{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:24:38Z","timestamp":1774542278785,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319491509","type":"print"},{"value":"9783319491516","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49151-6_23","type":"book-chapter","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T02:09:46Z","timestamp":1478225386000},"page":"330-343","source":"Crossref","is-referenced-by-count":1,"title":["Authenticated CAN Communications Using Standardized Cryptographic Techniques"],"prefix":"10.1007","author":[{"given":"Zhuo","family":"Wei","sequence":"first","affiliation":[]},{"given":"Yanjiang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Tieyan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,5]]},"reference":[{"key":"23_CR1","unstructured":"Staggs, J.: How to hack your mini cooper: reverse engineering can messages on passenger automobiles. Institute for Information Security"},{"key":"23_CR2","unstructured":"Valasek, C., Miller, C.: A survey of remote automotive attack surfaces. http:\/\/www.ioactive.com\/pdfs\/IOActive_Remote_Attack_Surfaces.pdf"},{"key":"23_CR3","unstructured":"Car Industry Three Years Behind Todays Cyber Threats. https:\/\/threatpost.com\/car-industry-three-years-behind-todays-cyber-threats\/116524\/"},{"key":"23_CR4","unstructured":"Miller, C., Valasek, C.: Adventures in automotive networks and control units. http:\/\/www.ioactive.com\/pdfs\/IOActive_Adventures_in_Automotive_Networks_and_Control_Units.pdf"},{"key":"23_CR5","unstructured":"Miller, C., Valasek, C.: Car Hacking: For Poories"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Smith, C.: Car Hacker\u2019s Handbook (2016)","DOI":"10.1016\/S1353-4858(16)30034-4"},{"key":"23_CR7","unstructured":"Valasek, C., Miller, C.: Remote Exploitation of an Unaltered Passenger Vehicle. http:\/\/www.ioactive.com\/pdfs\/IOActive_Remote_Car_Hacking.pdf"},{"key":"23_CR8","unstructured":"Car hacked on 60 minutes. Accessed July 2016 [Online]. http:\/\/www.cbsnews.com\/news\/car-hacked-on-60-minutes\/"},{"key":"23_CR9","unstructured":"Samy kamkar - home. https:\/\/samy.pl\/"},{"key":"23_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2007\/74706","volume":"1","author":"M Wolf","year":"2007","unstructured":"Wolf, M., Weimerskirch, A., Wollinger, T.: State of the art: embedding security in vehicles. EURASIP J. Embedded Syst. 1, 1\u201316 (2007)","journal-title":"EURASIP J. Embedded Syst."},{"key":"23_CR11","unstructured":"SAE J3061 (2016). http:\/\/standards.sae.org\/wip\/j3061\/"},{"key":"23_CR12","unstructured":"Approaches for Vehicle Information Security, Information Technology Promotion Agency, Japan (2013)"},{"key":"23_CR13","unstructured":"E-safety vehicle intrusion protected applications (EVITA). http:\/\/evita-project.org\/ . Accessed July 2016"},{"key":"23_CR14","unstructured":"Preparing Secure Vehicle-to-X Communication Systems (PRESERVER). https:\/\/www.preserve-project.eu\/ . Accessed July 2016"},{"key":"23_CR15","unstructured":"Open Vehicular Secure Platform (OVERSEE). https:\/\/www.oversee-project.com\/index.php?id=2 . Accessed July 2016"},{"key":"23_CR16","unstructured":"Bruton, J.A.: Securing CAN Bus Communication: An Analysis of Cryptographic Approaches (2014)"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Markantonakis, K., Mayes, K.: Secure Smart Embedded Devices, Platforms and Applications (2013)","DOI":"10.1007\/978-1-4614-7915-4"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Brooks, R.R., Yun, S.B., Deng, J.: Cyber-Physical Security of Automotive Information Technology. Elsevier Inc., Amsterdam (2012)","DOI":"10.1016\/B978-0-12-415815-3.00026-1"},{"key":"23_CR19","unstructured":"Van Herrewege, A., Singelee, D., Verbauwhede, I.: CANAuth \u2013 a simple, back- ward compatible broadcast authentication protocol for CAN bus. In: ECRYPT Workshop on Lightweight Cryptography 2011 (2011)"},{"key":"23_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-642-35404-5_15","volume-title":"Cryptology and Network Security","author":"B Groza","year":"2012","unstructured":"Groza, B., Murvay, S., Herrewege, A., Verbauwhede, I.: LiBrA-CAN: a lightweight broadcast authentication protocol for controller area networks. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 185\u2013200. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-35404-5_15"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Ziermann, T., Wildermann, S., Teich, J.: CAN+: a new backward-compatible controller area network (CAN) protocol with up to 16x higher data rates. In: Design, Automation & Test in Europe Conference & Exhibition (DATE 2009), pp. 1088\u20131093. IEEE (2009)","DOI":"10.1109\/DATE.2009.5090826"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium on Security and Privacy (SP 2000), Berkeley, CA, USA, pp. 56\u201373, May 2000","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: security protocols for sensor networks. In: Seventh Annual International Conference on Mobile Computing and Networks (MobiCOM 2001), Rome, Italy, July 2001","DOI":"10.1145\/381677.381696"},{"issue":"6","key":"23_CR24","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1109\/JCN.2009.6388411","volume":"11","author":"A Studer","year":"2009","unstructured":"Studer, A., Bai, F., Bellur, B., Perrig, A.: Flexible, extensible, and efficient VANET authentication. J. Commun. Netw. 11(6), 574\u2013588 (2009)","journal-title":"J. Commun. Netw."},{"key":"23_CR25","unstructured":"Hartkopp, O., Reuber, C., Schilling, R.: MaCAN - message authenticated CAN. In: 10th International Conference on Embedded Security in Cars (ESCAR 2012), Berlin, Germany, vol. 6 (2012)"},{"key":"23_CR26","unstructured":"Hazem, A., Fahmy, H.A.: LCAP - a lightweight CAN authentication protocol for securing in-vehicle networks. In: 10th International Conference on Embedded Security in Cars (ESCAR 2012), Berlin, Germany, vol. 6 (2012)"},{"key":"23_CR27","unstructured":"Kurachi, R., Matsubara, Y., Takada, H., Adachi, N., Miyashita, Y., Horihata, S.: CaCAN centralised authentication system in CAN. In: 12th International Conference on Embedded Security in Cars (ESCAR 2014) (2014)"},{"key":"23_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_15","volume-title":"Computer Security \u2013 ESORICS 2016","author":"A-I Radu","year":"2016","unstructured":"Radu, A.-I., Garcia, F.D.: LeiA: a lightweight authentication protocol for CAN. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878. Springer, Heidelberg (2016). doi: 10.1007\/978-3-319-45741-3_15"},{"key":"23_CR29","unstructured":"Wolf, M., Weimerskirch, A., Paar, C.: Security in automotive bus systems. Workshop on Embedded Security in Cars (2004)"},{"key":"23_CR30","unstructured":"Researchers Hacked a Model S, But Tesla\u2019s Already Release a Patch (2015). https:\/\/www.wired.com\/2015\/08\/researchers-hacked-model-s-teslas-already\/"},{"key":"23_CR31","unstructured":"ISO, IEC 9798-2: Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms"},{"key":"23_CR32","doi-asserted-by":"crossref","unstructured":"Basin, D., Cremers, C., Meier, S.: Provably repairing the ISO\/IEC 9798 standard for entity authentication. In: 1st International Conference on Theory and Practice of Software, POST 2012, pp. 129\u2013148 (2012)","DOI":"10.1007\/978-3-642-28641-4_8"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49151-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T08:01:40Z","timestamp":1568534500000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49151-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491509","9783319491516"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49151-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}