{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:19:15Z","timestamp":1759133955079,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.23919\/wmnc.2018.8480909","type":"proceedings-article","created":{"date-parts":[[2018,10,4]],"date-time":"2018-10-04T18:31:08Z","timestamp":1538677868000},"page":"1-8","source":"Crossref","is-referenced-by-count":10,"title":["BOTVEILLANCE: A Vehicular Botnet Surveillance Attack against Pseudonymous Systems in VANETs"],"prefix":"10.23919","author":[{"given":"Mevlut Turker","family":"Garip","sequence":"first","affiliation":[]},{"given":"Peter","family":"Reiher","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Gerla","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"IEEE standards","article-title":"Wireless access in vehicular environments","year":"2010","key":"ref30"},{"key":"ref10","article-title":"Congestion attacks to autonomous cars using vehicular botnets","author":"garip","year":"2015","journal-title":"NDSS"},{"key":"ref11","article-title":"Interloc: An interference-aware rssi-based localization and sybil attack detection mechanism for vehicular ad hoc networks","author":"garip","year":"2017","journal-title":"IEEE CCNC"},{"key":"ref12","article-title":"Ghost: Concealing vehicular botnet communication in the vanet control channel","author":"garip","year":"2016","journal-title":"IEEE IWCMC"},{"key":"ref13","article-title":"Privacy in vanets using changing pseudonyms-ideal and real","author":"gerlach","year":"2007","journal-title":"IEEE VTC"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.62"},{"key":"ref15","article-title":"Towards modeling wireless location privacy","author":"huang","year":"2005","journal-title":"International Workshop on Privacy Enhancing Technologies"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179605"},{"key":"ref17","article-title":"Vclt: An accurate trajectory tracking attack based on crowdsourcing in vanets","author":"lin","year":"2015","journal-title":"ICA3PP"},{"key":"ref18","article-title":"An analytical model for random changing pseudonyms scheme in vanets","author":"pan","year":"2011","journal-title":"IEEE NCIS"},{"key":"ref19","article-title":"Connected vehicles: Surveillance threat and mitigation","author":"petit","year":"2015","journal-title":"Black Hat Europe'06"},{"year":"2014","key":"ref28","article-title":"Mitigation strategies for design exceptions"},{"key":"ref4","article-title":"Location tracking attack in ad hoc networks based on topology information","author":"chapkin","year":"2006","journal-title":"IEEE MASS"},{"journal-title":"DOT HS 811 059","article-title":"National motor vehicle crash causation survey","year":"2008","key":"ref27"},{"article-title":"2016 year end u.s. vehicle sales rankings","year":"2017","author":"cain","key":"ref3"},{"key":"ref6","article-title":"Pseudonym based mechanism for sustaining privacy in vanets","author":"chaurasia","year":"2009","journal-title":"IEEE CICSYN"},{"key":"ref29","first-page":"163","article-title":"A classification of location privacy attacks and approaches","volume":"18","author":"wernke","year":"2014","journal-title":"JPUC"},{"key":"ref5","first-page":"136","article-title":"Optimizing pseudonym updation in vehicular ad-hoc networks","author":"chaurasia","year":"2009","journal-title":"Transactions on Computational Science IV"},{"key":"ref8","article-title":"Strong and affordable location privacy in vanets: Identity diffusion using time-slots and swapping","author":"eckhoff","year":"2010","journal-title":"IEEE VNC"},{"key":"ref7","article-title":"Simulation of obfuscation and negotiation for location privacy","author":"duckham","year":"2005","journal-title":"COSIT"},{"key":"ref2","article-title":"On the effectiveness of changing pseudonyms to provide location privacy in vanets","author":"butty\u00e1n","year":"2007","journal-title":"ESAS"},{"key":"ref9","article-title":"Mix-zones for location privacy in vehicular networks","author":"freudiger","year":"2007","journal-title":"ACM Win-ITS"},{"key":"ref1","article-title":"Track me if you can: On the effectiveness of context-based identifier changes in deployed mobile networks","author":"bilogrevic","year":"2012","journal-title":"NDSS"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2345420"},{"key":"ref22","article-title":"Amoeba: Robust location privacy scheme for vanet","volume":"25","author":"sampigethaya","year":"2007","journal-title":"IEEE JSAC"},{"article-title":"Car hacking code released at defcon","year":"2013","author":"rosenblatt","key":"ref21"},{"article-title":"Veins: Vehicles in network simulation","year":"2015","author":"sommer","key":"ref24"},{"article-title":"Driverless car could be hacked by 14-year-old from indonesia, senator warns","year":"2013","author":"smith","key":"ref23"},{"key":"ref26","first-page":"3589","article-title":"An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications","volume":"59","author":"sun","year":"2010","journal-title":"IEEE TVT"},{"key":"ref25","article-title":"Tacking together efficient authentication, revocation, and privacy in vanets","author":"studer","year":"2009","journal-title":"IEEE SECON"}],"event":{"name":"2018 11th IFIP Wireless and Mobile Networking Conference (WMNC)","start":{"date-parts":[[2018,9,3]]},"location":"Prague","end":{"date-parts":[[2018,9,5]]}},"container-title":["2018 11th IFIP Wireless and Mobile Networking Conference (WMNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8467756\/8480841\/08480909.pdf?arnumber=8480909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T04:44:52Z","timestamp":1643172292000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8480909\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.23919\/wmnc.2018.8480909","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}