{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:29:10Z","timestamp":1740137350017,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Romanian Ministry of Research and Innovation, CNCS-UEFISCDI","award":["PN-III-P1-1.1-TE-2016-1317"],"award-info":[{"award-number":["PN-III-P1-1.1-TE-2016-1317"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s10207-020-00532-5","type":"journal-article","created":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T10:03:50Z","timestamp":1611050630000},"page":"817-831","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Securing the controller area network with covert voltage channels"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0330-4523","authenticated-orcid":false,"given":"Pal-Stefan","family":"Murvay","sequence":"first","affiliation":[]},{"given":"Lucian","family":"Popa","sequence":"additional","affiliation":[]},{"given":"Bogdan","family":"Groza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,19]]},"reference":[{"issue":"6","key":"532_CR1","doi-asserted-by":"publisher","first-page":"3879","DOI":"10.1109\/TVT.2007.901889","volume":"56","author":"O Amrani","year":"2007","unstructured":"Amrani, O., Rubin, A.: Contention detection and resolution for multiple-access power-line communications. IEEE Trans. Vehicul. Technol. 56(6), 3879\u20133887 (2007)","journal-title":"IEEE Trans. Vehicul. Technol."},{"key":"532_CR2","unstructured":"AUTOSAR: Specification of secure onboard communication (2017)"},{"key":"532_CR3","unstructured":"Berk, V., Giani, A., Cybenko, G., Hanover, N.: Detection of covert channel encoding in network packet delays. Rapport technique TR536, de lUniversit\u00e9 de Dartmouth 19 (2005)"},{"key":"532_CR4","doi-asserted-by":"crossref","unstructured":"Cabuk, S., Brodley, CE., Shields, C.: IP covert timing channels: design and detection. In: Proceedings of the 11th ACM conference on Computer and communications security, pp 178\u2013187 (2004)","DOI":"10.1145\/1030083.1030108"},{"issue":"1","key":"532_CR5","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/TII.2014.2365153","volume":"11","author":"G Cena","year":"2014","unstructured":"Cena, G., Bertolotti, I.C., Hu, T., Valenzano, A.: A mechanism to prevent stuff bits in CAN for achieving jitterless communication. IEEE Trans. Ind. Inf. 11(1), 83\u201393 (2014)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"532_CR6","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.csi.2018.11.007","volume":"63","author":"G Cena","year":"2019","unstructured":"Cena, G., Bertolotti, I.C., Hu, T., Valenzano, A.: On a software-defined CAN controller for embedded systems. Comput. Standards Interfaces 63, 43\u201351 (2019)","journal-title":"Comput. Standards Interfaces"},{"key":"532_CR7","unstructured":"Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner ,F., Kohno, T., et\u00a0al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, San Francisco, pp 77\u201392 (2011)"},{"issue":"6","key":"532_CR8","doi-asserted-by":"publisher","first-page":"5146","DOI":"10.1109\/TVT.2018.2825258","volume":"67","author":"E Choi","year":"2018","unstructured":"Choi, E., Han, S., Lee, J., Lee, S., Kang, S., Choi, J.W.: Compatibility analysis of the turbo controller area network (turbo CAN). IEEE Trans. Vehicul. Technol. 67(6), 5146\u20135157 (2018)","journal-title":"IEEE Trans. Vehicul. Technol."},{"key":"532_CR9","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.comcom.2016.05.016","volume":"93","author":"S Dolev","year":"2016","unstructured":"Dolev, S., Krzywiecki, \u0141., Panwar, N., Segal, M.: Optical puf for non-forwardable vehicle authentication. Comput. Commun. 93, 52\u201367 (2016)","journal-title":"Comput. Commun."},{"issue":"6","key":"532_CR10","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1109\/TIFS.2013.2259818","volume":"8","author":"E Fernandes","year":"2013","unstructured":"Fernandes, E., Crispo, B., Conti, M.: FM 99.9, radio virus: exploiting FM radio broadcasts for malware deployment. IEEE Trans. Inf. Foren. Secur. 8(6), 1027\u20131037 (2013)","journal-title":"IEEE Trans. Inf. Foren. Secur."},{"key":"532_CR11","unstructured":"Ferreira, J., Oliveira, A., Fonseca, P., Fonseca, JA.: An experiment to assess bit error rate in CAN. In: Proceedings of 3rd International Workshop of Real-Time Networks (RTN2004), pp. 15\u201318 (2004)"},{"issue":"1","key":"532_CR12","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MVT.2017.2736344","volume":"13","author":"B Groza","year":"2018","unstructured":"Groza, B., Murvay, P.S.: Security solutions for the controller area network: bringing authentication to in-vehicle networks. IEEE Vehicul. Technol. Mag. 13(1), 40\u201347 (2018)","journal-title":"IEEE Vehicul. Technol. Mag."},{"key":"532_CR13","doi-asserted-by":"publisher","first-page":"104294","DOI":"10.1109\/ACCESS.2019.2931247","volume":"7","author":"B Groza","year":"2019","unstructured":"Groza, B., Popa, L., Murvay, P.: TRICKS-time triggered covert key sharing for controller area networks. IEEE Access 7, 104294\u2013104307 (2019)","journal-title":"IEEE Access"},{"key":"532_CR14","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-030-16874-2_7","volume-title":"Security and Safety Interplay of Intelligent Software Systems","author":"B Groza","year":"2019","unstructured":"Groza, B., Popa, L., Murvay, P.S.: INCANTA-intrusion detection in controller area networks with time-covert authentication. Security and Safety Interplay of Intelligent Software Systems, pp. 94\u2013110. Springer International Publishing, Cham (2019)"},{"key":"532_CR15","doi-asserted-by":"crossref","unstructured":"Groza, B., Popa, L., Murvay, P.S.: Canto-covert authentication with timing channels over optimized traffic flows for can. IEEE Trans. Inf. Foren. Secur. 16, 601\u2013616 (2021). https:\/\/doi.org\/10.1109\/TIFS.2020.3017892","DOI":"10.1109\/TIFS.2020.3017892"},{"issue":"5","key":"532_CR16","doi-asserted-by":"publisher","first-page":"3081","DOI":"10.1109\/TIE.2016.2516508","volume":"63","author":"L Guerrieri","year":"2016","unstructured":"Guerrieri, L., Masera, G., Stievano, I.S., Bisaglia, P., Garcia Valverde, W.R., Concolato, M.: Automotive power-line communication channels: mathematical characterization and hardware emulator. IEEE Trans. Ind. Electron. 63(5), 3081\u20133090 (2016)","journal-title":"IEEE Trans. Ind. Electron."},{"key":"532_CR17","doi-asserted-by":"crossref","unstructured":"Han, J., Lin, YH., Perrig, A., Bai, F.: Short paper: Mvsec: secure and easy-to-use pairing of mobile devices with vehicles. In: Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, pp. 51\u201356 (2014)","DOI":"10.1145\/2627393.2627400"},{"key":"532_CR18","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-319-99073-6_15","volume-title":"Computer Security","author":"J Van den Herrewegen","year":"2018","unstructured":"Van den Herrewegen, J., Garcia, F.D.: Beneath the bonnet: a breakdown of diagnostic security. Computer Security, pp. 305\u2013324. Springer International Publishing, Cham (2018)"},{"key":"532_CR19","doi-asserted-by":"crossref","unstructured":"Hussain, R., Kim, D., Tokuta, AO., Melikyan, HM., Oh, H.: Covert communication based privacy preservation in mobile vehicular networks. In: MILCOM 2015- 2015 IEEE Military Communications Conference, pp. 55\u201360 (2015)","DOI":"10.1109\/MILCOM.2015.7357418"},{"key":"532_CR20","unstructured":"ISO: 11898-1-Road vehicles-Controller area network (CAN)-Part 1: Data link layer and physical signalling. Technical report, International Organization for Standardization (2003a)"},{"key":"532_CR21","unstructured":"ISO: 11898\u20132, Road vehicles Controller area network (CAN) Part 2: High-speed medium access unit. Technical report, International Organization for Standardization (2003b)"},{"key":"532_CR22","unstructured":"ISO: 11898\u20133, Road vehicles Controller area network (CAN) Part 3: Part 3: Low-speed, fault-tolerant, medium-dependent interface. Technical report, International Organization for Standardization (2006)"},{"key":"532_CR23","doi-asserted-by":"crossref","unstructured":"Jain, S., Wang, Q., Arafin ,MT., Guajardo, J.: Probing attacks on physical layer key agreement for automotive controller area networks. In: 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 7\u201312 (2018)","DOI":"10.1109\/AsianHOST.2018.8607166"},{"issue":"5","key":"532_CR24","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1109\/TSG.2016.2517129","volume":"8","author":"J Jousse","year":"2017","unstructured":"Jousse, J., Ginot, N., Batard, C., Lemaire, E.: Power line communication management of battery energy storage in a small-scale autonomous photovoltaic system. IEEE Trans. Smart Grid 8(5), 2129\u20132137 (2017)","journal-title":"IEEE Trans. Smart Grid"},{"key":"532_CR25","doi-asserted-by":"crossref","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., et al.: (2010) Experimental security analysis of a modern automobile. In: IEEE Symposium on Security and Privacy (SP), pp. 447\u2013462. IEEE (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"532_CR26","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ghosal, D., Armknecht, F., Sadeghi, AR., Schulz, S., Katzenbeisser, S.: Hide and seek in time-robust covert timing channels. In: European Symposium on Research in Computer Security, Springer, pp. 120\u2013135 (2009)","DOI":"10.1007\/978-3-642-04444-1_8"},{"key":"532_CR27","doi-asserted-by":"crossref","unstructured":"Lodi, GA., Ott, A., Cheema, SA., Haardt, M., Freitag, T.: Power Line Communication in automotive harness on the example of Local Interconnect Network. In: International Symposium on Power Line Communications and its Applications (ISPLC), pp. 212\u2013217 (2016)","DOI":"10.1109\/ISPLC.2016.7476263"},{"key":"532_CR28","first-page":"91","volume":"2015","author":"C Miller","year":"2015","unstructured":"Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015, 91 (2015)","journal-title":"Black Hat USA"},{"key":"532_CR29","doi-asserted-by":"crossref","unstructured":"Mueller, A., Lothspeich, T.: Plug-and-secure communication for CAN. CAN Newsletter pp. 10\u201314 (2015)","DOI":"10.1016\/S1353-4858(15)30059-3"},{"key":"532_CR30","unstructured":"Pico Technology.: CAN and CAN FD bus decoding. https:\/\/www.picotech.com\/library\/oscilloscopes\/can-bus-serial-protocol-decoding. Accessed 20 April 2020(2020)"},{"key":"532_CR31","unstructured":"Robert Bosch GmbH.: Can specification, version 2.0 (1991)"},{"key":"532_CR32","unstructured":"Rowan, S., Clear, M., Gerla, M., Huggard, M., Goldrick, CM.: Securing vehicle to vehicle communications using blockchain through visible light and acoustic side-channels (2017). arXiv preprint arXiv:1704.02553"},{"key":"532_CR33","unstructured":"Strobl, M., Waas, T., Moehne, S., Kucera, M., Rath, A., Balbierer, N., Schingale, A.: Using Ethernet over powerline communication in automotive networks. In: Proceedings of the 10th International Workshop on Intelligent Solutions in Embedded Systems, pp. 39\u201344 (2012)"},{"key":"532_CR34","doi-asserted-by":"crossref","unstructured":"Sung, G., Huang, C., Wang, C.: A PLC transceiver design of in-vehicle power line in FlexRay-based automotive communication systems. In: 2012 IEEE International Conference on Consumer Electronics (ICCE), pp. 309\u2013310 (2012)","DOI":"10.1109\/ICCE.2012.6161882"},{"key":"532_CR35","unstructured":"Tektronix.: Debugging CAN, LIN, and FlexRay Automotive Buses with an Oscilloscope, application note. https:\/\/download.tek.com\/document\/Automotive-Bus_App-Note_55W-61098-3.pdf. Accessed 20 April 2020 (2019)"},{"key":"532_CR36","unstructured":"Wolf, M., Weimerskirch, A., Paar, C.: Security in automotive bus systems. In: Workshop on Embedded Security in Cars (2004)"},{"key":"532_CR37","doi-asserted-by":"crossref","unstructured":"Ying, X., Bernieri, G., Conti, M., Poovendran, R.: TACAN: transmitter authentication through covert channels in controller area networks. In: Proceedings of the 10th ACM\/IEEE International Conference on Cyber-Physical Systems, ICCPS 2019, Montreal, QC, Canada, April 16\u201318, 2019, pp 23\u201334 (2019)","DOI":"10.1145\/3302509.3313783"},{"key":"532_CR38","doi-asserted-by":"crossref","unstructured":"Ziermann, T., Wildermann, S., Teich, J.: CAN+: A new backward-compatible Controller Area Network (CAN) protocol with up to 16x higher data rates. In: Proceedings of the Conference on Design, Automation and Test in Europe, European Design and Automation Association, pp. 1088\u20131093 (2009)","DOI":"10.1109\/DATE.2009.5090826"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-020-00532-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-020-00532-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-020-00532-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T04:51:09Z","timestamp":1670820669000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-020-00532-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,19]]},"references-count":38,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["532"],"URL":"https:\/\/doi.org\/10.1007\/s10207-020-00532-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2021,1,19]]},"assertion":[{"value":"19 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest:"}},{"value":"This work was supported by a grant of Ministry of Research and Innovation, CNCS-UEFISCDI, Project Number PN-III-P1-1.1-TE-2016-1317, within PNCDI III (2018-2020).","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Funding:"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval:"}}]}}