Advanced Bit Stuffing Mechanism for Reducing CAN Message Response Time

نویسندگان

  • Kiejin Park
  • Minkoo Kang
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network

This paper presents a novel approach for calculating a probabilistic worst-case response-time for messages in the Controller Area Network (CAN). CAN uses a bit-stuffing mechanism to exclude forbidden bit-patterns within a message frame. The added bits eliminate the forbidden patterns but cause an increase in frame length. How much the length is increased depends on the bit-pattern of the origin...

متن کامل

The Hardware Implementation of Improved RSA Algorithm

RSA algorithm is an asymmetric key cryptography. It is a block cipher. RSA has stronger security than single key cryptography. RSA has a pair of keya private key a and public key. Sender sends the message encrypting it with the public key of receiver. Receiver receives the message by decrypting it with its private key. RSA provides authentication and integrity. So it is used in SSL for key exch...

متن کامل

Proceedings of the Second UK Embedded Forum

Nolte and colleagues (e.g. Nolte et al. Proc. of the 8th IEEE Real-Time and Embedded Technology and Applications Symposium, San Jose, California. 2002) have described an approach which aims to reduce the impact of bit stuffing in networks employing the Controller Area Network (CAN) protocol. In this paper, we explore the impact of the Nolte technique on a set of general random – CAN data and sh...

متن کامل

AVR411: Secure Rolling Code Algorithm for Wireless Link

● Uses advanced encryption standard (AES) and its cipher-based message authentication code (CMAC) mode of operation for transmitter authentication ● 128, 192 or 256 Bit key sizes supported ● Uses sleep modes for low-power consumption ● Less than 30ms response time ● PC command-line tools for cryptographic key management ● Multiple transmitters supported ● Secure learning mechanism for introduci...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017