considered. In this respect, we plan to carry out more
extensive experiments with attacks of higher level as
well as targeting other pre-crash scenarios.
ACKNOWLEDGMENT
This work is partially supported by Rijkswaterstaat
under the TU/e Smart Mobility programme, by ITEA3
through the APPSTACLE project (15017) and by
ECSEL through the SECREDAS project.
REFERENCES
Alizadeh, M., Peters, S., Etalle, S., and Zannone, N. (2018).
Behavior Analysis in the Medical Sector: Theory and
Practice. In Proceedings of ACM/SIGAPP Symposium
On Applied Computing. ACM.
Apvrille, L., El Khayari, R., Henniger, O., Roudier, Y.,
Schweppe, H., Seudié, H., Weyl, B., and Wolf,
M. (2010). Secure automotive on-board electronics
network architecture. In Proceedings of FISITA 2010
World Automotive Congress. EURECOM.
Costante, E., den Hartog, J., Petkovi
´
c, M., Etalle, S., and
Pechenizkiy, M. (2017). A white-box anomaly-based
framework for database leakage detection. Journal of
Information Security and Applications, 32:27–46.
Eboli, L., Mazzulla, G., and Pungillo, G. (2017). How
drivers’ characteristics can affect driving style. Trans-
portation Research Procedia, 27:945–952.
European Telecommunications Standards Institute (2012).
ETSI TS 102 940 V1.1.1 - Intelligent Transport
Systems (ITS); Security; ITS communications security
architecture and security management.
Foster, I. D., Prudhomme, A., Koscher, K., and Savage, S.
(2015). Fast and vulnerable: A story of telematic
failures. In Proceedings of USENIX Workshop on
Offensive Technologies. USENIX Association.
Golle, P., Greene, D., and Staddon, J. (2004). Detecting and
correcting malicious data in VANETs. In Proceedings
of the 1st ACM International Workshop on Vehicular
Ad Hoc Networks, pages 29–37. ACM.
Harding, J., Powell, G., Yoon, R., Fikentscher, J., Doyle,
C., Sade, D., Lukuc, M., Simons, J., and Wang, J.
(2014). Vehicle-to-Vehicle communications: Readi-
ness of V2V technology for application.
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T.,
Checkoway, S., McCoy, D., Kantor, B., Anderson, D.,
Shacham, H., et al. (2010). Experimental security
analysis of a modern automobile. In Proceedings of
IEEE Symposium on Security and Privacy, pages 447–
462.
Lo, N.-W. and Tsai, H.-C. (2007). Illusion attack on VANET
applications - a message plausibility problem. In
Proceedings of Globecom Workshops, pages 1–8.
Mazloom, S., Rezaeirad, M., Hunter, A., and McCoy, D.
(2016). A security analysis of an in vehicle infotain-
ment and app platform. In Proceedings of USENIX
Workshop on Offensive Technologies. USENIX Associ-
ation.
Miller, C. and Valasek, C. (2015). Remote exploitation of
an unaltered passenger vehicle. Black Hat.
Najm, W. G., Toma, S., and Brewer, J. (2013). Depiction
of priority light-vehicle pre-crash scenarios for safety
applications based on vehicle-to-vehicle communica-
tions. Technical report, National Highway Traffic
Safety Adminstration (NHTSA).
National Highway Traffic Safety Administration (NHTSA)
(2017). Federal motor vehicle safety standards; V2V
communications. Proposed Rule.
Palanca, A., Evenchick, E., Maggi, F., and Zanero, S. (2017).
A stealth, selective, link-layer denial-of-service attack
against automotive networks. In Proceedings of Confe-
rence on Detection of Intrusions and Malware & Vulne-
rability Assessment, pages 185–206. Springer.
Papadimitratos, P., Gligor, V., and Hubaux, J.-P. (2006).
Securing Vehicular Communications – Assumptions,
Requirements, and Principles. In Proceedings of
Workshop on Embedded Security in Cars, pages 5–14.
Raya, M. and Hubaux, J.-P. (2007). Securing vehicular ad
hoc networks. Journal of Computer Security, 15(1):39–
68.
SAE Motor Vehicle Council (2008). Draft SAE J2735 - Dedi-
cated Short Range Communications (DSRC) Message
Set Dictionary.
Schmidt, R. K., Leinmüller, T., Schoch, E., Held, A., and
Schäfer, G. (2008). Vehicle behavior analysis to
enhance security in vanets. In Proceedings of the 4th
IEEE Vehicle-to-Vehicle Communications Workshop
(V2VCOM2008).
Sommer, R. and Paxson, V. (2010). Outside the closed
world: On using machine learning for network intru-
sion detection. In Proceedings of IEEE Symposium on
Security and Privacy, pages 305–316. IEEE.
Stübing, H., Jaeger, A., Schmidt, C., and Huss, S. A. (2010).
Verifying mobility data under privacy considerations in
Car-to-X communication. In Proceedings of the 17th
ITS World Congress.
Toma, S., Swanson, E., and Najm, W. G. (2013). Light
vehicle crash avoidance needs and countermeasure
profiles for safety applications based on vehicle-to-
vehicle communications. Technical report, National
Highway Traffic Safety Adminstration (NHTSA).
U.S. Department of Transportation (2018). Safety
Pilot Model Deployment data. https://data.
transportation.gov/Automobiles/Safety-Pilot-Model-
Deployment-Data/a7qq-9vfe. Accessed: 2018-03-01.
Xiao, B., Yu, B., and Gao, C. (2006). Detection and localiza-
tion of sybil nodes in VANETs. In Proceedings of the
2006 Workshop on Dependability Issues in Wireless Ad
Hoc Networks and Sensor Networks, pages 1–8. ACM.
Feature Selection for Anomaly Detection in Vehicular Ad Hoc Networks
491