{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T12:45:11Z","timestamp":1769604311854,"version":"3.49.0"},"reference-count":42,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Comms. Net."],"abstract":"<jats:p>Integration of the Internet of Things (IoT) in the automotive industry has brought benefits as well as security challenges. Significant benefits include enhanced passenger safety and more comprehensive vehicle performance diagnostics. However, current onboard and remote vehicle diagnostics do not include the ability to detect counterfeit parts. A method is needed to verify authentic parts along the automotive supply chain from manufacture through installation and to coordinate part authentication with a secure database. In this study, we develop an architecture for anti-counterfeiting in automotive supply chains. The core of the architecture consists of a cyber-physical trust anchor and authentication mechanisms connected to blockchain-based tracking processes with cloud storage. The key parameters for linking a cyber-physical trust anchor in embedded IoT include identifiers (i.e., serial numbers, special features, hashes), authentication algorithms, blockchain, and sensors. A use case was provided by a two-year long implementation of simple trust anchors and tracking for a coffee supply chain which suggests a low-cost part authentication strategy could be successfully applied to vehicles. The challenge is authenticating parts not normally connected to main vehicle communication networks. Therefore, we advance the coffee bean model with an acoustical sensor to differentiate between authentic and counterfeit tires onboard the vehicle. The workload of secure supply chain development can be shared with the development of the connected autonomous vehicle networks, as the fleet performance is degraded by vehicles with questionable replacement parts of uncertain reliability.<\/jats:p>","DOI":"10.3389\/frcmn.2023.1096841","type":"journal-article","created":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T09:35:36Z","timestamp":1701423336000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Key parameters linking cyber-physical trust anchors with embedded internet of things systems"],"prefix":"10.3389","volume":"4","author":[{"given":"Michele","family":"Maasberg","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Leslie G.","family":"Butler","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ian","family":"Taylor","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1965","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"B1","doi-asserted-by":"publisher","first-page":"214434","DOI":"10.1109\/ACCESS.2020.3041074","article-title":"Cybersecurity of smart electric vehicle charging: a power grid perspective","volume":"8","author":"Acharya","year":"2020","journal-title":"IEEE Access"},{"key":"B2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3431233","article-title":"Cyberattacks and countermeasures for in-vehicle networks","volume":"54","author":"Aliwa","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"B3","first-page":"281","article-title":"A novel high-interaction honeypot network for internet of vehicles","author":"Anastasiadis","year":"2023"},{"key":"B4","volume-title":"HoneyEVSE: an honeypot to emulate electric vehicle supply equipments","author":"Baldo","year":"2023"},{"key":"B5","doi-asserted-by":"publisher","first-page":"100205","DOI":"10.1016\/j.treng.2023.100205","article-title":"Analyses on standards and regulations for connected and automated vehicles: identifying the certifications roadmap","volume":"14","author":"Benyahya","year":"2023","journal-title":"Transp. Eng."},{"key":"B6","volume-title":"LDL technology, assignee. Method for managing type identifiers","author":"Bracq","year":"2020"},{"key":"B7","doi-asserted-by":"publisher","first-page":"14355","DOI":"10.1109\/JIOT.2021.3069951","article-title":"ExHPD: exploiting human, physical, and driving behaviors to detect vehicle cyber attacks","volume":"8","author":"Chen","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"B8","doi-asserted-by":"publisher","first-page":"6697","DOI":"10.3390\/su14116697","article-title":"State-of-the-Art of factors affecting the adoption of automated vehicles","volume":"14","author":"Chen","year":"2022","journal-title":"Sustainability"},{"key":"B9","doi-asserted-by":"publisher","first-page":"102217","DOI":"10.1016\/j.tre.2020.102217","article-title":"Cybersecurity in logistics and supply chain management: an overview and future research directions","volume":"146","author":"Cheung","year":"2021","journal-title":"Transp. Res. Part E Logist. Transp. Rev."},{"key":"B10","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1109\/TMC.2020.3017484","article-title":"Arbitrator2.0: preventing unauthorized access on passive tags","volume":"21","author":"Ding","year":"2022","journal-title":"IEEE Trans. Mob. Comput."},{"key":"B11","doi-asserted-by":"publisher","first-page":"1073780","DOI":"10.3389\/friot.2022.1073780","article-title":"Revisiting the internet of things: new trends, opportunities and grand challenges","volume":"1","author":"Elgazzar","year":"2022","journal-title":"Front. Internet Things"},{"key":"B12","doi-asserted-by":"publisher","first-page":"162401","DOI":"10.1109\/ACCESS.2021.3130495","article-title":"Vehicle security: a survey of security issues and vulnerabilities, malware attacks and defenses","volume":"9","author":"Elkhail","year":"2021","journal-title":"IEEE Access"},{"key":"B13","doi-asserted-by":"publisher","first-page":"13752","DOI":"10.1109\/JSEN.2020.3004275","article-title":"Cybersecurity attacks in vehicular sensors","volume":"20","author":"El-Rewini","year":"2020","journal-title":"IEEE Sensors J."},{"key":"B14","doi-asserted-by":"publisher","first-page":"16267","DOI":"10.1109\/TITS.2022.3149449","article-title":"On the cybersecurity of traffic signal control system with connected vehicles","volume":"23","author":"Feng","year":"2022","journal-title":"IEEE Trans. Intelligent Transp. Syst."},{"key":"B15","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1080\/08874417.2022.2103853","article-title":"Cybersecurity in the automotive industry: a systematic literature review (slr)","volume":"1","author":"Fernandez de Arroyabe","year":"2022","journal-title":"J. Comput. Inf. Syst."},{"key":"B16","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1049\/smc2.12016","article-title":"Shazam for bats: internet of Things for continuous real?time biodiversity monitoring","volume":"3","author":"Gallacher","year":"2021","journal-title":"IET Smart Cities"},{"key":"B17","doi-asserted-by":"publisher","first-page":"83176","DOI":"10.1109\/ACCESS.2022.3196346","article-title":"Post-accident cyberattack event analysis for connected and automated vehicles","volume":"10","author":"Girdhar","year":"2022","journal-title":"IEEE Access"},{"key":"B18","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1007\/s11227-010-0497-9","article-title":"A holistic approach examining RFID design for security and privacy","volume":"64","author":"Good","year":"2013","journal-title":"J. Supercomput."},{"key":"B19","volume-title":"Standards","year":"2021"},{"key":"B20","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MVT.2017.2669348","article-title":"Driving with sharks: rethinking connected vehicles with vehicle cybersecurity","volume":"12","author":"Hashem Eiza","year":"2017","journal-title":"IEEE Veh. Technol. Mag."},{"key":"B21","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1080\/0735648X.2019.1692425","article-title":"Automotive cybersecurity: assessing a new platform for cybercrime and malicious hacking","volume":"42","author":"Kennedy","year":"2019","journal-title":"J. Crime Justice"},{"key":"B22","doi-asserted-by":"publisher","first-page":"106515","DOI":"10.1016\/j.aap.2021.106515","article-title":"A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles","volume":"165","author":"Khan","year":"2022","journal-title":"Accid. Analysis Prev."},{"key":"B23","doi-asserted-by":"publisher","first-page":"105837","DOI":"10.1016\/j.aap.2020.105837","article-title":"Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions","volume":"148","author":"Khan","year":"2020","journal-title":"Accid. Analysis Prev."},{"key":"B24","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MCE.2022.3154346","article-title":"Roadmap for cybersecurity in autonomous vehicles","volume":"11","author":"Kukkala","year":"2022","journal-title":"IEEE Consum. Electron. Mag."},{"key":"B25","doi-asserted-by":"publisher","first-page":"5916","DOI":"10.1109\/JIOT.2018.2872474","article-title":"Cybersecurity measures for geocasting in vehicular cyber physical system environments","volume":"6","author":"Kumar","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"B26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3442443","article-title":"Fortifying vehicular security through low overhead physically unclonable functions","volume":"18","author":"Labrado","year":"2022","journal-title":"ACM J. Emerg. Technol. Comput. Syst."},{"key":"B27","doi-asserted-by":"publisher","first-page":"2495","DOI":"10.3390\/s20092495","article-title":"A review of IoT sensing applications and challenges using RFID and wireless sensor networks","volume":"20","author":"Landaluce","year":"2020","journal-title":"Sensors"},{"key":"B28","doi-asserted-by":"publisher","first-page":"857039","DOI":"10.3389\/fpubh.2022.857039","article-title":"Construction of a traceability system for food industry chain safety information based on internet of things technology","volume":"10","author":"Lin","year":"2022","journal-title":"Front. Public Health"},{"key":"B29","doi-asserted-by":"publisher","first-page":"912388","DOI":"10.3389\/friot.2022.912388","article-title":"Practical application of internet of things in the creation of intelligent services and environments","volume":"1","author":"Lv","year":"2022","journal-title":"Front. Internet Things"},{"key":"B30","doi-asserted-by":"publisher","first-page":"36937","DOI":"10.1109\/ACCESS.2021.3063301","article-title":"Making investment decisions on RFID technology: an evaluation of key adoption factors in construction firms","volume":"9","author":"Mabad","year":"2021","journal-title":"IEEE Access"},{"key":"B31","doi-asserted-by":"publisher","first-page":"104671","DOI":"10.1109\/ACCESS.2022.3210117","article-title":"HoneyCar: a framework to configure honeypot vulnerabilities on the internet of vehicles","volume":"10","author":"Panda","year":"2022","journal-title":"IEEE Access"},{"key":"B32","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/s40857-017-0095-6","article-title":"Automated insect detection using acoustic features based on sound generated from insect activities","volume":"45","author":"Phung","year":"2017","journal-title":"Acoust. Aust."},{"key":"B33","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-207","volume-title":"Zero trust architecture","author":"Rose","year":"2020"},{"key":"B34","doi-asserted-by":"publisher","first-page":"108979","DOI":"10.1109\/ACCESS.2022.3213843","article-title":"Cybersecurity and forensics in connected autonomous vehicles: a review of the state-of-the-art","volume":"10","author":"Sharma","year":"2022","journal-title":"IEEE Access"},{"key":"B35","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s11417-022-09365-8","article-title":"Driven to death: a Chinese case study on the counterfeiting of automotive components","volume":"17","author":"Shen","year":"2022","journal-title":"Asian J. Criminol."},{"key":"B36","volume-title":"Music identification system","author":"Swierczek","year":"2005"},{"key":"B37","doi-asserted-by":"publisher","first-page":"57143","DOI":"10.1109\/ACCESS.2022.3174679","article-title":"Zero trust architecture (zta): a comprehensive survey","volume":"10","author":"Syed","year":"2022","journal-title":"IEEE Access"},{"key":"B38","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1057\/ejis.2009.44","article-title":"A contingency model for creating value from RFID supply chain network projects in logistics and manufacturing environments","volume":"18","author":"Wamba","year":"2009","journal-title":"Eur. J. Inf. Syst."},{"key":"B39","volume-title":"Bridgestone, assignee. Information presentation system, information presentation apparatus, and information presentation method","author":"Yamada","year":"2022"},{"key":"B40","doi-asserted-by":"publisher","first-page":"104461","DOI":"10.1016\/j.micpro.2022.104461","article-title":"ThreatSurf: a method for automated Threat Surface assessment in automotive cybersecurity engineering","volume":"90","author":"Zelle","year":"2022","journal-title":"Microprocess. Microsystems"},{"key":"B41","doi-asserted-by":"publisher","first-page":"13152","DOI":"10.1109\/TVT.2022.3196051","article-title":"APPB: anti-counterfeiting and privacy-preserving blockchain-based vehicle supply chains","volume":"71","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"B42","doi-asserted-by":"publisher","first-page":"5","DOI":"10.3390\/safety9010005","article-title":"The effect of driving style on responses to unexpected vehicle cyberattacks","volume":"9","author":"Zhang","year":"2023","journal-title":"Safety"}],"container-title":["Frontiers in Communications and Networks"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frcmn.2023.1096841\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T09:35:40Z","timestamp":1701423340000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frcmn.2023.1096841\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":42,"alternative-id":["10.3389\/frcmn.2023.1096841"],"URL":"https:\/\/doi.org\/10.3389\/frcmn.2023.1096841","relation":{},"ISSN":["2673-530X"],"issn-type":[{"value":"2673-530X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,30]]},"article-number":"1096841"}}