Defining C-ITS Environment and Attack Scenarios