{"id":"https://openalex.org/W2757540250","doi":"https://doi.org/10.1109/iscas.2017.8050833","title":"A low-cost masquerade and replay attack detection method for CAN in automobiles","display_name":"A low-cost masquerade and replay attack detection method for CAN in automobiles","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2757540250","doi":"https://doi.org/10.1109/iscas.2017.8050833","mag":"2757540250"},"language":"en","primary_location":{"id":"doi:10.1109/iscas.2017.8050833","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas.2017.8050833","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033991968","display_name":"Mohammad Raashid Ansari","orcid":"https://orcid.org/0000-0002-4416-7879"},"institutions":[{"id":"https://openalex.org/I161057412","display_name":"University of New Hampshire","ror":"https://ror.org/01rmh9n78","country_code":"US","type":"education","lineage":["https://openalex.org/I161057412"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mohammad Raashid Ansari","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of New Hampshire, Durham, NH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of New Hampshire, Durham, NH, USA","institution_ids":["https://openalex.org/I161057412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011910194","display_name":"Wallace T. Miller","orcid":"https://orcid.org/0000-0001-7403-9969"},"institutions":[{"id":"https://openalex.org/I161057412","display_name":"University of New Hampshire","ror":"https://ror.org/01rmh9n78","country_code":"US","type":"education","lineage":["https://openalex.org/I161057412"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"W. Thomas Miller","raw_affiliation_strings":["University of New Hampshire, Durham, NH, US"],"affiliations":[{"raw_affiliation_string":"University of New Hampshire, Durham, NH, US","institution_ids":["https://openalex.org/I161057412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055715437","display_name":"Chenghua She","orcid":null},"institutions":[{"id":"https://openalex.org/I161057412","display_name":"University of New Hampshire","ror":"https://ror.org/01rmh9n78","country_code":"US","type":"education","lineage":["https://openalex.org/I161057412"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chenghua She","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of New Hampshire, Durham, NH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of New Hampshire, Durham, NH, USA","institution_ids":["https://openalex.org/I161057412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043556165","display_name":"Qiaoyan Yu","orcid":"https://orcid.org/0000-0002-7232-8529"},"institutions":[{"id":"https://openalex.org/I161057412","display_name":"University of New Hampshire","ror":"https://ror.org/01rmh9n78","country_code":"US","type":"education","lineage":["https://openalex.org/I161057412"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qiaoyan Yu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of New Hampshire, Durham, NH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of New Hampshire, Durham, NH, USA","institution_ids":["https://openalex.org/I161057412"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5033991968"],"corresponding_institution_ids":["https://openalex.org/I161057412"],"apc_list":null,"apc_paid":null,"fwci":0.43,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.65585884,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9772999882698059,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7469434142112732},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.7023018002510071},{"id":"https://openalex.org/keywords/can-bus","display_name":"CAN bus","score":0.6902475953102112},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5637164115905762},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.545131504535675},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5429112911224365},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.46884453296661377},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39729198813438416},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3450755476951599},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3423750400543213},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.14070859551429749},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10882124304771423}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7469434142112732},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.7023018002510071},{"id":"https://openalex.org/C201762086","wikidata":"https://www.wikidata.org/wiki/Q728183","display_name":"CAN bus","level":2,"score":0.6902475953102112},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5637164115905762},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.545131504535675},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5429112911224365},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.46884453296661377},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39729198813438416},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3450755476951599},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3423750400543213},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.14070859551429749},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10882124304771423}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscas.2017.8050833","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas.2017.8050833","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1629374427","https://openalex.org/W2042529046","https://openalex.org/W2047370995","https://openalex.org/W2058144310","https://openalex.org/W2096279841","https://openalex.org/W2097242419","https://openalex.org/W2106958114","https://openalex.org/W2116520617","https://openalex.org/W2128395674","https://openalex.org/W2166668397","https://openalex.org/W2524044976"],"related_works":["https://openalex.org/W2385031275","https://openalex.org/W2790138121","https://openalex.org/W2610549918","https://openalex.org/W2964166404","https://openalex.org/W2971501545","https://openalex.org/W2995980218","https://openalex.org/W4224903450","https://openalex.org/W2734555013","https://openalex.org/W2778462195","https://openalex.org/W2757540250"],"abstract_inverted_index":{"Controller":[0],"Area":[1],"Network":[2],"(CAN)":[3],"is":[4,37,57,161,175],"the":[5,22,29,47,50,63,78,84,119,123,129,137,154,158,179,193],"main":[6],"bus":[7,36],"that":[8,52,153,169],"connects":[9],"Electronic":[10],"Control":[11],"Units(ECUs)":[12],"in":[13,67,144],"automobiles.":[14,197],"The":[15],"CAN":[16,35,48,55,68,85,98,116,124,146,183],"protocol":[17],"has":[18],"been":[19],"revised":[20],"over":[21,33],"years":[23],"to":[24,60,76,91,105,118],"improve":[25],"vehicle":[26],"safety":[27],"but":[28],"security":[30],"of":[31,44,96,122,157,165,170,177,189,196],"communication":[32],"a":[34,39,72,93,145,186],"still":[38],"concern.":[40],"Despite":[41],"different":[42],"kinds":[43],"attacks":[45,82],"challenge":[46],"security,":[49],"attack":[51],"injects":[53],"masqueraded":[54,180],"frames":[56,184],"extremely":[58],"difficult":[59],"defeat":[61],"given":[62],"limited":[64],"resources":[65],"available":[66],"system.":[69],"We":[70,140],"propose":[71],"low-cost":[73],"detection":[74,187],"mechanism":[75],"address":[77],"masquerade":[79],"and":[80,134,181],"replay":[81],"on":[83],"bus.":[86],"Existing":[87],"work":[88],"either":[89],"requires":[90],"store":[92],"long":[94],"list":[95],"legal":[97],"IDs":[99],"or":[100],"uses":[101],"hardware-consuming":[102],"cryptographic":[103,132],"algorithms":[104],"detect":[106],"attacks.":[107],"In":[108],"contrast,":[109],"our":[110,142],"method":[111,143,160,174],"only":[112],"adds":[113],"one":[114],"more":[115],"ID":[117],"acceptance":[120],"filter":[121],"node":[125],"under":[126],"protection,":[127],"eliminating":[128],"need":[130],"for":[131],"modules":[133],"significantly":[135],"reducing":[136],"hardware":[138],"cost.":[139],"implemented":[141],"system":[147],"prototype.":[148],"Our":[149,173],"experimental":[150],"results":[151],"show":[152],"latency":[155],"overhead":[156],"proposed":[159],"approximately":[162],"three":[163],"orders":[164],"magnitude":[166],"less":[167],"than":[168],"other":[171],"methods.":[172],"capable":[176],"detecting":[178],"replayed":[182],"with":[185],"speed":[188],"40\u03bcs,":[190],"which":[191],"satisfies":[192],"real-time":[194],"requirement":[195]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
