{"id":"https://openalex.org/W3093914037","doi":"https://doi.org/10.1109/wf-iot48130.2020.9221400","title":"Secure CAN for Connected Vehicles","display_name":"Secure CAN for Connected Vehicles","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3093914037","doi":"https://doi.org/10.1109/wf-iot48130.2020.9221400","mag":"3093914037"},"language":"en","primary_location":{"id":"doi:10.1109/wf-iot48130.2020.9221400","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wf-iot48130.2020.9221400","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 6th World Forum on Internet of Things (WF-IoT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063868222","display_name":"Timothy Dee","orcid":"https://orcid.org/0000-0002-7125-3318"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Timothy Dee","raw_affiliation_strings":["Electrical & Computer Engineering, Iowa State University, Ames, IA, USA"],"affiliations":[{"raw_affiliation_string":"Electrical & Computer Engineering, Iowa State University, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102977539","display_name":"Akhilesh Tyagi","orcid":"https://orcid.org/0000-0002-2101-3594"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Akhilesh Tyagi","raw_affiliation_strings":["Electrical & Computer Engineering, Iowa State University, Ames, IA, USA"],"affiliations":[{"raw_affiliation_string":"Electrical & Computer Engineering, Iowa State University, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5063868222"],"corresponding_institution_ids":["https://openalex.org/I173911158"],"apc_list":null,"apc_paid":null,"fwci":0.3082,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.57511531,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7965109348297119},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.7478203177452087},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.631232500076294},{"id":"https://openalex.org/keywords/synchronizing","display_name":"Synchronizing","score":0.6195573806762695},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5806024074554443},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.547653317451477},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5431209802627563},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4382791817188263},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.432504802942276},{"id":"https://openalex.org/keywords/can-bus","display_name":"CAN bus","score":0.4153992533683777},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.4113154411315918},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1352246105670929},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.12895417213439941},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12501093745231628}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7965109348297119},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.7478203177452087},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.631232500076294},{"id":"https://openalex.org/C162932704","wikidata":"https://www.wikidata.org/wiki/Q1058791","display_name":"Synchronizing","level":3,"score":0.6195573806762695},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5806024074554443},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.547653317451477},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5431209802627563},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4382791817188263},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.432504802942276},{"id":"https://openalex.org/C201762086","wikidata":"https://www.wikidata.org/wiki/Q728183","display_name":"CAN bus","level":2,"score":0.4153992533683777},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.4113154411315918},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1352246105670929},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.12895417213439941},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12501093745231628}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wf-iot48130.2020.9221400","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wf-iot48130.2020.9221400","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 6th World Forum on Internet of Things (WF-IoT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W19910538","https://openalex.org/W87635799","https://openalex.org/W133259797","https://openalex.org/W1629374427","https://openalex.org/W1910751411","https://openalex.org/W2040325382","https://openalex.org/W2065806894","https://openalex.org/W2096279841","https://openalex.org/W2110081058","https://openalex.org/W2114867755","https://openalex.org/W2128395674","https://openalex.org/W2149254819","https://openalex.org/W2156849548","https://openalex.org/W2158455327","https://openalex.org/W2518763300","https://openalex.org/W2524044976","https://openalex.org/W4252106068","https://openalex.org/W6603557143","https://openalex.org/W6605384915","https://openalex.org/W6676669492","https://openalex.org/W6950685506"],"related_works":["https://openalex.org/W2359328895","https://openalex.org/W2363535981","https://openalex.org/W2007402811","https://openalex.org/W2326762630","https://openalex.org/W2391354408","https://openalex.org/W1986103452","https://openalex.org/W2166562438","https://openalex.org/W2388558702","https://openalex.org/W1565658545","https://openalex.org/W2757540250"],"abstract_inverted_index":{"A":[0,160],"Controller":[1],"Area":[2],"Network":[3],"(CAN)":[4],"bus":[5],"facilitates":[6],"real":[7],"time":[8,60],"data/command":[9],"transfer":[10],"over":[11,90],"small":[12],"distances.":[13],"It":[14],"is":[15,128,235,258],"frequently":[16],"used":[17],"in":[18,94,114],"automotive,":[19],"off-road,":[20],"and":[21,50,133,180,212,219,251],"industrial":[22],"environments":[23],"with":[24,33,111],"several":[25],"IoT":[26,119],"nodes":[27,120],"connected":[28,100],"to":[29,39,87,129,145,192,207,209],"it.":[30],"Control":[31],"messages":[32,146,152,208],"commands":[34],"can":[35,105],"cause":[36],"an":[37],"actuator":[38],"perform":[40],"some":[41],"action.":[42,52,68],"An":[43],"adversary":[44],"might":[45],"observe":[46],"the":[47,54,66,118,122,131,138],"control":[48,55,89],"message":[49,56,190],"subsequent":[51],"Injecting":[53],"at":[57,108],"a":[58,99,141,157,165,177,183,216,248,253],"later":[59],"(replay":[61],"attack)":[62],"should":[63],"not":[64,154],"replay":[65,148],"same":[67],"Unfortunately":[69],"current":[70],"CAN":[71,123,189],"protocol":[72],"provides":[73],"no":[74],"protection":[75],"against":[76],"such":[77],"attacks.":[78,149],"Third":[79],"party":[80],"components":[81],"may":[82],"reverse":[83],"engineer":[84],"messaging":[85],"protocols":[86],"gain":[88],"critical":[91],"systems":[92],"resulting":[93],"dangerous":[95],"system":[96],"malfunctions.":[97],"In":[98],"vehicle":[101],"ecosystem,":[102],"these":[103,224],"attacks":[104],"also":[106],"originate":[107],"peer":[109],"vehicles":[110],"transactions":[112],"coming":[113],"through":[115,260],"one":[116],"of":[117,135,140],"on":[121],"bus.":[124],"The":[125,172,232],"proposed":[126],"solution":[127],"verify":[130],"integrity":[132,139,211],"authenticity":[134],"messages.":[136,171,201],"Verifying":[137],"freshness":[142,184,220,254],"value":[143,221],"appended":[144],"prevents":[147],"Authenticity":[150],"guarantees":[151],"do":[153],"come":[155],"from":[156],"malicious":[158],"party.":[159],"keyed":[161],"hash":[162],"function":[163],"using":[164,237],"shared":[166,178,217,229,233,249],"secret":[167,179],"key":[168,218,230,234,250],"enables":[169],"authenticated":[170],"challenges":[173],"are:":[174],"(1)":[175],"establishing":[176,247],"(2)":[181],"synchronizing":[182,252],"value.":[185,255],"Past":[186],"standards":[187,196],"limit":[188],"sizes":[191],"8":[193,205],"bytes.":[194,225],"New":[195],"(CAN-FD)":[197],"allow":[198],"for":[199,222,246],"longer":[200],"We":[202],"propose":[203],"appending":[204],"bytes":[206],"provide":[210],"authenticity.":[213],"Nodes":[214],"require":[215,228],"creating":[223],"Many":[226],"scenarios":[227],"renegotiation.":[231],"negotiated":[236],"Elliptic":[238],"Curve":[239],"Cryptography":[240],"(ECC)":[241],"infrastructure.":[242],"Protocols":[243],"are":[244],"developed":[245],"Protocol":[256],"correctness":[257],"verified":[259],"simulations.":[261]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
