{"id":"https://openalex.org/W4386536246","doi":"https://doi.org/10.1109/tnse.2023.3312545","title":"Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network","display_name":"Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network","publication_year":2023,"publication_date":"2023-09-08","ids":{"openalex":"https://openalex.org/W4386536246","doi":"https://doi.org/10.1109/tnse.2023.3312545"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2023.3312545","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2023.3312545","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008960995","display_name":"Amar Rasheed","orcid":"https://orcid.org/0000-0002-1929-9124"},"institutions":[{"id":"https://openalex.org/I191429286","display_name":"Sam Houston State University","ror":"https://ror.org/00yh3cz06","country_code":"US","type":"education","lineage":["https://openalex.org/I191429286"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Amar Rasheed","raw_affiliation_strings":["Department of Computer Science, Sam Houston State University, Huntsville, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Sam Houston State University, Huntsville, TX, USA","institution_ids":["https://openalex.org/I191429286"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013606349","display_name":"Mohamed Baza","orcid":"https://orcid.org/0000-0001-5153-8693"},"institutions":[{"id":"https://openalex.org/I204593131","display_name":"College of Charleston","ror":"https://ror.org/00390t168","country_code":"US","type":"education","lineage":["https://openalex.org/I204593131"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohamed Baza","raw_affiliation_strings":["Department of Computer Science, College of Charleston, Charleston, SC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Charleston, Charleston, SC, USA","institution_ids":["https://openalex.org/I204593131"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012520636","display_name":"Mahmoud M. Badr","orcid":"https://orcid.org/0000-0002-8986-001X"},"institutions":[{"id":"https://openalex.org/I90965887","display_name":"SUNY Polytechnic Institute","ror":"https://ror.org/000fxgx19","country_code":"US","type":"education","lineage":["https://openalex.org/I90965887"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mahmoud. M. Badr","raw_affiliation_strings":["Department of Network and Computer Security, Suny Polytechnic Institute, Utica, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of Network and Computer Security, Suny Polytechnic Institute, Utica, NY, USA","institution_ids":["https://openalex.org/I90965887"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076631435","display_name":"Hani Alshahrani","orcid":"https://orcid.org/0000-0002-8799-9448"},"institutions":[{"id":"https://openalex.org/I47164929","display_name":"Najran University","ror":"https://ror.org/05edw4a90","country_code":"SA","type":"education","lineage":["https://openalex.org/I47164929"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Hani Alshahrani","raw_affiliation_strings":["Department of Computer Science, College of Computer Science and Information Systems, Najran University, Najran, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer Science and Information Systems, Najran University, Najran, Saudi Arabia","institution_ids":["https://openalex.org/I47164929"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information System and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information System and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5008960995"],"corresponding_institution_ids":["https://openalex.org/I191429286"],"apc_list":null,"apc_paid":null,"fwci":2.6067,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.90273683,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"11","issue":"1","first_page":"1008","last_page":"1025"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.9653000235557556,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.913100004196167,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7895832657814026},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6973648071289062},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.6882719993591309},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4971599876880646},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.45660048723220825},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.44318971037864685},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4285946786403656},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41055041551589966},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34244245290756226}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7895832657814026},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6973648071289062},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.6882719993591309},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4971599876880646},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.45660048723220825},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.44318971037864685},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4285946786403656},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41055041551589966},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34244245290756226}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2023.3312545","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2023.3312545","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1489027369","https://openalex.org/W1503864966","https://openalex.org/W1967308747","https://openalex.org/W2030112111","https://openalex.org/W2159047178","https://openalex.org/W2514873781","https://openalex.org/W2604623014","https://openalex.org/W2605933137","https://openalex.org/W2739928414","https://openalex.org/W2784615959","https://openalex.org/W2799341537","https://openalex.org/W2906931310","https://openalex.org/W2948886424","https://openalex.org/W2974312453","https://openalex.org/W2977100904","https://openalex.org/W2980985189","https://openalex.org/W3005206852","https://openalex.org/W3010738875","https://openalex.org/W3021499617","https://openalex.org/W3089446247","https://openalex.org/W3095361242","https://openalex.org/W3096736982","https://openalex.org/W3112825668","https://openalex.org/W3153104774","https://openalex.org/W3159761532","https://openalex.org/W3175572032","https://openalex.org/W3189306419","https://openalex.org/W3194066230","https://openalex.org/W3204357844","https://openalex.org/W3206362444","https://openalex.org/W3213338431","https://openalex.org/W3215903849","https://openalex.org/W4205441570","https://openalex.org/W4210980683","https://openalex.org/W4238341678","https://openalex.org/W4280633873","https://openalex.org/W4281702766","https://openalex.org/W4284899175","https://openalex.org/W4308627425","https://openalex.org/W4313406111","https://openalex.org/W4319068551","https://openalex.org/W4319430516","https://openalex.org/W4368232621","https://openalex.org/W4383376892"],"related_works":["https://openalex.org/W2167384606","https://openalex.org/W2026027869","https://openalex.org/W2189418772","https://openalex.org/W4210980683","https://openalex.org/W2545296949","https://openalex.org/W2583600037","https://openalex.org/W2147276925","https://openalex.org/W1665498659","https://openalex.org/W3133502160","https://openalex.org/W3080258714"],"abstract_inverted_index":{"Smart":[0],"vehicles":[1],"and":[2,88,137,151,170,178,201],"industrial":[3],"control":[4],"systems":[5,40,57],"becoming":[6],"increasingly":[7],"complex.":[8],"They":[9],"are":[10,41,58],"comprised":[11],"of":[12,16,47,55,64,72,79,100,119,213,226],"a":[13,61,73,101,120,154,223],"large":[14],"number":[15],"connected":[17],"intelligence":[18],"sensor":[19],"devices.":[20],"For":[21],"such":[22],"systems,":[23,53],"Controller":[24],"Area":[25],"Network":[26],"(CAN)":[27],"bus":[28,199],"offer":[29],"high-integrity":[30],"serial":[31],"communication":[32],"capabilities.":[33,92],"It":[34],"transformed":[35],"the":[36,45,70,98,117,191,196,211,214],"way":[37],"how":[38],"these":[39,56],"networked.":[42],"Due":[43],"to":[44,60,206,221],"lack":[46],"data":[48,83,86,112,141,229],"security":[49,146,166,193],"features":[50],"on":[51,109,153,187],"CAN-enabled":[52],"many":[54],"vulnerable":[59],"wide":[62],"range":[63],"cyber":[65],"threats.":[66],"This":[67],"article":[68],"proposed":[69,192],"development":[71,160],"crypto-based":[74],"subsystem":[75,147,194],"that":[76,128],"is":[77],"capable":[78],"supporting":[80,183],"CAN":[81,130,145,198],"authenticated":[82,105],"encryption/decryption,":[84],"crypto-provable":[85],"traceability,":[87],"replay":[89],"attack":[90,126,216],"detection":[91,224],"Data":[93],"confidentiality":[94],"was":[95,114,148,168],"achieved":[96,195],"via":[97],"deployment":[99],"lightweight":[102],"block":[103],"cipher":[104],"encryption":[106,174,208],"scheme":[107],"based":[108],"TinyJAMBU-128.":[110],"Crypto-provable":[111],"traceability":[113],"accomplished":[115],"through":[116],"utilization":[118],"block-chaining":[121],"approach.":[122],"Meanwhile,":[123],"an":[124],"anti-replay":[125,215],"mechanism":[127],"implements":[129],"message":[131,184,203],"context":[132],"awareness":[133],"has":[134],"been":[135],"tested":[136],"validated":[138],"under":[139],"various":[140],"infection":[142,230],"rates.":[143],"Our":[144],"fully":[149],"implemented":[150],"deployed":[152],"testbed":[155],"with":[156,172,180],"multiple":[157],"STM32":[158],"Nucleo":[159],"boards.":[161],"System":[162],"performance":[163,189],"for":[164,182,228],"our":[165,188],"schemes":[167,175],"analyzed":[169],"compared":[171,205],"traditional":[173],"AES,":[176],"ARIA,":[177],"Camellia":[179],"SHA-512":[181],"authentication.":[185],"Based":[186],"results,":[190],"lowest":[197],"load":[200],"average":[202],"overhead":[204],"other":[207],"schemes.":[209],"In":[210],"case":[212],"mechanism,":[217],"we":[218],"were":[219],"able":[220],"reach":[222],"rate":[225,231],"99.99%":[227],"below":[232],"20%.":[233]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
