I. Bilogrevic, I. Aad, P. Ginzboorg, V. Niemi, and J. Hubaux, Track me if you can: On the effectiveness of context-based identifier changes in deployed mobile networks, NDSS, 2012.

L. Buttyán, T. Holczer, and I. Vajda, On the effectiveness of changing pseudonyms to provide location privacy in vanets, ESAS, 2007.

T. Cain, , 2016.

S. Chapkin, B. Bako, F. Kargl, and E. Schoch, Location tracking attack in ad hoc networks based on topology information, IEEE MASS, 2006.

B. Chaurasia, S. Verma, G. Tomar, and A. Abraham, Optimizing pseudonym updation in vehicular ad-hoc networks, Transactions on Computational Science IV, pp.136-148, 2009.

B. K. Chaurasia, S. Verma, G. S. Tomar, and S. Bhaskar, Pseudonym based mechanism for sustaining privacy in vanets, IEEE CICSYN, 2009.

M. Duckham and L. Kulik, Simulation of obfuscation and negotiation for location privacy, COSIT, 2005.

D. Eckhoff, C. Sommer, T. Gansen, R. German, and F. Dressler, Strong and affordable location privacy in vanets: Identity diffusion using timeslots and swapping, IEEE VNC, 2010.

J. Freudiger, M. Raya, M. Félegyházi, P. Papadimitratos, and J. P. Hubaux, Mix-zones for location privacy in vehicular networks, ACM WiN-ITS, 2007.

M. T. Garip, M. E. Gursoy, P. Reiher, and M. Gerla, Congestion attacks to autonomous cars using vehicular botnets, NDSS, 2015.

M. T. Garip, P. H. Kim, P. Reiher, and M. Gerla, Interloc: An interference-aware rssi-based localization and sybil attack detection mechanism for vehicular ad hoc networks, IEEE CCNC, 2017.

M. T. Garip, P. Reiher, and M. Gerla, Ghost: Concealing vehicular botnet communication in the vanet control channel, IEEE IWCMC, 2016.

M. Gerlach and F. Guttler, Privacy in vanets using changing pseudonyms-ideal and real, IEEE VTC, 2007.

B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, Achieving guaranteed anonymity in gps traces via uncertainty-aware path cloaking, IEEE Transactions on Mobile Computing, vol.9, issue.8, pp.1089-1107, 2010.

L. Huang, H. Yamane, K. Matsuura, and K. Sezaki, Towards modeling wireless location privacy, International Workshop on Privacy Enhancing Technologies, 2005.

M. Li, K. Sampigethaya, L. Huang, and R. Poovendran, Swing & swap: user-centric approaches towards maximizing location privacy, ACM Workshop on Privacy in Electronic Society, 2006.

C. Lin, K. Liu, B. Xu, J. Deng, C. W. Yu et al., Vclt: An accurate trajectory tracking attack based on crowdsourcing in vanets, vol.3, 2015.

Y. Pan, J. Li, L. Feng, and B. Xu, An analytical model for random changing pseudonyms scheme in vanets, IEEE NCIS, 2011.

J. Petit, D. Broekhuis, M. Feiri, and F. Kargl, Connected vehicles: Surveillance threat and mitigation, 2015.

J. Petit, F. Schaub, M. Feiri, and F. Kargl, Pseudonym schemes in vehicular networks: A survey, IEEE Communications Surveys & Tutorials, vol.17, issue.1, pp.228-255, 2015.

S. Rosenblatt, Car hacking code released at defcon

K. Sampigethaya, M. Li, L. Huang, and R. Poovendran, Amoeba: Robust location privacy scheme for vanet, IEEE JSAC, vol.25, issue.8, 2007.

G. Smith, Driverless car could be hacked by 14-year-old from indonesia, senator warns, 2013.

C. Sommer, Veins: Vehicles in network simulation

A. Studer, E. Shi, F. Bai, and A. Perrig, Tacking together efficient authentication, revocation, and privacy in vanets, IEEE SECON, 2009.

Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications, IEEE TVT, vol.59, issue.7, pp.3589-3603, 2010.

U. , Department of Transportation. National motor vehicle crash causation survey, DOT HS, vol.811, p.59, 2008.

U. S. , Department of Transportation FHWA. Mitigation strategies for design exceptions, 2014.

M. Wernke, P. Skvortsov, F. Dürr, and K. Rothermel, A classification of location privacy attacks and approaches, JPUC, vol.18, issue.1, pp.163-175, 2014.

L. Wireless and . Group, Wireless access in vehicular environments, 2010.