Data modification in V2I communication poses a serious threat, with the chief concern being the modification of data that could affect system integrity. Currently, automotive companies can update their latest vehicle systems through wireless connections. These updates can impact safety-critical aspects of the system and if maliciously modified could have detrimental effects on vehicle performance and behavior \cite{lotfi_towards_2013}. Attackers capable of modifying the update data could do so even if the data were encrypted, as any erroneous data could cause system failure and result in deaths, injuries, or damages.

Communication integrity must be verified to deal with message tampering between entities, especially when coming from important servers such as the manufacturer. Protection could be implemented using message authentication techniques such as signing, as well as restricting delivery methods based on message content \cite{hideaki_approaches_2013}. In addition, data should be verified in timely manner, before it is allowed to affect the system. This will allow the system to reject data safely if tampering is detected \cite{kyusuk_practical_2014}.