Advanced Bit Stuffing Mechanism for Reducing CAN Message Response Time
نویسندگان
چکیده
منابع مشابه
Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network
This paper presents a novel approach for calculating a probabilistic worst-case response-time for messages in the Controller Area Network (CAN). CAN uses a bit-stuffing mechanism to exclude forbidden bit-patterns within a message frame. The added bits eliminate the forbidden patterns but cause an increase in frame length. How much the length is increased depends on the bit-pattern of the origin...
متن کاملThe Hardware Implementation of Improved RSA Algorithm
RSA algorithm is an asymmetric key cryptography. It is a block cipher. RSA has stronger security than single key cryptography. RSA has a pair of keya private key a and public key. Sender sends the message encrypting it with the public key of receiver. Receiver receives the message by decrypting it with its private key. RSA provides authentication and integrity. So it is used in SSL for key exch...
متن کاملProceedings of the Second UK Embedded Forum
Nolte and colleagues (e.g. Nolte et al. Proc. of the 8th IEEE Real-Time and Embedded Technology and Applications Symposium, San Jose, California. 2002) have described an approach which aims to reduce the impact of bit stuffing in networks employing the Controller Area Network (CAN) protocol. In this paper, we explore the impact of the Nolte technique on a set of general random – CAN data and sh...
متن کاملAVR411: Secure Rolling Code Algorithm for Wireless Link
● Uses advanced encryption standard (AES) and its cipher-based message authentication code (CMAC) mode of operation for transmitter authentication ● 128, 192 or 256 Bit key sizes supported ● Uses sleep modes for low-power consumption ● Less than 30ms response time ● PC command-line tools for cryptographic key management ● Multiple transmitters supported ● Secure learning mechanism for introduci...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017