{"id":"https://openalex.org/W4400907944","doi":"https://doi.org/10.1109/les.2024.3432593","title":"An Endogenous Security Study of Telematics Box in Intelligent Connected Vehicles","display_name":"An Endogenous Security Study of Telematics Box in Intelligent Connected Vehicles","publication_year":2024,"publication_date":"2024-07-23","ids":{"openalex":"https://openalex.org/W4400907944","doi":"https://doi.org/10.1109/les.2024.3432593"},"language":"en","primary_location":{"id":"doi:10.1109/les.2024.3432593","is_oa":false,"landing_page_url":"https://doi.org/10.1109/les.2024.3432593","pdf_url":null,"source":{"id":"https://openalex.org/S22443479","display_name":"IEEE Embedded Systems Letters","issn_l":"1943-0663","issn":["1943-0663","1943-0671"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Embedded Systems Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101914916","display_name":"Zhen Zhang","orcid":"https://orcid.org/0000-0003-0623-5866"},"institutions":[{"id":"https://openalex.org/I918919364","display_name":"Switch","ror":"https://ror.org/02yw51758","country_code":"CH","type":"nonprofit","lineage":["https://openalex.org/I918919364"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Zhen Zhang","raw_affiliation_strings":["Electric and Computer Engineering Department, National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China","National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Electric and Computer Engineering Department, National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China","institution_ids":["https://openalex.org/I918919364"]},{"raw_affiliation_string":"National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006392997","display_name":"Yuezhong Zhang","orcid":"https://orcid.org/0009-0009-2274-7977"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuezhong Zhang","raw_affiliation_strings":["Endogenous Security Research Center, Purple Mountain Laboratories, Nanjing, China","Purple Mountain Laboratories, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Endogenous Security Research Center, Purple Mountain Laboratories, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"Purple Mountain Laboratories, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100407243","display_name":"Jinfeng Zhang","orcid":"https://orcid.org/0009-0006-5562-3354"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinfeng Zhang","raw_affiliation_strings":["Endogenous Security Research Center, Purple Mountain Laboratories, Nanjing, China","Purple Mountain Laboratories, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Endogenous Security Research Center, Purple Mountain Laboratories, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"Purple Mountain Laboratories, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102011118","display_name":"Jichao Xie","orcid":"https://orcid.org/0000-0002-3075-188X"},"institutions":[{"id":"https://openalex.org/I918919364","display_name":"Switch","ror":"https://ror.org/02yw51758","country_code":"CH","type":"nonprofit","lineage":["https://openalex.org/I918919364"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Jichao Xie","raw_affiliation_strings":["Electric and Computer Engineering Department, National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China","National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Electric and Computer Engineering Department, National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China","institution_ids":["https://openalex.org/I918919364"]},{"raw_affiliation_string":"National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082798666","display_name":"Shaoxun Liu","orcid":"https://orcid.org/0000-0003-0997-3485"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaoxun Liu","raw_affiliation_strings":["Endogenous Security Research Center, Purple Mountain Laboratories, Nanjing, China","Purple Mountain Laboratories, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Endogenous Security Research Center, Purple Mountain Laboratories, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"Purple Mountain Laboratories, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101914916"],"corresponding_institution_ids":["https://openalex.org/I918919364"],"apc_list":null,"apc_paid":null,"fwci":1.2453,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.79456797,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"16","issue":"4","first_page":"501","last_page":"504"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9297999739646912,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9297999739646912,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8004617691040039},{"id":"https://openalex.org/keywords/telematics","display_name":"Telematics","score":0.7404099702835083},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4506443440914154},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3950425684452057},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.25481292605400085}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8004617691040039},{"id":"https://openalex.org/C89074322","wikidata":"https://www.wikidata.org/wiki/Q485669","display_name":"Telematics","level":2,"score":0.7404099702835083},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4506443440914154},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3950425684452057},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.25481292605400085}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/les.2024.3432593","is_oa":false,"landing_page_url":"https://doi.org/10.1109/les.2024.3432593","pdf_url":null,"source":{"id":"https://openalex.org/S22443479","display_name":"IEEE Embedded Systems Letters","issn_l":"1943-0663","issn":["1943-0663","1943-0671"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Embedded Systems Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.5199999809265137,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W130597914","https://openalex.org/W2010307518","https://openalex.org/W2984228170","https://openalex.org/W3047991807","https://openalex.org/W3190644151","https://openalex.org/W3194026771","https://openalex.org/W3207548272","https://openalex.org/W4206410367","https://openalex.org/W4248794113","https://openalex.org/W4300059230","https://openalex.org/W4317207036"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W28596303","https://openalex.org/W2075084475","https://openalex.org/W571717219","https://openalex.org/W2111119084","https://openalex.org/W2753549526","https://openalex.org/W2906361627","https://openalex.org/W2770474257","https://openalex.org/W3169289700"],"abstract_inverted_index":{"Intelligent":[0],"connected":[1],"vehicles":[2],"(ICVs)":[3],"are":[4],"the":[5,11,16,22,26,28,33,52,88,91,98,102,110,124,136,155,171,181,187,197,204,211,215,219],"result":[6],"of":[7,25,30,35,90,93,101,112,133,210,222],"technological":[8],"advancements":[9],"in":[10,87,104,186],"new":[12,198],"era,":[13],"greatly":[14],"enhancing":[15],"driving":[17],"experience.":[18],"However,":[19],"due":[20],"to":[21,122,145],"complex":[23,38],"nature":[24],"system,":[27],"intelligence":[29],"devices,":[31],"and":[32,55,66,81,149,189,202,207],"connectivity":[34],"data,":[36],"a":[37,107,142,158],"physical":[39],"fusion":[40],"system":[41,126,161],"has":[42],"been":[43],"created.":[44],"The":[45,118],"in-vehicle":[46,75,182,212,223],"Telematics":[47],"Box":[48],"(T-Box),":[49],"serving":[50],"as":[51,61],"central":[53],"communication":[54],"data":[56,64],"hub,":[57],"faces":[58],"challenges,":[59],"such":[60],"network":[62],"vulnerabilities,":[63],"privacy,":[65],"malicious":[67,147],"attacks":[68],"through":[69],"untrusted":[70],"software":[71,188],"updates.":[72],"Therefore,":[73],"an":[74,84],"T-Box":[76,103,172,183,217],"with":[77,106,162,173],"high":[78],"reliability,":[79],"security,":[80],"performance":[82],"is":[83,121,165,184],"urgent":[85],"product":[86],"era":[89],"Internet":[92],"Vehicles.":[94],"This":[95,167],"article":[96],"investigates":[97],"endogenous":[99],"security":[100,164],"ICV,":[105],"focus":[108],"on":[109],"integration":[111],"dynamic":[113],"heterogeneous":[114,129],"redundancy":[115],"(DHR)":[116],"architecture.":[117],"underlying":[119],"idea":[120],"transform":[123],"original":[125],"into":[127,154],"multiple":[128],"systems,":[130],"where":[131],"some":[132],"them":[134],"handle":[135],"same":[137],"business":[138],"functions.":[139],"By":[140],"applying":[141],"consensus":[143],"mechanism":[144],"detect":[146],"nodes":[148,153],"dynamically":[150],"scheduling":[151],"healthy":[152],"working":[156],"mode,":[157],"self-purifying":[159],"defense":[160,175],"intrinsic":[163],"formed.":[166],"design":[168,199],"approach":[169],"endows":[170],"inherent":[174],"capabilities":[176],"against":[177],"unknown":[178],"vulnerabilities.":[179],"Meanwhile,":[180],"redesigned":[185],"hardware":[190],"implementation":[191],"scheme.":[192],"Experimental":[193],"results":[194],"demonstrate":[195],"that":[196],"notably":[200],"enhances":[201],"ensures":[203,218],"robust":[205],"stability":[206],"elevated":[208],"reliability":[209],"T-Box.":[213],"Evidently,":[214],"upgraded":[216],"safe":[220],"processing":[221],"CAN":[224],"bus":[225],"data.":[226]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2024-07-24T00:00:00"}
