5G and Beyond,; Connected and Automated Vehicles; Machine Learning; Misbehavior Detection Systems; Security; Vehicle-to-Everything
Abstract :
[en] Advances in Vehicle-to-Everything (V2X) technology and onboard sensors have significantly accelerated deploying Connected and Automated Vehicles (CAVs). Integrating V2X with 5G has enabled Ultra-Reliable Low Latency Communications (URLLC) to CAVs. However, while communication performance has been enhanced, security and privacy issues have increased. Attacks have become more aggressive, and attackers have become more strategic. Public Key Infrastructure (PKI) proposed by standardization bodies cannot solely defend against these attacks. Thus, in complementary of that, sophisticated systems should be designed to detect such attacks and attackers. Machine Learning (ML) has recently emerged as a key enabler to secure future roads. Various V2X Misbehavior Detection Systems (MDSs) have adopted this paradigm. However, analyzing these systems is a research gap, and developing effective ML-based MDSs is still an open issue. To this end, this paper comprehensively surveys and classifies ML-based MDSs as well as discusses and analyses them from security and ML perspectives. It also provides some learned lessons and recommendations for guiding the development, validation, and deployment of ML-based MDSs. Finally, this paper highlighted open research and standardization issues with some future directions.
Disciplines :
Computer science
Author, co-author :
Boualouache, Abdelwahab ; University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
Engel, Thomas ; University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
External co-authors :
no
Language :
English
Title :
A Survey on Machine Learning-based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks
Publication date :
December 2022
Journal title :
IEEE Communications Surveys and Tutorials
Publisher :
IEEE
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
FnR Project :
FNR14891397 - Intelligent Orchestrated Security And Privacy-aware Slicing For 5g And Beyond Vehicular Networks, 2020 (01/04/2021-31/03/2024) - Thomas Engel
H. Yin, L. Zhang, and S. Roy, "Multiplexing URLLC traffic within eMBB services in 5G NR: Fair scheduling," IEEE Trans. Commun., vol. 69, no. 2, pp. 1080-1093, Feb. 2021.
J. Wang, J. Liu, and N. Kato, "Networking and communications in autonomous driving: A survey," IEEE Commun. Surveys Tuts., vol. 21, no. 2, pp. 1243-1274, 2nd Quart., 2018.
G. Volk, Q. Delooz, F. A. Schiegg, A. Von Bernuth, A. Festag, and O. Bringmann, "Towards realistic evaluation of collective perception for connected and automated driving," in Proc. IEEE Int. Intell. Transp. Syst. Conf. (ITSC), 2021, pp. 1049-1056.
D. Hetzer, M. Muehleisen, A. Kousaridas, and J. Alonso-Zarate, "5G connected and automated driving: Use cases and technologies in cross-border environments," in Proc. IEEE Eur. Conf. Netw. Commun. (EuCNC), 2019, pp. 78-82.
V. Sharma, I. You, and N. Guizani, "Security of 5G-V2X: Technologies, standardization, and research directions," IEEE Netw., vol. 34, no. 5, pp. 306-314, Sep./Oct. 2020.
R. Lu, L. Zhang, J. Ni, and Y. Fang, "5G vehicle-to-everything services: Gearing up for security and privacy," Proc. IEEE, vol. 108, no. 2, pp. 373-389, Feb. 2020.
J. Wang, Y. Shao, Y. Ge, and R. Yu, "Physical-layer authentication based on adaptive Kalman filter for V2X communication," Veh. Commun., vol. 26, Dec. 2020, Art. no. 100281.
F. Azam, S. K. Yadav, N. Priyadarshi, S. Padmanaban, and R. Bansal, "A comprehensive review of authentication schemes in vehicular ad-hoc network," IEEE Access, vol. 9, pp. 31309-31321, 2021.
Y. Yang, L. Wei, J. Wu, C. Long, and B. Li, "A blockchain-based multi-domain authentication scheme for conditional privacy preserving in vehicular ad-hoc network," IEEE Internet Things J., vol. 9, no. 11, pp. 8078-8090, Jun. 2022.
Intelligent Transport Systems (ITS); Security; Trust and Privacy Management; Release 2, ETSI Standard TS 102 941, Oct. 2021.
S. Gyawali, Y. Qian, and R. Q. Hu, "Deep reinforcement learning based dynamic reputation policy in 5G based vehicular communication networks," IEEE Trans. Veh. Technol., vol. 70, no. 6, pp. 6136-6146, Jun. 2021.
E. Bout, V. Loscri, and A. Gallais, "How machine learning changes the nature of cyberattacks on IoT networks: A survey," IEEE Commun. Surveys Tuts., vol. 24, no. 1, pp. 248-279, 1st Quart., 2022.
B. Mao, F. Tang, Y. Kawamoto, and N. Kato, "AI models for green communications towards 6G," IEEE Commun. Surveys Tuts., vol. 24, no. 1, pp. 210-247, 1st Quart., 2022.
A. L. Buczak and E. Guven, "A survey of data mining and machine learning methods for cyber security intrusion detection," IEEE Commun. Surveys Tuts., vol. 18, no. 2, pp. 1153-1176, 2nd Quart., 2016.
F. Tang, B. Mao, N. Kato, and G. Gui, "Comprehensive survey on machine learning in vehicular network: Technology, applications and challenges," IEEE Commun. Surveys Tuts., vol. 23, no. 3, pp. 2027-2057, 3rd Quart., 2021.
"Intelligent transport systems (ITS);security; pre-standardization study on Misbehaviour detection; release 2," ETSI, Sophia Antipolis, France, Rep. TR 103 460, Oct. 2020.
Intelligent Transport Systems (ITS); Security; Misbehaviour Reporting Service, ETSI Standard TS 103759, Dec. 2021.
S. Keele et al., "Guidelines for performing systematic literature reviews in software engineering, ver. 2.3," EBSE, Rio de Janeiro, Brazil, Rep. TR-2007, 2007.
F. Sakiz and S. Sen, "A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV," Ad Hoc Netw., vol. 61, pp. 33-50, Jun. 2017.
M. Arshad, Z. Ullah, N. Ahmad, M. Khalid, H. Criuckshank, and Y. Cao, "A survey of local/cooperative-based malicious information detection techniques in VANETs," EURASIP J. Wireless Commun. Netw., vol. 2018, no. 1, pp. 1-17, 2018.
S. Sharma and A. Kaul, "A survey on intrusion detection systems and Honeypot based proactive security mechanisms in VANETs and VANET cloud," Veh. Commun., vol. 12, pp. 138-164, Apr. 2018.
R. W. van der Heijden, S. Dietzel, T. Leinmüller, and F. Kargl, "Survey on Misbehavior detection in cooperative intelligent transportation systems," IEEE Commun. Surveys Tuts., vol. 21, no. 1, pp. 779-811, 1st Quart., 2018.
G. K. Rajbahadur, A. J. Malton, A. Walenstein, and A. E. Hassan, "A survey of anomaly detection for connected vehicle cybersecurity and safety," in Proc. IEEE Intell. Veh. Symp. (IV), 2018, pp. 421-426.
A. M. Alrehan and F. A. Alhaidari, "Machine learning techniques to detect DDoS attacks on VANET system: A survey," in Proc. IEEE 2nd Int. Conf. Comput. Appl. Inf. Security (ICCAIS), 2019, pp. 1-6.
F. Gonçalves et al., "A systematic review on intelligent intrusion detection systems for VANETs," in Proc. IEEE 11th Int. Congr. Ultra Modern Telecommun. Control Syst. Workshops (ICUMT), 2019, pp. 1-10.
M. Dibaei et al., "Attacks and defences on intelligent connected vehicles: A survey," Digit. Commun. Netw., vol. 6, no. 4, pp. 399-421, 2020.
S. A. Almalki and J. Song, "A review on data falsification-based attacks in cooperative intelligent transportation systems," Int. J. Comput. Sci. Security, vol. 14, no. 2, p. 22, 2020.
X. Sun, F. R. Yu, and P. Zhang, "A survey on cyber-security of connected and autonomous vehicles (CAVs)," IEEE Trans. Intell. Transp. Syst., vol. 23, no. 7, pp. 6240-6259, Jul. 2022.
A. Talpur and M. Gurusamy, "Machine learning for security in vehicular networks: A comprehensive survey," IEEE Commun. Surveys Tuts., vol. 24, no. 1, pp. 346-379, 1st Quart., 2022.
H. Bangui and B. Buhnova, "Recent advances in machine-learning driven intrusion detection in transportation: Survey," Procedia Comput. Sci., vol. 184, pp. 877-886, Jan. 2021.
F. Tang, Y. Kawamoto, N. Kato, and J. Liu, "Future intelligent and secure vehicular network toward 6G: Machine-learning approaches," Proc. IEEE, vol. 108, no. 2, pp. 292-307, Feb. 2020.
M. Dibaei et al., "Investigating the prospect of leveraging blockchain and machine learning to secure vehicular networks: A survey," IEEE Trans. Intell. Transp. Syst., vol. 23, no. 2, pp. 683-700, Feb. 2022.
Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service, ETSI Standard EN 302 637-2, Nov. 2014.
V2X Communications Message Set Dictionary, SAE Standard J2735_202007, Jul. 2020.
Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic Service, ETSI Standard EN 302 637-2, Sep. 2014.
"Intelligent transport systems (ITS);vehicular communications; basic set of applications; analysis of the collective perception service (CPS); release 2," ETSI, Sophia Antipolis, France, Rep. TR 103 562, Dec. 2019.
Intelligent Transport System (ITS); Vehicular Communications; Basic Set of Applications; Specification of the Collective Perception Service, ETSI Standard TS 103 324, May 2021.
A. Bazzi, A. Zanella, I. Sarris, and V. Martinez, "Co-channel coexistence: Let ITS-G5 and sidelink C-V2X make peace," in Proc. IEEE MTT-S Int. Conf. Microw. Intell. Mobility (ICMIM), 2020, pp. 1-4.
C. Campolo, A. Molinaro, and V. Sciancalepore, "5G network slicing for V2X communications: Technologies and enablers," Radio Access Netw. Slicing Virtualization 5G Vertical Industries, vol. 2, no. 1, pp. 239-257, 2021.
Service Requirements for Enhanced V2X Scenarios, 3GPP Standard TS 22.186, Jul. 2018.
Architecture Enhancements for 5G System (5GS) to Support Vehicleto-Everything (V2X) Services, 3GPP Standard TS 23.287, Jul. 2020.
Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 1: Requirements, ETSI Standard EN 302 636-1, Feb. 2014.
Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 5: Transport Protocols; Sub-Part 1: Basic Transport Protocol, ETSI Standard TS 102 636-5-1, Feb. 2011.
A. Abunei, C.-R. Comşa, and I. Bogdan, "Implementation of ETSI ITS-G5 based inter-vehicle communication embedded system," in Proc. IEEE Int. Symp. Signals Circuits Syst. (ISSCS), 2017, pp. 1-4.
Cellular-V2X Technology Overview 80-PE732-63 Rev. B, Qualcomm, San Diego, CA, USA, 2019.
ITS Stack 80-PE732-64 Rev A, Qualcomm, San Diego, CA, USA, 2019.
Service Requirements for V2X Services, 3GPP Standard TS 22.185, Mar. 2017.
D. Sempere-García, M. Sepulcre, and J. Gozalvez, "LTE-V2X mode 3 scheduling based on adaptive spatial reuse of radio resources," Ad Hoc Netw., vol. 113, Mar. 2021, Art. no. 102351.
X. Ge, Z. Li, and S. Li, "5G software defined vehicular networks," IEEE Commun. Mag., vol. 55, no. 7, pp. 87-93, Jul. 2017.
H. Cao, H. Zhao, D. X. Luo, N. Kumar, and L. Yang, "Dynamic virtual resource allocation mechanism for survivable services in emerging NFV-enabled vehicular networks," IEEE Trans. Intell. Transp. Syst., vol. 23, no. 11, pp. 22492-22504, Nov. 2022.
M. M. Elsayed, K. M. Hosny, M. M. Fouda, and M. M. Khashaba, "Vehicles communications handover in 5G: A survey," ICT Exp., to be published.
V. O. Nyangaresi and A. J. Rodrigues, "Efficient handover protocol for 5G and beyond networks," Comput. Security, vol. 113, Feb. 2022, Art. no. 102546.
K. Trichias, P. Demestichas, and N. Mitrou, "Inter-PLMN mobility management challenges for supporting cross-border connected and automated mobility (CAM) over 5G," J. ICT Stand., vol. 1, pp. 113-146, May 2021.
"Study on enhancement of 3GPP support for 5G V2X services," 3GPP, Sophia Antipolis, France, Rep. TR 22.886, Dec. 2018.
M. H. C. Garcia et al., "A tutorial on 5G NR V2X communications," IEEE Commun. Surveys Tuts., vol. 23, no. 3, pp. 1972-2026, 3rd Quart., 2021.
A. Boualouache, S.-M. Senouci, and S. Moussaoui, "A survey on pseudonym changing strategies for vehicular ad-hoc networks," IEEE Commun. Surveys Tuts., vol. 20, no. 1, pp. 770-790, 1st Quart., 2017.
M. Raya and J. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Security, vol. 15, no. 1, pp. 39-68, Jan. 2007.
M. Terrovitis, G. Poulis, N. Mamoulis, and S. Skiadopoulos, "Local suppression and splitting techniques for privacy preserving publication of trajectories," IEEE Trans. Knowl. Data Eng., vol. 29, no. 7, pp. 1466-1479, Jul. 2017.
S. Zhang, G. Wang, M. Z. A. Bhuiyan, and Q. Liu, "A dual privacy preserving scheme in continuous location-based services," IEEE Internet Things J., vol. 5, no. 5, pp. 4191-4200, May 2018.
Z. Tu, K. Zhao, F. Xu, Y. Li, L. Su, and D. Jin, "Protecting trajectory from semantic attack considering {k}-anonymity, {l}-diversity, and {t}-closeness," IEEE Trans. Netw. Service Manag., vol. 16, no. 1, pp. 264-278, Mar. 2019.
S. Shaham, M. Ding, B. Liu, S. Dang, Z. Lin, and J. Li, "Privacy preservation in location-based services: A novel metric and attack model," IEEE Trans. Mobile Comput., vol. 20, no. 10, pp. 3006-3019, Oct. 2021.
R. Khan, P. Kumar, D. N. K. Jayakody, and M. Liyanage, "A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions," IEEE Commun. Surveys Tuts., vol. 22, no. 1, pp. 196-248, 1st Quart., 2019.
A. Akhunzada and M. K. Khan, "Toward secure software defined vehicular networks: Taxonomy, requirements, and open issues," IEEE Commun. Mag., vol. 55, no. 7, pp. 110-118, Jul. 2017.
J. Wang and J. Liu, "Secure and reliable slicing in 5G and beyond vehicular networks," IEEE Wireless Commun., vol. 29, no. 1, pp. 126-133, Feb. 2022.
A. Dutta and E. Hammad, "5G security challenges and opportunities: A system approach," in Proc. IEEE 3rd 5G World Forum (5GWF), 2020, pp. 109-114.
R. Soua, I. Turcanu, F. Adamsky, D. Führer, and T. Engel, "Multiaccess edge computing for vehicular networks: A position paper," in Proc. IEEE Globecom Workshops (GC Wkshps), 2018, pp. 1-6.
S. Gupta, B. L. Parne, and N. S. Chaudhari, "Security vulnerabilities in handover authentication mechanism of 5G network," in Proc. IEEE 1st Int. Conf. Secure Cyber Comput. Commun. (ICSCCC), 2018, pp. 369-374.
C. Lai, R. Lu, D. Zheng, and X. Shen, "Security and privacy challenges in 5G-enabled vehicular networks," IEEE Netw., vol. 34, no. 2, pp. 37-45, Mar./Apr. 2020.
Intelligent Transport Systems (ITS); Security; Security Management Messages Communication Requirements and Distribution Protocols, ETSI Standard TS 103 601, Oct. 2020.
D. Li, C. Gu, and Y. Zhu, "Gene fingerprinting: Cracking encrypted tunnel with zero-shot learning," IEICE Trans. Inf. Syst., vol. 105, no. 6, pp. 1172-1184, 2022.
R. W. van der Heijden, T. Lukaseder, and F. Kargl, "VeReMi: A dataset for comparable evaluation of misbehavior detection in VANETs," in Proc. Int. Conf. Security Privacy Commun. Syst., 2018, pp. 318-337.
"VeReMi Data Set." Accessed: Oct. 6, 2021. [Online]. Available: https://github.com/VeReMi-dataset/VeReMi/releases
J. Kamel, M. Wolf, R. W. van der Hei, A. Kaiser, P. Urien, and F. Kargl, "VeReMi extension: A dataset for comparable evaluation of misbehavior detection in VANETs," in Proc. IEEE Int. Conf. Commun. (ICC), 2020, pp. 1-6.
J. Kamel, M. R. Ansari, J. Petit, A. Kaiser, I. B. Jemaa, and P. Urien, "Simulation framework for misbehavior detection in vehicular networks," IEEE Trans. Veh. Technol., vol. 69, no. 6, pp. 6631-6643, Jun. 2020.
C. Kolias, G. Kambourakis, A. Stavrou, and S. Gritzalis, "Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset," IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 184-208, 1st Quart., 2016.
"The AWID2 Dataset." Accessed: Jan. 11, 2022. [Online]. Available: https://icsdweb.aegean.gr/awid/awid2
M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, "A detailed analysis of the KDD CUP 99 data set," in Proc. IEEE Symp. Comput. Intell. Security Defense Appl., 2009, pp. 1-6.
J. Song, H. Takakura, and Y. Okabe. "Description of Kyoto University Benchmark Data." 2006. Accessed: Mar. 15, 2016. [Online]. Available: http://www.takakura.com/Kyoto_data/BenchmarkData-Description-v5. pdf
"Traffic Data From Kyoto University's Honeypots." Accessed: Oct. 11, 2021. [Online]. Available: http://www.takakura.com/Kyoto_data/
N. Moustafa and J. Slay, "UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in Proc. Mil. Commun. Inf. Syst. Conf. (MilCIS), 2015, pp. 1-6.
"The UNSW-NB15 Dataset." Accessed: Oct. 11, 2021. [Online]. Available: http://www.takakura.com/Kyoto_data/
A. Shiravi, H. Shiravi, M. Tavallaee, and A. A. Ghorbani, "Toward developing a systematic approach to generate benchmark datasets for intrusion detection," Comput. Security, vol. 31, no. 3, pp. 357-374, 2012.
I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, "Toward generating a new intrusion detection dataset and intrusion traffic characterization," in Proc. ICISSp, vol. 1, Jan. 2018, pp. 108-116.
X. Zeng, R. Bagrodia, and M. Gerla, "GloMoSim: A library for parallel simulation of large-scale wireless networks," in Proc. IEEE 12th Workshop Parallel Distrib. Simulat. (PADS), 1998, pp. 154-161.
N. McKeown et al., "OpenFlow: Enabling innovation in campus networks," ACM SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, pp. 69-74, 2008.
S. So, P. Sharma, and J. Petit, "Integrating plausibility checks and machine learning for Misbehavior detection in VANET," in Proc. 17th IEEE Int. Conf. Mach. Learn. Appl. (ICMLA), 2018, pp. 564-571.
A. Le and C. Maple, "Shadows don't lie: N-sequence trajectory inspection for Misbehaviour detection and classification in VANETs," in Proc. IEEE 90th Veh. Technol. Conf. (VTC-Fall), 2019, pp. 1-6.
P. K. Singh, S. Gupta, R. Vashistha, S. K. Nandi, and S. Nandi, "Machine learning based approach to detect position falsification attack in VANET," in Proc. Int. Conf. Security Privacy, 2019, pp. 166-178.
P. Sharma and H. Liu, "A machine-learning-based data-centric misbehavior detection model for Internet of Vehicles," IEEE Internet Things J., vol. 8, no. 6, pp. 4991-4999, Mar. 2021.
D. Kosmanos et al., "A novel intrusion detection system against spoofing attacks in connected electric vehicles," Array, vol. 5, Mar. 2020, Art. no. 100013.
J. Montenegro, C. Iza, and M. A. Igartua, "Detection of position falsification attacks in VANETs applying trust model and machine learning," in Proc. 17th ACM Symp. Perform. Eval. Wireless Ad Hoc Sensor Ubiquitous Netw., 2020, pp. 9-16.
S. Ercan, M. Ayaida, and N. Messai, "New features for position falsification detection in VANETs using machine learning," in Proc. IEEE Int. Conf. Commun. (ICC), 2021, pp. 1-6.
S. Ercan, M. Ayaida, and N. Messai, "Misbehavior detection for position falsification attacks in VANETs using machine learning," IEEE Access, vol. 10, pp. 1893-1904, 2021.
F. Hawlader, A. Boualouache, S. Faye, and T. Engel, "Intelligent misbehavior detection system for detecting false position attacks in vehicular networks," in Proc. IEEE Int. Conf. Commun. Workshops (ICC Workshops), 2021, pp. 1-6.
T. Okamura and K. Sato, "Misbehavior detection method by time series change of vehicle position in vehicle-to-everything communication," J. Transp. Technol., vol. 11, no. 2, p. 284, 2021.
H. Grover, T. Alladi, V. Chamola, D. Singh, and K.-K. R. Choo, "Edge computing and deep learning enabled secure multi-tier network for Internet of Vehicles," IEEE Internet Things J., vol. 8, no. 19, pp. 14787-14796, Oct. 2021.
R. Sedar, C. Kalalas, F. Vázquez-Gallego, and J. Alonso-Zarate, "Reinforcement learning-based misbehaviour detection in V2X scenarios," in Proc. IEEE MeditCom, Sep. 2021, pp. 1-8.
A. Uprety, D. B. Rawat, and J. Li, "Privacy preserving misbehavior detection in IoV using federated machine learning," in Proc. IEEE 18th Annu. Consum. Commun. Netw. Conf. (CCNC), 2021, pp. 1-6.
A. Sharma and A. Jaekel, "Machine learning approach for detecting location spoofing in VANET," in Proc. IEEE Int. Conf. Comput. Commun. Netw. (ICCCN), 2021, pp. 1-6.
A. Sharma and A. Jaekel, "Machine learning based misbehaviour detection in VANET using consecutive BSM approach," IEEE Open J. Veh. Technol., vol. 3, pp. 1-14, 2021.
H. Mankodiya, M. S. Obaidat, R. Gupta, and S. Tanwar, "XAI-AV: Explainable artificial intelligence for trust management in autonomous vehicles," in Proc. IEEE Int. Conf. Commun. Comput. Cybersecurity Inf. (CCCI), 2021, pp. 1-5.
H. Aliev and H. Kim, "Misbehavior detection based on multi-head deep learning for V2X network security," in Proc. IEEE Int. Conf. Consum. Electron. Asia (ICCE-Asia), 2021, pp. 1-2.
F. A. Ghaleb, A. Zainal, M. A. Rassam, and F. Mohammed, "An effective misbehavior detection model using artificial neural network for vehicular ad hoc network applications," in Proc. IEEE Conf. Appl. Inf. Netw. Security (AINS), 2017, pp. 13-18.
J.-P. Monteuuis, J. Petit, J. Zhang, H. Labiod, S. Mafrica, and A. Servel, "'My autonomous car is an elephant;: A machine learning based detector for implausible dimension," in Proc. IEEE 3rd Int. Conf. Security Smart Cities Ind. Control Syst. Commun. (SSIC), 2018, pp. 1-8.
P. K. Singh, M. K. Dash, P. Mittal, S. K. Nandi, and S. Nandi, "Misbehavior detection in c-ITS using deep learning approach," in Proc. Int. Conf. Intell. Syst. Design Appl., 2018, pp. 641-652.
S. Gyawali and Y. Qian, "Misbehavior detection using machine learning in vehicular communication networks," in Proc. IEEE Int. Conf. Commun. (ICC), 2019, pp. 1-6.
S. Gyawali, Y. Qian, and R. Q. Hu, "Machine learning and reputation based misbehavior detection in vehicular communication networks," IEEE Trans. Veh. Technol., vol. 69, no. 8, pp. 8871-8885, Aug. 2020.
N. Negi, O. Jelassi, H. Chaouchi, and S. Clemençon, "Distributed online data anomaly detection for connected vehicles," in Proc. IEEE Int. Conf. Artif. Intell. Inf. Commun. (ICAIIC), 2020, pp. 494-500.
S. A. Almalki and F. T. Sheldon, "Deep learning to improve false data injection attack detection in cooperative intelligent transportation systems," in Proc. IEEE 12th Annu. Inf. Technol. Electron. Mobile Commun. Conf. (IEMCON), 2021, pp. 1016-1021.
B. Ko and S. H. Son, "An approach to detecting malicious information attacks for platoon safety," IEEE Access, vol. 9, pp. 101289-101299, 2021.
S. Boddupalli and S. Ray, "REDEM: Real-time detection and mitigation of communication attacks in connected autonomous vehicle applications," IFIP Adv. Inf. Commun. Technol., vol. 574, pp. 1-18, May 2019.
S.-L. Wang et al., "Deep-learning-based intrusion detection for autonomous vehicle-following systems," in Proc. IEEE Int. Intell. Transp. Syst. Conf. (ITSC), 2021, pp. 865-872.
S. Boddupalli, A. Hegde, and S. Ray, "Replace: Real-time security assurance in vehicular platoons against V2V attacks," in Proc. IEEE Int. Intell. Transp. Syst. Conf. (ITSC), 2021, pp. 1179-1185.
A. Sarker and H. Shen, "A data-driven Misbehavior detection system for connected autonomous vehicles," Proc. ACM Interactive Mobile Wearable Ubiquitous Technol., vol. 2, no. 4, pp. 1-21, 2018.
A. A. Ayoob, G. Su, and G. Al, "Hierarchical growing neural gas network (HGNG)-based semicooperative feature classifier for IDS in vehicular ad hoc network (VANET)," J. Sensor Actuator Netw., vol. 7, no. 3, p. 41, 2018.
P. Gu, R. Khatoun, Y. Begriche, and A. Serhrouchni, "Support vector machine (SVM) based Sybil attack detection in vehicular networks," in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), 2017, pp. 1-6.
P. Gu, R. Khatoun, Y. Begriche, and A. Serhrouchni, "k-nearest neighbours classification based Sybil attack detection in vehicular networks," in Proc. 3rd Int. Conf. Mobile Secure Services (MobiSecServ), 2017, pp. 1-6.
J. Kamel, F. Haidar, I. B. Jemaa, A. Kaiser, B. Lonc, and P. Urien, "A misbehavior authority system for Sybil attack detection in C-ITS," in Proc. IEEE 10th Annu. Ubiquitous Comput. Electron. Mobile Commun. Conf. (UEMCON), 2019, pp. 1117-1123.
C. H. Quevedo, A. M. Quevedo, G. A. Campos, R. L. Gomes, J. Celestino, and A. Serhrouchni, "An intelligent mechanism for Sybil attacks detection in VANETs," in Proc. IEEE Int. Conf. Commun. (ICC), 2020, pp. 1-6.
A. Boualouache and T. Engel, "Federated learning-based scheme for detecting passive mobile attackers in 5G vehicular edge computing," Ann. Telecommun., vol. 77, pp. 1-20, Jul. 2022.
J. Grover, N. K. Prajapati, V. Laxmi, and M. S. Gaur, "Machine learning approach for multiple misbehavior detection in VANET," in Proc. Int. Conf. Adv. Comput. Commun., 2011, pp. 644-653.
J. Grover, V. Laxmi, and M. S. Gaur, "Misbehavior detection based on ensemble learning in VANET," in Proc. Int. Conf. Adv. Comput. Netw. Security, 2011, pp. 602-611.
W. Li, A. Joshi, and T. Finin, "SVM-CASE: An SVM-based context aware security framework for vehicular ad-hoc networks," in Proc. IEEE 82nd Veh. Technol. Conf. (VTC-Fall), 2015, pp. 1-5.
C. Zhang, K. Chen, X. Zeng, and X. Xue, "Misbehavior detection based on support vector machine and Dempster-Shafer theory of evidence in VANETs," IEEE Access, vol. 6, pp. 59860-59870, 2018.
E. Eziama, K. Tepe, A. Balador, K. S. Nwizege, and L. M. Jaimes, "Malicious node detection in vehicular ad-hoc network using machine learning and deep learning," in Proc. IEEE Globecom Workshops (GC Wkshps), 2018, pp. 1-6.
I. Mahmoudi, J. Kamel, I. Ben-Jemaa, A. Kaiser, and P. Urien, "Towards a reliable machine learning based global misbehavior detection in C-ITS: Model evaluation approach," in Proc. Int. Workshop Veh. Adhoc Netw. Smart Cities (IWVSC), 2019, p. 3.
J. Kamel, I. B. Jemaa, A. Kaiser, L. Cantat, and P. Urien, "Misbehavior detection in C-ITS: A comparative approach of local detection mechanisms," in Proc. IEEE Veh. Netw. Conf. (VNC), 2019, pp. 1-8.
T. Alladi, V. Kohli, V. Chamola, and F. R. Yu, "Securing the Internet of Vehicles: A deep learning-based classification framework," IEEE Netw. Lett., vol. 3, no. 2, pp. 94-97, Jun. 2021.
T. Alladi, V. Kohli, V. Chamola, F. R. Yu, and M. Guizani, "Artificial intelligence (AI)-empowered intrusion detection architecture for the Internet of Vehicles," IEEE Wireless Commun., vol. 28, no. 3, pp. 144-149, Jun. 2021.
T. Alladi, A. Agrawal, B. Gera, V. Chamola, B. Sikdar, and M. Guizani, "Deep neural networks for securing IoT enabled vehicular ad-hoc networks," in Proc. IEEE Int. Conf. Commun. (ICC), 2021, pp. 1-6.
N. C. Kushardianto, Y. E. Hillali, and C. Tatkeu, "2-step prediction for detecting attacker in vehicle to vehicle communication," in Proc. IEEE 94th Veh. Technol. Conf. (VTC-Fall), 2021, pp. 1-5.
F. Gonçalves, J. Macedo, and A. Santos, "Intelligent hierarchical intrusion detection system for VANETs," in Proc. 13th Int. Congr. Ultra Modern Telecommun. Control Syst. Workshops (ICUMT), 2021, pp. 50-59.
F. Gonçalves, J. Macedo, and A. Santos, "An intelligent hierarchical security framework for VANETs," Information, vol. 12, no. 11, p. 455, 2021.
F. Gonçalves et al., "Synthesizing Datasets with security threats for vehicular ad-hoc networks," in Proc. GLOBECOM IEEE Global Commun. Conf., 2020, pp. 1-6.
T. Alladi, B. Gera, A. Agrawal, V. Chamola, and F. R. Yu, "DeepADV: A deep neural network framework for anomaly detection in VANETs," IEEE Trans. Veh. Technol., vol. 70, no. 11, pp. 12013-12023, Nov. 2021.
H.-Y. Hsu, N.-H. Cheng, and C.-W. Tsai, "A deep learning-based integrated algorithm for Misbehavior detection system in VANETs," in Proc. ACM Int. Conf. Intell. Comput. Emerg. Appl., 2021, pp. 53-58.
S. Boddupalli, A. S. Rao, and S. Ray, "Resilient cooperative adaptive cruise control for autonomous vehicles using machine learning," 2021, arXiv:2103.10533.
Y. Liu, H. Xue, W. Zhuang, F. Wang, L. Xu, and G. Yin, "CT2-MDS: Cooperative trust-aware tolerant misbehaviour detection system for connected and automated vehicles," IET Intell. Transport Syst., vol. 16, no. 2, pp. 218-231, 2022.
H. Sedjelmaci and S. M. Senouci, "An accurate and efficient collaborative intrusion detection framework to secure vehicular networks," Comput. Elect. Eng., vol. 43, pp. 33-47, Jun. 2015.
Y. Zeng, M. Qiu, D. Zhu, Z. Xue, J. Xiong, and M. Liu, "DeepVCM: A deep learning based intrusion detection method in VANET," in Proc. IEEE 5th Int. Conf. Big Data Security Cloud (BigDataSecurity) IEEE Int. Conf. High Perform. Smart Comput. (HPSC) IEEE Int. Conf. Intell. Data Security (IDS), 2019, pp. 288-293.
H. Tan, Z. Gui, and I. Chung, "A secure and efficient certificateless authentication scheme with unsupervised anomaly detection in VANETs," IEEE Access, vol. 6, pp. 74260-74276, 2018.
H. Izakian, W. Pedrycz, and I. Jamal, "Fuzzy clustering of time series data using dynamic time warping distance," Eng. Appl. Artif. Intell., vol. 39, no. 1, pp. 235-244, 2015.
P. K. Singh, S. K. Jha, S. K. Nandi, and S. Nandi, "ML-based approach to detect DDoS attack in V2I communication under SDN architecture," in Proc. TENCON IEEE Region 10 Conf., 2018, pp. 144-149.
Y. Yu, L. Guo, Y. Liu, J. Zheng, and Y. Zong, "An efficient SDNbased DDoS attack detection and rapid response platform in vehicular networks," IEEE Access, vol. 6, pp. 44570-44579, 2018.
K. Sharshembiev, S.-M. Yoo, and E. Elmahdi, "Protocol misbehavior detection framework using machine learning classification in vehicular ad hoc networks," Wireless Netw., vol. 27, no. 3, pp. 2103-2118, 2021.
A. R. Narayanadoss, T. Truong-Huu, P. M. Mohan, and M. Gurusamy, "Crossfire attack detection using deep learning in software defined ITS networks," in Proc. IEEE 89th Veh. Technol. Conf. (VTC-Spring), 2019, pp. 1-6.
L. A. Maglaras, "A novel distributed intrusion detection system for vehicular ad hoc networks," Int. J. Adv. Comput. Sci. Appl., vol. 6, no. 4, pp. 101-106, 2015.
D. Tian, Y. Wang, G. Lu, and G. Yu, "A vehicular ad hoc networks intrusion detection system based on BUSNet," in Proc. IEEE 2nd Int. Conf. Future Comput. Commun., vol. 1, 2010, p. 225.
L. Nie, Y. Li, and X. Kong, "Spatio-temporal network traffic estimation and anomaly detection based on convolutional neural network in vehicular ad-hoc networks," IEEE Access, vol. 6, pp. 40168-40176, 2018.
A. Gruebler, K. D. McDonald-Maier, and K. M. A. Alheeti, "An intrusion detection system against black hole attacks on the communication network of self-driving cars," in Proc. IEEE 6th Int. Conf. Emerg. Security Technol. (EST), 2015, pp. 86-91.
K. M. A. Alheeti, A. Gruebler, and K. D. McDonald-Maier, "On the detection of grey hole and rushing attacks in self-driving vehicular networks," in Proc. 7th Comput. Sci. Electron. Eng. Conf. (CEEC), 2015, pp. 231-236.
K. M. A. Alheeti, A. Gruebler, and K. McDonald-Maier, "Intelligent intrusion detection of grey hole and rushing attacks in self-driving vehicular networks," Computers, vol. 5, no. 3, p. 16, 2016.
Y. Zeng, M. Qiu, Z. Ming, and M. Liu, "Senior2local: A machine learning based intrusion detection method for VANETs," in Proc. Int. Conf. Smart Comput. Commun., 2018, pp. 417-426.
S. A. Siddiqui, A. Mahmood, W. E. Zhang, and Q. Z. Sheng, "Machine learning based trust model for misbehaviour detection in Internet-of-Vehicles," in Proc. Int. Conf. Neural Inf. Process., 2019, pp. 512-520.
A. Acharya and J. Oluoch, "A dual approach for preventing blackhole attacks in vehicular ad hoc networks using statistical techniques and supervised machine learning," in Proc. IEEE Int. Conf. Electron. Inf. Technol. (EIT), 2021, pp. 230-235.
O. A. Wahab, A. Mourad, H. Otrok, and J. Bentahar, "CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks," Exp. Syst. Appl., vol. 50, pp. 40-54, May 2016.
E. A. Shams, A. Rizaner, and A. H. Ulusoy, "Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks," Comput. Security, vol. 78, pp. 245-254, Sep. 2018.
P. K. Singh, R. R. Gupta, S. K. Nandi, and S. Nandi, "Machine learning based approach to detect wormhole attack in VANETs," in Proc. Workshops Int. Conf. Adv. Inf. Netw. Appl., 2019, pp. 651-661.
K. M. A. Alheeti and K. McDonald-Maier, "Hybrid intrusion detection in connected self-driving vehicles," in Proc. 22nd Int. Conf. Autom. Comput. (ICAC), 2016, pp. 456-461.
K. M. A. Alheeti and K. McDonald-Maier, "Intelligent intrusion detection in external communication systems for autonomous vehicles," Syst. Sci. Control Eng., vol. 6, no. 1, pp. 48-56, 2018.
M. Kim, I. Jang, S. Choo, J. Koo, and S. Pack, "Collaborative security attack detection in software-defined vehicular networks," in Proc. 19th Asia-Pac. Netw. Oper. Manag. Symp. (APNOMS), 2017, pp. 19-24.
T. Zhang and Q. Zhu, "Distributed privacy-preserving collaborative intrusion detection systems for VANETs," IEEE Trans. Signal Inf. Process. Netw., vol. 4, no. 1, pp. 148-161, May 2018.
T. Zhang and Q. Zhu, "Differentially private collaborative intrusion detection systems for VANETs," 2020, arXiv:2005.00703.
F. A Ghaleb et al., "Misbehavior-aware on-demand collaborative intrusion detection system using distributed ensemble learning for VANET," Electronics, vol. 9, no. 9, p. 1411, 2020.
J. Ashraf, A. D. Bakhshi, N. Moustafa, H. Khurshid, A. Javed, and A. Beheshti, "Novel deep learning-enabled LSTM autoencoder architecture for discovering anomalous events from intelligent transportation systems," IEEE Trans. Intell. Transp. Syst., vol. 22, no. 7, pp. 4507-4518, Jul. 2021.
J. Shu, L. Zhou, W. Zhang, X. Du, and M. Guizani, "Collaborative intrusion detection for VANETs: A deep learning-based distributed SDN approach," IEEE Trans. Intell. Transp. Syst., vol. 22, no. 7, pp. 4519-4530, Jul. 2021.
X. Li, Z. Hu, M. Xu, Y. Wang, and J. Ma, "Transfer learning based intrusion detection scheme for Internet of Vehicles," Inf. Sci., vol. 547, pp. 119-135, Feb. 2021.
H. Bangui, M. Ge, and B. Buhnova, "A hybrid data-driven model for intrusion detection in VANET," Procedia Comput. Sci., vol. 184, pp. 516-523, May 2021.
L. Yang, A. Moubayed, and A. Shami, "MTH-IDS: A multi-tiered hybrid intrusion detection system for Internet of Vehicles," IEEE Internet Things J., vol. 9, no. 1, pp. 616-632, Jan. 2022.
I. A. Khan, N. Moustafa, D. Pi, W. Haider, B. Li, and A. Jolfaei, "An enhanced multi-stage deep learning framework for detecting malicious activities from autonomous vehicles," IEEE Trans. Intell. Transp. Syst., vol. 23, no. 12, pp. 25469-25478, Dec. 2022.
H. Liu et al., "Blockchain and federated learning for collaborative intrusion detection in vehicular edge computing," IEEE Trans. Veh. Technol., vol. 70, no. 6, pp. 6073-6084, Jun. 2021.
R. Rahal, A. A. Korba, N. Ghoualmi-Zine, Y. Challal, and M. Y. Ghamri-Doudane, "AntibotV: A multilevel behaviour-based framework for botnets detection in vehicular networks," J. Netw. Syst. Manag., vol. 30, no. 1, pp. 1-40, 2022.
X. Liu, G. Yan, D. B. Rawat, and S. Deng, "Data mining intrusion detection in vehicular ad hoc network," IEICE Trans. Inf. Syst., vol. 97, no. 7, pp. 1719-1726, 2014.
L. Yang and A. Shami, "A transfer learning and optimized CNN based intrusion detection system for Internet of Vehicles," 2022, arXiv:2201.11812.
D. Karagiannis and A. Argyriou, "Jamming attack detection in a pair of RF communicating vehicles using unsupervised machine learning," Veh. Commun., vol. 13, pp. 56-63, Jul. 2018.
N. Lyamin, D. Kleyko, Q. Delooz, and A. Vinel, "AI-based malicious network traffic detection in VANETs," IEEE Netw., vol. 32, no. 6, pp. 15-21, Nov./Dec. 2018.
N. Lyamin, A. Vinel, M. Jonsson, and J. Loo, "Real-time detection of denial-of-service attacks in IEEE 802.11p vehicular networks," IEEE Commun. Lett., vol. 18, no. 1, pp. 110-113, Nov./Dec. 2014.
N. V. Abhishek and M. Gurusamy, "JaDe: Low power jamming detection using machine learning in vehicular networks," IEEE Wireless Commun. Lett., vol. 10, no. 10, pp. 2210-2214, Oct. 2021.
D. Kosmanos et al., "Intrusion detection system for platooning connected autonomous vehicles," in Proc. IEEE 4th South East Europe Design Autom. Comput. Eng. Comput. Netw. Soc. Media Conf. (SEEDA-CECNSM), 2019, pp. 1-9.
Z. Du, C. Wu, T. Yoshinaga, K.-L. A. Yau, Y. Ji, and J. Li, "Federated learning for vehicular Internet of Things: Recent advances and open issues," IEEE Open J. Comput. Soc., vol. 1, pp. 45-61, 2020.
N. Aljeri and A. Boukerche, "Mobility management in 5G-enabled vehicular networks: Models, protocols, and classification," ACM Comput. Surveys, vol. 53, no. 5, pp. 1-35, 2020.
M. R. Palattella, R. Soua, A. Khelil, and T. Engel, "Fog computing as the key for seamless connectivity handover in future vehicular networks," in Proc. 34th ACM/SIGAPP Symp. Appl. Comput., 2019, pp. 1996-2000.
E. Gures, I. Shayea, A. Alhammadi, M. Ergen, and H. Mohamad, "A comprehensive survey on mobility management in 5G heterogeneous networks: Architectures, challenges and solutions," IEEE Access, vol. 8, pp. 195883-195913, 2020.
D. Zhao, Z. Yan, M. Wang, P. Zhang, and B. Song, "Is 5G handover secure and private? A survey," IEEE Internet Things J., vol. 8, no. 16, pp. 12855-12879, Aug. 2021.
M. J. Alam and M. Ma, "DC and COMP authentication in LTEadvanced 5G HetNet," in Proc. GLOBECOM IEEE Global Commun. Conf., 2017, pp. 1-6.
X. Duan and X. Wang, "Authentication handover and privacy protection in 5G hetnets using software-defined networking," IEEE Commun. Mag., vol. 53, no. 4, pp. 28-35, Apr. 2015.
I. H. Abdulqadder and S. Zhou, "SliceBlock: Context-aware authentication handover and secure network slicing using DAG-blockchain in edge-assisted SDN/NFV-6G environment," IEEE Internet Things J., vol. 9, no. 18, pp. 18079-18097, Sep. 2022.
L. Zhang, C. An, Q. Zhang, and C. Tang, "Misbehavior detection algorithm in CCSDS space telecommand system," IEEE Commun. Lett., vol. 14, no. 8, pp. 746-748, Aug. 2010.
A. Boualouache, S.-M. Senouci, and S. Moussaoui, "PRIVANET: An efficient pseudonym changing and management framework for vehicular ad-hoc networks," IEEE Trans. Intell. Transp. Syst., vol. 21, no. 8, pp. 3209-3218, Aug. 2020.
O. A. Fernando, H. Xiao, and J. Spring, "Developing a testbed with P4 to generate datasets for the analysis of 5G-MEC security," in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), 2022, pp. 2256-2261.
Y.-E. Kim, Y.-S. Kim, and H. Kim, "Effective feature selection methods to detect IoT DDoS attack in 5G core network," Sensors, vol. 22, no. 10, p. 3819, 2022.
H. Mun, M. Seo, and D. H. Lee, "Secure privacy-preserving V2V communication in 5G-V2X supporting network slicing," IEEE Trans. Intell. Transp. Syst., vol. 23, no. 9, pp. 14439-14455, Sep. 2022.
J.-H. Cho et al., "Toward proactive, adaptive defense: A survey on moving target defense," IEEE Commun. Surveys Tuts., vol. 22, no. 1, pp. 709-745, 1st Quart., 2020.
L. Fei-Fei, R. Fergus, and P. Perona, "One-shot learning of object categories," IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 4, pp. 594-611, Apr. 2006.
H. Sedjelmaci, S. M. Senouci, N. Ansari, and A. Boualouache, "A trusted hybrid learning approach to secure edge computing," IEEE Consum. Electron. Mag., vol. 11, no. 3, pp. 30-37, May 2022.
C. Benzaid and T. Taleb, "AI-driven zero touch network and service management in 5G and beyond: Challenges and research directions," IEEE Netw., vol. 34, no. 2, pp. 186-194, Mar./Apr. 2020.
A. Boualouache, R. Soua, and T. Engel, "SDN-based misbehavior detection system for vehicular networks," in Proc. IEEE 91st Veh. Technol. Conf. (VTC-Spring), 2020, pp. 1-5.
M. Ambrosin, L. L. Yang, X. Liu, M. R. Sastry, and I. J. Alvarez, "Design of a misbehavior detection system for objects based shared perception V2X applications," in Proc. IEEE Intell. Transp. Syst. Conf. (ITSC), 2019, pp. 1165-1172.
M. Tsukada, S. Arii, H. Ochiai, and H. Esaki, "Misbehavior detection using collective perception under privacy considerations," 2021, arXiv:2111.03461.
C. Buerkle, F. Geissler, M. Paulitsch, and K.-U. Scholl, "Fault-tolerant perception for automated driving a lightweight monitoring approach," 2021, arXiv:2111.12360.
X. Liu et al., "MISO-V: Misbehavior detection for collective perception services in vehicular communications," in Proc. IEEE Intell. Veh. Symp. (IV), 2021, pp. 369-376.
F. Geissler, A. Unnervik, and M. Paulitsch, "A plausibility-based fault detection method for high-level fusion perception systems," IEEE Open J. Intell. Transp. Syst., vol. 1, pp. 176-186, 2020.
P. Sharma, D. Austin, and H. Liu, "Attacks on machine learning: Adversarial examples in connected and autonomous vehicles," in Proc. IEEE Int. Symp. Technol. Homeland Security (HST), 2019, pp. 1-7.
A. Qayyum, M. Usama, J. Qadir, and A. Al-Fuqaha, "Securing connected & autonomous vehicles: Challenges posed by adversarial machine learning and the way forward," IEEE Commun. Surveys Tuts., vol. 22, no. 2, pp. 998-1026, 1st Quart., 2020.
L. Lyu, H. Yu, J. Zhao, and Q. Yang, "Threats to federated learning," in Federated Learning. Heidelberg, Germany: Springer, 2020, pp. 3-16.
A. Talpur and M. Gurusamy, "Adversarial attacks against deep reinforcement learning framework in Internet of Vehicles," 2021, arXiv:2108.00833.
R. Xing, Z. Su, N. Zhang, Y. Peng, H. Pu, and J. Luo, "Trustevaluation-based intrusion detection and reinforcement learning in autonomous driving," IEEE Netw., vol. 33, no. 5, pp. 54-60, 2019.
"Intelligent transport systems (ITS); security; threat, vulnerability and risk analysis (TVRA)," ETSI, Sophia Antipolis, France, Rep. TR 102 893, Mar. 2017.
Intelligent Transport Systems (ITS); Testing; Conformance Test Specifications for ITS PKI Management; Part 1: Protocol Implementation Conformance Statement (PICS), ETSI Standard TS 103 525-1, Jan. 2022.
Intelligent Transport Systems (ITS); Testing; Conformance Test Specifications for ITS PKI Management; Part 2: Test Suite Structure and Test Purposes (TSS & TP), ETSI Standard TS 103 525-2, Jan. 2022.
Intelligent Transport Systems (ITS); Testing; Conformance Test Specifications for ITS PKI Management; Part 3: Abstract Test Suite (ATS) and Protocol Implementation Extra Information for Testing (PIXIT), ETSI Standard TS 103 525-3, Jan. 2022.