{"id":"https://openalex.org/W4390044045","doi":"https://doi.org/10.1109/tits.2023.3339821","title":"CEAMP: A Cross-Domain Entity Authentication and Message Protection Framework for Intra-Vehicle Network","display_name":"CEAMP: A Cross-Domain Entity Authentication and Message Protection Framework for Intra-Vehicle Network","publication_year":2023,"publication_date":"2023-12-21","ids":{"openalex":"https://openalex.org/W4390044045","doi":"https://doi.org/10.1109/tits.2023.3339821"},"language":"en","primary_location":{"id":"doi:10.1109/tits.2023.3339821","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tits.2023.3339821","pdf_url":null,"source":{"id":"https://openalex.org/S144771191","display_name":"IEEE Transactions on Intelligent Transportation Systems","issn_l":"1524-9050","issn":["1524-9050","1558-0016"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Intelligent Transportation Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042814178","display_name":"Chao Shang","orcid":"https://orcid.org/0000-0002-1428-1339"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chao Shang","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101850333","display_name":"Jin Cao","orcid":"https://orcid.org/0000-0003-1372-7252"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Cao","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108050448","display_name":"Jiajia Liu","orcid":"https://orcid.org/0000-0003-4273-8866"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiajia Liu","raw_affiliation_strings":["National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100629240","display_name":"Yinghui Zhang","orcid":"https://orcid.org/0000-0002-5764-3272"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinghui Zhang","raw_affiliation_strings":["National Engineering Laboratory for Wireless Security, School of Cyberspace Security, Xi&#x2019;an University of Posts and Telecommunications, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, School of Cyberspace Security, Xi&#x2019;an University of Posts and Telecommunications, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036725114","display_name":"Ben Niu","orcid":"https://orcid.org/0000-0003-2898-7495"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ben Niu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024453724","display_name":"Hui Li","orcid":"https://orcid.org/0000-0001-8310-7169"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5042814178"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.8033,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.72924495,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"25","issue":"7","first_page":"6780","last_page":"6795"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9351000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9186000227928162,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/notation","display_name":"Notation","score":0.6859188079833984},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.6291471123695374},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5705206394195557},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5560862421989441},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5433827042579651},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.48683303594589233},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4598340392112732},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39923280477523804},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39885637164115906},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.36998748779296875},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.33170825242996216},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2719852924346924},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2459874153137207},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2135888636112213},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.09562849998474121}],"concepts":[{"id":"https://openalex.org/C45357846","wikidata":"https://www.wikidata.org/wiki/Q2001982","display_name":"Notation","level":2,"score":0.6859188079833984},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.6291471123695374},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5705206394195557},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5560862421989441},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5433827042579651},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.48683303594589233},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4598340392112732},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39923280477523804},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39885637164115906},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.36998748779296875},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.33170825242996216},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2719852924346924},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2459874153137207},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2135888636112213},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.09562849998474121},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tits.2023.3339821","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tits.2023.3339821","pdf_url":null,"source":{"id":"https://openalex.org/S144771191","display_name":"IEEE Transactions on Intelligent Transportation Systems","issn_l":"1524-9050","issn":["1524-9050","1558-0016"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Intelligent Transportation Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2207847045","display_name":null,"funder_award_id":"U23B2024","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3401502809","display_name":null,"funder_award_id":"YJSJ23007","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G4687489897","display_name":null,"funder_award_id":"62172317","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8145832166","display_name":null,"funder_award_id":"62102298","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W146244851","https://openalex.org/W1564840975","https://openalex.org/W1993180463","https://openalex.org/W2047276559","https://openalex.org/W2087928947","https://openalex.org/W2109116994","https://openalex.org/W2145415641","https://openalex.org/W2476684267","https://openalex.org/W2477729276","https://openalex.org/W2520418590","https://openalex.org/W2907551460","https://openalex.org/W2922254723","https://openalex.org/W2923182414","https://openalex.org/W2945012921","https://openalex.org/W2948886424","https://openalex.org/W2962011393","https://openalex.org/W2998500054","https://openalex.org/W3013387941","https://openalex.org/W3067183320","https://openalex.org/W3085604187","https://openalex.org/W3100954552","https://openalex.org/W3112825668","https://openalex.org/W3136132277","https://openalex.org/W3151464580","https://openalex.org/W3159608395","https://openalex.org/W4213366431","https://openalex.org/W4214906331"],"related_works":["https://openalex.org/W2166668397","https://openalex.org/W2116285675","https://openalex.org/W1533309011","https://openalex.org/W3048245612","https://openalex.org/W1603859080","https://openalex.org/W4220718301","https://openalex.org/W1555715488","https://openalex.org/W1980599209","https://openalex.org/W2061637199","https://openalex.org/W2997078490"],"abstract_inverted_index":{"Controller":[0],"Area":[1],"Network":[2],"(CAN)":[3],"is":[4,157,222,287],"the":[5,14,20,26,56,69,99,112,116,124,130,137,142,219,281,288,302,307],"most":[6,40],"wide-used":[7],"bus":[8,28],"system":[9],"in":[10,107,134,152,218],"Intra-Vehicle":[11],"Networks(IVN).":[12],"However,":[13],"nature":[15],"of":[16,22,41,126,145,211,276,283],"broadcast":[17],"communication":[18],"and":[19,77,82,88,103,111,129,174,239],"lack":[21],"security":[23,66,90],"mechanisms":[24],"make":[25],"CAN":[27,70,308],"extremely":[29],"fragile":[30],"against":[31],"malicious":[32],"attacks.":[33,122],"Although":[34],"there":[35],"are":[36,43],"works":[37],"protecting":[38],"IVN,":[39],"them":[42],"not":[44,54],"feasible":[45],"when":[46],"applied":[47],"to":[48,164,183,204,229,248,269,315],"real":[49,105],"vehicles":[50],"because":[51],"they":[52],"do":[53],"consider":[55],"IVN":[57,292,303],"node":[58],"capability.":[59],"In":[60],"this":[61,286],"paper,":[62],"we":[63],"propose":[64],"a":[65,108,146,149,212,277],"framework":[67],"for":[68,148],"bus,":[71],"covering":[72],"ECU":[73,151],"entity":[74],"identity":[75],"management":[76],"authentication,":[78],"symmetric":[79],"key":[80],"generation":[81],"update,":[83],"intra-domain,":[84],"cross-domain":[85,220,293],"secure":[86,294],"transmission,":[87],"sensitivity-based":[89],"classification":[91],"methods.":[92],"We":[93],"formally":[94],"verify":[95],"our":[96,135,153,284],"protocols":[97],"using":[98],"up-to-date":[100],"tool":[101],"Tamarin":[102],"simulate":[104],"attacks":[106],"simulation":[109],"environment":[110],"results":[113,139],"show":[114,140],"that":[115,141],"proposed":[117,154,299],"protocol":[118,296],"can":[119],"resist":[120],"these":[121],"By":[123],"use":[125],"speck":[127],"encryption":[128],"Chaskey":[131],"MAC":[132],"algorithm":[133],"schemes,":[136],"analysis":[138],"increased":[143],"time":[144,215,290],"frame":[147],"single":[150],"intra-domain":[155],"scheme":[156,221],"<inline-formula":[158,165,175,184,198,205,223,230,240,249,263,270],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[159,166,176,185,199,206,224,231,241,250,264,271],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[160,167,177,186,200,207,225,232,242,251,265,272],"<tex-math":[161,168,178,187,201,208,226,233,243,252,266,273],"notation=\"LaTeX\">$2.09~ms$</tex-math>":[162],"</inline-formula>":[163,170,182,191,203,210,228,235,247,256,268,275],"notation=\"LaTeX\">$2.78~ms$</tex-math>":[169],"on":[171,192,236,257],"Arduino":[172,193,237,258],"Mega,":[173,238],"notation=\"LaTeX\">$121.65":[179],"\\mu":[180,189,245,254],"s$</tex-math>":[181,190,246,255],"notation=\"LaTeX\">$152.15":[188],"DUE,":[194,259],"which":[195,260],"takes":[196,261],"up":[197,262],"notation=\"LaTeX\">$6.08\\%$</tex-math>":[202],"notation=\"LaTeX\">$7.61\\%$</tex-math>":[209],"10ms":[213,278],"cyclic":[214],"frame.":[216,279],"And":[217],"notation=\"LaTeX\">$2.55~ms$</tex-math>":[227],"notation=\"LaTeX\">$3.24~ms$</tex-math>":[234],"notation=\"LaTeX\">$134.30":[244],"notation=\"LaTeX\">$164.80":[253],"notation=\"LaTeX\">$6.72\\%$</tex-math>":[267],"notation=\"LaTeX\">$8.24\\%$</tex-math>":[274],"To":[280],"best":[282],"knowledge,":[285],"first":[289],"an":[291],"transmission":[295],"has":[297],"been":[298],"without":[300],"changing":[301],"network":[304],"topology":[305],"or":[306],"protocol.":[309],"Our":[310],"work":[311],"brings":[312],"practical":[313],"protection":[314],"IVN.":[316]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
