{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T11:12:40Z","timestamp":1775301160259,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030053444","type":"print"},{"value":"9783030053451","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_26","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:07:56Z","timestamp":1544173676000},"page":"304-313","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Secure Passive Keyless Entry and Start System Using Machine Learning"],"prefix":"10.1007","author":[{"given":"Usman","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Hong","family":"Song","sequence":"additional","affiliation":[]},{"given":"Awais","family":"Bilal","sequence":"additional","affiliation":[]},{"given":"Mamoun","family":"Alazab","sequence":"additional","affiliation":[]},{"given":"Alireza","family":"Jolfaei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"26_CR1","unstructured":"Waraksa, T.J., Fraley, K.D., Kiefer, R.E., Douglas, D.G., Gilbert, L.H.: Passive keyless entry system. Google Patents, US Patent 4,942,393 (1990)"},{"key":"26_CR2","unstructured":"Francillon, A., Danev, B., Capkun, S.: Relay attacks on passive keyless entry and start systems in modern cars. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2011)"},{"issue":"2","key":"26_CR3","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/3176402","volume":"61","author":"K Fu","year":"2018","unstructured":"Fu, K., Xu, W.: Risks of trusting the physics of sensors. Commun. ACM 61(2), 20\u201323 (2018)","journal-title":"Commun. ACM"},{"key":"26_CR4","unstructured":"Bacchus, M., Coronado, A., Gutierrez, M.A.: The insights into car hacking (2017)"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Jolfaei, A., Kant, K.: A lightweight integrity protection scheme for fast communications in smart grid. In: International Conference on Security and Cryptography, pp. 31\u201342 (2017)","DOI":"10.5220\/0006394200310042"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 447\u2013462 (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"26_CR7","unstructured":"Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium (2011)"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Choi, W., Seo, M., Lee, D.H.: Sound-proximity: 2-factor authentication against relay attack on passive keyless entry and start system. J. Adv. Transp. (2018)","DOI":"10.1155\/2018\/1935974"},{"key":"26_CR9","unstructured":"Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA, vol. 2015 (2015)"},{"key":"26_CR10","unstructured":"Benadjila, R., Renard, M., Lopes-Esteves, J., Kasmi, C.: One car, two frames: attacks on hitag-2 remote keyless entry systems revisited. In: USENIX Workshop on Offensive Technologies (2017)"},{"key":"26_CR11","volume-title":"RFID: Applications, Security, and Privacy","author":"S Garfinkel","year":"2006","unstructured":"Garfinkel, S., Rosenberg, B.: RFID: Applications, Security, and Privacy. Pearson Education India, Chennai (2006)"},{"key":"26_CR12","unstructured":"Van Herrewege, A., Singelee, D., Verbauwhede, I.: CANAuth - a simple, backward compatible broadcast authentication protocol for CAN Bus. In: ECRYPT Workshop on Lightweight Cryptography, vol. 2011 (2011)"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Groza, B., Murvay, S., Van Herrewege, A., Verbauwhede, I.: LiBrA-CAN: a lightweight broadcast authentication protocol for controller area networks, pp. 185\u2013200(2012)","DOI":"10.1007\/978-3-642-35404-5_15"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Schweppe, H., Roudier, Y., Weyl, B., Apvrille, L., Scheuermann, D.: Car2X communication: securing the last meter-a cost-effective approach for ensuring trust in Car2X applications using in-vehicle symmetric cryptography. In: IEEE Vehicular Technology Conference, pp. 1\u20135 (2011)","DOI":"10.1109\/VETECF.2011.6093081"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Guan, L., Lin, J., Luo, B., Jing, J., Wang, J.: Protecting private keys against memory disclosure attacks using hardware transactional memory. In: IEEE Symposium on Security and Privacy, pp. 3\u201319 (2015)","DOI":"10.1109\/SP.2015.8"},{"key":"26_CR16","unstructured":"Bruwer, F.: Microchips and remote control devices comprising same. Google Patents, US Patent 6,108,326 (2000)"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Brainard, J., Juels, A., Rivest, R.L., Szydlo, M., Yung, M.: Fourth-factor authentication: somebody you know. In: ACM Conference on Computer and Communications Security, pp. 168\u2013178 (2006)","DOI":"10.1145\/1180405.1180427"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Ranganathan, A., Capkun, S.: Are we really close? Verifying proximity in wireless systems. IEEE Secur. Priv. (2017)","DOI":"10.1109\/MSP.2017.56"},{"issue":"9","key":"26_CR19","doi-asserted-by":"publisher","first-page":"4741","DOI":"10.1109\/TVT.2009.2027710","volume":"58","author":"J Park","year":"2009","unstructured":"Park, J., et al.: Intelligent vehicle power control based on machine learning of optimal control parameters and prediction of road type and traffic congestion. IEEE Trans. Veh. Technol. 58(9), 4741\u20134756 (2009)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"26_CR20","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1109\/TITS.2010.2040177","volume":"11","author":"S Sivaraman","year":"2010","unstructured":"Sivaraman, S., Trivedi, M.M.: A general active-learning framework for on-road vehicle recognition and tracking. IEEE Trans. Intell. Transp. Syst. 11(2), 267\u2013276 (2010)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"26_CR21","unstructured":"Avatefipour, O., Malik, H.: State-of-the-art survey on in-vehicle network communication (CAN-Bus) security and vulnerabilities. arXiv preprint arXiv:1802.01725 (2018)"},{"key":"26_CR22","unstructured":"Weber, M., Klug, S., Sax, E., Zimmer, B.: Embedded hybrid anomaly detection for automotive CAN communication. In: 9th European Congress on Embedded Real Time Software and Systems (2018)"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Alazab, A., Hobbs, M., Abawajy, J., Alazab, M.: Using feature selection for intrusion detection system. In: International Symposium on Communications and Information Technologies (ISCIT), pp. 296\u2013301. IEEE (2012)","DOI":"10.1109\/ISCIT.2012.6380910"},{"key":"26_CR24","unstructured":"Tran, K.-N., Alazab, M., Broadhurst, R., et al.: Towards a feature rich model for predicting spam emails containing malicious attachments and URLs. In: 11th Australasian Data Mining Conference, Canberra (2013)"},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Mercaldo, F., Nardone, V., Orlando, A., Santone, A.: Who\u2019s driving my car? A machine learning based approach to driver identification (2018)","DOI":"10.5220\/0006633403670372"},{"key":"26_CR26","first-page":"306","volume":"26","author":"T Kuwahara","year":"2018","unstructured":"Kuwahara, T., et al.: Supervised and unsupervised intrusion detection based on CAN message frequencies for in-vehicle network. J. Inf. Process. 26, 306\u2013313 (2018)","journal-title":"J. Inf. Process."},{"issue":"6","key":"26_CR27","doi-asserted-by":"publisher","first-page":"e0155781","DOI":"10.1371\/journal.pone.0155781","volume":"11","author":"M-J Kang","year":"2016","unstructured":"Kang, M.-J., Kang, J.-W.: Intrusion detection system using deep neural network for in-vehicle network security. PloS ONE 11(6), e0155781 (2016)","journal-title":"PloS ONE"},{"issue":"2","key":"26_CR28","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1023\/A:1018054314350","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman, L.: Bagging predictors. Mach. Learn. 24(2), 123\u2013140 (1996)","journal-title":"Mach. Learn."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T10:18:24Z","timestamp":1775297904000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}