.. .. Test-network,

.. .. Train-network,

. .. Train-vehicle-density,

, Simulation Scenario: Part of Luxembourg city

. .. , Detection accuracy of Data replay Sybil per number of received reports, p.74

. .. , Detection accuracy of Dos disruptive Sybil per number of received reports, p.74

, Detection accuracy of traffic congestion Sybil per number of received reports, p.75

. .. , Detection accuracy of Dos Random Sybil per number of received reports, p.75

. .. Tracking-algorithm,

, Highway scenario (100 km long), 4 lanes for each direction

, Brooklyn grid road network scenario

, Prediction error for fail and success scenario

, 27 CDF of being untraceable vs number of attacker spots

, Basic vs kalman filter prediction quality on highway scenario

, Basic vs kalman filter prediction quality on grid scenario

. .. , CDF Car2car grid scenario with different silent period duration (0,1,2 seconds), p.93

. .. , CDF Car2car highway scenario with different silent period duration (0,1,2 seconds), p.94

. .. , 32 CDF random grid scenario with different silent period duration (0,1,2 seconds), p.95

. .. , 33 CDF random highway scenario with different silent period duration (0,1,2 seconds), p.96

E. .. Wireshark,

. .. , Data path within the ITS-S architecture when sending an AT request, p.102

, AT request/response using TIG or TI3G profile

, Use case picture (left) and testbed deployment (right)

, AT request/response median packet size on the G5 network

, AT request/response round-trip latency

.. .. In-vehicle-equipments,

. .. , Google Maps ©: Versailles-Satory test track (green line = RSU coverage), vol.109, p.vi

, Number of pseudonyms (or AT) reloaded versus speed for both communication profiles, p.110

, Pseudonyms reload median end-to-end latency versus speed

.. .. Scoop,

, Google Maps ©: Open road (Technocentre Renault and Versailles route)-photo from google maps

, SCOOP vehicle used in the test

, RTT AT request/response on cellular technology

. .. , RTT AT request/response packet size on cellular technology, p.116

. .. Embedded-security-architecture, 125 vii Another perspective is the choice of technology per UC and the resilience of technology for autonomous vehicles. Current ETSI standards handle only the ITS-G5 part, many security use cases may be better handled using cellular technologies

H. Farah, K. Arnaud, L. Brigitte, U. Pascal, and D. Richard, C-ITS use cases: study, extension and classification methodology, IEEE 87th Vehicular Technology Conference, 2017.

H. Farah, K. Arnaud, L. Brigitte, and U. Pascal, Risk Analysis on C-ITS pseudonymity aspects, IEEE/IFIP 10th New Technologies, Mobility and Security (NTMS), 2019.

K. Joseph, H. Farah, B. Ines, . Jemaa, K. Arnaud et al., A Misbehavior Authority System for Sybil AttackDetection in C-ITS, 10th IEEE Annual Ubiquitous Computing, Electronics, and Mobile Communication Conference (UEMCON), 2019.

H. Farah, K. Arnaud, and L. Brigitte, On the Performance Evaluation of Vehicular PKI Protocol for V2X Communications Security, IEEE 86th Vehicular Technology Conference, 2017.

H. Farah, K. Arnaud, L. Brigitte, U. Pascal, and C. Pki, Performance Evaluation in a Real Environment, IEEE/IFIP 15th Wireless On-demand Network systems and Services Conference (WONS), 2019.

H. Farah, J. Kamel, I. B. Jemaa, A. Kaiser, L. Brigitte et al., DARE dataset specifications for each scenario, IEEE 91th Vehicular Technology Conference (VTC), vol.2020

H. Farah, B. Farah, L. Brigitte, and P. Urien, Performance Evaluation of Pseudonym Reload overCellular Technology, IEEE/IFIP 11th New Technologies, Mobility and Security (NTMS), vol.2021

J. Mohamednidhalmejri and M. Ben-othman, Survey on VANET security challenges and possible cryptographic solutions, ScienceDirect, pp.53-66, 2014.

K. Do and B. Martini, The Role of the Adversary Model in Applied Security Research. Cryptology ePrint Archive, 2018.

H. Farah, K. Arnaud, L. Brigitte, U. Pascal, and D. Richard, C-ITS use cases: study, extension and classification methodology, IEEE 87th Vehicular Technology Conference, 2017.

H. Farah, K. Arnaud, L. Brigitte, and U. Pascal, Risk Analysis on C-ITS pseudonymity aspects, IEEE/IFIP 10th New Technologies, Mobility and Security (NTMS), 2019.

K. Joseph, H. Farah, B. Ines, . Jemaa, K. Arnaud et al.,

, A Misbehavior Authority System for Sybil AttackDetection in C-ITS, 10th IEEE Annual Ubiquitous Computing, Electronics, and Mobile Communication Conference (UEMCON), 2019.

H. Farah, K. Joseph, I. B. Jemaa, A. Kaiser, L. Brigitte et al., DARE dataset specifications for each scenario, IEEE 91th Vehicular Technology Conference (VTC), p.2020

H. Farah, K. Arnaud, and L. Brigitte, On the Performance Evaluation of Vehicular PKI Protocol for V2X Communications Security, IEEE 86th Vehicular Technology Conference, 2017.

H. Farah, K. Arnaud, L. Brigitte, and U. Pascal, C-ITS PKI protocol: Performance Evaluation in a Real Environment, IEEE/IFIP 15th Wireless On-demand Network systems and Services Conference (WONS), 2019.

, ETSI EN 302 663 V1.2.0. Intelligent Transport Systems (ITS); Access layer specification for Intelligent Transport Systems operating in the 5 GHz frequency band, 2012.

. Autotalks, ITS-G5 technology -A Fact Sheet, 2010.

, ETSI, vol.302, pp.637-639

, Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service, 2018.

H. Liping and S. Lei, Research on Trust Model of PKI, Fourth International Conference on Intelligent Computation Technology and Automation, pp.232-235, 2011.

, ETSI TS 102 940 V1.3.1. Intelligent Transport Systems (ITS); Security; ITS communications security architecture and security management, pp.338-350, 2018.

W. Whyte, A. Weimerskirch, V. Kumar, and T. Hehn, A Security Credential Management System for V2V Communications, IEEE Vehicular Networking Conference, pp.22-23, 2013.

M. D. Furtado,

R. D. Mushrall,

H. Liu, Threat Analysis of the Security Credential Management System for Vehicular Communications, IEEE International Symposium on Technologies for Homeland Security (HST), 2018.

D. Cham, Eugtne van Heyst. Group Signatures. EUROCRYPT '91, pp.257-265, 1991.

, CAR 2 CAR Communication Consortium

. Etsi and . En, 302 665 V1.1.1. Intelligent Transport Systems (ITS)

, Communications Architecture, pp.13-16, 2010.

, ISO/IEC 7498-1. Information technology -Open Systems Interconnection -Basic Reference Model: The Basic Model, 1994.

, EN 302 636-5-1 V1.2.1. Intelligent Transport Systems (ITS)

, Vehicular Communications; GeoNetworking; Part 5: Transport Protocols; Sub-part 1: Basic Transport Protocol, 2014.

, EN 302 636-4-1 V1.2.1. Intelligent Transport Systems (ITS)

, Vehicular Communications; GeoNetworking; Part 4: Geographical addressing and forwarding for point-to-point and point-to-multipoint communications, Media-Independant Functionality, vol.1, 2014.

, EN, vol.302, pp.636-642

, Vehicular Communications; GeoNetworking; Part 6: Internet Integration; Sub-part 1: Transmission of IPv6 Packets over GeoNetworking Protocols, 2011.

, Intelligent Transport Systems (ITS, vol.102, pp.894-895

, Users and applications requirements; Part 1: Facility layer structure, functional requirements and specifications, 2013.

, IEEE Guide for Wireless Access in Vehicular Environments (WAVE) -Architecture, pp.0-2013, 2013.

H. Meriem, M. Lahcen, H. , and A. Elfergougui, Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree, International Workshop on Technologies, Algorithms, Models, Platforms and Applications for Smart Cities, 2018.

M. Sinha and A. Kumar, Overview on Vehicular Ad Hoc Network and its Security Issues, 2nd International Conference on Trends in Electronics and Informatics (ICOEI), 2018.

M. Raya and J. Hubaux, Security aspects of inter-vehicle communications. 5th Swiss Transport Research Conference (STRC), 2005.

B. Parno and A. Perrig, Challenges in Securing Vehicular Networks. HotNets-IV, 2005.

R. Sures-ghassan, . Samara, A. H. Wafaa, and . Al-salihy, Some Properties of Uniform Step Size Quantizers, Second International Conference on Network Applications, Protocols and Services, 2010.

Y. Fan, Z. Zhang, M. Trinkle, A. D. Dimitrovski, . Ju-bin et al., A Cross-Layer Defense Mechanism Against GPS Spoofing Attacks on PMUs in Smart Grids, IEEE TRANSACTIONS ON SMART GRID, vol.6, 2015.

A. Boualouache, S. Senouci, and S. Moussaoui, A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks, IEEE Communications Surveys Tutorials, 2017.
URL : https://hal.archives-ouvertes.fr/hal-02542259

J. Petit, D. Broekhuis, M. Feiri, and F. Kargl, Connected Vehicles: Surveillance Threat and Mitigation, 2015.

, V5.2.3. CYBER; Methods and protocols; Part 1: Method and pro forma for Threat, Vulnerability, Risk Analysis (TVRA), ETSI TS, vol.102, pp.165-166, 2017.

, ETSI TR 102 638 V1.1.1. Intelligent Transport Systems (ITS)

, Vehicular Communications; Basic Set of Applications; Definitions, 2009.

G. Pocovi, M. Lauridsen, B. Soret, K. I. Pedersen, and P. Mogensen, Automation for On-road Vehicles: Use Cases and Requirements for Radio Design, Vehicular Technology Conference (VTC Fall), 2015.

, 5GPPP. 5G Automotive Vision, 2015.

K. Sjoberg, P. A. , T. Buburuzan, and . Brakemeier, Cooperative Intelligent transport systems in europe Current Deployment Status and Outlook, Vehicular Technology Magazine, 2017.

. Etsi and . Etsi, Intelligent Transport Systems (ITS) Security Threat Vulnerability and Risk Analysis (TVRA), TR, vol.102, p.893, 2017.

M. Rim, L. Brigitte, L. Houda, and S. Noemie, How to Secure ITS Applications, Ad Hoc Networking Workshop (Med-Hoc-Net), 2012.

K. Wagstaff, C. Cardie, S. Rogers, and S. Schroedl, Constrained K-means Clustering with Background Knowledge, International Conference on Machine Learning

K. A. Nazeer and M. P. Sebastian, Imroving the Accurancy and Efficiency of the K-means Clustering Algorithm, In World Congress on Engineering, 2009.

P. Singh, Clustering Techniques in Data Mining: A Comparison. Bharati Vidyapeeth's Institute of Computers, Applications and Management (BVICAM), pp.170-182, 2015.

B. Berrehili-fatima-zahra and . Abdelhamid, Risk analysis in Internet of Things using EBIOS, IEEE 7th Annual Computing and Communication Workshop and Conference, 2017.

. Etsi and . Etsi, Methods and protocols, Part 1: Method and pro forma for Threat, Vulnerability, Risk Analysis (TVRA), TS, vol.102, issue.165, 2017.

M. Rim, L. Houda, L. Brigitte, and S. Noemie, Risk Analysis Study of ITS Communication Architecture, Third International Conference on The Network of the Future (NOF), 2012.

J. Douceur, the Sybil Attack, First International Workshop on Peer-to-Peer Systems, 2003.

J. Kamel, A. Kaiser, I. B. Jemaa, P. Cincilla, and P. Urien, CaTch: A Confidence Range Tolerant Misbehavior Detection Approach, IEEE Wireless Communications and Networking Conference (WCNC), 2019.
URL : https://hal.archives-ouvertes.fr/hal-02126960

, Security Policy & Governance Framework for Deployment and Operation of European Cooperative Intelligent Transport Systems (C-ITS). Cooperative, connected and automated mobility (CCAM), pp.1-36, 2017.

A. A. Pouyan and M. Alimohammadi, Sybil Attack Detection in Vehicular Networks, Computer Science and Information Technology 2.4, pp.197-202, 2014.

Y. Hao, J. Tang, and Y. Cheng, Cooperative sybil attack detection for position based applications in privacy preserved vanets, IEEE Global Telecommunications Conference -GLOBECOM, pp.1-5, 2011.

F. A. Ghaleb, A. Zainal, M. A. Rassam, and F. Mohammed, An effective misbehavior detection model using artificial neural network for vehicular ad hoc network applications, 2017 IEEE Conference on Application, Information and Network Security (AINS), pp.13-18, 2017.

R. Shrestha, S. Djuraev, and S. Y. Nam, Sybil attack detection in vehicular network based on received signal strength, 2014 International Conference on Connected Vehicles and Expo (ICCVE), pp.745-746, 2014.

D. Gantsou, On the use of security analytics for attack detection in vehicular ad hoc networks, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), pp.1-6, 2015.

A. K. Sharma, S. K. Saroj, S. K. Chauhan, and S. K. Saini, Sybil attack prevention and detection in vehicular ad hoc network, 2016 International Conference on Computing, Communication and Automation (ICCCA), pp.594-599, 2016.

S. So, P. Sharma, and J. Petit, Integrating plausibility checks and machine learning for misbehavior detection in vanet, 17th IEEE International Conference on Machine Learning and Applications (ICMLA), pp.564-571, 2018.

J. Kamel, A. Kaiser, I. B. Jemaa, P. Cincilla, and P. Urien, CaTch: a confidence range tolerant misbehavior detection approach, 2019 IEEE Wireless Communications and Networking Conference (WCNC) (IEEE WCNC 2019), 2019.
URL : https://hal.archives-ouvertes.fr/hal-02126960

J. Kamel, Github repository: Framework for misbehavior detection (f 2 md), 2019.

K. Joseph, H. Farah, I. B. Jemaa, A. Kaiser, L. Brigitte et al., A Misbehavior Authority System for Sybil Attack Detection in C-ITS, IEEE UEMCON 2019, 2013.

, Framework For Misbehavior Detection (F 2 MD). F 2 MD website, 2019.

C. Sommer, R. German, and F. Dressler, Bidirectionally coupled network and road traffic simulation for improved ivc analysis, IEEE Transactions on Mobile Computing, vol.10, issue.1, pp.3-15, 2011.

L. Codeca, R. Frank, and T. Engel, Luxembourg sumo traffic (lust) scenario: 24 hours of mobility for vehicular networking research, IEEE Vehicular Networking Conference (VNC), pp.1-8, 2015.

J. Petit and R. Ansari, V2X Validation Tool, 2018.

J. Petit, F. Schaub, M. Feiri, and F. Kargl, Pseudonym schemes in vehicular networks: A survey, IEEE Communications Surveys Tutorials, vol.17, issue.1, pp.228-255, 2015.

, Intelligent Transport Systems (ITS); Security; Pre-standardization study on pseudonym change management, 2018.

Y. Pan, J. Li, L. Feng, and B. Xu, An analytical model for random changing pseudonyms scheme in VANETs, 2011 International Conference on Network Computing and Information Security (NCIS), 2011.

. Sampigethaya-k, . Huang, . Li, . Poovendran-r, . Matsuura-k et al., Providing location privacy for VANET, the Third Workshop on Embedded Security in Cars (ESCAR '05), 2005.

K. Emara, W. Woerndl, and J. Schlichter, CAPS: Context-Aware Privacy Scheme for VANET Safety Applications, The 8th ACM Conference on Security Privacy in Wireless and Mobile Networks, 2015.

A. R. Beresford and F. Stajano, Location Privacy in Pervasive Computing, Journal IEEE Pervasive Computing, 2003.

J. Freudiger, M. Raya, M. Félegyházi, P. Papadimitratos, and J. Hubaux, Mix-Zones for Location Privacy in Vehicular Networks, ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS), 2007.

. Sae-j2735, Dedicated Short Range Communications (DSRC) Message Set Dictionary

, PRESERVE project deliverable D5.3. Deployment issues report v3, 2013.

S. Lefevre, J. Petit, R. Bajcsy, C. Laugier, and F. Kargl, Impact of V2X Privacy Strategies on Intersection Collision Avoidance Systems, IEEE Vehicular Networking Conference (VNC'13), 2013.
URL : https://hal.archives-ouvertes.fr/hal-00905936

B. Wiedersheim, Z. Ma, F. Kargl, and P. Papadimitratos, Privacy in Inter-Vehicular Networks: Why simple pseudonym change is not enough, The Seventh International Conference on Wireless On-demand Network Systems and Services (WONS2010), 2010.

D. Forster, H. Lohr, A. Gratz, J. Petit, and F. Kargl, An Evaluation of Pseudonym Changes for Vehicular Networks in Large-Scale, Realistic Traffic Scenarios, IEEE Transactions on Intelligent Transportation Systems, 2017.

K. Emara, W. Woerndl, and J. Schlichter, Beacon-based Vehicle Tracking in Vehicular Ad-hoc Networks, 2013.

, Car 2 Car Communication consortium

D. Zentrum-für-luft-und-raumfahrt,

C. Sommer, R. German, and F. Dressler, Bidirectionally coupled network and road traffic simulation for improved ivc analysis, IEEE Transactions on Mobile Computing, vol.10, issue.1, pp.3-15, 2011.

, Intelligent Transport Systems (ITS),Security, Trust and Privacy Management, vol.102, p.941, 2018.

. Etsi and . Ts, -1 V1.1.1 -Intelligent Transport Systems (ITS), vol.102, pp.636-642

. Geonetworking, Internet Integration; Sub-part 1: Transmission of IPv6 Packets over GeoNetworking Protocols, 2011.

R. Moalla, B. Lonc, H. Labiod, and N. Simoni, Towards a cooperative its vehicle application oriented security framework, IEEE Intelligent Vehicles Symposium Proceedings, 2014.