{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:27:55Z","timestamp":1760171275299},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T00:00:00Z","timestamp":1682467200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T00:00:00Z","timestamp":1682467200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,4,26]]},"DOI":"10.1109\/vnc57357.2023.10136275","type":"proceedings-article","created":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T17:28:14Z","timestamp":1685640494000},"page":"223-230","source":"Crossref","is-referenced-by-count":4,"title":["Assessing the Impact of Attacks on an Automotive Ethernet Time Synchronization Testbed"],"prefix":"10.1109","author":[{"given":"Mahdi","family":"Fotouhi","sequence":"first","affiliation":[{"name":"University of Luxembourg,Faculty of Science, Technology and Medicine"}]},{"given":"Alessio","family":"Buscemi","sequence":"additional","affiliation":[{"name":"University of Luxembourg,Faculty of Science, Technology and Medicine"}]},{"given":"Abdelwahab","family":"Boualouache","sequence":"additional","affiliation":[{"name":"University of Luxembourg,Faculty of Science, Technology and Medicine"}]},{"given":"Florian","family":"Jomrich","sequence":"additional","affiliation":[{"name":"Honda R&#x0026;D Europe (Germany) GmbH"}]},{"given":"Christian","family":"Koebel","sequence":"additional","affiliation":[{"name":"Honda R&#x0026;D Europe (Germany) GmbH"}]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[{"name":"University of Luxembourg,Faculty of Science, Technology and Medicine"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2006.1704163"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2019.2918597"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCS.2009.5340204"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3236448"},{"journal-title":"IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems - Redline","first-page":"1","year":"2008","key":"ref11"},{"key":"ref10","first-page":"22","article-title":"A security analysis and revised security extension for the precision time protocol","author":"itkin","year":"2017","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4564481"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.69"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCS.2019.8886635"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00080-y"},{"key":"ref19","article-title":"Encryption is futile: Delay attacks on high-precision clock synchronization","author":"annessi","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISR.2013.6695734"},{"journal-title":"TSN Documentation Project for Linux","year":"0","key":"ref24"},{"journal-title":"apu2e4","year":"2016","author":"engine","key":"ref23"},{"journal-title":"Wireshark Go deep","year":"2021","key":"ref26"},{"journal-title":"Tcpdump and libcap","year":"2021","key":"ref25"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM40551.2019.8973494"},{"journal-title":"A New Generation of Gigabit Smart Switches","year":"2019","key":"ref22"},{"journal-title":"linuxptp ptp4l","year":"0","key":"ref21"},{"journal-title":"IEEE Standard Association","article-title":"802.1AE: MAC Security (MACsec)","year":"2018","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9055"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4303"},{"journal-title":"IEEE -SA Standards","article-title":"IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems","year":"2019","key":"ref8"},{"journal-title":"IEEE Draft Standard for Local and Metropolitan Area Networks-Timing and Synchronization for Time-Sensitive Applications in Bridged Local Area Networks","year":"2008","key":"ref7"},{"key":"ref9","article-title":"RFC 7384: Security requirements of time protocols in packet switched networks","author":"mizrahi","year":"2014","journal-title":"tools ietf org"},{"key":"ref4","first-page":"1","article-title":"On the security of IEEE 802.1 time-sensitive networking","author":"ergen\u00e7","year":"2021","journal-title":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29673-4_8"},{"journal-title":"P802 1DG - TSN Profile for Automotive In-Vehicle Ethernet Communications","year":"2023","key":"ref6"},{"journal-title":"Draft Standard for Local and metropolitan area networks - Time-Sensitive Networking Profile for Automotive In-Vehicle Ethernet Communications","year":"2020","key":"ref5"}],"event":{"name":"2023 IEEE Vehicular Networking Conference (VNC)","start":{"date-parts":[[2023,4,26]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2023,4,28]]}},"container-title":["2023 IEEE Vehicular Networking Conference (VNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10136303\/10136314\/10136275.pdf?arnumber=10136275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T17:48:41Z","timestamp":1687196921000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10136275\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,26]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/vnc57357.2023.10136275","relation":{},"subject":[],"published":{"date-parts":[[2023,4,26]]}}}