Cyber-Security for the Controller Area Network (CAN) Communication Protocol
Chung-Wei Lin and Alberto Sangiovanni-Vincentelli Department of Electrical Engineering and Computer Sciences University of California, Berkeley
https://www.csie.ntu.edu.tw/~cwlin/document/40108.pdf
References
[1] K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, “Experimental security analysis of a modern automobile,” in IEEE Symposium on Security and Privacy, pp. 447–462, 2010.
[2] M. Wolf, A. Weimerskirch, and C. Paar, “Security in automotive bus systems,” in Workshop on Embedded Security in Cars, 2004.
[3] A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient authentication and signing of multicast streams over lossy channels,” in IEEE Symposium on Security and Privacy, pp. 56–73, 2000.
[4] A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient and secure source authentication for multicast,” in Network and Distributed System Security Symposium, pp. 35–46, 2001.
[5] A. Perrig, R. Canetti, D. Song, and D. Tygar, “The tesla broadcast authentication protocol,” in RSA Cryptobytes, pp. 2–13, 2002.
[6] C. Szilagyi and P. Koopman, “A flexible approach to embedded network multicast authentication,” in Workshop on Embedded Systems Security, 2008.
[7] C. Szilagyi and P. Koopman, “Flexible multicast authentication for time-triggered embedded control network applications,” in IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 165–174, 2009.
[8] C. Szilagyi and P. Koopman, “Low cost multicast authentication via validity voting in time-triggered embedded control networks,” in Workshop on Embedded Systems Security, 2010.
[9] S. Shenker and I. Stoica, “Security,” in Slides of Lectures 13 and 14, CS 194: Distributed Systems, University of California, Berkeley, 2005.
[10] Bosch, Controller Area Network, Specification 2.0, 1991.
[11] M. D. Natale, H. Zeng, P. Giusto, and A. Ghosal, “Worst-case time analysis of can messages,” in Understanding and Using the Controller Area Network Communication Protocol. Springer, pp. 43–65, 2012.
Related Article on Qiita
CAN FD and CAN XL on arXiv
https://qiita.com/kaizen_nagoya/items/d8efb0da53cd3456f735
CAN FD & CAN XL on arXiv references
https://qiita.com/kaizen_nagoya/items/7df86c66084372a96f1d
CAN FD & CAN XL on arXiv references name order
https://qiita.com/kaizen_nagoya/items/ec5e4e4491228db534c0