{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T05:13:59Z","timestamp":1769318039866,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T00:00:00Z","timestamp":1713398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CPS-2103459, SHF-2210744, 2244450, AMPS-2229073, CNS-2103405"],"award-info":[{"award-number":["CPS-2103459, SHF-2210744, 2244450, AMPS-2229073, CNS-2103405"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,18]]},"DOI":"10.1145\/3603287.3651209","type":"proceedings-article","created":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T12:06:34Z","timestamp":1714219594000},"page":"18-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Living on the Electric Vehicle and Cloud Era: A Study of Cyber Vulnerabilities, Potential Impacts, and Possible Strategies"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-6340-2233","authenticated-orcid":false,"given":"Long","family":"Vu","sequence":"first","affiliation":[{"name":"Kennesaw State University, Marietta, Georgia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8562-0492","authenticated-orcid":false,"given":"Kun","family":"Suo","sequence":"additional","affiliation":[{"name":"Kennesaw State University, Marietta, Georgia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0550-2248","authenticated-orcid":false,"given":"Md Romyull","family":"Islam","sequence":"additional","affiliation":[{"name":"Kennesaw State University, Marietta, Georgia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5467-7082","authenticated-orcid":false,"given":"Nobel","family":"Dhar","sequence":"additional","affiliation":[{"name":"Kennesaw State University, Marietta, Georgia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7184-4102","authenticated-orcid":false,"given":"Tu N.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Kennesaw State University, Marietta, Georgia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2332-9816","authenticated-orcid":false,"given":"Selena","family":"He","sequence":"additional","affiliation":[{"name":"Kennesaw State University, Marietta, Georgia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3980-1425","authenticated-orcid":false,"given":"Yong","family":"Shi","sequence":"additional","affiliation":[{"name":"Kennesaw State University, Marietta, Georgia, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. 5 Tips for Protecting Your Connected Vehicle against Cyberattacks. https:\/\/tinyurl.com\/srypvysc."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Battery in the Cloud. https:\/\/tinyurl.com\/muyw2ffe."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. Cloud Technology for Electric Vehicles. https:\/\/tinyurl.com\/4jvc3fwk."},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. Connecting Canada Securing the Vehicle of the Future. https:\/\/www2.deloitte.com\/ca\/en\/pages\/risk\/articles\/securing-the-vehicles-of-the-future.html."},{"key":"e_1_3_2_1_5_1","unstructured":"[n.d.]. Cyberattack on Cars Increased 225% in Last Three Years. https:\/\/www.israel21c.org\/cyberattacks-on-cars-increased-225-in-last-three-years\/."},{"key":"e_1_3_2_1_6_1","unstructured":"[n.d.]. ETSI ITS Security Threat Vulnerability and Risk Analysis (TVRA). https:\/\/www.etsi.org\/deliver\/etsi_tr\/102800_102899\/102893\/01.01.01_60\/tr_102893v010101p.pdf."},{"key":"e_1_3_2_1_7_1","unstructured":"[n. d.]. Everon: Moving Up a Gear with Microservices on Google Kubernetes Engine. https \/\/cloud.google.com\/customers\/everon."},{"key":"e_1_3_2_1_8_1","unstructured":"[n. d.]. Hijacking EV Charge Points to Cause DoS. https:\/\/www.saiflow.com\/hijacking-chargers-identifier-to-cause-dos\/."},{"key":"e_1_3_2_1_9_1","volume-title":"d.]. IEA","year":"2022","unstructured":"[n. d.]. IEA (2022), Electric Vehicles. https:\/\/www.iea.org\/reports\/electric-vehicles."},{"key":"e_1_3_2_1_10_1","unstructured":"[n.d.]. Impact of Cyber Attack on Your Business. https:\/\/www.nibusinessinfo.co.uk\/content\/impact-cyber-attack-your-business."},{"key":"e_1_3_2_1_11_1","unstructured":"[n. d.]. The Increasing Need for Electric Vehicle Cyber Security. shorturl.at\/inprT."},{"key":"e_1_3_2_1_12_1","unstructured":"[n. d.]. Keyless Cars Twice as Likely to be Stolen as Non-Keyless Models. https:\/\/www.driving.co.uk\/news\/keyless-cars-twice-as-likely-to-be-stolen-as-non-keyless-models\/."},{"key":"e_1_3_2_1_13_1","unstructured":"[n. d.]. New Study Shows Just How Bad Vehicle Hacking Has Gotten. https:\/\/www.cnet.com\/roadshow\/news\/2019-automotive-cyber-hack-security-study-upstream\/."},{"key":"e_1_3_2_1_14_1","unstructured":"[n. d.]. Race to Secure Connected Cars. https:\/\/approov.io\/blog\/the-race-to-secure-connected-cars."},{"key":"e_1_3_2_1_15_1","unstructured":"[n. d.]. The Rise of Cyber-Attacks in the Automotive Industry. https:\/\/www.uscybersecurity.net\/automotive-industry\/."},{"key":"e_1_3_2_1_16_1","unstructured":"[n. d.]. Six Ways to Protect Against Autonomous Vehicle Cyber Attacks. https:\/\/innovationatwork.ieee.org\/six-ways-to-protect-against-autonomous-vehicle-cyber-attacks\/."},{"key":"e_1_3_2_1_17_1","unstructured":"[n. d.]. Tesla BLE Phone-as-a-Key Passive Entry Vulnerable to Relay Attacks. https:\/\/tinyurl.com\/2p93e3zm."},{"key":"e_1_3_2_1_18_1","unstructured":"[n.d.]. Tesla Model S and Model 3 Prove Vulnerable to GPS Spoofing Attacks. https:\/\/rb.gy\/cr6um."},{"key":"e_1_3_2_1_19_1","unstructured":"[n. d.]. Tesla Model-X Hacked and Stolen in Minutes Using New Key Fob Hack. https:\/\/www.zdnet.com\/article\/tesla-model-x-hacked-and-stolen-in-minutes-using-new-key-fob-hack\/."},{"key":"e_1_3_2_1_20_1","unstructured":"[n.d.]. Top 4 Car Features That Rely on Vehicle-to-Cloud Connectivity. https:\/\/autocrypt.io\/4-car-features-rely-on-vehicle-to-cloud-connectivity\/."},{"key":"e_1_3_2_1_21_1","unstructured":"[n. d.]. Use These Car Hacking Safety Tips to Protect Your Vehicle from Cyber Threats. https:\/\/northstar-ins.com\/car-hacking-safety-tips\/."},{"key":"e_1_3_2_1_22_1","unstructured":"[n. d.]. V2X in the Connected Car of the Future. https:\/\/www.qorvo.com\/design-hub\/blog\/v2x-in-the-connected-car-of-the-future."},{"key":"e_1_3_2_1_23_1","unstructured":"[n. d.]. Volkswagen Automotive Cloud. https:\/\/www.volkswagen.co.uk\/en\/electric-and-hybrid\/discover-electric\/volkswagen-automotive-cloud.html."},{"key":"e_1_3_2_1_24_1","volume-title":"d.]. What are the Downsides to Electric Cars? shorturl.at\/iBZ59","unstructured":"[n. d.]. What are the Downsides to Electric Cars? shorturl.at\/iBZ59."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11203376"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi11020027"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3084396"},{"key":"e_1_3_2_1_29_1","volume-title":"Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Baker Richard","year":"2019","unstructured":"Richard Baker and Ivan Martinovic. 2019. Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging. In 28th USENIX Security Symposium (USENIX Security 19). Santa Clara, CA, USA."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20082364"},{"key":"e_1_3_2_1_31_1","volume-title":"Second Workshop on the Economics of Peer-to-peer Systems","author":"Buchegger Sonja","year":"2004","unstructured":"Sonja Buchegger and Jean-Yves Le Boudec. 2004. A Robust Reputation System for P2P and Mobile Ad-Hoc Networks. P2P and Mobile Ad-hoc Networks, Second Workshop on the Economics of Peer-to-peer Systems (2004)."},{"key":"e_1_3_2_1_32_1","volume-title":"TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks","author":"Chuang Ming-Chin","year":"2013","unstructured":"Ming-Chin Chuang and Jeng-Farn Lee. 2013. TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks. IEEE Systems Journal (2013)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2993210.2993212"},{"key":"e_1_3_2_1_34_1","volume-title":"Cyber Security Issues of Internet of Electric Vehicles. In IEEE Wireless Communications and Networking Conference (WCNC). IEEE","author":"Fraiji Yosra","year":"2018","unstructured":"Yosra Fraiji, Lamia Ben Azzouz, Wassim Trojet, and Leila Azouz Saidane. 2018. Cyber Security Issues of Internet of Electric Vehicles. In IEEE Wireless Communications and Networking Conference (WCNC). IEEE, Barcelona, Spain."},{"key":"e_1_3_2_1_35_1","volume-title":"Jehad M Hamamreh, and Huseyin Arslan.","author":"Furqan Haji M","year":"2019","unstructured":"Haji M Furqan, Muhammad Sohaib J Solaija, Jehad M Hamamreh, and Huseyin Arslan. 2019. Intelligent Physical Layer Security Approach for V2X Communication. arXiv preprint arXiv:1905.05075 (2019)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107093"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the International Conference on Data Science (ICDATA)","author":"Hardy William","year":"2016","unstructured":"William Hardy, Lingwei Chen, Shifu Hou, Yanfang Ye, and Xin Li. 2016. DL4MD: A Deep Learning Framework for Intelligent Malware Detection. In Proceedings of the International Conference on Data Science (ICDATA). Las Vegas, NV, USA."},{"key":"e_1_3_2_1_38_1","volume-title":"Consumer Reports","author":"Harto Chris","year":"2020","unstructured":"Chris Harto. 2020. Electric Vehicle Ownership Costs: Chapter 2-Maintenance. Consumer Reports, September (2020), 20--1."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2020.2999885"},{"key":"e_1_3_2_1_40_1","volume-title":"Cybersecurity Attacks in Vehicle-to-Infrastructure Applications and Their Prevention. Transportation Research Record Journal of the Transportation Research Board","author":"Islam Mhafuzul","year":"2018","unstructured":"Mhafuzul Islam, Mashrur Chowdhury, Hongda Li, and Hongxin Hu. 2018. Cybersecurity Attacks in Vehicle-to-Infrastructure Applications and Their Prevention. Transportation Research Record Journal of the Transportation Research Board (2018)."},{"key":"e_1_3_2_1_41_1","volume-title":"Vehicular Network: Properties, Structure, Challenges, Attacks, Solutions for Improving Scalability and Security. International Journal of Scientific & Engineering Research 4. Issue 6.","author":"Jayalakshmi N. S.","year":"2013","unstructured":"N. S. Jayalakshmi, Rachel Rajadurai, and K. Indumathi. 2013. Vehicular Network: Properties, Structure, Challenges, Attacks, Solutions for Improving Scalability and Security. International Journal of Scientific & Engineering Research 4. Issue 6."},{"key":"e_1_3_2_1_42_1","volume-title":"Smart Route: Internet-of-Vehicles (IoV)-Based Congestion Detection and Avoidance (IoV-Based CDA) Using Rerouting Planning. Journal of Applied Sciences","author":"Khan Zahid","year":"2020","unstructured":"Zahid Khan, Anis Koubaa, and Haleem Farman. 2020. Smart Route: Internet-of-Vehicles (IoV)-Based Congestion Detection and Avoidance (IoV-Based CDA) Using Rerouting Planning. Journal of Applied Sciences (2020)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700133"},{"key":"e_1_3_2_1_44_1","volume-title":"External Integrity Verification for Outsourced Big Data in Cloud and IoT: A Big Picture. Future Generation Computer Systems","author":"Liu Chang","year":"2015","unstructured":"Chang Liu, Chi Yang, Xuyun Zhang, and Jinjun Chen. 2015. External Integrity Verification for Outsourced Big Data in Cloud and IoT: A Big Picture. Future Generation Computer Systems (2015)."},{"key":"e_1_3_2_1_45_1","volume-title":"5G Vehicle-to-Everything Services: Gearing Up for Security and Privacy. Proc","author":"Lu Rongxing","year":"2019","unstructured":"Rongxing Lu, Lan Zhang, Jianbing Ni, and Yuguang Fang. 2019. 5G Vehicle-to-Everything Services: Gearing Up for Security and Privacy. Proc. IEEE (2019)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.01.008"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Ashwin Rao Ashish Sangwan Arzad A. Kherani Anitha Varghese Bhargav Bellur and Rajeev Shorey. 2007. Secure V2V Communication With Certificate Revocations. In 2007 Mobile Networking for Vehicular Environments.","DOI":"10.1109\/MOVE.2007.4300817"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102223"},{"key":"e_1_3_2_1_49_1","volume-title":"Muhammad Rizwan Anwar, et al","author":"Raza Salman","year":"2019","unstructured":"Salman Raza, Shangguang Wang, Manzoor Ahmed, Muhammad Rizwan Anwar, et al. 2019. A Survey on Vehicular Edge Computing: Architecture, Applications, Technical Issues, and Future Directions. Wireless Communications and Mobile Computing (2019)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s38314-020-0193-3"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287762"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2418316"}],"event":{"name":"ACM SE '24: 2024 ACM Southeast Conference","location":"Marietta GA USA","acronym":"ACM SE '24","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2024 ACM Southeast Conference on ZZZ"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603287.3651209","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603287.3651209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:07:14Z","timestamp":1756487234000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603287.3651209"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,18]]},"references-count":52,"alternative-id":["10.1145\/3603287.3651209","10.1145\/3603287"],"URL":"https:\/\/doi.org\/10.1145\/3603287.3651209","relation":{},"subject":[],"published":{"date-parts":[[2024,4,18]]},"assertion":[{"value":"2024-04-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}