{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:27:02Z","timestamp":1766068022253,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T00:00:00Z","timestamp":1716940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T00:00:00Z","timestamp":1716940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,29]]},"DOI":"10.1109\/vnc61989.2024.10575984","type":"proceedings-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T18:10:48Z","timestamp":1719943848000},"page":"148-155","source":"Crossref","is-referenced-by-count":7,"title":["Security Protocols for Ethernet-Based In-Vehicle Communication"],"prefix":"10.1109","author":[{"given":"Timm","family":"Lauser","sequence":"first","affiliation":[{"name":"Darmstadt University of Applied Sciences,Darmstadt,Germany"}]},{"given":"Daniel","family":"Zelle","sequence":"additional","affiliation":[{"name":"Fraunhofer SIT \\ Athene,Darmstadt,Germany"}]},{"given":"Dustin","family":"Kern","sequence":"additional","affiliation":[{"name":"Darmstadt University of Applied Sciences,Darmstadt,Germany"}]},{"given":"Christoph","family":"Krau\u00df","sequence":"additional","affiliation":[{"name":"Darmstadt University of Applied Sciences,Darmstadt,Germany"}]},{"given":"Lars","family":"V\u00f6lker","sequence":"additional","affiliation":[{"name":"Technica Engineering,Munich,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2010.55"},{"key":"ref2","article-title":"Consolidation in Vehicle Electronic Architectures","author":"Wendt","year":"2015","journal-title":"Roland Berger Strategy Consultants"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/9781108895248"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.69"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3054934"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/VNC51378.2020.9318389"},{"key":"ref7","article-title":"Ethernet as a Service for Software Defined Vehicles: Design Objectives and Orientations","volume-title":"2022 IEEE Standards Association (IEEE SA) Ethernet & IP @ Automotive Technology Day","author":"Laclau","year":"2022"},{"key":"ref8","first-page":"6","article-title":"Comprehensive Experimental Analyses of Automotive Attack Surfaces","volume-title":"Proceedings of the 20th USENIX Conference on Security, ser. SECll","author":"Checkoway","year":"2011"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref10","first-page":"21","article-title":"Security and Privacy Vulnerabilities of In-car Wireless Networks: A Tire Pressure Monitoring System Case Study","volume-title":"Proceedings of the 19th USENIX Conference on Security, ser. USENIX Security10","author":"Rouf","year":"2010"},{"issue":"S91","key":"ref11","first-page":"1","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"2015","author":"Miller","year":"2015","journal-title":"Black Hat USA"},{"volume-title":"AUTOSAR Standards, AUTOSAR Foundation R23\u201311, AUTOSAR Std.","year":"2023","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_19"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PDP55904.2022.00046"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502991"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3637059"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3105824"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126618500822"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3465748"},{"volume-title":"Tamarin Prover","year":"2023","author":"Basin","key":"ref20"},{"volume-title":"Ethernet & Adaptive AUTOSAR - Key elements of the new Volkswagen E\/E architecture","year":"2017","author":"Wille","key":"ref21"},{"volume-title":"Ethernet Journey at Jaguar Land Rover - Challenges in the Development of an Ethernet Backbone","year":"2017","author":"Bath","key":"ref22"},{"key":"ref23","article-title":"QoS-Predictable SOA on TSN: Insights from a Case-Study","volume-title":"Automotive Ethernet Congress 2021","author":"Villanueva","year":"2021"},{"key":"ref24","article-title":"On the state of crypto-agility","author":"Alnahawi","year":"2023","journal-title":"Cryptology ePrint Archive, Paper 2023\/487"},{"volume-title":"Information Technology-Open Systems Interconnection-Basic Reference Model: The Basic Model, ISO\/IEC Std. 7498\u20131:1994","year":"1996","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2023.10225636"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2018.8591953"},{"key":"ref28","article-title":"Extensible Authentication Protocol (EAP)","author":"Vollbrecht","year":"2004","journal-title":"RFC 3748"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"ref30","article-title":"Secure automotive on-board electron-ics network architecture","volume-title":"FISITA 2010 world automotive congress, Budapest, Hungary","volume":"8","author":"Apvrille","year":"2010"},{"article-title":"Trusted Platform Module Library - Part 1: Architecture","volume-title":"Specification Family 2.0 - Rev. 01.38","year":"2016","key":"ref31"},{"volume-title":"Volkswagen relies on TPM from Infineon","year":"2019","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.110"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58469-0_17"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437521"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5374"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4535"},{"key":"ref38","article-title":"DTLS-based Multicast Security in Constrained Environments","volume-title":"Inter-net Engineering Task Force, Internet-Draft draft-keoh-dice-multicast-security-08","author":"Keoh","year":"2014"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3385958.3430482"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_18"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134063"}],"event":{"name":"2024 IEEE Vehicular Networking Conference (VNC)","start":{"date-parts":[[2024,5,29]]},"location":"Kobe, Japan","end":{"date-parts":[[2024,5,31]]}},"container-title":["2024 IEEE Vehicular Networking Conference (VNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10574872\/10575940\/10575984.pdf?arnumber=10575984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T04:52:17Z","timestamp":1720241537000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10575984\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,29]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/vnc61989.2024.10575984","relation":{},"subject":[],"published":{"date-parts":[[2024,5,29]]}}}