{"id":"https://openalex.org/W4398151316","doi":"https://doi.org/10.1109/tvt.2024.3402986","title":"CAN-MM: Multiplexed Message Authentication Code for Controller Area Network Message Authentication in Road Vehicles","display_name":"CAN-MM: Multiplexed Message Authentication Code for Controller Area Network Message Authentication in Road Vehicles","publication_year":2024,"publication_date":"2024-05-20","ids":{"openalex":"https://openalex.org/W4398151316","doi":"https://doi.org/10.1109/tvt.2024.3402986"},"language":"en","primary_location":{"id":"doi:10.1109/tvt.2024.3402986","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tvt.2024.3402986","pdf_url":"https://ieeexplore.ieee.org/ielx7/25/4356907/10534822.pdf","source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ieeexplore.ieee.org/ielx7/25/4356907/10534822.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051751631","display_name":"Franco Oberti","orcid":"https://orcid.org/0000-0001-7974-9505"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Politecnico di Torino","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Franco Oberti","raw_affiliation_strings":["Department of Control and Computer Engineering, Politecnico di Torino, Torino, Italy","DUMAREY Softronix S.r.l., Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Control and Computer Engineering, Politecnico di Torino, Torino, Italy","institution_ids":["https://openalex.org/I177477856"]},{"raw_affiliation_string":"DUMAREY Softronix S.r.l., Torino, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065582630","display_name":"Alessandro Savino","orcid":"https://orcid.org/0000-0003-0529-7950"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Politecnico di Torino","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Alessandro Savino","raw_affiliation_strings":["Department of Control and Computer Engineering, Politecnico di Torino, Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Control and Computer Engineering, Politecnico di Torino, Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009336869","display_name":"Ernesto S\u00e1nchez","orcid":"https://orcid.org/0000-0002-7042-295X"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Politecnico di Torino","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Ernesto Sanchez","raw_affiliation_strings":["Department of Control and Computer Engineering, Politecnico di Torino, Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Control and Computer Engineering, Politecnico di Torino, Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5098711624","display_name":"Paolo Casasso","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Paolo Casasso","raw_affiliation_strings":["DUMAREY Softronix S.r.l., Torino, Italy"],"affiliations":[{"raw_affiliation_string":"DUMAREY Softronix S.r.l., Torino, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047908207","display_name":"Filippo Parisi","orcid":"https://orcid.org/0000-0002-4260-7308"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Filippo Parisi","raw_affiliation_strings":["DUMAREY Softronix S.r.l., Torino, Italy"],"affiliations":[{"raw_affiliation_string":"DUMAREY Softronix S.r.l., Torino, Italy","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026593274","display_name":"Stefano Di Carlo","orcid":"https://orcid.org/0000-0002-7512-5356"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Politecnico di Torino","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Stefano Di Carlo","raw_affiliation_strings":["Department of Control and Computer Engineering, Politecnico di Torino, Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Control and Computer Engineering, Politecnico di Torino, Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5051751631"],"corresponding_institution_ids":["https://openalex.org/I177477856"],"apc_list":null,"apc_paid":null,"fwci":1.879,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.85581097,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"73","issue":"10","first_page":"14661","last_page":"14673"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9771000146865845,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.968999981880188,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.7488270401954651},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6512840390205383},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6469888091087341},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6079043745994568},{"id":"https://openalex.org/keywords/multiplexing","display_name":"Multiplexing","score":0.5811617374420166},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.447950541973114},{"id":"https://openalex.org/keywords/hash-based-message-authentication-code","display_name":"Hash-based message authentication code","score":0.44317442178726196},{"id":"https://openalex.org/keywords/message-broker","display_name":"Message broker","score":0.44229042530059814},{"id":"https://openalex.org/keywords/data-authentication-algorithm","display_name":"Data Authentication Algorithm","score":0.4400906562805176},{"id":"https://openalex.org/keywords/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.4121691882610321},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22826334834098816},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21362808346748352},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.21086356043815613}],"concepts":[{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.7488270401954651},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6512840390205383},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6469888091087341},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6079043745994568},{"id":"https://openalex.org/C19275194","wikidata":"https://www.wikidata.org/wiki/Q222903","display_name":"Multiplexing","level":2,"score":0.5811617374420166},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.447950541973114},{"id":"https://openalex.org/C100485629","wikidata":"https://www.wikidata.org/wiki/Q1669397","display_name":"Hash-based message authentication code","level":4,"score":0.44317442178726196},{"id":"https://openalex.org/C179733262","wikidata":"https://www.wikidata.org/wiki/Q6821765","display_name":"Message broker","level":2,"score":0.44229042530059814},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.4400906562805176},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.4121691882610321},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22826334834098816},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21362808346748352},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.21086356043815613}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tvt.2024.3402986","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tvt.2024.3402986","pdf_url":"https://ieeexplore.ieee.org/ielx7/25/4356907/10534822.pdf","source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/tvt.2024.3402986","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tvt.2024.3402986","pdf_url":"https://ieeexplore.ieee.org/ielx7/25/4356907/10534822.pdf","source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4398151316.pdf"},"referenced_works_count":44,"referenced_works":["https://openalex.org/W1629374427","https://openalex.org/W1968616969","https://openalex.org/W1982091933","https://openalex.org/W2008285395","https://openalex.org/W2023746183","https://openalex.org/W2034627150","https://openalex.org/W2296701710","https://openalex.org/W2324618222","https://openalex.org/W2481411448","https://openalex.org/W2493266175","https://openalex.org/W2520418590","https://openalex.org/W2604623014","https://openalex.org/W2783684738","https://openalex.org/W2785513402","https://openalex.org/W2902415164","https://openalex.org/W2907401758","https://openalex.org/W2921212998","https://openalex.org/W2942235444","https://openalex.org/W3033053846","https://openalex.org/W3134606046","https://openalex.org/W3152077392","https://openalex.org/W3164317619","https://openalex.org/W3171372630","https://openalex.org/W3196788377","https://openalex.org/W3209237090","https://openalex.org/W3215815040","https://openalex.org/W4200597240","https://openalex.org/W4205205710","https://openalex.org/W4205356381","https://openalex.org/W4226023837","https://openalex.org/W4226061632","https://openalex.org/W4252106068","https://openalex.org/W4254917368","https://openalex.org/W4297337509","https://openalex.org/W4327809007","https://openalex.org/W4389794090","https://openalex.org/W4393888174","https://openalex.org/W6666863774","https://openalex.org/W6675361099","https://openalex.org/W6742512641","https://openalex.org/W6799848562","https://openalex.org/W6800525906","https://openalex.org/W6849313196","https://openalex.org/W6864387944"],"related_works":["https://openalex.org/W3210438939","https://openalex.org/W2155394186","https://openalex.org/W4234011401","https://openalex.org/W1984916066","https://openalex.org/W2603122561","https://openalex.org/W2187382066","https://openalex.org/W2913647450","https://openalex.org/W2996978867","https://openalex.org/W2026511375","https://openalex.org/W2116285675"],"abstract_inverted_index":{"As":[0],"the":[1,7,48,51,94,121,133],"automotive":[2,49],"industry":[3,33],"adopts":[4],"more":[5],"technology,":[6],"threat":[8],"of":[9,96,120,132],"cyberattacks":[10],"on":[11],"vehicles":[12],"grows.":[13],"Electronic":[14],"Control":[15],"Units":[16],"(ECUs)":[17],"operate":[18],"in":[19,47,67],"a":[20,59],"hostile":[21],"environment,":[22],"raising":[23],"safety":[24],"concerns":[25],"for":[26,61],"drivers":[27],"and":[28,34,124],"passengers.":[29],"Initiatives":[30],"from":[31],"both":[32],"government":[35],"bodies":[36],"aim":[37],"to":[38,64,81,128],"address":[39],"these":[40],"risks.":[41],"The":[42,112],"primary":[43],"communication":[44,69],"protocol":[45,110,123],"used":[46],"industry,":[50],"standard":[52,89],"Controller":[53],"Area":[54],"Networks":[55],"(CANs)":[56],"protocol,":[57],"is":[58,114],"target":[60],"cybercriminals":[62],"due":[63],"its":[65],"limitations":[66],"ensuring":[68],"integrity.":[70],"This":[71],"paper":[72],"proposes":[73],"CAN":[74,90,109,122],"Multiplexed":[75],"MAC":[76,97,129],"(CAN-MM),":[77],"using":[78],"frequency":[79],"modulation":[80],"multiplex":[82],"Message":[83],"Authentication":[84],"Code":[85],"(MAC)":[86],"data":[87],"with":[88,107,117],"communication.":[91],"CAN-MM":[92],"enables":[93],"transmission":[95],"payloads":[98],"at":[99],"reduced":[100],"time":[101],"cost":[102],"while":[103],"maintaining":[104],"backward":[105],"compatibility":[106],"old":[108],"versions.":[111],"solution":[113],"also":[115],"compatible":[116],"modern":[118],"evolutions":[119],"advanced":[125],"algorithms":[126],"resorting":[127],"as":[130],"part":[131],"security":[134],"infrastructure.":[135]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
