{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:01:32Z","timestamp":1725793292625},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319066431"},{"type":"electronic","value":"9783319066448"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06644-8_11","type":"book-chapter","created":{"date-parts":[[2014,4,29]],"date-time":"2014-04-29T03:24:57Z","timestamp":1398741897000},"page":"113-125","source":"Crossref","is-referenced-by-count":9,"title":["Attack Potential and Efficient Security Enhancement of Automotive Bus Networks Using Short MACs with Rapid Key Change"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"Bittl","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Memorandum of Understanding for OEMs within the CAR 2 CAR Communication Consortium on Deployment Strategy for cooperative ITS in Europe, v 4.0102 (June 2011)"},{"key":"11_CR2","unstructured":"CANlog4. giN - Gesellschaft f\u00fcr industrielle Netzwerke (December 2013), \n \n http:\/\/gin.de\/index.php?device=1004&lang=en"},{"key":"11_CR3","unstructured":"ISO 11898-1:2003 Road vehicles \u2013 Controller area network (CAN) \u2013 Part 1: Data link layer and physical signalling (February 2013)"},{"key":"11_CR4","unstructured":"ISO 17458-2:2013 Road vehicles \u2013 FlexRay communications system \u2013 Part 2: Data link layer specification (January 2013)"},{"key":"11_CR5","unstructured":"ISO\/DIS 17987-3 Road vehicles \u2013 Local Interconnect Network (LIN) \u2013 Part 3: Protocol specification (November 2013)"},{"key":"11_CR6","unstructured":"TTX-Connexion. TTTech (December 2013), \n \n http:\/\/www.tttech.com\/products\/automotive\/testing-tools\/signal-routing\/ttx-connexion\/"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Al-Kuwari, S., Wolthusen, D.: On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles. In: Forensics in Telecommunications, Information and Multimedia: Third International ICST Conf., pp. 207\u2013223 (2010)","DOI":"10.1007\/978-3-642-23602-0_20"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 1\u201315. Springer, Heidelberg (1996)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak sponge function family (June 2013), \n \n http:\/\/keccak.noekeon.org\/","DOI":"10.1007\/978-3-642-38348-9_19"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Chang, S., Perlner, R., Burr, W.E., Turan, M.S., Kelsey, J.M., Paul, S., Bassham, L.E.: Third Round Report of the SHA-3 Cryptographic Hash Algorithm Competition. Tech. rep., NIST (November 2012)","DOI":"10.6028\/NIST.IR.7896"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. NIST Special Publication 800-38B, NIST (May 2005)","DOI":"10.6028\/NIST.SP.800-38b-2005"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC. NIST Special Publication 800-38D, NIST (November 2007)","DOI":"10.6028\/NIST.SP.800-38d"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-642-35404-5_15","volume-title":"Cryptology and Network Security","author":"B. Groza","year":"2012","unstructured":"Groza, B., Murvay, S., van Herrewege, A., Verbauwhede, I.: LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol.\u00a07712, pp. 185\u2013200. Springer, Heidelberg (2012)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Koscher, K., et al.: Experimental Security Analysis of a Modern Automobile. In: 31st IEEE Symposium on Security and Privacy, vol.\u00a031 (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication. Tech. Rep. RFC2104, Network Working Group, IETF (February 1997)","DOI":"10.17487\/rfc2104"},{"key":"11_CR16","unstructured":"Miller, C., Valasek, C.: Adventures in Automotive Networks and Control Units (2013), \n \n http:\/\/illmatics.com\/car_hacking.pdf"},{"key":"11_CR17","unstructured":"Moser, M.: Trust Evaluation and Trust Assurance, Protection Profiles, 7th CAR 2 CAR Forum (November 2013)"},{"key":"11_CR18","unstructured":"MOST Cooperation: MOST Specification (July 2010)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"M\u2019Raihi, D., Bellare, M., Naccache, D., Ranen, O.: HOTP: An HMAC-Based One-Time Password Algorithm. Tech. Rep. RFC: 4226, Network Working Group, IETF (December 2005)","DOI":"10.17487\/rfc4226"},{"key":"11_CR20","unstructured":"Nisch, P.: Security Issues in Modern Automotive Systems (June 2012), \n \n http:\/\/www.panisch.com\/wp-content\/uploads\/2012\/06\/Security_Issues_in_Modern_Automotive_Cars.pdf"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Paar, C., Pelzl, J.: Understanding Cryptography, 2nd edn. Springer (2010)","DOI":"10.1007\/978-3-642-04101-3"},{"key":"11_CR22","unstructured":"Schweppe, H., Roudier, Y.: Security Issues in Vehicular Systems: Threats, Emerging Solutions and Standards. In: 5th Conference on Network Architectures and Information Systems Security (May 2010)"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Schweppe, H., Roudier, Y., Weyl, B., Apvrille, L.: Car2X Communication: Securing the Last Meter - A Cost-Effective Approach for Ensuring Trust in Car2X Applications Using In-Vehicle Symmetric Cryptography. In: 2011 IEEE Vehicular Technology Conference (VTC Fall), pp. 1\u20135 (September 2011)","DOI":"10.1109\/VETECF.2011.6093081"},{"key":"11_CR24","unstructured":"Van Herrewege, A., Singelee, D., Verbauwhede, I.: CANAuth - A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus. In: ECRYPT Workshop on Lightweight Cryptography 2011 (January 2011)"},{"key":"11_CR25","unstructured":"Wolf, M., Weimerskirch, A., Paar, C.: Security in Automotive Bus Systems. In: Proceedings of the Workshop on Embedded Security in Cars (escar) 2004 (2004)"}],"container-title":["Lecture Notes in Computer Science","Communication Technologies for Vehicles"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06644-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T17:54:25Z","timestamp":1558893265000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06644-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319066431","9783319066448"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06644-8_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}