{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:51:36Z","timestamp":1762005096393,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030168735"},{"type":"electronic","value":"9783030168742"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-16874-2_7","type":"book-chapter","created":{"date-parts":[[2019,3,27]],"date-time":"2019-03-27T03:04:43Z","timestamp":1553655883000},"page":"94-110","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["INCANTA - INtrusion Detection in Controller Area Networks with Time-Covert Authentication"],"prefix":"10.1007","author":[{"given":"Bogdan","family":"Groza","sequence":"first","affiliation":[]},{"given":"Lucian","family":"Popa","sequence":"additional","affiliation":[]},{"given":"Pal-Stefan","family":"Murvay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,28]]},"reference":[{"unstructured":"AUTOSAR: Specification of Secure Onboard Communication, 4.3.1 edn (2017)","key":"7_CR1"},{"doi-asserted-by":"crossref","unstructured":"Boudguiga, A., Klaudel, W., Boulanger, A., Chiron, P.: A simple intrusion detection method for controller area network. In: 2016 IEEE International Conference on Communications (ICC), pp. 1\u20137. IEEE (2016)","key":"7_CR2","DOI":"10.1109\/ICC.2016.7511098"},{"unstructured":"Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, San Francisco (2011)","key":"7_CR3"},{"unstructured":"Cho, K.-T., Shin, K. G.: Fingerprinting electronic control units for vehicle intrusion detection. In: 25th USENIX Security Symposium (2016)","key":"7_CR4"},{"issue":"8","key":"7_CR5","doi-asserted-by":"publisher","first-page":"2114","DOI":"10.1109\/TIFS.2018.2812149","volume":"13","author":"W Choi","year":"2018","unstructured":"Choi, W., Joo, K., Jo, H.J., Park, M.C., Lee, D.H.: VoltageIDS: low-level communication characteristics for automotive intrusion detection system. IEEE Trans. Inf. Forensics Secur. 13(8), 2114\u20132129 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"7_CR6","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/LCOMM.2013.040913.130419","volume":"17","author":"M Cristea","year":"2013","unstructured":"Cristea, M., Groza, B.: Fingerprinting smartphones remotely via ICMP timestamps. IEEE Commun. Lett. 17(6), 1081\u20131083 (2013)","journal-title":"IEEE Commun. Lett."},{"issue":"4","key":"7_CR7","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MVT.2017.2647814","volume":"12","author":"H Giannopoulos","year":"2017","unstructured":"Giannopoulos, H., Wyglinski, A.M., Chapman, J.: Securing vehicular controller area networks: an approach to active bus-level countermeasures. IEEE Veh. Technol. Mag. 12(4), 60\u201368 (2017)","journal-title":"IEEE Veh. Technol. Mag."},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-642-35404-5_15","volume-title":"Cryptology and Network Security","author":"B Groza","year":"2012","unstructured":"Groza, B., Murvay, S., van Herrewege, A., Verbauwhede, I.: LiBrA-CAN: a lightweight broadcast authentication protocol for controller area networks. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 185\u2013200. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-35404-5_15"},{"issue":"4","key":"7_CR9","doi-asserted-by":"publisher","first-page":"2034","DOI":"10.1109\/TII.2013.2239301","volume":"9","author":"B Groza","year":"2013","unstructured":"Groza, B., Murvay, S.: Efficient protocols for secure broadcast in controller area networks. IEEE Trans. Industr. Inf. 9(4), 2034\u20132042 (2013)","journal-title":"IEEE Trans. Industr. Inf."},{"unstructured":"Hartkopp, O., Reuber, C., Schilling, R.: MaCAN-message authenticated CAN. In: 10th International Conference on Embedded Security in Cars (ESCAR 2012) (2012)","key":"7_CR10"},{"unstructured":"Hoppe, T., Dittman, J.: Sniffing\/replay attacks on can buses: a simulated attack on the electric window lift classified using an adapted cert taxonomy. In: Proceedings of the 2nd Workshop on Embedded Systems Security (WESS), pp. 1\u20136 (2007)","key":"7_CR11"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-662-53140-2_5","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","author":"S Jain","year":"2016","unstructured":"Jain, S., Guajardo, J.: Physical layer group key agreement for automotive controller area networks. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 85\u2013105. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_5"},{"issue":"6","key":"7_CR13","doi-asserted-by":"publisher","first-page":"e0155781","DOI":"10.1371\/journal.pone.0155781","volume":"11","author":"M-J Kang","year":"2016","unstructured":"Kang, M.-J., Kang, J.-W.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS One 11(6), e0155781 (2016)","journal-title":"PLoS One"},{"doi-asserted-by":"crossref","unstructured":"Kang, M.-J., Kang, J.-W.: A novel intrusion detection method using deep neural network for in-vehicle network security. In: 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), pp. 1\u20135. IEEE (2016)","key":"7_CR14","DOI":"10.1109\/VTCSpring.2016.7504089"},{"issue":"2","key":"7_CR15","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TDSC.2005.26","volume":"2","author":"T Kohno","year":"2005","unstructured":"Kohno, T., Broido, A., Claffy, K.C.: Remote physical device fingerprinting. IEEE Trans. Dependable Secure Comput. 2(2), 93\u2013108 (2005)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"doi-asserted-by":"crossref","unstructured":"Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 447\u2013462. IEEE (2010)","key":"7_CR16","DOI":"10.1109\/SP.2010.34"},{"unstructured":"Kurachi, R., Matsubara, Y., Takada, H., Adachi, N., Miyashita, Y., Horihata, S.: CaCAN - centralized authentication system in CAN (controller area network). In: 14th International Conference on Embedded Security in Cars (ESCAR 2014) (2014)","key":"7_CR17"},{"doi-asserted-by":"crossref","unstructured":"Li, H., Zhao, L., Juliato, M., Ahmed, S., Sastry, M.R., Yang, L.L.: POSTER: intrusion detection system for in-vehicle networks using sensor correlation and integration. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2531\u20132533. ACM (2017)","key":"7_CR18","DOI":"10.1145\/3133956.3138843"},{"issue":"1","key":"7_CR19","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/LES.2014.2354011","volume":"7","author":"C-W Lin","year":"2015","unstructured":"Lin, C.-W., Zhu, Q., Sangiovanni-Vincentelli, A.: Security-aware modeling and efficient mapping for CAN-based real-time distributed automotive systems. IEEE Embed. Syst. Lett. 7(1), 11\u201314 (2015)","journal-title":"IEEE Embed. Syst. Lett."},{"doi-asserted-by":"crossref","unstructured":"Marchetti, M., Stabili, D., Guido, A., Colajanni, M.: Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms. In: Research and Technologies for Society and Industry Leveraging a better Tomorrow (RTSI), pp. 1\u20136. IEEE (2016)","key":"7_CR20","DOI":"10.1109\/RTSI.2016.7740627"},{"key":"7_CR21","first-page":"260","volume":"21","author":"C Miller","year":"2013","unstructured":"Miller, C., Valasek, C.: Adventures in automotive networks and control units. DEF CON 21, 260\u2013264 (2013)","journal-title":"DEF CON"},{"unstructured":"Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA (2015)","key":"7_CR22"},{"doi-asserted-by":"crossref","unstructured":"Moon, S.B., Skelly, P., Towsley, D.: Estimation and removal of clock skew from network delay measurements. In: INFOCOM 1999, Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Proceedings, vol. 1, pp. 227\u2013234. IEEE (1999)","key":"7_CR23","DOI":"10.1109\/INFCOM.1999.749287"},{"doi-asserted-by":"crossref","unstructured":"Moore, M.R., Bridges, R.A., Combs, F.L., Starr, M.S., Prowell, S.J.: Modeling inter-signal arrival times for accurate detection of can bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection. In: Proceedings of the 12th Annual Conference on Cyber and Information Security Research, pp. 11. ACM (2017)","key":"7_CR24","DOI":"10.1145\/3064814.3064816"},{"key":"7_CR25","first-page":"10","volume":"4","author":"A Mueller","year":"2015","unstructured":"Mueller, A., Lothspeich, T.: Plug-and-secure communication for CAN. CAN Newsl. 4, 10\u201314 (2015)","journal-title":"CAN Newsl."},{"issue":"4","key":"7_CR26","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/LSP.2014.2304139","volume":"21","author":"P-S Murvay","year":"2014","unstructured":"Murvay, P.-S., Groza, B.: Source identification using signal characteristics in controller area networks. IEEE Signal Process. Lett. 21(4), 395\u2013399 (2014)","journal-title":"IEEE Signal Process. Lett."},{"doi-asserted-by":"crossref","unstructured":"M\u00fcter, M., Asaj, N.: Entropy-based anomaly detection for in-vehicle networks. In: 2011 IEEE of the Intelligent Vehicles Symposium (IV), po. 1110\u20131115. IEEE (2011)","key":"7_CR27","DOI":"10.1109\/IVS.2011.5940552"},{"doi-asserted-by":"crossref","unstructured":"M\u00fcter, M., Groll, A., Freiling, F.C.: A structured approach to anomaly detection for in-vehicle networks. In: 2010 Sixth International Conference on Information Assurance and Security (IAS), pp. 92\u201398. IEEE (2010)","key":"7_CR28","DOI":"10.1109\/ISIAS.2010.5604050"},{"doi-asserted-by":"crossref","unstructured":"Narayanan, S.N., Mittal, S., Joshi, A.: $$\\text{OBD}\\_\\text{ SecureAlert }$$ OBD _ SecureAlert : an anomaly detection system for vehicles. In: 2016 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1\u20136. IEEE (2016)","key":"7_CR29","DOI":"10.1109\/SMARTCOMP.2016.7501710"},{"key":"7_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-319-45741-3_15","volume-title":"Computer Security \u2013 ESORICS 2016","author":"A-I Radu","year":"2016","unstructured":"Radu, A.-I., Garcia, F.D.: LeiA: a $$\\underline{{\\rm L}}$$ L \u0332 ightweight auth $$\\underline{{\\rm e}}$$ e \u0332 nticat $$\\underline{{\\rm i}}$$ i \u0332 on protocol for C $$\\underline{{\\rm A}}$$ A \u0332 N. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9879, pp. 283\u2013300. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45741-3_15"},{"doi-asserted-by":"crossref","unstructured":"Sagong, S.U., Ying, X., Clark, A., Bushnell, L., Poovendran, R.: Cloaking the clock: emulating clock skew in controller area networks. In: Proceedings of the 9th ACM\/IEEE International Conference on Cyber-Physical Systems, pp. 32\u201342. IEEE Press (2018)","key":"7_CR31","DOI":"10.1109\/ICCPS.2018.00012"},{"doi-asserted-by":"crossref","unstructured":"Song, H.M., Kim, H.R., Kim, H.K.: Intrusion detection system based on the analysis of time intervals of can messages for in-vehicle network. In: 2016 International Conference on Information Networking (ICOIN), pp. 63\u201368. IEEE (2016)","key":"7_CR32","DOI":"10.1109\/ICOIN.2016.7427089"},{"issue":"1","key":"7_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJES.2018.089430","volume":"10","author":"I Studnia","year":"2018","unstructured":"Studnia, I., Alata, E., Nicomette, V., Ka\u00e2niche, M., Laarouchi, Y.: A language-based intrusion detection approach for automotive embedded networks. Int. J. Embed. Syst. 10(1), 1\u201312 (2018)","journal-title":"Int. J. Embed. Syst."},{"doi-asserted-by":"crossref","unstructured":"Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 130\u2013139. IEEE (2016)","key":"7_CR34","DOI":"10.1109\/DSAA.2016.20"},{"key":"7_CR35","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.knosys.2017.02.023","volume":"123","author":"A Theissler","year":"2017","unstructured":"Theissler, A.: Detecting known and unknown faults in automotive systems using ensemble-based anomaly detection. Knowl.-Based Syst. 123, 163\u2013173 (2017)","journal-title":"Knowl.-Based Syst."},{"key":"7_CR36","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-319-74176-5_25","volume-title":"Industrial Networks and Intelligent Systems","author":"D Tian","year":"2018","unstructured":"Tian, D., et al.: An intrusion detection system based on machine learning for CAN-Bus. In: Chen, Y., Duong, T.Q. (eds.) INISCOM 2017. LNICST, vol. 221, pp. 285\u2013294. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-74176-5_25"},{"unstructured":"Van Herrewege, A., Singelee, D., Verbauwhede, I.: CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus. In: ECRYPT Workshop on Lightweight Cryptography, vol. 2011 (2011)","key":"7_CR37"}],"container-title":["Lecture Notes in Computer Science","Security and Safety Interplay of Intelligent Software Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-16874-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,14]],"date-time":"2022-09-14T12:24:37Z","timestamp":1663158277000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-16874-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030168735","9783030168742"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-16874-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"28 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSITS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Cyber Security for Intelligent Transportation Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csits2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cyber.bgu.ac.il\/esorics_csits2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"9","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"5","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"56% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}