“…[15], [41], [42], [43], [44] Command Injection Request execution of existing command with malicious intent, typically to affect actuation [30], [15], [31], [32] Impersonation (or masquerade or spoofing) attack An adversary assumes successfully the identity of one of the legitimate nodes in the vehicular network [41], [45], [44], [46], [36], [47], [48], [49] Packet Duplication Transmit unnecessary network messages to exhaust bandwidth or trigger unnecessary processing [24], [23], [25] Selective Forwarding Retransmit data selectively in a vehicular network [24], [23], [25] GPS Jamming Jam legitimate GPS signals; possibly followed by GPS spoofing [28] GPS Spoofing Transmit false GPS signals to disrupt or hijack navigation of a GPSdependent vehicle, such as a UAV [28] Fuzzing (Fuzz testing) Send random messages to the in-vehicle network to trigger critical instructions in a brute force manner) [21] False Data Injection Transmit false data to trigger malicious events or affect situational/environmental awareness [28] False Information Dissemination Transmit false data, e.g. a reputation score, to affect a collaborative process in a network [28], [50] Location Spoofing Share false location coordinates within a vehicular network [39] Malware Infect vehicle with malicious software/firmware by compromising supply chain or hijacking an update [30], [51], [52], [19], [53] Resource exhaustion attack Exhaust a vehicle's battery/fuel, network, processing or other resource by repeating requests, infecting with malware, etc.…”