The widespread communication of vehicles with each other and road infrastructure has raised concerns about how to ensure network security of the electronic control units (ECUs) in the vehicle. The fact that networks such as the Controller Area Network (CAN), which is commonly used in in-vehicle communications, will also be connected to external networks (e.g. 3G / 4G mobile networks) will allow malicious adversaries to benefit from the vulnerability of the CAN. The authentication of messages of ECUs in the vehicle is required to ensure that in-vehicle communications are secured. However, the cryptographic algorithms and protocols that can be used for this message verification process should be selected considering the real-time communicatio...
In recent years, the security of automotive Cyber-Physical Systems (CPSs) is facing urgent threats d...
The development of automotive-information & communication technology (ICT) convergence has re...
The automotive market is increasingly profitable for cyberattacks with the constant shift toward ful...
Today, in-vehicle innovation has brought us to a newer level of the incorporated system being explor...
Vehicles have evolved from mostly mechanical machines into devices controlled by an internal compute...
The vehicles are equipped with electronic control units that control their functions. These units co...
Modern vehicles are incredibly complex and operate through an exchange of information between many E...
As connectivity between and within vehicles increases, so does concern about safety and security. Va...
The CAN bus is a multi-master network messaging protocol that is a standard across the vehicular ind...
In this paper a new security technique aiming to ensure safe and reliable communications between dif...
With the rapid development of the Internet of Vehicles, the increase in vehicle functional requireme...
The continuous search for network connections outside vehicles has increased the surface of cyber-at...
We propose a security mechanism to help prevent cyber-attacks (masquerade and replay) in vehicles wi...
Communication in modern cars is managed by a controller area network (CAN) bus protocol and its exte...
In-vehicle network security is becoming one of the leading research fields in the cybersecurity are...
In recent years, the security of automotive Cyber-Physical Systems (CPSs) is facing urgent threats d...
The development of automotive-information & communication technology (ICT) convergence has re...
The automotive market is increasingly profitable for cyberattacks with the constant shift toward ful...
Today, in-vehicle innovation has brought us to a newer level of the incorporated system being explor...
Vehicles have evolved from mostly mechanical machines into devices controlled by an internal compute...
The vehicles are equipped with electronic control units that control their functions. These units co...
Modern vehicles are incredibly complex and operate through an exchange of information between many E...
As connectivity between and within vehicles increases, so does concern about safety and security. Va...
The CAN bus is a multi-master network messaging protocol that is a standard across the vehicular ind...
In this paper a new security technique aiming to ensure safe and reliable communications between dif...
With the rapid development of the Internet of Vehicles, the increase in vehicle functional requireme...
The continuous search for network connections outside vehicles has increased the surface of cyber-at...
We propose a security mechanism to help prevent cyber-attacks (masquerade and replay) in vehicles wi...
Communication in modern cars is managed by a controller area network (CAN) bus protocol and its exte...
In-vehicle network security is becoming one of the leading research fields in the cybersecurity are...
In recent years, the security of automotive Cyber-Physical Systems (CPSs) is facing urgent threats d...
The development of automotive-information & communication technology (ICT) convergence has re...
The automotive market is increasingly profitable for cyberattacks with the constant shift toward ful...