tits.2017.2665968","type":"journal-article","created":{"date-parts":[[2017,3,6]],"date-time":"2017-03-06T19:23:37Z","timestamp":1488828217000},"page":"2898-2915","source":"Crossref","is-referenced-by-count":440,"title":["Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1747-9914","authenticated-orcid":false,"given":"Simon","family":"Parkinson","sequence":"first","affiliation":[]},{"given":"Paul","family":"Ward","sequence":"additional","affiliation":[]},{"given":"Kyle","family":"Wilson","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Miller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","first-page":"301","article-title":"VANET: Security attacks and its possible solutions","volume":"3","author":"rawat","year":"0","journal-title":"J Info and Oper Management"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/WOCN.2013.6616194"},{"key":"ref71","first-page":"30","article-title":"Identification of malicious vehicle in VANET environment from DDOS attack","volume":"4","author":"pathre","year":"2013","journal-title":"J Global Res Comput Sci"},{"key":"ref70","first-page":"703","article-title":"Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer","author":"verdult","year":"2015","journal-title":"Proc 22nd USENIX Secur Symp (USENIX Security)"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88181-0_11"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/2076450.2076470"},{"key":"ref74","first-page":"20","article-title":"Denial of service (DOS) attack and its possible solutions in VANET","volume":"65","author":"hasbullah","year":"2010","journal-title":"World Acad Sci Eng Technol"},{"key":"ref39","article-title":"Investigating the causes of and possible remedies for sensor damage in digital cameras used on the omega laser systems","author":"boccuzzi","year":"2008"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2008.4621263"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2012.2233736"},{"key":"ref78","year":"2016","journal-title":"Connected Cards the Open Road for Hackers"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19786-4_20"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"684","DOI":"10.15623\/ijret.2013.0212117","article-title":"Obstacle detection using mono vision camera and laser scanner","volume":"2","author":"mahajan","year":"2013","journal-title":"International Journal of Engineering Research and Technology"},{"key":"ref32","year":"2016","journal-title":"Researcher hacks self-driving car sensors"},{"key":"ref31","article-title":"Energy consumption of encryption schemes in wireless devices","author":"hirani","year":"2003"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2018396.2018403"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2005.1505111"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2006.883940"},{"key":"ref35","first-page":"64","article-title":"Object boundary recognition using b-snake","volume":"2","author":"giveki","year":"2011","journal-title":"Can J Image Process Comput Vis"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2004.1398868"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.116"},{"key":"ref62","article-title":"Estimation of driver behavior for autonomous vehicle applications","author":"gadepally","year":"2013"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2014.6856582"},{"key":"ref63","article-title":"Ride-through for autonomous vehicles","author":"kane","year":"2013","journal-title":"Proc 32nd Int Conf Comput Safety Rel Secur (SAFECOMP)"},{"key":"ref28","year":"2016","journal-title":"Cars Safer From 1 November 2012"},{"key":"ref64","year":"2016","journal-title":"Google Gives More Detail on Safety of its Autonomous Cars"},{"key":"ref27","article-title":"Tire pressure maintenance&#x2014;A statistical investigation","author":"singh","year":"2009"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049516"},{"key":"ref66","author":"glielmo","year":"2010","journal-title":"Vehicle-to-Vehicle\/Vehicle-to-Infrastructure Control"},{"key":"ref29","first-page":"11","article-title":"Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study","author":"roufa","year":"2010","journal-title":"Proc 19th USENIX Security Symp"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2009.0191"},{"key":"ref68","first-page":"1","article-title":"Classes 1752 of attacks in VANET","volume":"1753","author":"sumra","year":"2011","journal-title":"Proc Saudi Int Electron Commun Photon Conf (SIECPC)"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.4271\/2006-01-1426"},{"key":"ref2","volume":"388","author":"hebert","year":"2012","journal-title":"Intelligent Unmanned Ground Vehicles Autonomous Navigation Research at Carnegie Mellon"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2327587"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2012.09.003"},{"key":"ref22","first-page":"56","article-title":"Assessing the spoofing threat: Development of a portable GPS civilian spoofer","volume":"55","author":"humphreys","year":"2008","journal-title":"Proc ION GNSS Int Tech Meeting Satellite Division"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/navi.44"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/cce:19990304"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/s16050689"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0174"},{"key":"ref25","year":"1991","journal-title":"Can Specification Version 2 0 Postfach 300240"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3390\/s130810599"},{"key":"ref51","author":"miller","year":"2014","journal-title":"A survey of Remote Automotive Attack Surfaces"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940562"},{"key":"ref90","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1177\/0278364909359210","article-title":"Path planning for autonomous vehicles in unknown semi-structured environments","volume":"29","author":"dmitri","year":"2010","journal-title":"Int J Robot Res"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2034669"},{"key":"ref58","author":"sheridan","year":"2002","journal-title":"Humans and Automation System Design and Research Issues"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2302386"},{"key":"ref56","article-title":"Security analysis of vehicle diagnostics using DoIP","author":"lindberg","year":"2011"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.4.7.552-564"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87698-4_19"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.4108\/e-forensics.2008.32"},{"key":"ref52","author":"vallance","year":"2015","journal-title":"Car Hack Uses Digital-Radio Broadcasts to Seize Control"},{"key":"ref10","year":"2016","journal-title":"Nissan Leaf Electric Cars Hack Vulnerability Disclosed"},{"key":"ref11","article-title":"Automotive security best practices","author":"clare","year":"2015"},{"key":"ref40","year":"2016","journal-title":"Mts Analysis of Laser Light Threat to CCTV"},{"key":"ref12","article-title":"Cyber-security risks in the supply chain","author":"white","year":"2015"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1108\/09600030010346521"},{"key":"ref14","first-page":"271","article-title":"An emerging threat: Eve meets a robot","author":"akdemir","year":"2010","journal-title":"Proc Int Conf Trusted Syst"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2013.18"},{"key":"ref82","author":"haataja","year":"2009","journal-title":"Security threats and countermeasures in Bluetooth-enabled systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TRA.2002.807557"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6069723"},{"key":"ref17","article-title":"Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing","author":"humphreys","year":"0"},{"key":"ref84","first-page":"1","article-title":"Bluesniff: Eve meets alice and bluetooth","volume":"7","author":"spill","year":"2007","journal-title":"Proc WOOT"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2013.2264594"},{"key":"ref19","year":"2016","journal-title":"UT Austin Researchers Successfully Spoof an $80 Million Yacht at Sea"},{"key":"ref80","year":"2016","journal-title":"BMW OBD Port Theft&#x2014;The Solution"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4564481"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref3","first-page":"77","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proc Usenix Secur Symp"},{"key":"ref6","author":"stottelaar","year":"2015","journal-title":"Practical Cyber-Attacks on Autonomous Vehicles"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2016.10.4.36"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2008.4732612"},{"key":"ref8","first-page":"83","article-title":"Cyber security riskanalysis for intelligent transport systems and in-vehicle networks","volume":"1","author":"ruddle","year":"2015","journal-title":"Intell Transp Syst Technol Appl"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/S1000-9361(08)60018-7"},{"key":"ref7","first-page":"546","article-title":"Potential cyberattacks on automated vehicles","volume":"16","author":"petit","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref49","year":"2016","journal-title":"Researchers Hack Into Driverless Car System Take Control Of Vehicle"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/PLANS.2006.1650586"},{"key":"ref88","article-title":"A survey of inter-vehicle communication","author":"luo","year":"2004","journal-title":"Tech Rep"},{"key":"ref9","first-page":"1","article-title":"Paradigm change of vehicle cyber security","author":"onishi","year":"2012","journal-title":"Proc 4th Int Conf Cyber Conflict (CYCON)"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON.2012.6253774"},{"key":"ref45","year":"2016","journal-title":"Cyber Security and the Future of Driverless Cars"},{"key":"ref48","article-title":"On board diagnostics: Risks and vulnerabilities of the connected vehicle","author":"klinedinst","year":"2016"},{"key":"ref47","first-page":"2012","article-title":"Privacy in autonomous vehicles","volume":"52","author":"glancy","year":"0","journal-title":"Santa Clara Law Review"},{"key":"ref42","year":"2016","journal-title":"Understand the Fatal Tesla Accident on Autopilot and the NHTSA Problem"},{"key":"ref41","article-title":"Hidden obstacles for googles self-driving cars: Impressive progress hides major limitations of googles quest for automated driving","author":"gomes","year":"2014"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3182\/20100906-3-IT-2019.00086"},{"key":"ref43","year":"2016","journal-title":"Skyscraper Melts Jaguar Car Parts"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979\/8089454\/07872388.pdf?arnumber=7872388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:05:05Z","timestamp":1642003505000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7872388\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":91,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tits.2017.2665968","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11]]}}}