{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:41:49Z","timestamp":1776444109764,"version":"3.51.2"},"reference-count":99,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000194","name":"U.S. Department of State Bureau of Educational and Cultural Affairs under Fulbright U.S. Scholar Grant Award","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000194","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100003882","name":"its cooperating agency the Institute of International Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100003882","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1109\/tits.2022.3165513","type":"journal-article","created":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T19:36:47Z","timestamp":1649965007000},"page":"18273-18287","source":"Crossref","is-referenced-by-count":32,"title":["Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4470-6406","authenticated-orcid":false,"given":"Badis","family":"Hammi","sequence":"first","affiliation":[{"name":"EPITA School of Engineering and Computer Science, Le Kremlin-Bic&#x00EA;tre, France"}]},{"given":"Yacine Mohamed","family":"Idir","sequence":"additional","affiliation":[{"name":"COSYS Department, Gustave Eiffel University, Champs-sur-Marne, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5982-8190","authenticated-orcid":false,"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[{"name":"College of Communication and Information, University of Kentucky, Lexington, KY, USA"}]},{"given":"Rida","family":"Khatoun","sequence":"additional","affiliation":[{"name":"Institut Mines-T&#x00E9;l&#x00E9;com, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8610-3451","authenticated-orcid":false,"given":"Jamel","family":"Nebhen","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Intelligent Transport Systems (ITS): Vehicular Communications: GeoNetworking; Part 1: Requirements","year":"2010"},{"key":"ref2","volume-title":"Intelligent Transport Systems (ITS): Vehicular Communications: GeoNetworking: Part 3: Network Architecture","year":"2010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2132790"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00502-015-0343-0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"ref6","volume-title":"Security Credential Management System Proof-of-Concept Implementation EE Requirements and Specifications Supporting SCMS Software Release 1.1","year":"2016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038492"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s18041212"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.03.006"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2833849"},{"key":"ref11","volume-title":"Intelligent Transport Systems (ITS), Vehicular Communications. Basic Set of Applications, Part 2: Specification of Cooperative Awareness Basic Service","year":"2014"},{"key":"ref12","volume-title":"Intelligent Transport Systems (ITS), Vehicular Communications. Basic Set of Applications, Part 3: Specifications of Decentralized Environmental Notification Basic Service","year":"2014"},{"key":"ref13","volume-title":"Dedicated Short Range Communications (DSRC) Message Set Dictionary","year":"2016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737583"},{"key":"ref15","volume-title":"Reseach and Innovative Technology Administration Vehicle-to-Vehicle (V2V) Communications for Safety","year":"2021"},{"key":"ref16","first-page":"269","article-title":"Sybil attack in VANETs","volume-title":"Proc. Secur. Self-Org. MANET Wireless Sensor Netw.","author":"Grover"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22885-9_15"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/milcom.2009.5379844"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2013.02.001"},{"key":"ref20","first-page":"1","article-title":"Challenges in securing vehicular networks","volume-title":"Proc. Workshop Hot Topics Netw.","author":"Parno"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE.2009.27"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON47517.2019.8993045"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63092-8_51"},{"key":"ref24","first-page":"20","article-title":"Review on avoiding Sybil attack in VANET while operating in an urban environment","volume":"97","author":"Velayudhan","year":"2019","journal-title":"J. Theor. Appl. Inf. Technol."},{"issue":"2","key":"ref25","first-page":"1","article-title":"A survey on Sybil attack detection in vehicular ad hoc networks (VANET)","volume":"29","author":"Abdulkader","year":"2018","journal-title":"J. Comput."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15497-8_5"},{"key":"ref27","first-page":"42","volume-title":"Intelligent Transport Systems (ITS): Vehicular Communications: Basic Set of Applications: Facilities Layer Protocols and Communication Requirements for Infratstructure Services","year":"2016"},{"key":"ref28","first-page":"94","volume-title":"Intelligent Transport Systems (ITS): Users and Applications Requirements: Part 2: Applications and Facilities Layer Common Data Dictionary","year":"2016"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JCSSE.2017.8025908"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2018.8628427"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2017.8065169"},{"key":"ref32","volume-title":"Vehicle-to-Vehicle Security Credential Management System: Request for Information. Technical Report, National Highway Traffic Safety Administration (NHTSA)","year":"2014"},{"key":"ref33","volume-title":"Intelligent Transport Systems (ITS); Security; ITS Communications Security Architecture and Security Management","year":"2012"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3403\/30265080u"},{"key":"ref35","volume-title":"Intelligent Transport Systems (ITS); Security; Security Services and Architecture","year":"2010"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3403\/30309810"},{"key":"ref37","first-page":"35","volume-title":"Intelligent Transport Systems (ITS), Security Header and Certificate Formats","year":"2017"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2345420"},{"key":"ref39","volume-title":"Special Cryptographic Primitives in SCMS. SCP1: Butterfly Keys","author":"Kumar","year":"2017"},{"key":"ref40","volume-title":"Security System: Integration Guide V4, SCOOP@F Delivrable 2.4.4.8","year":"2016"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2011.3614"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2009.48"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0182"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1160972.1160974"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023881"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249492"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.01.009"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161076"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1427\/1\/012009"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.263"},{"key":"ref51","volume-title":"Technical Report, Siemens","year":"2018"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE.2012.27"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2070425.2070450"},{"key":"ref54","volume-title":"Method of improving coverage and optimisation in communication networks","author":"Hamalainen","year":"2014"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1400374RP"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2307888.2307902"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.01.010"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3242102.3242125"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1080\/17445760.2019.1617865"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2864111"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTIT.2014.6996123"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CSNet47905.2019.9108923"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2872456"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359558"},{"key":"ref65","first-page":"259","article-title":"The sybil attack in sensor networks: Analysis & defenses","volume-title":"Proc. 3rd Int. Symp. Inf. Process. Sensor Netw.","author":"Newsome"},{"issue":"2","key":"ref66","first-page":"397","article-title":"Detection of Sybil attack in VANET","volume":"14","author":"Raj","year":"2020","journal-title":"Karpagam JCS"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2011.01.004"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2993769"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07272-8"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2018.8361717"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2014.066178"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2014.6912147"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6115555"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.13189\/ujcn.2015.030103"},{"issue":"2","key":"ref75","first-page":"817","article-title":"Detection of Sybil attacks in vehicular ad hoc networks based on road side unit support","volume":"6","author":"Naveed","year":"2015","journal-title":"Int. J. Sci. Eng. Res."},{"issue":"7","key":"ref76","first-page":"17","article-title":"Localization of Sybil nodes and detection of malicious node in vanets","volume":"2","author":"Murugan","year":"2015","journal-title":"Int. J. Adv. Inf. Eng. Technol."},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110308"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29461-7_41"},{"key":"ref79","first-page":"426","article-title":"A privacy-preserving authentication and sybil detection protocol for vehicular ad hoc networks","volume-title":"Proc. IEEE Int. Conf. Consum. Electron. (ICCE)","author":"Thiago"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2011.6134242"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0431-x"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC.2015.7432979"},{"issue":"1","key":"ref83","first-page":"22","article-title":"Sybil nodes detection based on received signal strength variations within vanet","volume":"9","author":"Bouassida","year":"2009","journal-title":"IJ Netw. Secur."},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.10"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-4409-5_13"},{"key":"ref86","first-page":"1","article-title":"Deterministic Sybil attack exclusion in cooperative-intelligent transportation systems","volume-title":"Proc. Konferenzver\u00f6ffentlichung","author":"Trauernicht"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC46108.2020.9045356"},{"key":"ref88","first-page":"1158","article-title":"Activate later certificates for V2x-combining its efficiency with privacy","volume-title":"Proc. IACR","author":"Verheul"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2434822"},{"key":"ref90","article-title":"Research challenges and solutions for IoT\/CPS","volume-title":"Proc. 26th Int. Conf. Comput. Commun. Netw. (ICCCN)","author":"John Stankovic"},{"key":"ref91","volume-title":"Data Analytics for Intelligent Transportation Systems","author":"Chowdhury","year":"2017"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2690902"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2016.0001"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510736"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7439(87)80084-9"},{"key":"ref96","article-title":"A novel anomaly detection scheme based on principal component classifier","author":"Shyu","year":"2003"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43862-6_13"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/11527503_82"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2785628"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979\/9916643\/09757751.pdf?arnumber=9757751","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T00:53:09Z","timestamp":1706057589000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9757751\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10]]},"references-count":99,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tits.2022.3165513","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10]]}}}