I. Introduction
Automated vehicles (AVs) are expected to revolutionize future transportation systems with considerable benefits, such as reduced energy consumption [1], improved smoothness of traffic flow [2], and optimized parking space allocation [3]. Despite these promising benefits, emerging AV technologies open a door for malicious actors to compromise vehicle safety and security which could result in adverse effects on traffic flow [4]. As the first generation of AVs, adaptive cruise control (ACC) vehicles are intrinsically vulnerable to potential cyberattacks. Those attacks can not only be launched in various forms but also cause substantial disruption to normal traffic flow [5]. As ACC vehicles are increasingly equipped with advanced vehicle-to-vehicle (V2V) communication technologies, enabling cooperative ACC (CACC) systems, they become even more vulnerable to attacks since V2V communication channels are subject to various adverse actions [6].