resolved. As a future work, more simulation can be
performed using the SUMO tool or NS3 to verify pro-
posed solutions. We could extend formal verification
to other V2X protocols.
REFERENCES
Abadi, M., Blanchet, B., and Fournet, C. (2017). The ap-
plied pi calculus: Mobile values, new names, and se-
cure communication. Journal of the ACM (JACM),
65(1):1–41.
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Com-
pagna, L., Cu
´
ellar, J., Drielsma, P. H., H
´
eam, P.-
C., Kouchnarenko, O., Mantovani, J., et al. (2005).
The avispa tool for the automated validation of in-
ternet security protocols and applications. In Inter-
national conference on computer aided verification,
pages 281–285. Springer.
Avalle, M., Pironti, A., and Sisto, R. (2014). Formal verifi-
cation of security protocol implementations: a survey.
Formal Aspects of Computing, 26(1):99–123.
Baelde, D., Delaune, S., and Moreau, S. (2020a). A method
for proving unlinkability of stateful protocols. In 2020
IEEE 33rd Computer Security Foundations Sympo-
sium (CSF), pages 169–183. IEEE.
Baelde, D., Delaune, S., and Moreau, S. (2020b). A Method
for Proving Unlinkability of Stateful Protocols. PhD
thesis, Irisa.
Barbosa, M., Barthe, G., Bhargavan, K., Blanchet, B.,
Cremers, C., Liao, K., and Parno, B. (2021). Sok:
Computer-aided cryptography. In 42nd IEEE Sympo-
sium on Security and Privacy, SP 2021, San Fran-
cisco, CA, USA, 24-27 May 2021, pages 777–795.
IEEE.
Basin, D., Cremers, C., and Meadows, C. (2018). Model
checking security protocols. In Handbook of Model
Checking, pages 727–762. Springer.
Blanchet, B. (2014). Automatic verification of security pro-
tocols in the symbolic model: The verifier proverif.
Foundations of Security Analysis and Design VII,
8604(3):54–87.
Blanchet, B. (2016). Modeling and verifying security proto-
cols with the applied pi calculus and proverif. Founda-
tions and Trends® in Privacy and Security, 1(1-2):1–
135.
Bojjagani, S., Reddy, Y. P., Anuradha, T., Rao, P. V., Reddy,
B. R., and Khan, M. K. (2022). Secure authentica-
tion and key management protocol for deployment of
internet of vehicles (iov) concerning intelligent trans-
port systems. IEEE Transactions on Intelligent Trans-
portation Systems, 23(12):24698–24713.
Chi, L., Msahli, M., Memmi, G., and Qiu, H. (2023).
Public-attention-based adversarial attack on traffic
sign recognition. In 2023 IEEE 20th Consumer
Communications & Networking Conference (CCNC),
pages 740–745. IEEE.
Comon, H. and Koutsos, A. (2017). Formal computa-
tional unlinkability proofs of rfid protocols. In 2017
IEEE 30th Computer Security Foundations Sympo-
sium (CSF), pages 100–114. IEEE.
Contreras-Castillo, J., Zeadally, S., and Guerrero-Iba
˜
nez,
J. A. (2017). Internet of vehicles: architecture, pro-
tocols, and security. IEEE internet of things Journal,
5(5):3701–3709.
Dolev, D. and Yao, A. (1983). On the security of public key
protocols. IEEE Transactions on information theory,
29(2):198–208.
ETSI, T. Etsi ts 102 941 v1. 1.1-intelligent transport sys-
tems (its); security; trust and privacy management,”
standard, tc its, 2012.
ETSI, T. (2010). Etsi ts 102 731 v1. 1.1-intelligent transport
systems (its); security; security services and architec-
ture. Standard, TC ITS.
Haidar, F., Kaiser, A., and Lonc, B. (2017). On the per-
formance evaluation of vehicular pki protocol for v2x
communications security. In 2017 IEEE 86th vehic-
ular technology conference (VTC-Fall), pages 1–5.
IEEE.
Hirschi, L., Baelde, D., and Delaune, S. (2019a). A method
for unbounded verification of privacy-type properties.
Journal of Computer Security, 27(3):277–342.
Hirschi, L., Baelde, D., and Delaune, S. (2019b). A method
for unbounded verification of privacy-type properties.
Journal of Computer Security, 27(3):277–342.
Hirschi, L. and et al, B. (2016). A method for verifying
privacy-type properties: the unbounded case. In 2016
IEEE Symposium on Security and Privacy (SP), pages
564–581. IEEE.
Lafourcade, P. and Puys, M. (2015). Performance eval-
uations of cryptographic protocols verification tools
dealing with algebraic properties. In International
Symposium on Foundations and Practice of Security,
pages 137–155. Springer.
Lafourcade, P., Terrade, V., and Vigier, S. (2009). Compar-
ison of cryptographic verification tools dealing with
algebraic properties. In International Workshop on
Formal Aspects in Security and Trust, pages 173–185.
Springer.
Lamssaggad, A., Benamar, N., Hafid, A. S., and Msahli, M.
(2021). A survey on the current security landscape
of intelligent transportation systems. IEEE Access,
9:9180–9208.
Lone, F. R., Verma, H. K., and Sharma, K. P. (2022). Rec-
ommender credibility-based trust model for secure
v2x communication. In 2022 5th International Con-
ference on Computational Intelligence and Networks
(CINE), pages 1–6. IEEE.
Lu, Z., Qu, G., and Liu, Z. (2019). A survey on recent
advances in vehicular network security, trust, and pri-
vacy. IEEE Transactions on Intelligent Transportation
Systems, 20(2):760–776.
Meier, S., Schmidt, B., Cremers, C., and Basin, D. (2013).
The tamarin prover for the symbolic analysis of se-
curity protocols. In International conference on com-
puter aided verification, pages 696–701. Springer.
Monteuuis, J. P., Hammi, B., Salles, E., Labiod, H.,
Blancher, R., Abalea, E., and Lonc, B. (2017). Se-
curing pki requests for c-its systems. In 2017 26th In-
Formal Analysis of C-ITS PKI Protocols
209