{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:15:57Z","timestamp":1759331757977,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319403847"},{"type":"electronic","value":"9783319403854"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40385-4_7","type":"book-chapter","created":{"date-parts":[[2016,6,17]],"date-time":"2016-06-17T14:46:42Z","timestamp":1466174802000},"page":"95-111","source":"Crossref","is-referenced-by-count":4,"title":["LiMon - Lightweight Authentication for Tire Pressure Monitoring Sensors"],"prefix":"10.1007","author":[{"given":"Cristina","family":"Solomon","sequence":"first","affiliation":[]},{"given":"Bogdan","family":"Groza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,18]]},"reference":[{"issue":"6","key":"7_CR1","doi-asserted-by":"crossref","first-page":"817","DOI":"10.3233\/JCS-130472","volume":"21","author":"D Basin","year":"2013","unstructured":"Basin, D., Cremers, C., Meier, S.: Provably repairing the iso\/iec 9798 standard for entity authentication. J. Comput. Secur. 21(6), 817\u2013846 (2013)","journal-title":"J. Comput. Secur."},{"key":"7_CR2","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: National Security Agency. The Simon and Speck families of lightweight block ciphers. pp. 16\u201345 (2013)"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"AA Bogdanov","year":"2007","unstructured":"Bogdanov, A.A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Cazorla, M., Marquet, K., Minier, M.: Survey and benchmark of lightweight block ciphers for wireless sensor networks. In: Samarati, P. (ed.) SECRYPT 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav\u00edk, Iceland, 29\u201331 July 2013, pp. 543\u2013548. SciTePress (2013)","DOI":"10.5220\/0004530905430548"},{"key":"7_CR5","unstructured":"Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, San Francisco (2011)"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523\u2013540. Springer, Heidelberg (2004)"},{"key":"7_CR7","unstructured":"FrenchNationalResearchAgency. Speck sample source code. http:\/\/bloc.project.citi-lab.fr\/library.html"},{"key":"7_CR8","unstructured":"Infineon. SP37T 1300kPa.Product brief. http:\/\/www.infineon.com\/dgdl\/SP37_1300kPa_PB.pdf?fileId=db3a3043382e83730138566f83105c7c"},{"key":"7_CR9","unstructured":"Infineon. SP37T Datasheet., 1.0 edn., January 2010"},{"key":"7_CR10","unstructured":"Infineon. SP37T ROM Library Guide., 1.0 edn., January 2010"},{"key":"7_CR11","unstructured":"Infineon. TDA5240 Datasheet., 4.0 edn., February 2010"},{"key":"7_CR12","unstructured":"Ishtiaq Roufa, R.M., Mustafaa, H., Travis Taylora, S.O., Xua, W., Gruteserb, M., Trappeb, W., Seskarb, I.: Security, privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study. In: 19th USENIX Security Symposium, Washington DC, pp. 11\u201313 (2010)"},{"key":"7_CR13","unstructured":"Klose, D.: Ruhr-University-Bochum. Present sample source code. http:\/\/www.lightweightcrypto.org\/implementations.php"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 447\u2013462. IEEE (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/10720107_25","volume-title":"Security Protocols","author":"F Stajano","year":"2000","unstructured":"Stajano, F.: The resurrecting duckling. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 183\u2013194. Springer, Heidelberg (2000)"},{"key":"7_CR16","unstructured":"Toth, A.: Method and system for monitoring a parameter of a tire of a vehicle, 16 April 2014. EP Patent App. EP20,120,464,019"},{"key":"7_CR17","unstructured":"van Zyl, P., Goethem, S.v., Jansen, S., Kanarchos, S., Rexeis, M., Hausberger, S., Smokers, R.: Study on tyre pressure monitoring systems (tpms) as a means to reduce light-commercial and heavy-duty vehicles fuel consumption and co2 emissions. Final report, European Commission DG Clima (2013)"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Xu, M., Xu, W., Walker, J., Moore, B.: Lightweight secure communication protocols for in-vehicle sensor networks. In: Proceedings of the 2013 ACM Workshop on Security, Privacy & Dependability for Cyber Vehicles, pp. 19\u201330. ACM (2013)","DOI":"10.1145\/2517968.2517973"}],"container-title":["Lecture Notes in Computer Science","Security of Industrial Control Systems and Cyber Physical Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40385-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T22:05:01Z","timestamp":1748988301000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40385-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319403847","9783319403854"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40385-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}