{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:50:47Z","timestamp":1778345447095,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Deutsche Forschungsgemeinschaft (DFG, German Research Foundation)","award":["390621612"],"award-info":[{"award-number":["390621612"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3507657.3528539","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T11:30:36Z","timestamp":1651923036000},"page":"207-221","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Take a Bite of the Reality Sandwich"],"prefix":"10.1145","author":[{"given":"Eric","family":"Wagner","sequence":"first","affiliation":[{"name":"Fraunhofer FKIE &amp; RWTH Aachen University, Wachtberg, Germany"}]},{"given":"Jan","family":"Bauer","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE, Wachtberg, Germany"}]},{"given":"Martin","family":"Henze","sequence":"additional","affiliation":[{"name":"RWTH Aachen University &amp; Fraunhofer FKIE, Aachen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453102"},{"key":"e_1_3_2_1_2_1","volume-title":"et almbox","author":"Aktas Ismet","year":"2017","unstructured":"Ismet Aktas , Alexander Bentkus , Florian Bonanati , et almbox . 2017 . Position Paper : Wireless Technologies for Industrie 4.0. Technical Report. VDE. Ismet Aktas, Alexander Bentkus, Florian Bonanati, et almbox. 2017. Position Paper: Wireless Technologies for Industrie 4.0. Technical Report. VDE."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93387-0_20"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3144457.3144478"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423349"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1953.tb01422.x"},{"key":"e_1_3_2_1_7_1","article-title":"On the Minimization of Glass-to-Glass and Glass-to-Algorithm Delay in Video Communication","volume":"20","author":"Bachhuber Christoph","year":"2017","unstructured":"Christoph Bachhuber , Eckehard Steinbach , Martin Freundl , and Martin Reisslein . 2017 . On the Minimization of Glass-to-Glass and Glass-to-Algorithm Delay in Video Communication . IEEE Transactions on Multimedia , Vol. 20 , 1 (2017). https:\/\/doi.org\/10.1109\/TMM.2017.2726189 10.1109\/TMM.2017.2726189 Christoph Bachhuber, Eckehard Steinbach, Martin Freundl, and Martin Reisslein. 2017. On the Minimization of Glass-to-Glass and Glass-to-Algorithm Delay in Video Communication. IEEE Transactions on Multimedia, Vol. 20, 1 (2017). https:\/\/doi.org\/10.1109\/TMM.2017.2726189","journal-title":"IEEE Transactions on Multimedia"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_36"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44750-4_2"},{"key":"e_1_3_2_1_11_1","volume-title":"Legacy-Compliant Data Authentication for Industrial Control System Traffic. In In Proceedings of the International Conference on Applied Cryptography and Network Security (ANCS). Springer, 665--685","author":"Castellanos John Henry","year":"2017","unstructured":"John Henry Castellanos , Daniele Antonioli , Nils Ole Tippenhauer , and Mart\u00edn Ochoa . 2017 . Legacy-Compliant Data Authentication for Industrial Control System Traffic. In In Proceedings of the International Conference on Applied Cryptography and Network Security (ANCS). Springer, 665--685 . https:\/\/doi.org\/10.1007\/978-3-319-61204-1_33 10.1007\/978-3-319-61204-1_33 John Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer, and Mart\u00edn Ochoa. 2017. Legacy-Compliant Data Authentication for Industrial Control System Traffic. In In Proceedings of the International Conference on Applied Cryptography and Network Security (ANCS). Springer, 665--685. https:\/\/doi.org\/10.1007\/978-3-319-61204-1_33"},{"key":"e_1_3_2_1_12_1","volume-title":"Computer Communications","volume":"28","author":"Challal Yacine","year":"2005","unstructured":"Yacine Challal , Abdelmadjid Bouabdallah , and Yoann Hinard . 2005 . RLH: receiver driven layered hash-chaining for multicast data origin authentication . Computer Communications , Vol. 28 , 7 (2005). https:\/\/doi.org\/10.1016\/j.comcom.2004.10.009 10.1016\/j.comcom.2004.10.009 Yacine Challal, Abdelmadjid Bouabdallah, and Yoann Hinard. 2005. RLH: receiver driven layered hash-chaining for multicast data origin authentication. Computer Communications, Vol. 28, 7 (2005). https:\/\/doi.org\/10.1016\/j.comcom.2004.10.009"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","DOI":"10.1109\/TMC.2007.70784","article-title":"General Network Lifetime and Cost Models for Evaluating Sensor Network Deployment Strategies","volume":"7","author":"Cheng Zhao","year":"2008","unstructured":"Zhao Cheng , Mark Perillo , and Wendi B Heinzelman . 2008 . General Network Lifetime and Cost Models for Evaluating Sensor Network Deployment Strategies . IEEE Transactions on Mobile Computing , Vol. 7 , 4 (2008). https:\/\/doi.org\/10.1109\/TMC.2007.70784 10.1109\/TMC.2007.70784 Zhao Cheng, Mark Perillo, and Wendi B Heinzelman. 2008. General Network Lifetime and Cost Models for Evaluating Sensor Network Deployment Strategies. IEEE Transactions on Mobile Computing, Vol. 7, 4 (2008). https:\/\/doi.org\/10.1109\/TMC.2007.70784","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2810232"},{"key":"e_1_3_2_1_15_1","volume-title":"IEEE Access","volume":"7","author":"Gouvea Da Silva Carlos Alexandre","year":"2019","unstructured":"Carlos Alexandre Gouvea Da Silva and Carlos Marcelo Pedroso . 2019 . MAC-Layer Packet Loss Models for Wi-Fi Networks: A Survey . IEEE Access , Vol. 7 (2019). https:\/\/doi.org\/MAC-Layer Packet Loss Models for Wi-Fi Networks : A Survey Carlos Alexandre Gouvea Da Silva and Carlos Marcelo Pedroso. 2019. MAC-Layer Packet Loss Models for Wi-Fi Networks: A Survey. IEEE Access, Vol. 7 (2019). https:\/\/doi.org\/MAC-Layer Packet Loss Models for Wi-Fi Networks: A Survey"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15317-4_20"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2940890"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2014.6881174"},{"key":"e_1_3_2_1_20_1","volume-title":"Introduction to Industrial Control Networks","author":"Galloway Brendan","year":"2012","unstructured":"Brendan Galloway and Gerhard P Hancke . 2012. Introduction to Industrial Control Networks . IEEE Communications surveys & tutorials, Vol. 15 , 2 ( 2012 ). https:\/\/doi.org\/10.1109\/SURV.2012.071812.00124 10.1109\/SURV.2012.071812.00124 Brendan Galloway and Gerhard P Hancke. 2012. Introduction to Industrial Control Networks. IEEE Communications surveys & tutorials, Vol. 15, 2 (2012). https:\/\/doi.org\/10.1109\/SURV.2012.071812.00124"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052235"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.871"},{"key":"e_1_3_2_1_23_1","volume-title":"Foundations of Cryptography II: Basic Applications","author":"Goldreich Oded","unstructured":"Oded Goldreich . 2009. Foundations of Cryptography II: Basic Applications . Cambridge University Press . Oded Goldreich. 2009. Foundations of Cryptography II: Basic Applications. Cambridge University Press."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS).","author":"Golle Philippe","year":"2001","unstructured":"Philippe Golle and Nagendra Modadugu . 2001 . Authenticating Streamed Data in the Presence of Random Packet Loss . In Proceedings of the Network and Distributed System Security Symposium (NDSS). Philippe Golle and Nagendra Modadugu. 2001. Authenticating Streamed Data in the Presence of Random Packet Loss. In Proceedings of the Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-013-1411-8"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.124"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2016.7880885"},{"key":"#cr-split#-e_1_3_2_1_28_1.1","doi-asserted-by":"crossref","unstructured":"Thomas H\u00e4nel Leonhard Br\u00fcggemann Felix Loske and Nils Aschenbruck. 2021. Long-Term Wireless Sensor Network Deployments in Industry and Office Scenarios. In 2021 IEEE 22nd International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM). https:\/\/doi.org\/10.1109\/WoWMoM51794.2021.00024 10.1109\/WoWMoM51794.2021.00024","DOI":"10.1109\/WoWMoM51794.2021.00024"},{"key":"#cr-split#-e_1_3_2_1_28_1.2","doi-asserted-by":"crossref","unstructured":"Thomas H\u00e4nel Leonhard Br\u00fcggemann Felix Loske and Nils Aschenbruck. 2021. Long-Term Wireless Sensor Network Deployments in Industry and Office Scenarios. In 2021 IEEE 22nd International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM). https:\/\/doi.org\/10.1109\/WoWMoM51794.2021.00024","DOI":"10.1109\/WoWMoM51794.2021.00024"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2018.8638027"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888033"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024687"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79263-5_10"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243751"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24025"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2012.050028"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3074054"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162217"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1027794.1027800"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","DOI":"10.1109\/TPDS.2011.95","article-title":"BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks","volume":"23","author":"Lu Rongxing","year":"2012","unstructured":"Rongxing Lu , Xiaodong Lin , Haojin Zhu , Xiaohui Liang , and Xuemin Shen . 2012 . BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks . IEEE Transactions on Parallel and Distributed Systems , Vol. 23 , 1 (2012).https:\/\/doi.org\/10.1109\/TPDS.2011.95 10.1109\/TPDS.2011.95 Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xiaohui Liang, and Xuemin Shen. 2012. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, Vol. 23, 1 (2012).https:\/\/doi.org\/10.1109\/TPDS.2011.95","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-52993-5_3"},{"key":"e_1_3_2_1_41_1","volume-title":"On optimization of command-delaying for advanced command authentication in smart grid systems. In 2019 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia)","author":"Mashima Daisuke","unstructured":"Daisuke Mashima , Ramkumar Rajendran , Toby Zhou , Binbin Chen , and Biplab Sikdar . 2019. On optimization of command-delaying for advanced command authentication in smart grid systems. In 2019 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia) . IEEE. Daisuke Mashima, Ramkumar Rajendran, Toby Zhou, Binbin Chen, and Biplab Sikdar. 2019. On optimization of command-delaying for advanced command authentication in smart grid systems. In 2019 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia). IEEE."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194554.3194582"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13051-4_19"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2304139"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.259"},{"key":"e_1_3_2_1_46_1","volume-title":"Recommendation for Key Management: Part 1 -- General. NIST Special Publication 800--57 Part 1 Revision 5","author":"National Institute of Standards and Technology. 2020.","year":"2020","unstructured":"National Institute of Standards and Technology. 2020. Recommendation for Key Management: Part 1 -- General. NIST Special Publication 800--57 Part 1 Revision 5 ( 2020 ). National Institute of Standards and Technology. 2020. Recommendation for Key Management: Part 1 -- General. NIST Special Publication 800--57 Part 1 Revision 5 (2020)."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS).","author":"Perrig Adrian","unstructured":"Adrian Perrig , Ran Canetti , Dawn Song , and J. Doug Tygar . 2001. Efficient and Secure Source Authentication for Multicast . In Proceedings of the Network and Distributed System Security Symposium (NDSS). Adrian Perrig, Ran Canetti, Dawn Song, and J. Doug Tygar. 2001. Efficient and Secure Source Authentication for Multicast. In Proceedings of the Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"e_1_3_2_1_49_1","volume-title":"Victor Wen, and David E Culler.","author":"Perrig Adrian","year":"2002","unstructured":"Adrian Perrig , Robert Szewczyk , Justin Douglas Tygar , Victor Wen, and David E Culler. 2002 . SPINS : Security protocols for sensor networks. Wireless networks, Vol. 8 , 5 (2002). Adrian Perrig, Robert Szewczyk, Justin Douglas Tygar, Victor Wen, and David E Culler. 2002. SPINS: Security protocols for sensor networks. Wireless networks, Vol. 8, 5 (2002)."},{"key":"e_1_3_2_1_50_1","volume-title":"Van Oorschot","author":"Preneel Bart","year":"1995","unstructured":"Bart Preneel and Paul C . Van Oorschot . 1995 . MDx-MAC and building fast MACs from hash functions. In Proceedings of the Annual International Cryptology Conference (CRYPTO). Springer . https:\/\/doi.org\/10.1007\/3-540-44750-4_1 10.1007\/3-540-44750-4_1 Bart Preneel and Paul C. Van Oorschot. 1995. MDx-MAC and building fast MACs from hash functions. In Proceedings of the Annual International Cryptology Conference (CRYPTO). Springer. https:\/\/doi.org\/10.1007\/3-540-44750-4_1"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_15"},{"key":"e_1_3_2_1_52_1","volume-title":"Ad Hoc Networks","volume":"92","author":"Randhawa Rizwan Hamid","year":"2019","unstructured":"Rizwan Hamid Randhawa , Abdul Hameed , and Adnan Noor Mian . 2019 . Energy efficient cross-layer approach for object security of CoAP for IoT devices . Ad Hoc Networks , Vol. 92 (2019). https:\/\/doi.org\/10.1016\/j.adhoc.2018.09.006 10.1016\/j.adhoc.2018.09.006 Rizwan Hamid Randhawa, Abdul Hameed, and Adnan Noor Mian. 2019. Energy efficient cross-layer approach for object security of CoAP for IoT devices. Ad Hoc Networks, Vol. 92 (2019). https:\/\/doi.org\/10.1016\/j.adhoc.2018.09.006"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.07.002"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093081"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the IFIP Networking Conference (Networking).","author":"Serror Martin","year":"2020","unstructured":"Martin Serror , Eric Wagner , Ren\u00e9 Glebke , and Klaus Wehrle . 2020 . QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation . In Proceedings of the IFIP Networking Conference (Networking). Martin Serror, Eric Wagner, Ren\u00e9 Glebke, and Klaus Wehrle. 2020. QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation. In Proceedings of the IFIP Networking Conference (Networking)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2015.11.010"},{"key":"e_1_3_2_1_57_1","volume-title":"Math. Ann.","volume":"106","author":"Sidon Simon","year":"1932","unstructured":"Simon Sidon . 1932 . Ein Satz \u00fcber trigonometrische Polynome und seine Anwendung in der Theorie der Fourier-Reihen . Math. Ann. , Vol. 106 , 1 (1932). https:\/\/doi.org\/10.1007\/BF01455900 10.1007\/BF01455900 Simon Sidon. 1932. Ein Satz \u00fcber trigonometrische Polynome und seine Anwendung in der Theorie der Fourier-Reihen. Math. Ann., Vol. 106, 1 (1932). https:\/\/doi.org\/10.1007\/BF01455900"},{"key":"e_1_3_2_1_58_1","volume-title":"Low cost multicast network authentication for embedded control systems. Ph.,D. Dissertation","author":"Szilagyi Christopher","unstructured":"Christopher Szilagyi . 2012. Low cost multicast network authentication for embedded control systems. Ph.,D. Dissertation . Carnegie Mellon University . Christopher Szilagyi. 2012. Low cost multicast network authentication for embedded control systems. Ph.,D. Dissertation. Carnegie Mellon University."},{"key":"e_1_3_2_1_59_1","volume-title":"Proceedings of the 2nd Workshop on Embedded Systems Security (WESS). https:\/\/doi.org\/10","author":"Szilagyi Christopher","year":"2008","unstructured":"Christopher Szilagyi and Philip Koopman . 2008 . A Flexible Approach to Embedded Network Multicast Authentication . In Proceedings of the 2nd Workshop on Embedded Systems Security (WESS). https:\/\/doi.org\/10 .1184\/R1\/6620639.v1 10.1184\/R1 Christopher Szilagyi and Philip Koopman. 2008. A Flexible Approach to Embedded Network Multicast Authentication. In Proceedings of the 2nd Workshop on Embedded Systems Security (WESS). https:\/\/doi.org\/10.1184\/R1\/6620639.v1"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270342"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873558"},{"key":"e_1_3_2_1_62_1","volume-title":"Swenson Jr","author":"Thompson A. Richard","year":"2017","unstructured":"A. Richard Thompson , James M. Moran , and George W . Swenson Jr . 2017 . Interferometry and Synthesis in Radio Astronomy. Springer Nature . https:\/\/doi.org\/10.1007\/978-3-319-44431-4 10.1007\/978-3-319-44431-4 A. Richard Thompson, James M. Moran, and George W. Swenson Jr. 2017. Interferometry and Synthesis in Radio Astronomy. Springer Nature. https:\/\/doi.org\/10.1007\/978-3-319-44431-4"},{"key":"e_1_3_2_1_63_1","volume-title":"Schneider Electric White Paper and Test Report","volume":"1","author":"Thonet Gilles","year":"2008","unstructured":"Gilles Thonet , Patrick Allard-Jacquin , and Pierre Colle . 2008 . ZigBee -- WiFi Coexistence . Schneider Electric White Paper and Test Report , Vol. 1 (2008). Gilles Thonet, Patrick Allard-Jacquin, and Pierre Colle. 2008. ZigBee -- WiFi Coexistence. Schneider Electric White Paper and Test Report, Vol. 1 (2008)."},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of the ECRYPT Workshop on Lightweight Cryptography","volume":"2011","author":"Herrewege Anthony Van","year":"2011","unstructured":"Anthony Van Herrewege , Dave Singelee , and Ingrid Verbauwhede . 2011 . CANAuth - A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus . In Proceedings of the ECRYPT Workshop on Lightweight Cryptography , Vol. 2011 . Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. 2011. CANAuth - A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus. In Proceedings of the ECRYPT Workshop on Lightweight Cryptography, Vol. 2011."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528554"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2721379"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2013.22"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998422"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_19"},{"key":"e_1_3_2_1_70_1","volume-title":"New Technologies, Mobility and Security","author":"Wu Taojun","unstructured":"Taojun Wu , Yi Cui , Brano Kusy , Akos Ledeczi , Janos Sallai , Nathan Skirvin , Jan Werner , and Yuan Xue . 2007. A Fast and Efficient Source Authentication Solution for Broadcasting in Wireless Sensor Networks . In New Technologies, Mobility and Security . Springer . https:\/\/doi.org\/10.1007\/978-1-4020-6270-4_5 10.1007\/978-1-4020-6270-4_5 Taojun Wu, Yi Cui, Brano Kusy, Akos Ledeczi, Janos Sallai, Nathan Skirvin, Jan Werner, and Yuan Xue. 2007. A Fast and Efficient Source Authentication Solution for Broadcasting in Wireless Sensor Networks. In New Technologies, Mobility and Security. Springer. https:\/\/doi.org\/10.1007\/978-1-4020-6270-4_5"},{"key":"e_1_3_2_1_71_1","volume-title":"Hardware Designs for Security in Ultra-Low-Power IoT Systems: An Overview and Survey","author":"Yang Kaiyuan","year":"2017","unstructured":"Kaiyuan Yang , David Blaauw , and Dennis Sylvester . 2017. Hardware Designs for Security in Ultra-Low-Power IoT Systems: An Overview and Survey . IEEE Micro , Vol . 37, 6 ( 2017 ). https:\/\/doi.org\/10.1109\/MM.2017.4241357 10.1109\/MM.2017.4241357 Kaiyuan Yang, David Blaauw, and Dennis Sylvester. 2017. Hardware Designs for Security in Ultra-Low-Power IoT Systems: An Overview and Survey. IEEE Micro, Vol. 37, 6 (2017). https:\/\/doi.org\/10.1109\/MM.2017.4241357"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.281"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855711.1855715"}],"event":{"name":"WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"San Antonio TX USA","acronym":"WiSec '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528539","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:27Z","timestamp":1750191147000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528539"}},"subtitle":["Revisiting the Security of Progressive Message Authentication Codes"],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":74,"alternative-id":["10.1145\/3507657.3528539","10.1145\/3507657"],"URL":"https:\/\/doi.org\/10.1145\/3507657.3528539","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}