{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T20:31:34Z","timestamp":1776457894188,"version":"3.51.2"},"reference-count":175,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Veh."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1109\/tiv.2024.3493938","type":"journal-article","created":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T15:00:47Z","timestamp":1730991647000},"page":"4742-4757","source":"Crossref","is-referenced-by-count":17,"title":["A Survey of Cybersecurity Challenges and Mitigation Techniques for Connected and Autonomous Vehicles"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-2646-3381","authenticated-orcid":false,"given":"Bhosale Akshay","family":"Tanaji","sequence":"first","affiliation":[{"name":"Department of Industrial and Systems Engineering, Indian Institute of Technology, Kharagpur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4306-9334","authenticated-orcid":false,"given":"Sayak","family":"Roychowdhury","sequence":"additional","affiliation":[{"name":"Department of Industrial and Systems Engineering, Indian Institute of Technology, Kharagpur, India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cstp.2021.08.004"},{"key":"ref2","article-title":"Autonomous vehicles self-driving chauffeur and AMoD reshuffle traditional supply chain","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.18178\/ijmlc.2019.9.6.869"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3318070"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3315721"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s23104643"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3385435"},{"key":"ref8","article-title":"Flying taxi trials in cities set to expand","author":"Wray","year":"2020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.oceaneng.2021.109558"},{"key":"ref10","article-title":"Black Hat USA 2015: The full story of how that jeep was hacked","author":"Drozhzhin","journal-title":"Kaspersky daily"},{"key":"ref11","article-title":"Renault cars spy case: French intelligence investigates"},{"key":"ref12","article-title":"Engineers develop hack to make automotive radar hallucinate","author":"Kingery","year":"2024"},{"key":"ref13","article-title":"Sue my car not me: Products liability and accidents involving autonomous vehicles","author":"Gurney","year":"2013"},{"key":"ref14","article-title":"No TitlTesla\u2019s autopilot was involved in another deadly car crashe","author":"Stewart","year":"2023"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/wevj12020062"},{"key":"ref16","article-title":"Pwn2Own 2024: Tesla hacks, dozens of zero-days in electrical vehicles","author":"Nelson","year":"2024"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102150"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3085297"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102269"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3304762"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2022.3186897"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ithings-greencom-cpscom-smartdata.2016.52"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8053-6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3078740"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/iccw.2016.7503804"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.10.017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2024.3365849"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2478\/ttj-2018-0027"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1177\/0361198118799012"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.001.1900220"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/s21030706"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2835662"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3286279"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3371378"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3321522"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2915983"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3356809"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-023-03268-x"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.05.032"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/network2010010"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2023.04.017"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2277471"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.09.005"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2023.100575"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3098971"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3008781"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2020.3046694"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2903793"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3097809"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3266582"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.018.2300125"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3453368"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3157309"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.04.007"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.05.001"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3362640"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919674"},{"key":"ref58","article-title":"Tesla vehicles can be stolen with new relay attack, but there\u2019s a two-inch caveat","author":"Lambert","year":"2022"},{"key":"ref59","article-title":"Tesla can still be stolen with a cheap radio hack-despite new keyless tech","author":"Greenberg","year":"2024"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.3390\/s18114040"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3302807"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2896087"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.2968606"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3233186"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MED48518.2020.9183007"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom\/bigdatase.2019.00116"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3240291"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1515"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11071072"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62582-5_4"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700364"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2019.8746516"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35308-6_22"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2351612"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00032"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/vtcspring.2017.8108460"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0782-7"},{"issue":"8","key":"ref78","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle","volume":"24","author":"Yan","year":"2016","journal-title":"Def Con"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2020.3012425"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109230"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3269029"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2020.3000797"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3236788"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3020845"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110308"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2993769"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3034327"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15035-8_63"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3347889"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103352"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2024.05.019"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-023-02716-9"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.04.005"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00072"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.3390\/electronics4030380"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2014.2342271"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.09.006"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3262347"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.2200298"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon44009.2020.9249677"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1203-5"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2016.7511098"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2023.100639"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3236274"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1506"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2024.3486367"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2018.2883057"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2961765"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc46108.2020.9045356"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63092-8_51"},{"key":"ref111","first-page":"4037","article-title":"Internet of Vehicles (IoV) requirements, attacks and countermeasures","volume-title":"Proc. 5 Int. Conf. Computing Sustain. Glob. Dev.","author":"Abdus"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/tiv.2024.3397872"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ictcs.2019.8923077"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ICICSP50920.2020.9232047"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100515"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2845744"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00037"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3128634"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-021-00543-w"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3281276"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2981127"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900463"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108205"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.3390\/app132413024"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3008361"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3027390"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2018.8500383"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2812149"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2883426"},{"key":"ref130","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.jnlssr.2023.12.004","article-title":"Unsupervised intrusion detection system for In-vehicle communication networks","volume":"5","author":"Kabilan","year":"2024","journal-title":"J. Saf. Sci. Resilience"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2782159"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2021.3121870"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100266"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110453"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-0422-5_10"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9040573"},{"key":"ref138","article-title":"Attack resilience and recovery using physical challenge response authentication for active sensors under integrity attacks","author":"Shoukry","year":"2016"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom\/bigdatase.2018.00079"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3376192"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854842"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3327026"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/lsens.2017.2752719"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.03.082"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3244077"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2019.100013"},{"key":"ref147","article-title":"Strategic honeypot allocation in dynamic networks : A game-theoretic approach for enhanced cybersecurity Strategic honeypot allocation in dynamic networks : A game-theoretic approach for enhanced cybersecurity","author":"Hemida","year":"2024"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2018.2870167"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2717999"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1145\/3277103.3277138"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.3390\/s21010202"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2971254"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/tr.2015.2406860"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.3390\/s21041273"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/tvlsi.2019.2929420"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2020.3002096"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2020.3035869"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.04.024"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103699"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2024.3351741"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1002\/9781119723950"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3544431"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120875"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2018.1800279"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2961002"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3321346"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.107617"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2017.07.003"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12234856"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/hpcc\/smartcity\/dss.2018.00247"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3061065"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3012961"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3332675"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3360698"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1016\/j.trb.2023.04.006"}],"container-title":["IEEE Transactions on Intelligent Vehicles"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7274857\/11236488\/10747118.pdf?arnumber=10747118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T05:52:32Z","timestamp":1762840352000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10747118\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":175,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tiv.2024.3493938","relation":{},"ISSN":["2379-8904","2379-8858"],"issn-type":[{"value":"2379-8904","type":"electronic"},{"value":"2379-8858","type":"print"}],"subject":[],"published":{"date-parts":[[2025,10]]}}}