{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T03:35:23Z","timestamp":1768707323486,"version":"3.49.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T00:00:00Z","timestamp":1620086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T00:00:00Z","timestamp":1620086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["833611"],"award-info":[{"award-number":["833611"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["739551"],"award-info":[{"award-number":["739551"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Republic of Cyprus through the Directorate General for European Programmes, Coordination, and Development"},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101003439"],"award-info":[{"award-number":["101003439"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"name":"FEDER and Secretaria d\u2019Universitats i Recerca del Departament d\u2019Empresa i Coneixement de la Generalitat de Catalunya","award":["2017-00376"],"award-info":[{"award-number":["2017-00376"]}]},{"name":"ERDF and the Spanish Government","award":["TEC2016-79988-P"],"award-info":[{"award-number":["TEC2016-79988-P"]}]},{"name":"ERDF and the Spanish Government","award":["PID2019-106808RA-I00 AEI\/FEDER"],"award-info":[{"award-number":["PID2019-106808RA-I00 AEI\/FEDER"]}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["833611"],"award-info":[{"award-number":["833611"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["833611"],"award-info":[{"award-number":["833611"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["833611"],"award-info":[{"award-number":["833611"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["833611"],"award-info":[{"award-number":["833611"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"name":"FEDER and Secretaria d\u2019Universitats i Recerca del Departament d\u2019Empresa i Coneixement de la Generalitat de Catalunya","award":["2017-00376"],"award-info":[{"award-number":["2017-00376"]}]},{"name":"ERDF and the Spanish Government","award":["TEC2016-79988-P"],"award-info":[{"award-number":["TEC2016-79988-P"]}]},{"name":"ERDF and the Spanish Government","award":["PID2019-106808RA-I00 AEI\/FEDER"],"award-info":[{"award-number":["PID2019-106808RA-I00 AEI\/FEDER"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The main goal of the H2020-CARAMEL project is to address the cybersecurity gaps introduced by the new technological domains adopted by modern vehicles applying, among others, advanced Artificial Intelligence and Machine Learning techniques. As a result, CARAMEL enhances the protection against threats related to automated driving, smart charging of Electric Vehicles, and communication among vehicles or between vehicles and the roadside infrastructure. This work focuses on the latter and presents the CARAMEL architecture aiming at assessing the integrity of the information transmitted by vehicles, as well as at improving the security and privacy of communication for connected and autonomous driving. The proposed architecture includes: (1) multi-radio access technology capabilities, with simultaneous 802.11p and LTE-Uu support, enabled by the connectivity infrastructure; (2) a MEC platform, where, among others, algorithms for detecting attacks are implemented; (3) an intelligent On-Board Unit with anti-hacking features inside the vehicle; (4) a Public Key Infrastructure that validates in real-time the integrity of vehicle\u2019s data transmissions. As an indicative application, the interaction between the entities of the CARAMEL architecture is showcased in case of a GPS spoofing attack scenario. Adopted attack detection techniques exploit robust in-vehicle and cooperative approaches that do not rely on encrypted GPS signals, but only on measurements available in the CARAMEL architecture.<\/jats:p>","DOI":"10.1186\/s13638-021-01971-x","type":"journal-article","created":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T16:03:16Z","timestamp":1620144196000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["CARAMEL: results on a secure architecture for connected and autonomous vehicles detecting GPS spoofing attacks"],"prefix":"10.1186","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1407-4022","authenticated-orcid":false,"given":"Christian","family":"Vitale","sequence":"first","affiliation":[]},{"given":"Nikos","family":"Piperigkos","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Laoudias","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Ellinas","sequence":"additional","affiliation":[]},{"given":"Jordi","family":"Casademont","sequence":"additional","affiliation":[]},{"given":"Josep","family":"Escrig","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Kloukiniotis","sequence":"additional","affiliation":[]},{"given":"Aris S.","family":"Lalos","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Moustakas","sequence":"additional","affiliation":[]},{"given":"Rodrigo","family":"Diaz Rodriguez","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Ba\u00f1os","sequence":"additional","affiliation":[]},{"given":"Gemma","family":"Roqueta Crusats","sequence":"additional","affiliation":[]},{"given":"Petros","family":"Kapsalas","sequence":"additional","affiliation":[]},{"given":"Klaus-Peter","family":"Hofmann","sequence":"additional","affiliation":[]},{"given":"Pouria Sayyad","family":"Khodashenas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,4]]},"reference":[{"key":"1971_CR1","doi-asserted-by":"publisher","first-page":"101823","DOI":"10.1016\/j.adhoc.2018.12.006","volume":"90","author":"J Cui","year":"2019","unstructured":"J. Cui, L.S. Liew, G. Sabaliauskaite, F. Zhou, A review on safety failures, security attacks, and available countermeasures for autonomous vehicles. Ad Hoc Netw. 90, 101823 (2019)","journal-title":"Ad Hoc Netw."},{"issue":"2","key":"1971_CR2","first-page":"53","volume":"1","author":"MN Mejri","year":"2014","unstructured":"M.N. Mejri, J. Ben-Othman, M. Hamdi, Survey on VANET security challenges and possible cryptographic solutions. Veh. Commun. 1(2), 53\u201366 (2014)","journal-title":"Veh. Commun."},{"key":"1971_CR3","doi-asserted-by":"crossref","unstructured":"C. Vitale, N. Piperigkos, C. Laoudias, G. Ellinas, J. Casademont, P.S. Khodashenas, A. Kloukiniotis, A.S. Lalos, K. Moustakas, P.B. Lobato et al., The CARAMEL project: a secure architecture for connected and autonomous vehicles, in 2020 European Conference on Networks and Communications (EuCNC), IEEE, pp. 133\u2013138 (2020)","DOI":"10.1109\/EuCNC48522.2020.9200945"},{"key":"1971_CR4","doi-asserted-by":"publisher","unstructured":"K. Deepa Thilak, A. Amuthan, DoS attack on VANET routing and possible defending solutions\u2014a survey, in 2016 International Conference on Information Communication and Embedded Systems, ICICES 2016 (Icices), pp. 1\u20137 (2016). https:\/\/doi.org\/10.1109\/ICICES.2016.7518892","DOI":"10.1109\/ICICES.2016.7518892"},{"issue":"3","key":"1971_CR5","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1109\/JSYST.2012.2231792","volume":"8","author":"MC Chuang","year":"2014","unstructured":"M.C. Chuang, J.F. Lee, TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst. J. 8(3), 749\u2013758 (2014). https:\/\/doi.org\/10.1109\/JSYST.2012.2231792","journal-title":"IEEE Syst. J."},{"key":"1971_CR6","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.peva.2015.01.003","volume":"87","author":"L Mokdad","year":"2015","unstructured":"L. Mokdad, J. Ben-Othman, A.T. Nguyen, DJAVAN: detecting jamming attacks in vehicle ad hoc Networks. Perform. Eval. 87, 47\u201359 (2015). https:\/\/doi.org\/10.1016\/j.peva.2015.01.003","journal-title":"Perform. Eval."},{"key":"1971_CR7","doi-asserted-by":"publisher","unstructured":"W. Whyte, A. Weimerskirch, V. Kumar, T. Hehn, A security credential management system for V2V communications, in IEEE Vehicular Networking Conference, VNC, pp. 1\u20138 (2013). https:\/\/doi.org\/10.1109\/VNC.2013.6737583","DOI":"10.1109\/VNC.2013.6737583"},{"issue":"1","key":"1971_CR8","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/TMC.2011.246","volume":"12","author":"A Wasef","year":"2013","unstructured":"A. Wasef, X.S. Shen, EMAP: expedite message authentication protocol for vehicular ad hoc networks. IEEE Trans. Mob. Comput. 12(1), 78\u201389 (2013). https:\/\/doi.org\/10.1109\/TMC.2011.246","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"4","key":"1971_CR9","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1109\/TPDS.2014.2308215","volume":"26","author":"J Li","year":"2014","unstructured":"J. Li, H. Lu, M. Guizani, Acpn: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 26(4), 938\u2013948 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"1971_CR10","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1109\/TSG.2013.2284438","volume":"5","author":"L Liu","year":"2014","unstructured":"L. Liu, M. Esmalifalak, Q. Ding, V.A. Emesih, Z. Han, Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans. Smart Grid 5(2), 612\u2013621 (2014). https:\/\/doi.org\/10.1109\/TSG.2013.2284438","journal-title":"IEEE Trans. Smart Grid"},{"key":"1971_CR11","unstructured":"R. Riebl, C. Obermaier, S. Neumeier, C. Facchi, Vanetza: Boosting research on inter-vehicle communication, in Proceedings of the 5th GI\/ITG KuVS Fachgespr\u00e4ch Inter-Vehicle Communication (FG-IVC), pp. 37\u201340 (2017)"},{"key":"1971_CR12","unstructured":"T. ETSI, ETSI TS 102 941 v1. 3.1-intelligent transport systems (ITS); security; trust and privacy management,\u201d Standard, TC ITS (2019)"},{"issue":"5","key":"1971_CR13","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1109\/TMC.2013.27","volume":"13","author":"S Uppoor","year":"2013","unstructured":"S. Uppoor, O. Trullols-Cruces, M. Fiore, J.M. Barcelo-Ordinas, Generation and analysis of a large-scale urban vehicular mobility dataset. IEEE Trans. Mobile Comput. 13(5), 1061\u20131075 (2013)","journal-title":"IEEE Trans. Mobile Comput."},{"issue":"2","key":"1971_CR14","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1511\/2009.77.126","volume":"97","author":"TP Hill","year":"2009","unstructured":"T.P. Hill, Knowing when to stop: how to gamble if you must-the mathematics of optimal stopping. Am. Sci. 97(2), 126\u2013133 (2009)","journal-title":"Am. Sci."},{"key":"1971_CR15","doi-asserted-by":"crossref","unstructured":"N.O. Tippenhauer, C. P\u00f6pper, K.B. Rasmussen, S. Capkun, On the requirements for successful GPS spoofing attacks, in Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 75\u201386 (2011)","DOI":"10.1145\/2046707.2046719"},{"key":"1971_CR16","unstructured":"I. Fernandez-Hernandez, G. Vecchione, F. D\u00edaz-Pulido, Galileo authentication: a programme and policy perspective, in 69th International Astronautical Congress (2018)"},{"key":"1971_CR17","unstructured":"P. Gutierrez, Galileo to Transmit Open Service Authentication (Inside GNSS, 2020)"},{"issue":"6","key":"1971_CR18","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1109\/TCST.2006.886439","volume":"15","author":"S Rezaei","year":"2007","unstructured":"S. Rezaei, R. Sengupta, Kalman filter-based integration of DGPS and vehicle sensors for localization. IEEE Trans. Control Syst. Technol. 15(6), 1080\u20131088 (2007)","journal-title":"IEEE Trans. Control Syst. Technol."},{"key":"1971_CR19","doi-asserted-by":"crossref","unstructured":"N. Souli, P. Kolios, G. Ellinas, Relative positioning of autonomous systems using signals of opportunity, in 2020 IEEE 91st Vehicular Technology Conference (VTC Spring), IEEE, pp. 1\u20136 (2020)","DOI":"10.1109\/VTC2020-Spring48590.2020.9128912"},{"issue":"1","key":"1971_CR20","doi-asserted-by":"publisher","first-page":"33","DOI":"10.5081\/jgps.9.1.33","volume":"9","author":"A Almagbile","year":"2010","unstructured":"A. Almagbile, J. Wang, W. Ding, Evaluating the performances of adaptive Kalman filter methods in GPS\/INS integration. J. Global Position. Syst. 9(1), 33\u201340 (2010)","journal-title":"J. Global Position. Syst."},{"key":"1971_CR21","unstructured":"A. Dosovitskiy, G. Ros, F. Codevilla, A. Lopez, V. Koltun, CARLA: An open urban driving simulator, in Conference on Robot Learning, pp. 1\u201316 (2017)"},{"key":"1971_CR22","doi-asserted-by":"publisher","unstructured":"H. Kim, S.H. Lee, S. Kim, Cooperative localization with distributed ADMM over 5G-based VANETs, in 2018 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1\u20135 (2018). https:\/\/doi.org\/10.1109\/WCNC.2018.8377454","DOI":"10.1109\/WCNC.2018.8377454"},{"key":"1971_CR23","doi-asserted-by":"crossref","unstructured":"A. Bahr, M.R. Walter, J.J. Leonard, Consistent cooperative localization, in 2009 IEEE International Conference on Robotics and Automation, IEEE, pp. 3415\u20133422 (2009)","DOI":"10.1109\/ROBOT.2009.5152859"},{"key":"1971_CR24","unstructured":"M. Grant, S. Boyd, CVX: Matlab software for disciplined convex programming, version 2.1 (2014)"},{"key":"1971_CR25","unstructured":"O. Sorkine, Laplacian mesh processing, in 26th Annual Conference of the European Association for Computer Graphics. Eurographics 2005 - State of the Art Reports, vol. 29, pp. 53\u201370 (2005)"},{"key":"1971_CR26","doi-asserted-by":"crossref","unstructured":"N. Piperigkos, A.S. Lalos, K. Berberidis, Graph based cooperative localization for connected and semi-autonomous vehicles. in 2020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), IEEE, pp. 1\u20136 (2020)","DOI":"10.1109\/CAMAD50429.2020.9209312"},{"key":"1971_CR27","doi-asserted-by":"crossref","unstructured":"N. Piperigkos, A.S. Lalos, K. Berberidis, C. Anagnostopoulos, Cooperative multi-modal localization in connected and autonomous vehicles, in 2020 IEEE 3rd Connected and Automated Vehicles Symposium (CAVS), IEEE, pp. 1\u20135","DOI":"10.1109\/CAVS51000.2020.9334558"},{"key":"1971_CR28","doi-asserted-by":"crossref","unstructured":"N. Piperigkos, A.S. Lalos, K. Berberidis, C. Laoudias, K. Moustakas, 5g enabled cooperative localization of connected and semi-autonomous vehicles via sparse Laplacian processing. in 2020 22nd International Conference on Transparent Optical Networks (ICTON), IEEE, pp. 1\u20134 (2020)","DOI":"10.1109\/ICTON51198.2020.9203314"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-021-01971-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-021-01971-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-021-01971-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T16:24:44Z","timestamp":1620145484000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-021-01971-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,4]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["1971"],"URL":"https:\/\/doi.org\/10.1186\/s13638-021-01971-x","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,4]]},"assertion":[{"value":"31 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"115"}}