The connected autonomous vehicle will never be completely autonomous; on the contrary, it will be heavily dependent on so called Vehicular ad-hoc Networks for its function. To deserve the trust of the general public, the vehicles as well as the Intelligent Transport System infrastructure must be able to handle not only natural disturbances, but also attacks of a malicious nature. In this paper,
... [Show full abstract] we discuss the effects of antagonistic attacks using Intentional Electromagnetic Interference and how the antagonistic nature of the threat renders probabilistic risk analysis inadequate for the defense of the vehicles and the infrastructure. Instead, we propose a shift towards resilience engineering and vulnerability analysis to manage antagonistic threats. Finally, we also give two examples of possible scenarios to illustrate the type of situations a connected autonomous vehicle must be able to handle.