“…CAN [52], [50], [51], [26] Eavesdropping, DoS attack, replay attack and unauthorized data transmission, bus fuzzing/frame falsifying/injection attack Confidentiality/authenticity/privacy of CAN messages, Intrusion Detection System (IDS) based defense techniques, securing telematics ECUs, cryptography, clock skew estimation of CAN messages, network segmentation. LiDAR [50], [53], [54] Spoofing, jamming, random modulation, signals counterfeiting Dynamic watermarking, reduction of signal-receiving angle, pulses transmission in random directions, and pulses' waveforms randomization, device fingerprinting, data authentication.…”