Spelling suggestions: "subject:"CAN (controller area bnetwork)"" "subject:"CAN (controller area conetwork)""
1 |
Comunicação de tempo-real em barramentos CAN baseados no controlador SJA1000 : análise e implementação de uma solução para o escalonamento de mensagensPires, António Júlio Morais January 2005 (has links)
Tese de mestrado. Engenharia Electrotécnica e de Computadores. 2005. Faculdade de Engenharia. Universidade do Porto
|
2 |
Motorsimulering av CAN-buss : Boxcar 9-5Richardson, Malin, Sandell, Unn January 2003 (has links)
No description available.
|
3 |
CAN bus diagnostic tool for PocketPCPettersson, Marcus January 2002 (has links)
No description available.
|
4 |
Motorsimulering av CAN-buss : Boxcar 9-5Richardson, Malin, Sandell, Unn January 2003 (has links)
No description available.
|
5 |
CAN bus diagnostic tool for PocketPCPettersson, Marcus January 2002 (has links)
No description available.
|
6 |
Sistema de comunicações tolerante a falhas e de baixa complexidade para um veículo eléctricoSantos, Bruno Laranjo dos January 2012 (has links)
Tese de mestrado. Mestrado integrado em Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 2012
|
7 |
Safety/Security Co-design for Automotive CAN BusesZhang, Mingqing 10 December 2024 (has links)
The automotive industry heavily relies on the controller area network (CAN) due to its low cost and robustness. However, as vehicle connectivity grows, CAN buses become more vulnerable to cyberattacks such as spoofing, sniffing, replay, and denial of service (DoS), compromising both safety and (cyber-)security. Most existing attempts to secure CAN buses necessitate modifications to the hardware or protocol, which increase costs and complicate implementation, or they employ security schemes that negatively impact timing behavior and safety for both passengers and other road participants. To address this problem, we first propose a safety/security co-design approach based on combining a technique we call periodic authenticated encryption. On the other hand, DoS attacks on CAN buses can typically only be mitigated rather than completely rejected, due to CAN's inherent characteristics. We hence propose a priority-raise approach to this aim. Further, securing CAN buses requires sending additional frames, which frames undergo individual arbitration processes, further increasing delay. To alleviate this situation, we propose an ID mirroring technique. Finally, to accommodate to varying timing requirements in safety-critical applications, we propose a dynamic encryption switching approach. To evaluate the efficacy of these techniques, we conducted experiments on real hardware and carried out extensive simulations using MATLAB/Simulink and OMNeT++. Additionally, we presented various case studies involving electronic stability control (ESC), emergency braking, adaptive cruise control (ACC), and cooperative driving. Our findings demonstrate that the proposed techniques effectively reduce transmission delays while mitigating or preventing all major cyberattacks on the CAN bus. Furthermore, these techniques enable us to meet typical automotive deadlines on CAN buses, fulfilling both safety and security requirements within automotive systems.:Introduction
Fundamentals
Related work
Case studies
Rejecting sniffing, spoofing and replay attacks on CAN buses
Mitigating DoS attacks on CAN buses
Improving timing on secured CAN buses
Evaluation
Concluding remarks
Bibliography
Appendix
|
Page generated in 0.0512 seconds