{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:55:30Z","timestamp":1762005330795},"reference-count":81,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3104854","type":"journal-article","created":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T20:21:44Z","timestamp":1629145304000},"page":"114854-114869","source":"Crossref","is-referenced-by-count":9,"title":["Review of the Security of Backward-Compatible Automotive Inter-ECU Communication"],"prefix":"10.1109","volume":"9","author":[{"given":"Chandra","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Samuel","family":"Moylan","sequence":"additional","affiliation":[]},{"given":"Eugene Y.","family":"Vasserman","sequence":"additional","affiliation":[]},{"given":"George T.","family":"Amariucai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3046974"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3064814.3064816"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.20"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3341105.3373868"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.005"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9091-9"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995934"},{"key":"ref38","first-page":"1","article-title":"Attacks on the KeeLoq block cipher and authentication systems","author":"bogdanov","year":"2007","journal-title":"Proc Conf RFID Secur"},{"key":"ref78","year":"2008"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_9"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2010.5636295"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2009.5090826"},{"key":"ref31","year":"2018","journal-title":"Nissan Autonomous Emergency Steering System"},{"key":"ref30","article-title":"Truck with monitored and resettable electronic control units","author":"coverdill","year":"1999"},{"key":"ref37","first-page":"1","article-title":"Cryptanalysis of the KeeLoq block cipher","volume":"2007","author":"bogdanov","year":"2007","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71039-4_6"},{"key":"ref35","first-page":"1","article-title":"Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study","author":"roufa","year":"2010","journal-title":"Proc USENIX Security07"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7498099"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.06.004"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.22247\/ijcna\/2017\/48968"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref63","first-page":"203","article-title":"A survey on potential applications of honeypot technology in intrusion detection systems","volume":"2","author":"baykara","year":"2015","journal-title":"Int J Comput Netw Appl (IJCNA)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2008.0810"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.026"},{"key":"ref27","year":"2021","journal-title":"CAN Bus Guide&#x2014;Error Flag"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/STA.2016.7952095"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2304139"},{"key":"ref29","author":"shukla","year":"2016","journal-title":"Embedded Security for Vehicles ECU Hacking"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2810232"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/WCICSS.2015.7420322"},{"key":"ref2","author":"voss","year":"2008","journal-title":"A Comprehensible Guide to Controller Area Network"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1049\/cce:19990304"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"ref22","first-page":"546","article-title":"Potential cyberattacks on automated vehicles","volume":"16","author":"petit","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.12.006"},{"key":"ref24","year":"2019","journal-title":"Introduction to the Controller Area Network (CAN)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"ref26","year":"2018","journal-title":"CAN bus error handling"},{"key":"ref25","article-title":"Controller area network (CAN) basics","author":"pazul","year":"1999"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2014.7030108"},{"key":"ref51","first-page":"1","article-title":"CaCAN-centralized authentication system in CAN (controller area network)","author":"kurachi","year":"2014","journal-title":"Proc ESCAR"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909807"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2019.8917500"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_6"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"ref55","first-page":"172","article-title":"LCAP&#x2014;A lightweight can authentication protocol for securing in-vehicle networks","author":"hazem","year":"2012","journal-title":"Proc ESCAR"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_15"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3055004.3055016"},{"key":"ref52","first-page":"5","article-title":"Security authentication system for in-vehicle network","volume":"81","author":"ueda","year":"2015","journal-title":"Proc SEI Tech Rev"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940525"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2013.6615528"},{"key":"ref40","first-page":"2021","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proc USENIX Security07"},{"key":"ref12","first-page":"94","article-title":"A survey of remote automotive attack surfaces","volume":"2014","author":"miller","year":"2014","journal-title":"Black Hat USA"},{"key":"ref13","article-title":"State-of-the-art survey on in-vehicle network communication (CAN-Bus) security and vulnerabilities","author":"avatefipour","year":"2018","journal-title":"arXiv 1802 01725"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600257"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.04.007"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2015.07.011"},{"key":"ref81","first-page":"1","article-title":"Free-fall: Hacking Tesla from wireless to CAN bus","volume":"25","author":"nie","year":"2017","journal-title":"Black Hat Briefings"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.10.002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.03.006"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.01.002"},{"key":"ref80","author":"kulandaivel","year":"2021","journal-title":"Cannon Reliable and Stealthy Remote Shutdown Attacks Via Unaltered Automotive Microcontrollers"},{"key":"ref4","first-page":"1","article-title":"Security in automotive bus systems","author":"wolf","year":"2004","journal-title":"Proc Workshop Embedded Secur Cars"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0314-2"},{"key":"ref6","first-page":"260","article-title":"Adventures in automotive networks and control units","author":"miller","year":"2013","journal-title":"Proc DEFCON"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.259"},{"key":"ref7","first-page":"1","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"91","author":"miller","year":"2015","journal-title":"Proc Black Hat USA"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MTITS.2017.8005670"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87698-4_21"},{"key":"ref46","first-page":"1","author":"bellare","year":"1997","journal-title":"HMAC Keyed-Hashing for Message Authentication"},{"key":"ref45","first-page":"20","article-title":"CANAuth&#x2014;A simple, backward compatible broadcast authentication protocol for CAN bus","author":"van herrewege","year":"2011","journal-title":"Proc ECRYPT Workshop Lightweight Cryptogr"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2009.5164434"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35404-5_15"},{"key":"ref42","first-page":"1","article-title":"BlueSniff: Eve meets Alice and Bluetooth","author":"spill","year":"2007","journal-title":"Proc WOOT"},{"key":"ref41","first-page":"949","article-title":"Plug-N-pwned: Comprehensive vulnerability analysis of OBD-II dongles as a new over-the-air attack surface in automotive IoT","author":"wen","year":"2020","journal-title":"Proc USENIX"},{"key":"ref44","first-page":"1","article-title":"Fast and vulnerable: A story of telematic failures","author":"foster","year":"2015","journal-title":"Proc WOOT"},{"key":"ref43","first-page":"993","article-title":"A practical wireless attack on the connected car and security protocol for in-vehicle CAN","volume":"16","author":"woo","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09514492.pdf?arnumber=9514492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:57:30Z","timestamp":1639771050000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9514492\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":81,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3104854","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}