{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T15:56:24Z","timestamp":1681746984529},"reference-count":23,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,2,1]]},"DOI":"10.1587\/transinf.2019inp0010","type":"journal-article","created":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T22:10:03Z","timestamp":1580508603000},"page":"256-264","source":"Crossref","is-referenced-by-count":1,"title":["Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Na","family":"RUAN","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Chunhua","family":"SU","sequence":"additional","affiliation":[{"name":"University of Aizu"}]},{"given":"Chi","family":"XIE","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] L. Xu, L.Y. Wang, G. Yin, and H. Zhang, \u201cCommunication information structures and contents for enhanced safety of highway vehicle platoons,\u201d IEEE Trans. Veh. Technol., vol.63, no.9, pp.4206-4220, 2014. 10.1109\/tvt.2014.2311384","DOI":"10.1109\/TVT.2014.2311384"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] M. Amoozadeh, A. Raghuramu, C.-N. Chuah, D. Ghosal, H.M. Zhang, J. Rowe, and K. Levitt, \u201cSecurity Vulnerabilities of Connected Vehicle Streams and Their Impact on Cooperative Driving,\u201d IEEE Commun. Mag., vol.53, no.6, pp.126-132, 2015. 10.1109\/mcom.2015.7120028","DOI":"10.1109\/MCOM.2015.7120028"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] S. Dadras, R.M. Gerdes, and R. Sharma, \u201cVehicular Platooning in an Adversarial Environment,\u201d Proc. 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS), pp.167-178, 2015. 10.1145\/2714576.2714619","DOI":"10.1145\/2714576.2714619"},{"key":"4","unstructured":"[4] D.B. Bruce, W. Sean, S. Bruno, and T. Patrick, \u201cIs your commute driving you crazy?: A study of misbehavior in vehicular platoons,\u201d Proc. 8th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks (ACM WiSec), p.22, 2015."},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] M.H. Manshaei, Q. Zhu, T. Alpcan, T. Basar, and J.-P. Hubaux, \u201cGame theory meets network security and privacy,\u201d ACM Computing Surveys (CSUR), vol.45, no.3, p.25, 2013. 10.1145\/2480741.2480742","DOI":"10.1145\/2480741.2480742"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] M. Li, N. Ruan, H. Zhu, J. Li, and X. Li, \u201cA Paralleling Broadcast Authentication Protocol for Sparse RSUs in Internet of Vehicles,\u201d Proc. 10th International Conference on Mobile Ad-hoc and Sensor Networks (MSN), pp.58-65, 2014. 10.1109\/msn.2014.15","DOI":"10.1109\/MSN.2014.15"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] X. Li, N. Ruan, F. Wu, J. Li, and M. Li, \u201cEfficient and enhanced broadcast authentication protocols based on multilevel \u00b5TESLA,\u201d Proc. IEEE International Performance Computing and Communications Conference (IPCCC), pp.1-8, 2014. 10.1109\/pccc.2014.7017109","DOI":"10.1109\/PCCC.2014.7017109"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] R. Shokri, G. Theodorakopoulos, J.-Y.L. Boudec, and J.-P. Hubaux, \u201cQuantifying location privacy,\u201d IEEE Symposium on Security and Privacy (SP), pp.247-262, 2011. 10.1109\/sp.2011.18","DOI":"10.1109\/SP.2011.18"},{"key":"9","unstructured":"[9] D. Fudenberg and J. Tirole, Game Theory, 6th ed., MIT Press, Cambridge, 1991."},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] X. Lin and X. Li, \u201cAchieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks,\u201d IEEE Trans. Veh. Technol., vol.62, no.7, pp.3339-3348, 2013. 10.1109\/tvt.2013.2257188","DOI":"10.1109\/TVT.2013.2257188"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] Y. Hao, Y. Cheng, C. Zhou, and W. Song, \u201cA distributed key management framework with cooperative message authentication in VANETs,\u201d IEEE J. Sel. Areas Commun., vol.29, no.3, pp.616-629, 2011. 10.1109\/jsac.2011.110311","DOI":"10.1109\/JSAC.2011.110311"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] Y. Hao, T. Han, and Y. Cheng, \u201cA cooperative message authentication protocol in VANETs,\u201d Proc. Global Communications Conference (GLOBECOM), pp.5562-5566, 2012. 10.1109\/glocom.2012.6504006","DOI":"10.1109\/GLOCOM.2012.6504006"},{"key":"13","unstructured":"[13] Y. Guo, L. Yin, L. Liu, and B. Fang, \u201cUtility-based Cooperative Decision in Cooperative Authentication,\u201d Proc. 33rd Annual IEEE International Conference on Computer Communications (INFOCOM14), pp.1006-1014, 2014. 10.1109\/infocom.2014.6848030"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] T. Alpcan and S. Buchegger, \u201cSecurity games for vehicular networks,\u201d IEEE Trans. Mobile Comput., vol.10, no.2, pp.280-290, 2011. 10.1109\/tmc.2010.146","DOI":"10.1109\/TMC.2010.146"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] M. Prabhakar, J.N. Singh, and G. Mahadevan, \u201cDefensive Mechanism for VANET security in game theoretic approach using heuristic based ant colony optimization,\u201d Proc. International Conference on Computer Communication and Informatics (ICCCI), pp.1-7, 2013. 10.1109\/iccci.2013.6466118","DOI":"10.1109\/ICCCI.2013.6466118"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] C. Zhang, X. Lin, R. Lu, P.-H. Ho, and X. Shen, \u201cAn efficient message authentication scheme for vehicular communications,\u201d IEEE Trans. Veh. Technol., vol.57, no.6, pp.3357-3368, 2008. 10.1109\/tvt.2008.928581","DOI":"10.1109\/TVT.2008.928581"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] T. Chen, L. Wu, F. Wu, and S. Zhong, \u201cStimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach,\u201d IEEE Trans. Veh. Technol., vol.60, no.2, pp.566-579, Feb. 2011. 10.1109\/tvt.2010.2093587","DOI":"10.1109\/TVT.2010.2093587"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] Y. Wang, F.R. Yu, M. Huang, A. Boukerche, and T. Chen, \u201cSecuring vehicular ad hoc networks with mean field game theory,\u201d Proc. 3rd ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications (DIVANet 13), pp.55-60, 2013. 10.1145\/2512921.2512936","DOI":"10.1145\/2512921.2512936"},{"key":"19","unstructured":"[19] B. LSlantchev, \u201cGame theory: Repeated games,\u201d Tech. Rep., Department of Political Science, University of California-San Diego, pp.1-19, March 2004."},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] J. Freudiger, M.H. Manshaei, J.-P. Hubaux, and D.C. Parkes, \u201cNon-Cooperative Location Privacy,\u201d IEEE Transactions on Dependable and Secure Computing, vol.10, no.2, pp.84-98, 2013. 10.1109\/tdsc.2012.85","DOI":"10.1109\/TDSC.2012.85"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] M. Prabhakar, J.N. Singh, and G. Mahadevan, \u201cNash Equilibrium and Marcov Chains to Enhance Game Theoretic Approach for Vanet Security,\u201d Proc. International Conference on Advances in Computing (ICAdC), pp.191-199, 2013. 10.1007\/978-81-322-0740-5_24","DOI":"10.1007\/978-81-322-0740-5_24"},{"key":"22","unstructured":"[22] D.T. Hoang, X. Lu, D. Niyato, P. Wang, and Z. Han, \u201cApplications of repeated games in wireless networks: A survey,\u201d arXiv:1501.02886v1, Jan. 2015."},{"key":"23","unstructured":"[23] T. Tithi, R. Gerdes, and C. Winstead, \u201cPoster: Position verification in vehicular platoons using a Euclidean distance matrix,\u201d Proc. Symp. Security and Privacy, May 2015."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/2\/E103.D_2019INP0010\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T03:27:18Z","timestamp":1580527638000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/2\/E103.D_2019INP0010\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,1]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019inp0010","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,1]]}}}