{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T02:09:42Z","timestamp":1776132582921,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,9]],"date-time":"2016-05-09T00:00:00Z","timestamp":1462752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,9]]},"DOI":"10.1145\/2908446.2908485","type":"proceedings-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T12:49:08Z","timestamp":1478263748000},"page":"233-239","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Lightweight Authentication Protocol Deployment over FlexRay"],"prefix":"10.1145","author":[{"given":"Ahmed Refaat","family":"Mousa","sequence":"first","affiliation":[{"name":"Nile University, Cairo, Egypt"}]},{"given":"Pakinam","family":"NourElDeen","sequence":"additional","affiliation":[{"name":"Ahram Canadian Univeristy, cairo, Egypt"}]},{"given":"Marianne","family":"Azer","sequence":"additional","affiliation":[{"name":"Nile University, Cairo, Egypt and Ministry of Communication and Information Technology, National Telecommunication Institute, Egypt"}]},{"given":"Mahmoud","family":"Allam","sequence":"additional","affiliation":[{"name":"Nile University, Cairo, Egypt"}]}],"member":"320","published-online":{"date-parts":[[2016,5,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bosch R. \"CAN specification version 2.0 \" Rober Bousch GmbH Postfach vol. 300240 1991. Bosch R. \"CAN specification version 2.0 \" Rober Bousch GmbH Postfach vol. 300240 1991."},{"issue":"1","key":"e_1_3_2_1_2_1","first-page":"198","article-title":"FlexRay communications system-protocol specification","volume":"2","author":"F. Consortium and others","year":"2005","unstructured":"F. Consortium and others , \" FlexRay communications system-protocol specification ,\" Version , vol. 2 , no. 1 , pp. 198 -- 207 , 2005 . F. Consortium and others, \"FlexRay communications system-protocol specification,\" Version, vol. 2, no. 1, pp. 198--207, 2005.","journal-title":"Version"},{"key":"e_1_3_2_1_3_1","unstructured":"Koopman P. \"The FlexRay Protocol \" no. June 2004 2013. Koopman P. \"The FlexRay Protocol \" no. June 2004 2013."},{"key":"e_1_3_2_1_4_1","first-page":"6","article-title":"Comprehensive Experimental Analyses of Automotive Attack Surfaces","author":"Checkoway S.","year":"2011","unstructured":"Checkoway S. , Mccoy D. , Kantor B., D. , Anderson H. Shacham , Savage S. , Koscher K. , Czeskis A. , Roesner F. , and Kohno T ., \" Comprehensive Experimental Analyses of Automotive Attack Surfaces ,\" System , pp. 6 -- 6 , 2011 . Checkoway S., Mccoy D., Kantor B., D., Anderson H. Shacham, Savage S., Koscher K., Czeskis A., Roesner F., and Kohno T., \"Comprehensive Experimental Analyses of Automotive Attack Surfaces,\" System, pp. 6--6, 2011.","journal-title":"System"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88181-0_11"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.026"},{"key":"e_1_3_2_1_7_1","unstructured":"Koopman P. P. \"A Case Study of Toyota Unintended Acceleration and Software Safety \" 2014. Koopman P. P. \"A Case Study of Toyota Unintended Acceleration and Software Safety \" 2014."},{"key":"e_1_3_2_1_8_1","first-page":"2012","article-title":"LCAP - A Lightweight CAN Authentication Protocol for Securing In-Vehicle Networks","author":"Hazem A.","year":"2012","unstructured":"Hazem A. and Fahmy H ., \" LCAP - A Lightweight CAN Authentication Protocol for Securing In-Vehicle Networks ,\" Escar 2012 , 2012 . Hazem A. and Fahmy H., \"LCAP - A Lightweight CAN Authentication Protocol for Securing In-Vehicle Networks,\" Escar 2012, 2012.","journal-title":"Escar"},{"key":"e_1_3_2_1_9_1","first-page":"24","volume-title":"Conf. Comput. Des.","author":"Lin C.","year":"2014","unstructured":"Lin C. , Zhu Q. , and Sangiovanni -vincentelli A ., \" Security-Aware Mapping for TDMA-Based Real-Time Distributed Systems,\" 2014 IEEE\/ACM Int . Conf. Comput. Des. , pp. 24 -- 31 , 2014 . Lin C., Zhu Q., and Sangiovanni-vincentelli A., \"Security-Aware Mapping for TDMA-Based Real-Time Distributed Systems,\" 2014 IEEE\/ACM Int. Conf. Comput. Des., pp. 24--31, 2014."},{"key":"e_1_3_2_1_10_1","volume-title":", \"Efficient Authentication and Signing of Multicast Streams over Lossy Channels","author":"Perrig A.","year":"2000","unstructured":"Perrig A. , Canetti R. , Song D. , Berkeley U. C. , and Watson I. B. M. T. J. , \"Efficient Authentication and Signing of Multicast Streams over Lossy Channels ,\" vol. 28913 , 2000 . Perrig A., Canetti R., Song D., Berkeley U. C., and Watson I. B. M. T. J., \"Efficient Authentication and Signing of Multicast Streams over Lossy Channels,\" vol. 28913, 2000."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2239301"},{"key":"e_1_3_2_1_13_1","volume-title":"Backward Compatible Broadcast Authentication Protocol for CAN bus,\" Escar","author":"van Herrewege A.","year":"2011","unstructured":"van Herrewege A. , Singelee D. , and Verbauwhede I. , \" CANAuth - A Simple , Backward Compatible Broadcast Authentication Protocol for CAN bus,\" Escar 2011 , Embed. Secur. Cars , 2011. van Herrewege A., Singelee D., and Verbauwhede I., \"CANAuth - A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus,\" Escar 2011, Embed. Secur. Cars, 2011."},{"key":"e_1_3_2_1_14_1","volume-title":"Autom. Test Eur. Conf. Exhib., no. MAY","author":"Ziermann T.","year":"2009","unstructured":"Ziermann T. , Wildermann S. , and Teich J ., \" CAN+: A new backward-compatible Controller Area Network (CAN) protocol with up to 16x higher data rates.,\" 2009 Des . Autom. Test Eur. Conf. Exhib., no. MAY , 2009 . Ziermann T., Wildermann S., and Teich J., \"CAN+: A new backward-compatible Controller Area Network (CAN) protocol with up to 16x higher data rates.,\" 2009 Des. Autom. Test Eur. Conf. Exhib., no. MAY, 2009."},{"key":"e_1_3_2_1_15_1","volume-title":"Conf. on Embedded Security in Cars (ESCAR 2012)","author":"Hartkopp O.","year":"2012","unstructured":"Hartkopp O. , Reuber C. , and Schilling R ., \" Macan-message authenticated can,\" in 10th Int . Conf. on Embedded Security in Cars (ESCAR 2012) , 2012 . Hartkopp O., Reuber C., and Schilling R., \"Macan-message authenticated can,\" in 10th Int. Conf. on Embedded Security in Cars (ESCAR 2012), 2012."},{"key":"e_1_3_2_1_16_1","volume-title":"CaCAN - centralized authentication system in CAN (controller area network),\" Proc. of ESCAR","author":"Kurachi Y.","year":"2014","unstructured":"H. T. N. A. Y. M. R. Kurachi Y. Matsubara and Horihata S. , \" CaCAN - centralized authentication system in CAN (controller area network),\" Proc. of ESCAR , 2014 . H. T. N. A. Y. M. R. Kurachi Y. Matsubara and Horihata S., \"CaCAN - centralized authentication system in CAN (controller area network),\" Proc. of ESCAR, 2014."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Vasile P. and Murvay S. \"Performance analysis of broadcast authentication protocols on CAN-FD and FlexRay \" no. 1. Vasile P. and Murvay S. \"Performance analysis of broadcast authentication protocols on CAN-FD and FlexRay \" no. 1.","DOI":"10.1145\/2818362.2818369"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-107r1","volume-title":"Recommendation for Applications Using Approved Hash Algorithms National Institute of Standards and Technology","author":"Dang Q.","year":"2012","unstructured":"Dang Q. and Gallagher P. , \" Recommendation for Applications Using Approved Hash Algorithms National Institute of Standards and Technology ,\" 2012 . Dang Q. and Gallagher P., \"Recommendation for Applications Using Approved Hash Algorithms National Institute of Standards and Technology,\" 2012."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54568-9_21"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.10.007"},{"key":"e_1_3_2_1_21_1","volume-title":"TTEthernet: Time-Triggered Ethernet,\" Time-Triggered Communication","author":"Steiner W.","year":"2011","unstructured":"Steiner W. , Bauer G. , Hall B. , and Paulitsch M. , \" TTEthernet: Time-Triggered Ethernet,\" Time-Triggered Communication . CRC Press , 2011 . Steiner W., Bauer G., Hall B., and Paulitsch M., \"TTEthernet: Time-Triggered Ethernet,\" Time-Triggered Communication. CRC Press, 2011."},{"key":"e_1_3_2_1_22_1","first-page":"79","volume-title":"Automotive Ethernet, a holistic approach for a next generation in-vehicle networking standard,\" in Advanced Microsystems for Automotive Applications","author":"Hank P.","year":"2012","unstructured":"Hank P. , Suermann T. , and M\u00fcller S. , \" Automotive Ethernet, a holistic approach for a next generation in-vehicle networking standard,\" in Advanced Microsystems for Automotive Applications 2012 , Springer , 2012, pp. 79 -- 89 . Hank P., Suermann T., and M\u00fcller S., \"Automotive Ethernet, a holistic approach for a next generation in-vehicle networking standard,\" in Advanced Microsystems for Automotive Applications 2012, Springer, 2012, pp. 79--89."}],"event":{"name":"INFOS '16: The 10th International Conference on Informatics and Systems","location":"Giza Egypt","acronym":"INFOS '16"},"container-title":["Proceedings of the 10th International Conference on Informatics and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2908446.2908485","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2908446.2908485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:13Z","timestamp":1750221553000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2908446.2908485"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,9]]},"references-count":22,"alternative-id":["10.1145\/2908446.2908485","10.1145\/2908446"],"URL":"https:\/\/doi.org\/10.1145\/2908446.2908485","relation":{},"subject":[],"published":{"date-parts":[[2016,5,9]]},"assertion":[{"value":"2016-05-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}