Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
Citations
412 citations
370 citations
Cites background from "Efficient In-Vehicle Delayed Data A..."
...For example, when data are broadcast using the BUS network, CAN does not ensure the confidentiality and authentication of the CAN data frame, paving the way for a malicious adversary to easily eavesdrop on data or launch a replay attack [7], [8]....
[...]
216 citations
197 citations
Cites background from "Efficient In-Vehicle Delayed Data A..."
...Similarly, the authors of [17] proposed to use multiple CRC fields for including a 64-bit MAC....
[...]
...To detect and prevent vehicle cyber attacks, various types of security solutions, such as Message Authentication Code (MAC) and Intrusion Detection Systems (IDSs) for in-vehicle networks — akin to those in the Internet security — have been proposed [8, 14, 17, 21]....
[...]
187 citations
Cites background from "Efficient In-Vehicle Delayed Data A..."
...The following categorizes have been proposed as countermeasures that provide IVN protection against various types of malicious attacks [12]–[14]: (1) ensuring the confidentiality and integrity of IVN message frames through encryption and authentication technologies [15]–[17], (2) separating potential attacking interfaces from IVNs (firewall policy) [18]–[20], and (3) developing intrusion detection systems (IDSs) for IVNs (IVN IDSs)....
[...]
References
7,390 citations
"Efficient In-Vehicle Delayed Data A..." refers background in this paper
...An initial approach to identifying which frame was bad in the compound MAC verification is to create a bloom filter [24, 25] of the compounded messages....
[...]
2,939 citations
"Efficient In-Vehicle Delayed Data A..." refers methods in this paper
...[10] present a solution using delayed key release for authenticated broadcasting in μTesla, a broadcasting...
[...]
2,703 citations
1,751 citations
Additional excerpts
...This approach has been presented in [20, 21] to secure communication in wireless sensor networks....
[...]
1,089 citations
"Efficient In-Vehicle Delayed Data A..." refers background in this paper
...as long as the underlying encryption algorithm is secure [17, 18]....
[...]