Security Strategies Against Tampering and Malicious Drivers