{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T19:10:20Z","timestamp":1654110620751},"reference-count":22,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7,1]]},"abstract":"<p>Broadcast authentication in Controller Area Networks (CAN) is subject to real time constraints that are hard to satisfy by expensive public key primitives. For this purpose the authors study here the use of one-time signatures which can be built on the most computationally efficient one-way functions. The authors use an enhancement of the classical Merkle signature as well as the more recently proposed HORS signature scheme. Notably, these two proposals offer different trade-offs, and they can be efficiently paired with time synchronization to reduce the overhead caused by the re-initialization of the public keys, which would otherwise require expensive authentication trees. The authors do outline clear bounds on the performance of such a solution and provide experimental results on development boards equipped with Freescale S12X, a commonly used automotive grade micro-controller. The authors also benefit from the acceleration offered by the XGATE co-processor available on S12X derivatives which significantly increases the computational performances.<\/p>","DOI":"10.4018\/jmcmc.2013070101","type":"journal-article","created":{"date-parts":[[2013,8,19]],"date-time":"2013-08-19T16:16:20Z","timestamp":1376928980000},"page":"1-18","source":"Crossref","is-referenced-by-count":0,"title":["Secure Broadcast with One-Time Signatures in Controller Area Networks"],"prefix":"10.4018","volume":"5","author":[{"given":"Bogdan","family":"Groza","sequence":"first","affiliation":[{"name":"Department of Automatics and Computer Science, Politehnica University of Timisoara, Timi?oara, Romania"}]},{"given":"Pal-Stefan","family":"Murvay","sequence":"additional","affiliation":[{"name":"Department of Automatics and Computer Science, Politehnica University of Timisoara, Timi?oara, Romania"}]}],"member":"2432","reference":[{"key":"jmcmc.2013070101-0","doi-asserted-by":"crossref","unstructured":"Bleichenbacher, D., & Maurer, U. (1994). Directed acyclic graphs, one-way functions and digital signatures. In Y. Desmedt (Ed.), Advances in cryptology crypto 94 (Vol. 839, p. 75-82). Springer Berlin \/ Heidelberg.","DOI":"10.1007\/3-540-48658-5_9"},{"key":"jmcmc.2013070101-1","doi-asserted-by":"crossref","unstructured":"Bleichenbacher, D., & Maurer, U. (1996). On the efficiency of one-time digital signatures. In K. Kim & T. Matsumoto (Eds.), Advances in cryptology asiacrypt \u201996 (Vol. 1163, p. 145-158). Springer Berlin \/ Heidelberg.","DOI":"10.1007\/BFb0034843"},{"key":"jmcmc.2013070101-2","unstructured":"Brown, R., Eddelbuettel, D., & Bauer, D. (2012). Dieharder: A random number test suite. Retrieved November 1, 2012, from http:\/\/www.phy.duke.edu\/~rgb\/General\/dieharder.php"},{"key":"jmcmc.2013070101-3","author":"R. G.Brown","year":"1983","journal-title":"Introduction to random signal analysis and Kalman filtering"},{"key":"jmcmc.2013070101-4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849714"},{"key":"jmcmc.2013070101-5","doi-asserted-by":"crossref","unstructured":"Groza, B., & Murvay, S. (2011). Secure broadcast with one-time signatures in controller area networks. In 2011 Sixth international conference on Availability, Reliability and Security (ARES) (pp. 371\u2013376).","DOI":"10.1109\/ARES.2011.62"},{"key":"jmcmc.2013070101-6","unstructured":"Iso 11898-1. (2003). Road vehicles - Controller Area Network (CAN) - part 1: Controller area network data link layer and medium access control [Computer software manual]."},{"key":"jmcmc.2013070101-7","doi-asserted-by":"crossref","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., et al. (2010, May). Experimental security analysis of a modern automobile. In Proceedings of the 2010 IEEE Symposium on Security and Privacy (SP) (pp. 447 -462).","DOI":"10.1109\/SP.2010.34"},{"key":"jmcmc.2013070101-8","unstructured":"Lamport, L. (1979). Constructing digital signatures from a one-way function (Tech. Rep.). Technical Report CSL-98, SRI International."},{"key":"jmcmc.2013070101-9","unstructured":"Liu, D., & Ning, P. (2003). Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In Proceedings of the 10th Annual Network and Distributed System Security Symposium (pp. 263\u2013276)."},{"key":"jmcmc.2013070101-10","doi-asserted-by":"publisher","DOI":"10.1145\/1027794.1027800"},{"key":"jmcmc.2013070101-11","unstructured":"Merkle, R. (1979). Secrecy, authentication, and public key systems (Tech. Rep. No. 1797-1), Stanford University, Stanford Electronics Laboratories."},{"key":"jmcmc.2013070101-12","doi-asserted-by":"crossref","unstructured":"Merkle, R. C. (1988). A digital signature based on a conventional encryption function. In Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology (pp. 369\u2013378). London, UK: Springer-Verlag.","DOI":"10.1007\/3-540-48184-2_32"},{"key":"jmcmc.2013070101-13","unstructured":"Mitchell, R. (2004). Tutorial: Introducing the XGATE module to consumer and industrial application developers, March 2006."},{"key":"jmcmc.2013070101-14","doi-asserted-by":"crossref","unstructured":"Perrig, A. (2001). The BiBa one-time signature and broadcast authentication protocol. In Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8) (pp. 28\u201337), Philadelphia, PA.","DOI":"10.1145\/501983.501988"},{"key":"jmcmc.2013070101-15","unstructured":"Perrig, A., Canetti, R., Song, D., & Tygar, J. D. (2001a). Efficient and secure source authentication for multicast. In Proceedings of the Network and Distributed System Security Symposium (NDSS \u201901) (pp. 35\u201346)."},{"key":"jmcmc.2013070101-16","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Song, D., & Tygar, J. D. (2001b). SPINS: Security protocols for sensor networks. In Seventh Annual ACM International Conference on Mobile Computing and Networks (Mobicom 2001) (pp. 189\u2013 199).","DOI":"10.1145\/381677.381696"},{"key":"jmcmc.2013070101-17","doi-asserted-by":"crossref","unstructured":"Reyzin, L., & Reyzin, N. (2002). Better than BiBa: Short one-time signatures with fast signing and verifying. In Proceedings of the 7th Australian Conference on Information Security and Privacy (pp. 144\u2013153). London, UK: Springer-Verlag.","DOI":"10.1007\/3-540-45450-0_11"},{"key":"jmcmc.2013070101-18","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., et al. (2010, April). A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST special publication 800-22. Retrieved November 1, 2012, from http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-22-rev1a\/SP800-22rev1a.pdf"},{"key":"jmcmc.2013070101-19","unstructured":"von Neumann, J. (1951). Various techniques used in connection with random digits. In A. S. H. et al. (Ed.), The Monte Carlo method (Vol. 12, pp. 36\u201338). National Bureau of Standards, Applied Mathematics Series."},{"key":"jmcmc.2013070101-20","unstructured":"Walker, J. (2012). Ent - A pseudorandom number sequence test program. Retrieved November 1, 2012, from http:\/\/www.fourmilab.ch\/random\/"},{"key":"jmcmc.2013070101-21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28428-1_6"}],"container-title":["International Journal of Mobile Computing and Multimedia Communications"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=80424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T18:36:41Z","timestamp":1654108601000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jmcmc.2013070101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,7,1]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jmcmc.2013070101","relation":{},"ISSN":["1937-9412","1937-9404"],"issn-type":[{"value":"1937-9412","type":"print"},{"value":"1937-9404","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,1]]}}}