2022
DOI: 10.3390/s22072636
|View full text |Cite
|
Sign up to set email alerts
|

CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks

Abstract: Automotive cyber-physical systems are in transition from the closed-systems to open-networking systems. As a result, in-vehicle networks such as the controller area network (CAN) have become essential to connect to inter-vehicle networks through the various rich interfaces. Newly exposed security concerns derived from this requirement may cause in-vehicle networks to pose threats to automotive security and driver’s safety. In this paper, to ensure a high level of security of the in-vehicle network for automoti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 38 publications
0
1
0
Order By: Relevance
“…Leveraging the configurable nature of its design, KMAC enables the inclusion of a customization string, providing users the flexibility to modify its functioning to specific security settings or requirements its versatility stretches across cryptographic demands, enabling message authentication, hashing, and key derivation. From the solid security qualities inherent in the SHA-3 family, KMAC retains a strong cryptographic foundation, playing a crucial role in postquantum cryptography and cryptographic standardization efforts by groups like the National Institute of Standards and Technology (NIST) [14]- [16].…”
Section: Related Workmentioning
confidence: 99%
“…Leveraging the configurable nature of its design, KMAC enables the inclusion of a customization string, providing users the flexibility to modify its functioning to specific security settings or requirements its versatility stretches across cryptographic demands, enabling message authentication, hashing, and key derivation. From the solid security qualities inherent in the SHA-3 family, KMAC retains a strong cryptographic foundation, playing a crucial role in postquantum cryptography and cryptographic standardization efforts by groups like the National Institute of Standards and Technology (NIST) [14]- [16].…”
Section: Related Workmentioning
confidence: 99%