2024
DOI: 10.1109/tnse.2023.3312545
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network

Amar Rasheed,
Mohamed Baza,
Mahmoud. M. Badr
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 46 publications
0
1
0
Order By: Relevance
“…Several works have been proposed to secure embedded systems [9][10][11]. Zareen et al [8] present an approach to embedded device security through the development of a Hardware Immune System (HWIS), leveraging Artificial Immune Systems for effective malware detection in IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…Several works have been proposed to secure embedded systems [9][10][11]. Zareen et al [8] present an approach to embedded device security through the development of a Hardware Immune System (HWIS), leveraging Artificial Immune Systems for effective malware detection in IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…In-vehicle communication protocols ensure that the various nodes within the car communicate using standardized methods with each other. Simply put, these protocols allow for the effective exchange of information and data between the different electronic nodes when the car is in operation [2][3][4][5]. One of the highly prevalent in-vehicle protocols used in modern cars is the Controller Area Network (CAN) bus [6].…”
Section: Introductionmentioning
confidence: 99%
“…(2) Replay attacks: An attacker intercepts and records a message, and then replays it later to achieve a malicious goal [98][99][100][101][102].…”
mentioning
confidence: 99%