{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:00:20Z","timestamp":1730304020467,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/vtcspring.2018.8417867","type":"proceedings-article","created":{"date-parts":[[2018,7,26]],"date-time":"2018-07-26T18:12:24Z","timestamp":1532628744000},"page":"1-5","source":"Crossref","is-referenced-by-count":7,"title":["Feasibility Study of Misbehavior Detection Mechanisms in Cooperative Intelligent Transport Systems (C-ITS)"],"prefix":"10.1109","author":[{"given":"Joseph","family":"Kamel","sequence":"first","affiliation":[]},{"given":"Arnaud","family":"Kaiser","sequence":"additional","affiliation":[]},{"given":"Ines","family":"Ben Jemaa","sequence":"additional","affiliation":[]},{"given":"Pierpaolo","family":"Cincilla","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Urien","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.180"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/j.comcom.2016.05.013","article-title":"T-vnets: a novel trust architecture for vehicular networks using the standardized messaging services of etsi its","volume":"93","author":"kerrache","year":"2016","journal-title":"Comput Commun"},{"key":"ref31","article-title":"Cooperative position verification - defending against roadside attackers 2.0","author":"leinm?ller","year":"2010","journal-title":"17th ITS World Congr"},{"key":"ref30","first-page":"106","article-title":"Removal of misbehaving insiders in anonymous vanets","author":"zhuo","year":"2009","journal-title":"ACM MSWiM"},{"key":"ref36","article-title":"Evaluating Misbehavior Detection for Vehicular Networks","author":"heijden","year":"2017","journal-title":"FG-IVC 2017"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2476338"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s13177-011-0038-9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737583"},{"key":"ref11","first-page":"1","article-title":"Cooperative sybil attack detection for position based applications in privacy preserved vanets","author":"hao","year":"2011","journal-title":"IEEE Globecom'2011"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1160972.1160974"},{"key":"ref13","first-page":"1","article-title":"ETSI TR 103 415 V0.1.9: Intelligent Transport Systems (ITS); Security; Pre-standardisation study on pseudonym change management","year":"2017","journal-title":"ETSI Technical Specification"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.57"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.26"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093096"},{"key":"ref17","first-page":"1","article-title":"Vehicle behavior analysis to enhance security in vanets","author":"schmidt","year":"2008","journal-title":"V2VCOM 2008"},{"key":"ref18","first-page":"166","article-title":"Intrusion detection in vanets through verification of vehicle movement data","author":"bimeyer","year":"2010","journal-title":"IEEE VNC 2010"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2016.7881000"},{"key":"ref28","first-page":"1","article-title":"ETSI EN 302 637&#x2013;3 V1.2.1: Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic Service","year":"2014","journal-title":"ETSI Technical Specification"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2009.5379844"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998440"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2009.48"},{"key":"ref6","first-page":"1","article-title":"ETSI EN 302 637&#x2013;2 V1.3.2: Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service","year":"2014","journal-title":"ETSI Technical Specification"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071006"},{"key":"ref5","first-page":"1","article-title":"ETSI TS 102 940 v1.2.1: Intelligent Transport Systems (ITS); Security; ITS communications security architecture and security management","year":"2016","journal-title":"ETSI Technical Specification"},{"key":"ref8","first-page":"1","article-title":"A DTSA (Detection Technique against a Sybil Attack) Protocol using SKC (Session Key based Certificate) on VANET","volume":"7","author":"byungkwan lee","year":"2013","journal-title":"IJSIA"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2007.4451013"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.263"},{"key":"ref9","first-page":"1","article-title":"ETSI TS 102 941 V1.1.15: Intelligent Transport Systems (ITS);Security;Trust and Privacy Management","year":"2017","journal-title":"ETSI Technical Specification"},{"key":"ref1","first-page":"1","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation)","volume":"l119","year":"2016","journal-title":"Official Journal of the European Union"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/sec.56"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2480244"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488501000831"},{"journal-title":"ETSI Technical Specification","article-title":"ETSI TS 101 539&#x2013;1 V1.1.1: Intelligent Transport Systems (ITS); V2X Applications; Part 1: Road Hazard Signalling (RHS) application requirements specification","year":"2013","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.02.008"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1860058.1860067"},{"key":"ref25","first-page":"1","article-title":"Proof-of-relevance: Filtering false data via authentic consensus in vehicle ad-hoc networks","author":"cao","year":"2008","journal-title":"IEEE INFOCOM Workshops 2008"}],"event":{"name":"2018 IEEE 87th Vehicular Technology Conference (VTC Spring)","start":{"date-parts":[[2018,6,3]]},"location":"Porto","end":{"date-parts":[[2018,6,6]]}},"container-title":["2018 IEEE 87th Vehicular Technology Conference (VTC Spring)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8417184\/8417457\/08417867.pdf?arnumber=8417867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T10:52:26Z","timestamp":1643194346000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8417867\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/vtcspring.2018.8417867","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}