{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T09:09:46Z","timestamp":1726477786802},"reference-count":139,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,3,10]],"date-time":"2024-03-10T00:00:00Z","timestamp":1710028800000},"content-version":"am","delay-in-days":283,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Vehicular Communications"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1016\/j.vehcom.2023.100586","type":"journal-article","created":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T23:07:03Z","timestamp":1677712023000},"page":"100586","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":10,"special_numbering":"C","title":["A survey on misbehavior detection for connected and autonomous vehicles"],"prefix":"10.1016","volume":"41","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-2423-646X","authenticated-orcid":false,"given":"Mohammed Lamine","family":"Bouchouia","sequence":"first","affiliation":[]},{"given":"Houda","family":"Labiod","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3171-9363","authenticated-orcid":false,"given":"Ons","family":"Jelassi","sequence":"additional","affiliation":[]},{"given":"Jean-Philippe","family":"Monteuuis","sequence":"additional","affiliation":[]},{"given":"Wafa Ben","family":"Jaballah","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Petit","sequence":"additional","affiliation":[]},{"given":"Zonghua","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.vehcom.2023.100586_br0010","series-title":"Digital Marketplaces Unleashed","first-page":"427","article-title":"An overview of technology, benefits and impact of automated and autonomous driving on the automotive industry","author":"Brenner","year":"2018"},{"key":"10.1016\/j.vehcom.2023.100586_br0020","series-title":"Black Hat Europe, vol. 11","first-page":"2015","article-title":"Remote attacks on automated vehicles sensors: experiments on camera and lidar","author":"Petit","year":"2015"},{"key":"10.1016\/j.vehcom.2023.100586_br0030","series-title":"Etsi tr 103 460 v2.1.1 (2020-10): Intelligent transport systems (its); security; pre-standardization study on misbehaviour detection; release","author":"ETSI","year":"22020"},{"key":"10.1016\/j.vehcom.2023.100586_br0040","author":"ISO"},{"key":"10.1016\/j.vehcom.2023.100586_br0050","series-title":"Information Systems Design and Intelligent Applications","article-title":"A detailed survey on misbehavior node detection techniques in vehicular ad hoc networks","author":"Khan","year":"2015"},{"key":"10.1016\/j.vehcom.2023.100586_br0060","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.adhoc.2017.03.006","article-title":"A survey of attacks and detection mechanisms on intelligent transportation systems: vanets and iov","volume":"61","author":"Sakiz","year":"2017","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.vehcom.2023.100586_br0070","author":"Hindy"},{"issue":"1","key":"10.1016\/j.vehcom.2023.100586_br0080","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1186\/s13638-018-1064-y","article-title":"A survey of local\/cooperative-based malicious information detection techniques in vanets","volume":"2018","author":"Arshad","year":"2018","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"10.1016\/j.vehcom.2023.100586_br0090","series-title":"2018 IEEE Intelligent Vehicles Symposium (IV)","first-page":"421","article-title":"A survey of anomaly detection for connected vehicle cybersecurity and safety","author":"Rajbahadur","year":"2018"},{"key":"10.1016\/j.vehcom.2023.100586_br0100","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2018.12.006","article-title":"A review on safety failures, security attacks, and available countermeasures for autonomous vehicles","volume":"90","author":"Cui","year":"2019","journal-title":"Ad Hoc Netw."},{"issue":"1","key":"10.1016\/j.vehcom.2023.100586_br0110","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1109\/COMST.2018.2873088","article-title":"Survey on misbehavior detection in cooperative intelligent transportation systems","volume":"21","author":"van der Heijden","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"5","key":"10.1016\/j.vehcom.2023.100586_br0120","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3337791","article-title":"Security modeling of autonomous systems: a survey","volume":"52","author":"Jahan","year":"2019","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.vehcom.2023.100586_br0130","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.comcom.2020.02.008","article-title":"Machine learning models for secure data analytics: a taxonomy and threat model","volume":"153","author":"Gupta","year":"2020","journal-title":"Comput. Commun."},{"key":"10.1016\/j.vehcom.2023.100586_br0140","series-title":"International Conference on Security and Privacy in Communication Systems","first-page":"318","article-title":"Veremi: a dataset for comparable evaluation of misbehavior detection in vanets","author":"van der Heijden","year":"2018"},{"issue":"3","key":"10.1016\/j.vehcom.2023.100586_br0150","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.dcan.2017.03.001","article-title":"Using discriminant analysis to detect intrusions in external communication for self-driving vehicles","volume":"3","author":"Alheeti","year":"2017","journal-title":"Dig. Commun. Netw."},{"key":"10.1016\/j.vehcom.2023.100586_br0160","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.compeleceng.2015.02.018","article-title":"An accurate and efficient collaborative intrusion detection framework to secure vehicular networks","volume":"43","author":"Sedjelmaci","year":"2015","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.vehcom.2023.100586_br0170","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.eswa.2015.12.006","article-title":"Ceap: Svm-based intelligent detection model for clustered vehicular ad hoc networks","volume":"50","author":"Wahab","year":"2016","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.vehcom.2023.100586_br0180","series-title":"2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS)","first-page":"19","article-title":"Collaborative security attack detection in software-defined vehicular networks","author":"Kim","year":"2017"},{"key":"10.1016\/j.vehcom.2023.100586_br0190","series-title":"2017 IEEE Wireless Communications and Networking Conference (WCNC)","first-page":"1","article-title":"Support vector machine (svm) based sybil attack detection in vehicular networks","author":"Gu","year":"2017"},{"key":"10.1016\/j.vehcom.2023.100586_br0200","article-title":"Classifying malicious nodes in vanets using support vector machines with modified fading memory","author":"Sharanya","year":"2017","journal-title":"ARPN J. Eng. Appl. Sci."},{"key":"10.1016\/j.vehcom.2023.100586_br0210","series-title":"2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA)","first-page":"564","article-title":"Integrating plausibility checks and machine learning for misbehavior detection in vanet","author":"So","year":"2018"},{"key":"10.1016\/j.vehcom.2023.100586_br0220","series-title":"International Conference on Smart Computing and Communication","first-page":"417","article-title":"Senior2local: a machine learning based intrusion detection method for vanets","author":"Zeng","year":"2018"},{"key":"10.1016\/j.vehcom.2023.100586_br0230","series-title":"Vehicular Networking Conference (VNC)","article-title":"Misbehavior detection in c-its: a comparative approach of local detection mechanisms","author":"Kamel","year":"2019"},{"key":"10.1016\/j.vehcom.2023.100586_br0240","series-title":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks","first-page":"84","article-title":"Physical layer plausibility checks for misbehavior detection in v2x networks","author":"So","year":"2019"},{"key":"10.1016\/j.vehcom.2023.100586_br0250","series-title":"International Conference on Security & Privacy","first-page":"166","article-title":"Machine learning based approach to detect position falsification attack in vanets","author":"Singh","year":"2019"},{"key":"10.1016\/j.vehcom.2023.100586_br0260","series-title":"2019 IEEE 2nd Connected and Automated Vehicles Symposium (CAVS)","first-page":"1","article-title":"Location anomalies detection for connected and autonomous vehicles","author":"Wang","year":"2019"},{"key":"10.1016\/j.vehcom.2023.100586_br0270","first-page":"04003","article-title":"Sensor Fault Detection and Diagnosis for Autonomous Vehicles","volume":"vol. 30","author":"Realpe","year":"2015"},{"key":"10.1016\/j.vehcom.2023.100586_br0280","series-title":"2015 Sixth International Conference on Emerging Security Technologies (EST)","first-page":"86","article-title":"An intrusion detection system against black hole attacks on the communication network of self-driving cars","author":"Alheeti","year":"2015"},{"key":"10.1016\/j.vehcom.2023.100586_br0290","series-title":"Application, Information and Network Security (AINS), 2017 IEEE Conference on","first-page":"13","article-title":"An effective misbehavior detection model using artificial neural network for vehicular ad hoc network applications","author":"Ghaleb","year":"2017"},{"key":"10.1016\/j.vehcom.2023.100586_br0300","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.future.2017.12.008","article-title":"A game theory based multi layered intrusion detection framework for vanet","volume":"82","author":"Subba","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.vehcom.2023.100586_br0310","series-title":"International Conference on Intelligent Systems Design and Applications","first-page":"641","article-title":"Misbehavior detection in c-its using deep learning approach","author":"Singh","year":"2018"},{"key":"10.1016\/j.vehcom.2023.100586_br0320","series-title":"2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)","first-page":"288","article-title":"Deepvcm: a deep learning based intrusion detection method in vanet","author":"Zeng","year":"2019"},{"key":"10.1016\/j.vehcom.2023.100586_br0330","article-title":"Real-time sensor anomaly detection and identification in automated vehicles","author":"van Wyk","year":"2019","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.vehcom.2023.100586_br0340","series-title":"International Conference on Advanced Computing, Networking and Security","first-page":"602","article-title":"Misbehavior detection based on ensemble learning in vanet","author":"Grover","year":"2011"},{"key":"10.1016\/j.vehcom.2023.100586_br0350","series-title":"Vehicular Ad-Hoc Networks for Smart Cities","first-page":"73","article-title":"Towards a reliable machine learning-based global misbehavior detection in c\u2013its: model evaluation approach","author":"Mahmoudi","year":"2020"},{"key":"10.1016\/j.vehcom.2023.100586_br0360","series-title":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","first-page":"1","article-title":"\u201cMy autonomous car is an elephant\u201d: a machine learning based detector for implausible dimension","author":"Monteuuis","year":"2018"},{"issue":"4","key":"10.1016\/j.vehcom.2023.100586_br0370","doi-asserted-by":"crossref","first-page":"148","DOI":"10.3390\/info10040148","article-title":"Survey and classification of automotive security attacks","volume":"10","author":"Sommer","year":"2019","journal-title":"Information"},{"key":"10.1016\/j.vehcom.2023.100586_br0380","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.adhoc.2018.10.002","article-title":"A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles","volume":"84","author":"Loukas","year":"2019","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.vehcom.2023.100586_br0390","series-title":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","article-title":"Catch: a confidence range tolerant misbehavior detection approach","author":"Kamel","year":"2019"},{"key":"10.1016\/j.vehcom.2023.100586_br0400","series-title":"ICC 2019-2019 IEEE International Conference on Communications (ICC)","first-page":"1","article-title":"Misbehavior detection using machine learning in vehicular communication networks","author":"Gyawali","year":"2019"},{"key":"10.1016\/j.vehcom.2023.100586_br0410","series-title":"Artificial intelligence and cybersecurity: Building an automotive cybersecurity framework using machine learning algorithms","author":"Kaja","year":"2019"},{"key":"10.1016\/j.vehcom.2023.100586_br0420","series-title":"3016: 2021 taxonomy and definitions for terms related to driving automation systems for on-road motor vehicles","author":"SAE","year":"2021"},{"key":"10.1016\/j.vehcom.2023.100586_br0430","series-title":"Resilience by design & failures forecasting for a connected autonomous vehicle","author":"Monteuuis","year":"2020"},{"key":"10.1016\/j.vehcom.2023.100586_br0440","series-title":"European standard 302 637-2 v1. 3.1-intelligent transport systems (its); vehicular communications; basic set of applications; part 2: Specification of cooperative awareness basic service","author":"ETSI","year":"2014"},{"key":"10.1016\/j.vehcom.2023.100586_br0450","series-title":"Technical report 103 300-1 v2.1.1-intelligent transport system (its); vulnerable road users (vru) awareness; part 1: Use cases definition","author":"ETSI","year":"2019"},{"key":"10.1016\/j.vehcom.2023.100586_br0460","series-title":"319 411-1 v1.2.2. Electronic signatures and infrastructures (esi); policy and security requirements for trust service providers issuing certificates; part 1: General requirements","author":"ETSI","year":"2018"},{"key":"10.1016\/j.vehcom.2023.100586_br0470","series-title":"ACM Computer Science in Car Symposium","article-title":"Attacker model for connected and automated vehicles","author":"Monteuuis","year":"2018"},{"key":"10.1016\/j.vehcom.2023.100586_br0480","series-title":"DEF CON, vol. 24","article-title":"Can you trust autonomous vehicles: contactless attacks against sensors of self-driving vehicle","author":"Yan","year":"2016"},{"issue":"11","key":"10.1016\/j.vehcom.2023.100586_br0490","doi-asserted-by":"crossref","first-page":"2898","DOI":"10.1109\/TITS.2017.2665968","article-title":"Cyber threats facing autonomous and connected vehicles: future challenges","volume":"18","author":"Parkinson","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"10.1016\/j.vehcom.2023.100586_br0500","first-page":"546","article-title":"Potential cyberattacks on automated vehicles","volume":"16","author":"Petit","year":"2014","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"1","key":"10.1016\/j.vehcom.2023.100586_br0510","doi-asserted-by":"crossref","first-page":"51","DOI":"10.3141\/2625-06","article-title":"Risk analysis of autonomous vehicles in mixed traffic streams","volume":"2625","author":"Bhavsar","year":"2017","journal-title":"Transp. Res. Rec."},{"key":"10.1016\/j.vehcom.2023.100586_br0520","first-page":"7","article-title":"Vanet security challenges and solutions: a survey","volume":"7","author":"Hasrouny","year":"2017","journal-title":"Veh. Commun."},{"key":"10.1016\/j.vehcom.2023.100586_br0530","series-title":"2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)","first-page":"164","article-title":"Autonomous vehicle security: a taxonomy of attacks and defences","author":"Thing","year":"2016"},{"key":"10.1016\/j.vehcom.2023.100586_br0540","series-title":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","first-page":"3","article-title":"Security automotive risk analysis method","author":"Monteuuis","year":"2018"},{"issue":"6","key":"10.1016\/j.vehcom.2023.100586_br0550","doi-asserted-by":"crossref","first-page":"2311","DOI":"10.1007\/s10270-021-00941-7","article-title":"A descriptive study of assumptions in stride security threat modeling","volume":"21","author":"Van Landuyt","year":"2022","journal-title":"Softw. Syst. Model."},{"key":"10.1016\/j.vehcom.2023.100586_br0560","series-title":"Systems security engineering: Considerations for a multidisciplinary approach in the engineering of trustworthy secure systems","author":"Ross","year":"2016"},{"key":"10.1016\/j.vehcom.2023.100586_br0570","series-title":"2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","first-page":"586","article-title":"Hands off the wheel in autonomous vehicles?: a systems perspective on over a million miles of field data","author":"Banerjee","year":"2018"},{"key":"10.1016\/j.vehcom.2023.100586_br0600","series-title":"Misbehavior detection and attacker identification in vehicular ad-hoc networks","author":"Bi\u00dfmeyer","year":"2014"},{"issue":"2","key":"10.1016\/j.vehcom.2023.100586_br0610","article-title":"Data verification and misbehavior detection in vehicular ad-hoc networks","volume":"73","author":"Ghaleb","year":"2015","journal-title":"J. Teknologi"},{"key":"10.1016\/j.vehcom.2023.100586_br0620","series-title":"A common language for computer security incidents","author":"Howard","year":"1998"},{"key":"10.1016\/j.vehcom.2023.100586_br0630","series-title":"Cybersecurity challenges in the uptake of artificial intelligence in autonomous driving, eur 30568 en, EUR 30568 EN","author":"Dede","year":"2021"},{"key":"10.1016\/j.vehcom.2023.100586_br0640","series-title":"2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR)","first-page":"194","article-title":"A review on cybersecurity vulnerabilities for unmanned aerial vehicles","author":"Krishna","year":"2017"},{"key":"10.1016\/j.vehcom.2023.100586_br0650","article-title":"Machine learning in iot security: current solutions and future challenges","author":"Hussain","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"10.1016\/j.vehcom.2023.100586_br0660","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0152173","article-title":"A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data","volume":"11","author":"Goldstein","year":"2016","journal-title":"PLoS ONE"},{"issue":"11","key":"10.1016\/j.vehcom.2023.100586_br0670","doi-asserted-by":"crossref","first-page":"117","DOI":"10.3390\/aerospace6110117","article-title":"Recent advances in anomaly detection methods applied to aviation","volume":"6","author":"Basora","year":"2019","journal-title":"Aerospace"},{"key":"10.1016\/j.vehcom.2023.100586_br0700","author":"Brockwell","year":"1987"},{"key":"10.1016\/j.vehcom.2023.100586_br0710","series-title":"2017 Third International Conference on Mobile and Secure Services (MobiSecServ)","first-page":"1","article-title":"k-nearest neighbours classification based sybil attack detection in vehicular networks","author":"Gu","year":"2017"},{"key":"10.1016\/j.vehcom.2023.100586_br0720","author":"Kosmanos"},{"issue":"8","key":"10.1016\/j.vehcom.2023.100586_br0730","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1109\/JSAC.2007.071006","article-title":"Eviction of misbehaving and faulty nodes in vehicular networks","volume":"25","author":"Raya","year":"2007","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"4","key":"10.1016\/j.vehcom.2023.100586_br0740","first-page":"101","article-title":"A novel distributed intrusion detection system for vehicular ad hoc networks","volume":"6","author":"Maglaras","year":"2015","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"10.1016\/j.vehcom.2023.100586_br0750","series-title":"Int. Conf. Adv. Veh. Syst., Technol. Appl.","first-page":"21","article-title":"A time-series clustering approach for sybil attack detection in vehicular ad hoc networks","author":"Dutta","year":"2013"},{"key":"10.1016\/j.vehcom.2023.100586_br0760","series-title":"2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)","first-page":"916","article-title":"An intrusion detection system against malicious attacks on the communication network of driverless cars","author":"Alheeti","year":"2015"},{"key":"10.1016\/j.vehcom.2023.100586_br0770","series-title":"2018 International Conference on Smart Communications in Network Technologies (SaCoNeT)","first-page":"200","article-title":"Fuzzy clustering for misbehaviour detection in vanet","author":"Amirat","year":"2018"},{"key":"10.1016\/j.vehcom.2023.100586_br0780","series-title":"Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data","first-page":"93","article-title":"Lof: identifying density-based local outliers","author":"Breunig","year":"2000"},{"key":"10.1016\/j.vehcom.2023.100586_br0790","series-title":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","first-page":"535","article-title":"Enhancing effectiveness of outlier detections for low density patterns","author":"Tang","year":"2002"},{"key":"10.1016\/j.vehcom.2023.100586_br0800","series-title":"Proceedings of the 18th ACM Conference on Information and Knowledge Management","first-page":"1649","article-title":"Loop: local outlier probabilities","author":"Kriegel","year":"2009"},{"issue":"5","key":"10.1016\/j.vehcom.2023.100586_br0810","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MCOM.2017.1600263","article-title":"Vehicular social networks: enabling smart mobility","volume":"55","author":"Ning","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.vehcom.2023.100586_br0820","article-title":"Malicious node detection scheme based on correlation of data and network topology in fog computing-based vanets","author":"Gu","year":"2020","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"11","key":"10.1016\/j.vehcom.2023.100586_br0830","doi-asserted-by":"crossref","first-page":"1927","DOI":"10.1109\/LCOMM.2019.2937097","article-title":"Attacker identification and intrusion detection for in-vehicle networks","volume":"23","author":"Ning","year":"2019","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.vehcom.2023.100586_br0840","series-title":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","first-page":"577","article-title":"Ranking outliers using symmetric neighborhood relationship","author":"Jin","year":"2006"},{"key":"10.1016\/j.vehcom.2023.100586_br0850","series-title":"Proceedings 19th International Conference on Data Engineering (Cat. No. 03CH37405)","first-page":"315","article-title":"Fast outlier detection using the local correlation integral","author":"Papadimitriou","year":"2003"},{"key":"10.1016\/j.vehcom.2023.100586_br0860","series-title":"10th European Congress on Embedded Real Time Software and Systems (ERTS 2020)","article-title":"Ontology based anomaly detection for cellular vehicular communications","author":"Ricard","year":"2020"},{"key":"10.1016\/j.vehcom.2023.100586_br0870","series-title":"Design and mitigation of vehicular botnets in vehicular ad hoc networks","author":"Garip","year":"2019"},{"issue":"11","key":"10.1016\/j.vehcom.2023.100586_br0880","doi-asserted-by":"crossref","DOI":"10.1177\/1550147718815845","article-title":"Automatic incident detection in smart city using multiple traffic flow parameters via v2x communication","volume":"14","author":"Iqbal","year":"2018","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"10.1016\/j.vehcom.2023.100586_br0890","series-title":"Detection of injection attacks on in-vehicle network using data analytics","author":"Dhulipala","year":"2018"},{"issue":"7","key":"10.1016\/j.vehcom.2023.100586_br0900","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1162\/089976601750264965","article-title":"Estimating the support of a high-dimensional distribution","volume":"13","author":"Sch\u00f6lkopf","year":"2001","journal-title":"Neural Comput."},{"key":"10.1016\/j.vehcom.2023.100586_br0910","article-title":"Real-time sensor anomaly detection and recovery in connected automated vehicle sensors","author":"Wang","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.vehcom.2023.100586_br0920","doi-asserted-by":"crossref","DOI":"10.1109\/JSEN.2020.2987841","article-title":"A fault detection and diagnosis system for autonomous vehicles based on hybrid approaches","author":"Fang","year":"2020","journal-title":"IEEE Sens. J."},{"key":"10.1016\/j.vehcom.2023.100586_br0930","doi-asserted-by":"crossref","DOI":"10.1016\/j.trc.2020.102622","article-title":"A variational autoencoder solution for road traffic forecasting systems: missing data imputation, dimension reduction, model selection and anomaly detection","volume":"115","author":"Boquet","year":"2020","journal-title":"Transp. Res., Part C, Emerg. Technol."},{"key":"10.1016\/j.vehcom.2023.100586_br0940","series-title":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","first-page":"1117","article-title":"A misbehavior authority system for sybil attack detection in c-its","author":"Kamel","year":"2019"},{"issue":"12","key":"10.1016\/j.vehcom.2023.100586_br0950","doi-asserted-by":"crossref","first-page":"5122","DOI":"10.1109\/JSEN.2018.2831082","article-title":"Obstacle detection for intelligent transportation systems using deep stacked autoencoder and k-nearest neighbor scheme","volume":"18","author":"Dairi","year":"2018","journal-title":"IEEE Sens. J."},{"key":"10.1016\/j.vehcom.2023.100586_br0960","author":"Denouden"},{"key":"10.1016\/j.vehcom.2023.100586_br0970","series-title":"Intrusion Detection on the Automotive Can Bus","author":"Schappin","year":"2017"},{"key":"10.1016\/j.vehcom.2023.100586_br0980","doi-asserted-by":"crossref","first-page":"114733","DOI":"10.1109\/ACCESS.2020.3004444","article-title":"Odpv: an efficient protocol to mitigate data integrity attacks in intelligent transport systems","volume":"8","author":"Javed","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.vehcom.2023.100586_br0990","series-title":"2018 IEEE 87th Vehicular Technology Conference","first-page":"1","article-title":"Robust detection of anomalous driving behavior","author":"Matousek","year":"2018"},{"key":"10.1016\/j.vehcom.2023.100586_br1000","first-page":"2529","article-title":"Robust kernel density estimation","volume":"13","author":"Kim","year":"2012","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.vehcom.2023.100586_br1010","series-title":"Development of a real-time roadway debris hazard spotting tool using connected vehicle data to enhance roadway safety and system efficiency","author":"Concas","year":"2019"},{"key":"10.1016\/j.vehcom.2023.100586_br1020","series-title":"2019 IEEE Vehicular Networking Conference (VNC)","first-page":"1","article-title":"Management of anomalous driving behavior","author":"Ucar","year":"2019"},{"key":"10.1016\/j.vehcom.2023.100586_br1030","series-title":"2016 International Conference for Students on Applied Engineering (ICSAE)","first-page":"75","article-title":"An intelligent intrusion detection scheme for self-driving vehicles based on magnetometer sensors","author":"Alheeti","year":"2016"},{"key":"10.1016\/j.vehcom.2023.100586_br1040","author":"Kim"},{"key":"10.1016\/j.vehcom.2023.100586_br1050","series-title":"2018 21st International Conference on Intelligent Transportation Systems (ITSC)","first-page":"307","article-title":"Robust deep reinforcement learning for security and safety in autonomous vehicle systems","author":"Ferdowsi","year":"2018"},{"key":"10.1016\/j.vehcom.2023.100586_br1060","series-title":"2018 IEEE 88th Vehicular Technology Conference (VTC-Fall)","first-page":"1","article-title":"Pearson correlation analysis to detect misbehavior in vanet","author":"Sharma","year":"2018"},{"key":"10.1016\/j.vehcom.2023.100586_br1070","series-title":"2018 IEEE Globecom Workshops (GC Wkshps)","first-page":"1","article-title":"Malicious node detection in vehicular ad-hoc network using machine learning and deep learning","author":"Eziama","year":"2018"},{"key":"10.1016\/j.vehcom.2023.100586_br1080","doi-asserted-by":"crossref","first-page":"1893","DOI":"10.1109\/ACCESS.2021.3136706","article-title":"Misbehavior detection for position falsification attacks in vanets using machine learning","volume":"10","author":"Ercan","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.vehcom.2023.100586_br1090","series-title":"Proceedings of the 2021 ACM International Conference on Intelligent Computing and Its Emerging Applications","first-page":"53","article-title":"A deep learning-based integrated algorithm for misbehavior detection system in vanets","author":"Hsu","year":"2021"},{"key":"10.1016\/j.vehcom.2023.100586_br1100","series-title":"2021 IEEE Intelligent Vehicles Symposium (IV)","first-page":"524","article-title":"Credibility enhanced temporal graph convolutional network based sybil attack detection on edge computing servers","author":"Luo","year":"2021"},{"issue":"20","key":"10.1016\/j.vehcom.2023.100586_br1110","doi-asserted-by":"crossref","first-page":"2534","DOI":"10.3390\/electronics10202534","article-title":"Malware detection based on graph attention networks for intelligent transportation systems","volume":"10","author":"Catal","year":"2021","journal-title":"Electronics"},{"key":"10.1016\/j.vehcom.2023.100586_br1120","series-title":"NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium","first-page":"1","article-title":"Boostguard: interpretable misbehavior detection in vehicular communication networks","author":"Elsayed","year":"2022"},{"issue":"7","key":"10.1016\/j.vehcom.2023.100586_br1130","doi-asserted-by":"crossref","first-page":"2810","DOI":"10.3390\/s22072810","article-title":"A fuzzy-based context-aware misbehavior detecting scheme for detecting rogue nodes in vehicular ad hoc network","volume":"22","author":"Ghaleb","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.vehcom.2023.100586_br1140","series-title":"2008 IEEE 68th Vehicular Technology Conference","first-page":"1","article-title":"Nctuns 5.0: a network simulator for ieee 802.11 (p) and 1609 wireless vehicular network researches","author":"Wang","year":"2008"},{"key":"10.1016\/j.vehcom.2023.100586_br1150","series-title":"Proceedings of the New Zealand Computer Science Research Students Conference, vol. 1995","first-page":"57","article-title":"Weka: the waikato environment for knowledge analysis","author":"Garner","year":"1995"},{"issue":"3","key":"10.1016\/j.vehcom.2023.100586_br1160","doi-asserted-by":"crossref","first-page":"16","DOI":"10.3390\/computers5030016","article-title":"Intelligent intrusion detection of grey hole and rushing attacks in self-driving vehicular networks","volume":"5","author":"Ali Alheeti","year":"2016","journal-title":"Computers"},{"key":"10.1016\/j.vehcom.2023.100586_br1170","series-title":"2017 IEEE International Conference on Consumer Electronics (ICCE)","first-page":"448","article-title":"An intrusion detection scheme for driverless vehicles based gyroscope sensor profiling","author":"Alheeti","year":"2017"},{"key":"10.1016\/j.vehcom.2023.100586_br1180","series-title":"2017 23rd International Conference on Automation and Computing (ICAC)","first-page":"1","article-title":"An intelligent security system for autonomous cars based on infrared sensors","author":"Alheeti","year":"2017"},{"key":"10.1016\/j.vehcom.2023.100586_br1190","author":"USDOT"},{"key":"10.1016\/j.vehcom.2023.100586_br1200","doi-asserted-by":"crossref","DOI":"10.1016\/j.ssci.2021.105479","article-title":"Deep learning for autonomous vehicle and pedestrian interaction safety","volume":"145","author":"Zhu","year":"2022","journal-title":"Saf. Sci."},{"issue":"02","key":"10.1016\/j.vehcom.2023.100586_br1210","first-page":"284","article-title":"Misbehavior detection method by time series change of vehicle position in vehicle-to-everything communication","volume":"11","author":"Okamura","year":"2021","journal-title":"J. Transp. Technol."},{"issue":"5","key":"10.1016\/j.vehcom.2023.100586_br1220","doi-asserted-by":"crossref","first-page":"1650","DOI":"10.1109\/25.892549","article-title":"Automotive signal diagnostics using wavelets and machine learning","volume":"49","author":"Guo","year":"2000","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.vehcom.2023.100586_br1230","first-page":"1","article-title":"Fuzzy and deep belief network based malicious vehicle identification and trust recommendation framework in vanets","author":"Tripathi","year":"2022","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"10.1016\/j.vehcom.2023.100586_br1240","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/TMC.2010.133","article-title":"Bidirectionally coupled network and road traffic simulation for improved IVC analysis","volume":"10","author":"Sommer","year":"2011","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.vehcom.2023.100586_br1250","series-title":"Modeling and Tools for Network Simulation","first-page":"35","article-title":"Omnet++","author":"Varga","year":"2010"},{"key":"10.1016\/j.vehcom.2023.100586_br1260","doi-asserted-by":"crossref","DOI":"10.1109\/TVT.2020.2984878","article-title":"Simulation framework for misbehavior detection in vehicular networks","author":"Kamel","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.vehcom.2023.100586_br1270","series-title":"2016 IEEE Vehicular Networking Conference (VNC)","first-page":"1","article-title":"Poster: prext: privacy extension for veins vanet simulator","author":"Emara","year":"2016"},{"key":"10.1016\/j.vehcom.2023.100586_br1280","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.simpat.2013.01.007","article-title":"itetris: a modular simulation platform for the large scale evaluation of cooperative its applications","volume":"34","author":"Rondinone","year":"2013","journal-title":"Simul. Model. Pract. Theory"},{"key":"10.1016\/j.vehcom.2023.100586_br1290","series-title":"Modeling and Tools for Network Simulation","first-page":"15","article-title":"The ns-3 network simulator","author":"Riley","year":"2010"},{"key":"10.1016\/j.vehcom.2023.100586_br1300","series-title":"Proceedings of the 1st Annual Conference on Robot Learning","first-page":"1","article-title":"CARLA: an open urban driving simulator","author":"Dosovitskiy","year":"2017"},{"key":"10.1016\/j.vehcom.2023.100586_br1310","series-title":"2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS)","first-page":"1","article-title":"Building a v2x simulation framework for future autonomous driving","author":"Lee","year":"2019"},{"key":"10.1016\/j.vehcom.2023.100586_br1320","year":"2018"},{"key":"10.1016\/j.vehcom.2023.100586_br1330","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.procs.2019.04.012","article-title":"Ventos: vehicular network open simulator with hardware-in-the-loop support","volume":"151","author":"Amoozadeh","year":"2019","journal-title":"Proc. Comput. Sci."},{"key":"10.1016\/j.vehcom.2023.100586_br1340","series-title":"Workshop on Automotive and Autonomous Vehicle Security (AutoSec), Ndss-Symposium","article-title":"A simulator for cooperative and automated driving security","author":"Bouchouia","year":"2022"},{"key":"10.1016\/j.vehcom.2023.100586_br1350","series-title":"Proceedings of the 5th GI\/ITG KuVS Fachgespr\u00e4ch Inter-Vehicle Communication (FG-IVC 2017)","first-page":"37","article-title":"Vanetza: boosting research on inter-vehicle communication","author":"Riebl","year":"2017"},{"key":"10.1016\/j.vehcom.2023.100586_br1370","author":"USDOT"},{"key":"10.1016\/j.vehcom.2023.100586_br1380","series-title":"IEEE International Conference on Communications (ICC)","article-title":"Veremi extension: a dataset for comparable evaluation of misbehavior detection in vanets","author":"Kamel","year":"2020"},{"key":"10.1016\/j.vehcom.2023.100586_br1390","doi-asserted-by":"crossref","DOI":"10.1016\/j.dib.2019.104368","article-title":"A dataset of full-stack its-g5 dsrc communications over licensed and unlicensed bands using a large-scale urban testbed","volume":"25","author":"Tassi","year":"2019","journal-title":"Data Brief"},{"key":"10.1016\/j.vehcom.2023.100586_br1400","first-page":"1","article-title":"Machine learning in iot security: current solutions and future challenges","author":"Hussain","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"10.1016\/j.vehcom.2023.100586_br1410","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1109\/COMST.2020.2975048","article-title":"Securing connected autonomous vehicles: challenges posed by adversarial machine learning and the way forward","volume":"22","author":"Qayyum","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.vehcom.2023.100586_br1420","series-title":"Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security","first-page":"27","article-title":"Towards poisoning of deep learning algorithms with back-gradient optimization","author":"Mu\u00f1oz-Gonz\u00e1lez","year":"2017"},{"key":"10.1016\/j.vehcom.2023.100586_br1430","doi-asserted-by":"crossref","first-page":"3886","DOI":"10.1109\/TIFS.2020.3003571","article-title":"Adversarial deep ensemble: evasion attacks and defenses for malware detection","volume":"15","author":"Li","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.vehcom.2023.100586_br1440","series-title":"Research Challenges in Information Science","first-page":"452","article-title":"Spatial and temporal cross-validation approach for misbehavior detection in c-its","author":"Bouchouia","year":"2021"}],"container-title":["Vehicular Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214209623000165?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214209623000165?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,6,16]],"date-time":"2024-06-16T00:48:29Z","timestamp":1718498909000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214209623000165"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":139,"alternative-id":["S2214209623000165"],"URL":"https:\/\/doi.org\/10.1016\/j.vehcom.2023.100586","relation":{},"ISSN":["2214-2096"],"issn-type":[{"value":"2214-2096","type":"print"}],"subject":[],"published":{"date-parts":[[2023,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A survey on misbehavior detection for connected and autonomous vehicles","name":"articletitle","label":"Article Title"},{"value":"Vehicular Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.vehcom.2023.100586","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"100586"}}