[1] Koscher K, Czeskis A, Roesner F, et al. Experimental security analysis of a modern automobile[C]//IEEE Symposium. Security and Privacy (SP). Oakland: IEEE, 2010: 447-462.[2] Ishtiaq R R M, Mustafaa H, Travis T S O, et al. Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study[C]//19th USENIX Security Symposium. Washington DC: USENIX, 2010: 11-13.[3] Checkoway S, Mccoy D, Kantor B, et al. Comprehensive experimental analyses of automotive attack surfaces[C]//20th USENIX Security Symposium. San Francisco: USENIX, 2011: 1-16.[4] Kammerer R, Fromel B, Wasicek A. Enhancing security in CAN systems using a star coupling router[C]//7th IEEE International Symposium. Industrial Embedded Systems(SIES). Karlsruhe: IEEE, 2012: 237-246.[5] Nilsson D K, Larson U E, Jonsson E. Efficient in-vehicle delayed data authentication based on compound message authentication codes[C]//Vehicular Technology Conference. VTC 2008-Fall. Calgary: IEEE, 2008: 1-5.[6] Oguma H, Yoshioka A, Nishikawa M, et al. New attestation based security architecture for in-vehicle communication[C]//Global Telecommunications Conference. IEEE GLOBECOM 2008. New Orleans: IEEE, 2008: 1-6.[7] Han K, Divya P S, Shin K G. On authentication in a connected vehicle: secure integration of mobile devices with vehicular networks[C]//2013 ACM/IEEE International Conference. Cyber-Physical Systems(ICCPS). Philadelphia: IEEE, 2013: 160-169.[8] Hazem A, Fahmy H A H. LCAP-a lightweight CAN authentication protocol for securing in-vehicle networks[C]//10th Escar Embedded Security in Cars Conference. Berlin: Escar, 2012: 1-10.[9] Robert B G. Version 2.0-1991. CAN specification[S]. Stuttgart: Bosch, 1991: 1-73.[10] Lin C W, Sangiovanni-Vincentelli A. Cyber-security for the controller area network(CAN) communication protocol[C]//2012 International Conference. Cyber Security(CyberSecurity). Washington DC: IEEE, 2012: 1-7. |