{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T10:46:58Z","timestamp":1774003618969,"version":"3.50.1"},"reference-count":37,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T00:00:00Z","timestamp":1773619200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UID\/50014\/2025"],"award-info":[{"award-number":["UID\/50014\/2025"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.compeleceng.2026.111107","type":"journal-article","created":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T08:25:42Z","timestamp":1773822342000},"page":"111107","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A comprehensive analysis of in-vehicle communication protocols: Performance benchmarks and security considerations"],"prefix":"10.1016","volume":"134","author":[{"given":"Iftikhar","family":"Hussain","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4632-9664","authenticated-orcid":false,"given":"Carlos","family":"Ser\u00f4dio","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8434-4887","authenticated-orcid":false,"given":"Frederico","family":"Branco","sequence":"additional","affiliation":[]},{"given":"Ant\u00f3nio","family":"Valente","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8872-5721","authenticated-orcid":false,"given":"Manuel J.C.S.","family":"Reis","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.compeleceng.2026.111107_bib0001","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.3390\/app13031278","article-title":"A perspective on ethernet in Automotive communications\u2014current status and future trends","volume":"13","author":"Bello","year":"2023","journal-title":"Appl Sci"},{"key":"10.1016\/j.compeleceng.2026.111107_bib0002","article-title":"Security assessment of in-vehicle communication protocols","volume":"44","author":"Anwar","year":"2023","journal-title":"Veh Commun"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.111107_bib0003","doi-asserted-by":"crossref","first-page":"17057","DOI":"10.3934\/mbe.2023761","article-title":"State-of-the-art survey of in-vehicle protocols and automotive ethernet security and vulnerabilities","volume":"20","author":"Douss","year":"2023","journal-title":"MBE"},{"key":"10.1016\/j.compeleceng.2026.111107_bib0004","series-title":"Presented at the WCX SAE world congress experience","first-page":"2020","article-title":"State of the art survey on comparison of CAN, FlexRay, LIN protocol and simulation of LIN protocol","author":"Hafeez","year":"2020"},{"issue":"17","key":"10.1016\/j.compeleceng.2026.111107_bib0005","doi-asserted-by":"crossref","first-page":"6382","DOI":"10.3390\/s22176382","article-title":"Automotive IoT ethernet-based communication technologies applied in a V2X context via a multi-protocol gateway","volume":"22","author":"Ioana","year":"2022","journal-title":"Sensors"},{"issue":"7","key":"10.1016\/j.compeleceng.2026.111107_bib0006","doi-asserted-by":"crossref","first-page":"1164","DOI":"10.3390\/app8071164","article-title":"An integrated self-diagnosis system for an autonomous vehicle based on an IoT gateway and Deep learning","volume":"8","author":"Jeong","year":"2018","journal-title":"Appl Sci"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111107_bib0007","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.3390\/electronics13061003","article-title":"Enhancing communication security an In-vehicle wireless sensor network","volume":"13","author":"Ven\u010dkauskas","year":"2024","journal-title":"Electron"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111107_bib0011","doi-asserted-by":"crossref","first-page":"450","DOI":"10.3390\/vehicles6010020","article-title":"Enhancing security in vehicle-to-vehicle communication: a comprehensive review of protocols and techniques","volume":"6","author":"Muslam","year":"2024","journal-title":"Vehicles"},{"key":"10.1016\/j.compeleceng.2026.111107_bib0012","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101245","article-title":"AI-based anomaly identification techniques for vehicles communication protocol systems: comprehensive investigation, research opportunities and challenges","volume":"27","author":"Ahmad","year":"2024","journal-title":"Internet Things"},{"key":"10.1016\/j.compeleceng.2026.111107_bib0008","series-title":"2023 18th conference on electrical machines, drives and power systems (ELMA)","first-page":"1","article-title":"Comparative evaluation of communication protocols in the automotive industry","author":"Yordanova","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.111107_bib0009","doi-asserted-by":"crossref","first-page":"92","DOI":"10.7763\/IJMO.2022.V13.807","article-title":"A security framework for In-vehicle FlexRay bus network","author":"Piao","year":"2022","journal-title":"IJMO"},{"issue":"17","key":"10.1016\/j.compeleceng.2026.111107_bib0010","doi-asserted-by":"crossref","first-page":"6679","DOI":"10.3390\/s22176679","article-title":"In-vehicle communication cyber security: challenges and solutions","volume":"22","author":"Rathore","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.compeleceng.2026.111107_bib0013","series-title":"Advances in computational intelligence and robotics","doi-asserted-by":"crossref","first-page":"162","DOI":"10.4018\/978-1-7998-7468-3.ch008","article-title":"Security of In-vehicle communication systems: a survey of possible vulnerabilities","author":"Dubrefjord","year":"2021"},{"key":"10.1016\/j.compeleceng.2026.111107_bib0014","series-title":"2020 first IEEE international conference on measurement, instrumentation, control and automation (ICMICA)","first-page":"1","article-title":"Novel implementation of a configurable gateway between CAN and ethernet protocol for In-vehicle networks","author":"Yadav","year":"2020"},{"key":"10.1016\/j.compeleceng.2026.111107_bib0015","series-title":"Automotive cybersecurity","first-page":"67","article-title":"In-vehicle communication and cyber security","author":"Kim","year":"2020"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111107_bib0016","doi-asserted-by":"crossref","first-page":"89","DOI":"10.2478\/jee-2021-0012","article-title":"A study of securing in-vehicle communication using IPSEC protocol","volume":"72","author":"Lastinec","year":"2021","journal-title":"J Electr Eng"},{"key":"10.1016\/j.compeleceng.2026.111107_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.compind.2022.103735","article-title":"Automatic whitelist generation system for ethernet based in-vehicle network","volume":"142","author":"Jo","year":"2022","journal-title":"Comput Ind"},{"key":"10.1016\/j.compeleceng.2026.111107_bib0018","series-title":"2024 IEEE vehicular networking conference (VNC)","first-page":"148","article-title":"Security protocols for ethernet-based In-vehicle communication","author":"Lauser","year":"2024"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111107_bib0019","doi-asserted-by":"crossref","first-page":"669","DOI":"10.3390\/s23020669","article-title":"Performance evaluation of zone-based In-vehicle network architecture for autonomous vehicles","volume":"23","author":"Park","year":"2023","journal-title":"Sensors"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111107_bib0020","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3431233","article-title":"Cyberattacks and countermeasures for In-vehicle networks","volume":"54","author":"Aliwa","year":"2022","journal-title":"ACM Comput Surv"},{"key":"10.1016\/j.compeleceng.2026.111107_bib0021","series-title":"Research methodology: tools & techniques","author":"Pandey","year":"2015"},{"issue":"11","key":"10.1016\/j.compeleceng.2026.111107_bib0022","first-page":"67","article-title":"Pragmatic methodology in management science","author":"D\u017awigo\u0142","year":"2023","journal-title":"Forum Sci Oecon"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111107_bib0023","doi-asserted-by":"crossref","first-page":"641","DOI":"10.3390\/s20030641","article-title":"Design of a FlexRay\/ethernet gateway and security mechanism for In-vehicle networks","volume":"20","author":"Lee","year":"2020","journal-title":"Sensors"},{"key":"10.1016\/j.compeleceng.2026.111107_bib0024","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2021.08.027","article-title":"Security on in-vehicle communication protocols: issues, challenges, and future research directions","volume":"180","author":"Mart\u00ednez-Cruz","year":"2021","journal-title":"Comput Commun"},{"issue":"13","key":"10.1016\/j.compeleceng.2026.111107_bib0025","doi-asserted-by":"crossref","first-page":"2777","DOI":"10.3390\/electronics12132777","article-title":"Performance enhancement of CAN\/ethernet automotive gateway with a CAN data reduction algorithm","volume":"12","author":"Oh","year":"2023","journal-title":"Electron"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111107_bib0026","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/IOTM.001.2300109","article-title":"Intrusion detection systems in automotive ethernet networks: challenges, opportunities and future research trends","volume":"7","author":"Quadar","year":"2024","journal-title":"IEEE Internet Things M"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111107_bib0027","doi-asserted-by":"crossref","first-page":"1693","DOI":"10.1007\/s11277-023-10842-1","article-title":"Modelling, simulation, and performance analysis of intra-vehicular heterogeneous networks","volume":"133","author":"Funes","year":"2023","journal-title":"Wirel Pers Commun"},{"key":"10.1016\/j.compeleceng.2026.111107_bib0028","doi-asserted-by":"crossref","DOI":"10.1016\/j.micpro.2020.103144","article-title":"Securing FlexRay-based in-vehicle networks","volume":"77","author":"P\u00fcllen","year":"2020","journal-title":"Microprocess Microsyst"},{"key":"10.1016\/j.compeleceng.2026.111107_bib0029","series-title":"Proceedings of the 15th international conference on information warfare and security (ICCWS 2020), in proceedings of the international conference on information warfare and security","first-page":"173","article-title":"Connected vehicle security","author":"Francia","year":"2020"},{"issue":"7","key":"10.1016\/j.compeleceng.2026.111107_bib0030","doi-asserted-by":"crossref","first-page":"119","DOI":"10.3390\/fi12070119","article-title":"Intrusion detection for in-vehicle communication networks: an unsupervised Kohonen SOM approach","volume":"12","author":"Barletta","year":"2020","journal-title":"Future Internet"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111107_bib0031","doi-asserted-by":"crossref","first-page":"1724","DOI":"10.3390\/s23031724","article-title":"A modular In-vehicle C-ITS architecture for sensor data collection, vehicular communications and cloud connectivity","volume":"23","author":"Rocha","year":"2023","journal-title":"Sensors"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111107_bib0032","doi-asserted-by":"crossref","first-page":"3167","DOI":"10.11591\/eei.v13i5.7549","article-title":"Handover management in vehicle communication: applications, techniques, issues, and challenges: a review","volume":"13","author":"Qasim","year":"2024","journal-title":"Bull EEI"},{"key":"10.1016\/j.compeleceng.2026.111107_bib0033","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103091","article-title":"Flooding attack mitigator for in-vehicle CAN using fault confinement in CAN protocol","volume":"126","author":"Park","year":"2023","journal-title":"Comput Secur"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111107_bib0034","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/s11235-019-00639-8","article-title":"A tutorial survey on vehicle-to-vehicle communications","volume":"73","author":"Zeadally","year":"2020","journal-title":"Telecommun Syst"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111107_bib0035","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/s42154-022-00184-2","article-title":"Review of In-vehicle optical Fiber communication technology","volume":"5","author":"Wang","year":"2022","journal-title":"Automot Innov"},{"key":"10.1016\/j.compeleceng.2026.111107_bib0036","article-title":"Sustainable and lightweight domain-based intrusion detection system for in-vehicle network","volume":"41","author":"Kristianto","year":"2024","journal-title":"Sustain Comput: Inform Syst"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.111107_bib0037","doi-asserted-by":"crossref","first-page":"4376","DOI":"10.3390\/s23094376","article-title":"A multi-layer intrusion detection system for SOME\/IP-based In-vehicle network","volume":"23","author":"Luo","year":"2023","journal-title":"Sensors"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626001795?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626001795?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T08:28:32Z","timestamp":1773995312000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790626001795"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":37,"alternative-id":["S0045790626001795"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111107","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A comprehensive analysis of in-vehicle communication protocols: Performance benchmarks and security considerations","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111107","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"111107"}}