{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T10:22:51Z","timestamp":1775125371669,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T00:00:00Z","timestamp":1588032000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T00:00:00Z","timestamp":1588032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100006636","name":"University of Maryland, Baltimore County","doi-asserted-by":"publisher","award":["start-up grant"],"award-info":[{"award-number":["start-up grant"]}],"id":[{"id":"10.13039\/100006636","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Transp Secur"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s12198-020-00208-0","type":"journal-article","created":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T01:02:22Z","timestamp":1588035742000},"page":"19-31","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Improving CAN bus security by assigning dynamic arbitration IDs"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4649-3467","authenticated-orcid":false,"given":"Riadul","family":"Islam","sequence":"first","affiliation":[]},{"given":"Rafi Ud Daula","family":"Refat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,28]]},"reference":[{"key":"208_CR1","doi-asserted-by":"publisher","first-page":"21,266","DOI":"10.1109\/ACCESS.2019.2894183","volume":"7","author":"OY Al-Jarrah","year":"2019","unstructured":"Al-Jarrah OY, Maple C, Dianati M, Oxtoby D, Mouzakitis A (2019) Intrusion detection systems for intra-vehicle networks: a review. IEEE Access 7:21,266\u201321,289","journal-title":"IEEE Access"},{"key":"208_CR2","doi-asserted-by":"publisher","first-page":"127,580","DOI":"10.1109\/ACCESS.2019.2937576","volume":"7","author":"O Avatefipour","year":"2019","unstructured":"Avatefipour O, Al-Sumaiti AS, El-Sherbeeny AM, Awwad EM, Elmeligy MA, Mohamed MA, Malik H (2019) An intelligent secured framework for cyberattack detection in electric vehicles\u2019 CAN bus using machine learning. IEEE Access 7:127,580\u2013127,592","journal-title":"IEEE Access"},{"issue":"4","key":"208_CR3","first-page":"553","volume":"44","author":"G Cena","year":"1997","unstructured":"Cena G, Valenzano A (1997) An improved CAN fieldbus for industrial applications. TIE 44(4):553\u2013564","journal-title":"TIE"},{"key":"208_CR4","first-page":"911","volume-title":"Proceedings of the 25th USENIX Conference on Security Symposium (SEC\u201916)","author":"K-T Cho","year":"2016","unstructured":"Cho K-T, Shin KG (2016) Fingerprinting electronic control units for vehicle intrusion detection. In: Proceedings of the 25th USENIX Conference on Security Symposium (SEC\u201916). USENIX Association, USA, pp 911\u2013927"},{"issue":"6","key":"208_CR5","doi-asserted-by":"publisher","first-page":"5618","DOI":"10.1109\/TVT.2019.2907692","volume":"68","author":"F Guo","year":"2019","unstructured":"Guo F, Wang Z, Du S, Li H, Zhu H, Pei Q, Cao Z, Zhao J (2019) Detecting vehicle anomaly in the edge via sensor consistency and frequency characteristic. IEEE Trans Veh Technol 68(6):5618\u20135628","journal-title":"IEEE Trans Veh Technol"},{"key":"208_CR6","unstructured":"Herrewege, Anthony Van, Dave Singel\u00e9e, Ingrid Verbauwhede (2011) CANAuth - A simple, backward compatible broadcast authentication protocol for CAN bus"},{"key":"208_CR7","doi-asserted-by":"crossref","unstructured":"King Z (2017) Investigating and securing communications in the Controller Area Network (CAN), International Conference on Computing, Networking and Communications (ICNC), vol 2017, Santa Clara, CA, pp 814\u2013818","DOI":"10.1109\/ICCNC.2017.7876236"},{"key":"208_CR8","doi-asserted-by":"crossref","unstructured":"Koyama T, Shibahara T, Hasegawa K, Okano Y, Tanaka M, Oshima Y (2019) Anomaly detection for mixed transmission CAN messages using quantized intervals and absolute difference of payloads. In: Proceedings of the ACM Workshop on Automotive Cybersecurity, pp 19\u201324","DOI":"10.1145\/3309171.3309174"},{"key":"208_CR9","first-page":"57","volume":"2017","author":"H Lee","year":"2017","unstructured":"Lee H, Jeong SH, Kim HK (2017) OTIDS: A novel intrusion detection system for in-vehicle network by using remote frame, 15th Annual Conference on Privacy, Security and Trust (PST). Calgary, AB 2017:57\u20135709","journal-title":"Calgary, AB"},{"key":"208_CR10","unstructured":"Lee H, Jeong SH, Kim HK (2018) CAN dataset for intrusion detection. Published by Hacking and Countermeasure Research Lab https:\/\/goo.gl\/WiVeFj"},{"issue":"3","key":"208_CR11","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MNET.2018.1700319","volume":"32","author":"X Li","year":"2018","unstructured":"Li X, Yu Y, Sun G, Chen K (2018) Connected vehicles\u2019 security from the perspective of the in-vehicle network. IEEE Netw 32(3):58\u201363","journal-title":"IEEE Netw"},{"issue":"1","key":"208_CR12","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1186\/s13638-019-1484-3","volume":"2019","author":"SF Lokman","year":"2019","unstructured":"Lokman SF, Othman AT, Abu-Bakar MH (2019) Intrusion detection system for automotive controller area network (CAN) bus system: a review. EURASIP J Wirel Commun Netw 2019(1):184","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"208_CR13","doi-asserted-by":"crossref","unstructured":"Lu Z, Wang Q, Chen X, Qu G, Lyu Y, Liu Z (2019) LEAP: a lightweight encryption and authentication protocol for in-vehicle communications. In: IEEE Intelligent Transportation Systems Conference, pp 1158\u20131164","DOI":"10.1109\/ITSC.2019.8917500"},{"key":"208_CR14","first-page":"1577","volume":"2017","author":"M Marchetti","year":"2017","unstructured":"Marchetti M, Stabili D (2017) Anomaly detection of CAN bus messages through analysis of ID sequences. IEEE Intelligent Vehicles Symposium (IV). Los Angeles, CA 2017:1577\u20131583","journal-title":"Los Angeles, CA"},{"key":"208_CR15","first-page":"1110","volume-title":"Entropy-based anomaly detection for in-vehicle networks","author":"M M\u00fcter","year":"2011","unstructured":"M\u00fcter M, Asaj N (2011) Entropy-based anomaly detection for in-vehicle networks, vol 2011. IEEE Intelligent Vehicles Symposium (IV), Baden-Baden, pp 1110\u20131115"},{"key":"208_CR16","unstructured":"Okuda R, Kajiwara Y, Terashima K (2014) A survey of technical trend of ADAS and autonomous driving. In: Proceedings of Technical Program - 2014 International Symposium on VLSI Technology, Systems and Application (VLSI-TSA), Hsinchu, pp 1\u20134"},{"key":"208_CR17","doi-asserted-by":"crossref","unstructured":"Pawelec K, Bridges RA, Combs FL (2019) Towards a CAN IDS based on a neural network data field predictor. In: Proceedings of the ACM Workshop on Automotive Cybersecurity, AutoSec \u201819, pp 31\u201334","DOI":"10.1145\/3309171.3309180"},{"key":"208_CR18","unstructured":"Python (2019) python-can. https:\/\/python-can.readthedocs.io\/en\/stable\/. Accessed Jan 2019"},{"key":"208_CR19","unstructured":"SocketCAN (2019). https:\/\/en.wikipedia.org\/wiki\/SocketCAN. Accessed Jan 2019"},{"key":"208_CR20","unstructured":"Ryo HK, Hiroaki T, Tomohiro M, Masayuki I, Satosh H (2015) Security authentication system for in-vehicle network. In: SEI Tech. Rev., vol 81, pp 44\u201355"},{"key":"208_CR21","first-page":"1","volume":"21","author":"HM Song","year":"2020","unstructured":"Song HM, Woo J, Kim HK (2020) In-vehicle network intrusion detection using deep convolutional neural network. Veh Commun 21:1\u201313","journal-title":"Veh Commun"},{"key":"208_CR22","doi-asserted-by":"crossref","unstructured":"Stabili D, Marchetti M (2019) Detection of missing CAN messages through inter-arrival time analysis. In: IEEE 90th Vehicular Technology Conference, pp 1\u20137","DOI":"10.1109\/VTCFall.2019.8891068"},{"key":"208_CR23","doi-asserted-by":"crossref","unstructured":"Tanaka D, Yamada M, Kashima H, Kishikawa T, Haga T, Sasaki T (2019) In-vehicle network intrusion detection and explanation using density ratio estimation. In: IEEE Intelligent Transportation Systems Conference, pp 2238\u20132243","DOI":"10.1109\/ITSC.2019.8917300"},{"key":"208_CR24","unstructured":"Tayyab M, Hafeez A, Malik H (2018) Spoofing attack on clock based intrusion detection system in controller area networks, vol 2018. NDIA Ground Vehicle Systems Engineering and Technology Symposium, Novi, Michigan, pp 1\u201313"},{"key":"208_CR25","unstructured":"Wu W, Li R, Xie G, An J, Bai Y, Zhou J, Li K (2019) A survey of intrusion detection for in-vehicle networks. IEEE Trans Intell Transp Syst:1\u201315"},{"key":"208_CR26","doi-asserted-by":"crossref","unstructured":"Ying X, Bernieri G, Conti M, Poovendran R (2019a) TACAN: Transmitter authentication through covert channels in controller area networks. In: Proceedings of the 10th ACM\/IEEE International Conference on Cyber-Physical Systems, pp 23\u201334","DOI":"10.1145\/3302509.3313783"},{"issue":"9","key":"208_CR27","doi-asserted-by":"publisher","first-page":"2300","DOI":"10.1109\/TIFS.2019.2895957","volume":"14","author":"X Ying","year":"2019","unstructured":"Ying X, Sagong SU, Clark A, Bushnell L, Poovendran R (2019b) Shape of the cloak: formal analysis of clock skew-based intrusion detection system in controller area networks. IEEE Trans Inf Forensics Secur 14(9):2300\u20132314","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"208_CR28","first-page":"10","volume":"1","author":"T Zhang","year":"2014","unstructured":"Zhang T, Antunes H, Aggarwal S (2014) Defending connected vehicles against malware: challenges and a solution framework. IOTJl 1(1):10\u201321","journal-title":"IOTJl"}],"container-title":["Journal of Transportation Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12198-020-00208-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12198-020-00208-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12198-020-00208-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:13:15Z","timestamp":1619568795000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12198-020-00208-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,28]]},"references-count":28,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["208"],"URL":"https:\/\/doi.org\/10.1007\/s12198-020-00208-0","relation":{},"ISSN":["1938-7741","1938-775X"],"issn-type":[{"value":"1938-7741","type":"print"},{"value":"1938-775X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,28]]},"assertion":[{"value":"9 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 April 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}