Abstract. Controller Area Network (CAN) is a communication bus that has no cryptographic protection against malicious adversaries. Once isolated, the envi-ronments in which CAN operates are now opened to intruders and assuring broad-cast authentication becomes a concern. To achieve this, public key primitives are not a solution because of the computational constraints, but symmetric primitives can be used with time synchronization at the cost of additional delays. Here we study several trade-offs on computational speed, memory and bandwidth having the main intention to depict the lower bounds on the efficiency of such proto-cols. For this purpose we use a wide spread controller from Freescale located somewhat on the edge of the market capab...
The continuous search for network connections outside vehicles has increased the surface of cyber-at...
It is widely known that Control Area Networks (CAN) are used in real-time, distributed and parallel ...
One of the main challenges of securing broadcast commu-nications is source authentication: to allow ...
Abstract—Despite realistic concerns, security is still absent from ve-hicular buses (such as CAN) mo...
Security in vehicular networks established itself as a highly active research area in the last few y...
peer reviewedThe Controller Area Network (CAN) dominates in-vehicle networking systems in modern veh...
Ensuring the data integrity of messages transmitted over the Controller Area Network (CAN) bus and o...
We propose a security mechanism to help prevent cyber-attacks (masquerade and replay) in vehicles wi...
The ever more exposure of modern vehicles to computer networks has led, in recent years, to increase...
The CAN (Controller Area Network) protocol provides one of the cost-effective methods to network cur...
Nowadays, the growing need to connect modern vehicles through computer networks leads to increased r...
The design of the Controller Area Network (CAN bus) did not account for security issues and, consequ...
This work studies the problem in which multiple subsystems equipped with smart sensors sharing a cap...
Control area network (CAN) is a two- wired, half duplex, high-speed network system, that is far supe...
In modern networked control applications, confidentiality and integrity are important features to ad...
The continuous search for network connections outside vehicles has increased the surface of cyber-at...
It is widely known that Control Area Networks (CAN) are used in real-time, distributed and parallel ...
One of the main challenges of securing broadcast commu-nications is source authentication: to allow ...
Abstract—Despite realistic concerns, security is still absent from ve-hicular buses (such as CAN) mo...
Security in vehicular networks established itself as a highly active research area in the last few y...
peer reviewedThe Controller Area Network (CAN) dominates in-vehicle networking systems in modern veh...
Ensuring the data integrity of messages transmitted over the Controller Area Network (CAN) bus and o...
We propose a security mechanism to help prevent cyber-attacks (masquerade and replay) in vehicles wi...
The ever more exposure of modern vehicles to computer networks has led, in recent years, to increase...
The CAN (Controller Area Network) protocol provides one of the cost-effective methods to network cur...
Nowadays, the growing need to connect modern vehicles through computer networks leads to increased r...
The design of the Controller Area Network (CAN bus) did not account for security issues and, consequ...
This work studies the problem in which multiple subsystems equipped with smart sensors sharing a cap...
Control area network (CAN) is a two- wired, half duplex, high-speed network system, that is far supe...
In modern networked control applications, confidentiality and integrity are important features to ad...
The continuous search for network connections outside vehicles has increased the surface of cyber-at...
It is widely known that Control Area Networks (CAN) are used in real-time, distributed and parallel ...
One of the main challenges of securing broadcast commu-nications is source authentication: to allow ...