References of "Hu, Tingting 50025905"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailCANASTA: Controller Area Network Authentication Schedulability Timing Analysis
Ikumapayi, Omolade; Olufowobi, Habeeb; Daily, Jeremy et al

in IEEE Transactions on Vehicular Technology (2023)

The Controller Area Network (CAN) dominates in-vehicle networking systems in modern vehicles. CAN was designed with low-latency and reliability as key features. Authenticity of a CAN frame was not ... [more ▼]

The Controller Area Network (CAN) dominates in-vehicle networking systems in modern vehicles. CAN was designed with low-latency and reliability as key features. Authenticity of a CAN frame was not considered in the design, thus, most in-vehicle network nodes inherently trust received messages as coming from a legitimate source. As a result, it is trivial to program (or hack) a network node to spoof traffic. Authentication is challenging for CAN and related protocols, such as SAE J1939, due to limited frame sizes and high bus utilization. Adding a message authentication code (MAC) as a separate message can unduly stress the real-time delivery of safety-critical messages. Although this stressor is well-known, the impact of authentication protocols on real-time message delivery in CAN has not yet been thoroughly examined. In this paper, we provide the first comprehensive analysis of realtime schedulability analysis applied to authentication schemes for CAN, CAN Flexible Data-rate (CAN FD), and CAN extra long payload (CAN XL). We formulate the response time analysis for addition of MACs and periodic transmission of MACs, and we examine their impact on two case studies and through evaluation with randomized schedulability experiments over a wide range of message sets. [less ▲]

Detailed reference viewed: 79 (3 UL)
Peer Reviewed
See detailSchedulability Analysis of CAN and CAN FD Authentication
Ikumapayi, Omolade; Olufowobi, Habeeb; Daily, Jeremy et al

Scientific Conference (2023)

Ensuring the data integrity of messages transmitted over the Controller Area Network (CAN) bus and other vehicular networks is achieved through the implementation of cryptographic authentication protocols ... [more ▼]

Ensuring the data integrity of messages transmitted over the Controller Area Network (CAN) bus and other vehicular networks is achieved through the implementation of cryptographic authentication protocols. However, these protocols raise concerns about a significant increase in response time due to the restrictions on CAN frame size and bandwidth. This paper presents a comprehensive analysis of the impact on response time of CAN and CAN Flexible Data-rate (CAN FD) messages with the implementation of cryptographic message authentication codes (MACs) and the periodic transmission of these codes. Our evaluation is based on a randomized schedulability experiment to provide insights into the overhead incurred by adding authentication to the frame payloads. [less ▲]

Detailed reference viewed: 113 (2 UL)
Full Text
Peer Reviewed
See detailAutomated Fault Tolerance Augmentation in Model-Driven Engineering for CPS
Hu, Tingting UL; Cibrario Bertolotti, Ivan; Navet, Nicolas UL et al

in Computer Standards and Interfaces (2020), 70

Cyber-Physical Systems are usually subject to dependability requirements such as safety and reliability constraints. Over the last 50 years, a body of efficient fault-tolerance mechanisms has been devised ... [more ▼]

Cyber-Physical Systems are usually subject to dependability requirements such as safety and reliability constraints. Over the last 50 years, a body of efficient fault-tolerance mechanisms has been devised to handle faults occurring at run-time. However, properly implementing those mechanisms is a time-consuming task that requires a great deal of know-how. In this paper, we propose a general framework which allows system designers to decouple functional and non-functional concerns, and express non- functional properties at design time using domain-specific languages. In the spirit of generative programming, functional models are then automatically “augmented” with dependability mechanisms. Importantly, the real-time behavior of the initial models in terms of sampling times and meeting deadlines is preserved. The practicality of the approach is demonstrated with the automated implementation of one prominent software fault-tolerance pattern, namely N-Version Programming, in the CPAL model-driven engineering workflow. [less ▲]

Detailed reference viewed: 152 (14 UL)
See detailReal-Time Systems Development with RTEMS and Multicore Processors
Bloom, Gedare; Sherrill, Joel; Hu, Tingting UL et al

Book published by CRC Press - 1st ed. (2020)

Detailed reference viewed: 102 (6 UL)
Full Text
Peer Reviewed
See detailEvent Notification in CAN-based Sensor Networks
Bloom, Gedare; Cena, Gianluca; Cibrario Bertolotti, Ivan et al

in IEEE Transactions on Industrial Informatics (2019), 15(10), 5613-5625

Preventive and reactive maintenance require the collection of an ever-increasing amount of information from industrial plants and other complex systems, like those based on robotized cells, a need that ... [more ▼]

Preventive and reactive maintenance require the collection of an ever-increasing amount of information from industrial plants and other complex systems, like those based on robotized cells, a need that can be fulfilled by means of a suitable event notification mechanism. At the same time, timing and delivery reliability requirements in those scenarios are typically less demanding than in other cases, thus enabling the adoption of best-effort notification approaches. This paper presents, evaluates, and compares some of those approaches, based on either standard CAN messaging or a recently proposed protocol extension called CAN XR. In the second case, the combined use of Bloom filters is also envisaged to increase flexibility. Results show that the latter approaches are advantageous in a range of event generation rates and network topologies of practical relevance. [less ▲]

Detailed reference viewed: 139 (3 UL)
Full Text
Peer Reviewed
See detailOn a Software-Defined CAN Controller for Embedded Systems
Cena, Gianluca; Cibrario Bertolotti, Ivan; Hu, Tingting UL et al

in Computer Standards and Interfaces (2019), 63

Controller Area Network (CAN) technology is nowadays ubiquitous in vehicular applications and is also gaining popularity in other contexts, for instance, embedded and industrial automation systems. The ... [more ▼]

Controller Area Network (CAN) technology is nowadays ubiquitous in vehicular applications and is also gaining popularity in other contexts, for instance, embedded and industrial automation systems. The recent standardization of CAN with flexible data rate (CAN FD), as well as other academic proposals, have highlighted the usefulness of enhancing the CAN physical and data link layers to attain better performance and other features. This paper describes a portable software-defined CAN controller called SDCC. Besides being handy as a research tool for experimenting with novel protocol concepts at the data link layer, SDCC is also fully capable of real-time execution. Hence, it can interact with real-world CAN devices through a physical bus interface. [less ▲]

Detailed reference viewed: 228 (10 UL)
Full Text
Peer Reviewed
See detailError detection and management in CAN XR
Cena, Gianluca; Cibrario Bertolotti, Ivan; Hu, Tingting UL et al

in 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS) (2018)

Nowadays, Controller Area Network is still the most popular solution for in-vehicle communications in automotive scenarios. Recently, the CAN with eXtensible in-frame Replyproposal has been introduced ... [more ▼]

Nowadays, Controller Area Network is still the most popular solution for in-vehicle communications in automotive scenarios. Recently, the CAN with eXtensible in-frame Replyproposal has been introduced, which permits several nodes to write at the same time on the bus in the data field of legacy CAN frames. This enables several new interesting communication services, including distributed key generation and highly-efficient data exchanges according to the combined message approach. Unfortunately, having several concurrent devices acting as transmitters for the same message impairs the ability of the protocol to detect global errors, hence worsening its robustness against electromagnetic disturbance. In this paper, this problem is analyzed in detail and some solutions are proposed, which make CAN XR as robust as the standard CAN protocol. [less ▲]

Detailed reference viewed: 110 (9 UL)
Full Text
Peer Reviewed
See detailCAN With eXtensible In-Frame Reply: Protocol Definition and Prototype Implementation
Cena, Gianluca; Cibrario Bertolotti, Ivan; Hu, Tingting UL et al

in IEEE Transactions on Industrial Informatics (2017), 13(5), 2436-2446

Controller area network (CAN) has been the de facto standard in the automotive industry for the past two decades. Recently, CAN with flexible data-rate (CAN FD) has been standardized, which achieves ... [more ▼]

Controller area network (CAN) has been the de facto standard in the automotive industry for the past two decades. Recently, CAN with flexible data-rate (CAN FD) has been standardized, which achieves noticeably higher throughput. Further improvements are still possible for CAN, by exploiting its peculiar physical layer to carry out distributed operations among network nodes, implemented as atomic transactions mapped on quasi-conventional frame exchanges. In this paper, a proposal is made for an extension to the CAN protocol, termed CAN with eXtensible in-frame Reply (CAN XR), which enables upper protocol layers to define new custom services devoted to, e.g., network management, application-specific functions, and high-efficiency data transfer. The key point is that CAN XR retains full backward compatibility with CAN, therefore, there is no need to change the protocol specification once again. [less ▲]

Detailed reference viewed: 131 (5 UL)
Full Text
Peer Reviewed
See detailA Low-Overhead Framework for Inexpensive Embedded Control Systems
Cibrario Bertolotti, Ivan; Hu, Tingting UL; Ghafour Zadeh Kashani, Gilda

in Proc. 12th International Conference on Digital Telecommunications (ICDT2017) (2017)

Embedded control systems are becoming more and more popular, especially in relatively inexpensive consumer prod- ucts, like home appliances and building automation controllers. As a consequence, there is ... [more ▼]

Embedded control systems are becoming more and more popular, especially in relatively inexpensive consumer prod- ucts, like home appliances and building automation controllers. As a consequence, there is an ever increasing desire to reduce firmware development time and cost, without hampering relia- bility and performance. In this paper, a low-overhead firmware development framework is proposed, which allows programmers to develop and deploy typical real-time control software faster than using plain C-language programming. At the same time, experimental results confirm the framework’s efficiency and applicability even to low-end microcontrollers. [less ▲]

Detailed reference viewed: 89 (7 UL)
Full Text
Peer Reviewed
See detailTowards Seamless Integration of N-Version Programming in Model-Based Design
Hu, Tingting UL; Cibrario Bertolotti, Ivan; Navet, Nicolas UL

in 22nd IEEE International Conference on Emerging Technologies And Factory Automation (ETFA’2017), Limassol, Cyprus, September 12-15 2017 (2017)

The ever-growing complexity of present-day software systems raises new and more stringent requirements on their availability, pushing designers to make use of sophisticated fault tolerance techniques far ... [more ▼]

The ever-growing complexity of present-day software systems raises new and more stringent requirements on their availability, pushing designers to make use of sophisticated fault tolerance techniques far beyond the areas they were traditionally conceived for, and bringing new challenges to both the modelling and implementation phases. In this paper, we propose a design pattern to model in a domain-specific language one of the prominent fault-tolerant techniques, namely the N-version programming. It can be integrated seamlessly into existing applications to enhance their functional correctness, while still preserving the timing characteristics, in particular the sampling times. Besides, it is also designed in a way to ease the automatic code generation. A counterpart of the same framework is also implemented in a lower-level programming language, for use when direct model execution is impractical, like in severely resource-limited embedded targets. [less ▲]

Detailed reference viewed: 115 (7 UL)
Full Text
Peer Reviewed
See detailSoftware patterns for fault injection in CPS engineering
Navet, Nicolas UL; Cibrario Bertolotti, Ivan; Hu, Tingting UL

in 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) (2017)

Software fault injection is a powerful technique to evaluate the robustness of an application and guide in the choice of fault-tolerant mechanisms. It however requires a lot of time and know-how to be ... [more ▼]

Software fault injection is a powerful technique to evaluate the robustness of an application and guide in the choice of fault-tolerant mechanisms. It however requires a lot of time and know-how to be properly implemented, which severely hinders its applicability. We believe software fault injection can be made more “affordable” by automating it and have it integrated within a model-driven engineering design flow. We first propose in this paper a framework supporting these objectives. Then, illustrating on the domain-specific language CPAL, we present injection patterns that can be embedded in the application code and discuss the types of faults each supports, as well as implementation issues. [less ▲]

Detailed reference viewed: 121 (4 UL)
Full Text
Peer Reviewed
See detailOptimized event notification in CAN through in-frame replies and Bloom filters
Bloom, Gadare; Cena, Gianluca; Cibrario Bertolotti, Ivan et al

in 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS) (2017)

Thanks to its distributed and asynchronous medium access control mechanism, CAN is the ideal choice for interconnecting devices in event-driven systems. When timing requirements of applications are not ... [more ▼]

Thanks to its distributed and asynchronous medium access control mechanism, CAN is the ideal choice for interconnecting devices in event-driven systems. When timing requirements of applications are not particularly demanding, as in the case of, e.g., reactive and proactive maintenance, constraints on event delivery can be relaxed, so that their notification may rely on best-effort approaches. In this paper, a number of techniques are taken into account for notifying events in such a kind of systems, and their performance has been evaluated. Besides conventional CAN, a recent proposal for extending this protocol, termed CAN XR, is considered. Moreover, the adoption of Bloom filters to cope with rare events in very large systems has also been evaluated. [less ▲]

Detailed reference viewed: 132 (16 UL)
Full Text
Peer Reviewed
See detailSupporting Security Protocols on CAN-Based Networks
Bloom, Gedare; Cena, Gianlua; Cibrario Bertolotti, Ivan et al

in 2017 IEEE 18th International Conference on Industrial Technology (ICIT2017) (2017)

The ever-increasing variety of services built on top of the Controller Area Network (CAN), along with the recent discovery of vulnerabilities in CAN-based automotive systems (some of them demonstrated in ... [more ▼]

The ever-increasing variety of services built on top of the Controller Area Network (CAN), along with the recent discovery of vulnerabilities in CAN-based automotive systems (some of them demonstrated in practice) stimulated a renewed attention to security-oriented enhancements of the CAN protocol. The issue is further compounded nowadays because, unlike in the past, security can no longer be enforced by physical bus segregation. This paper describes how CAN XR, a recently proposed extension of the CAN data-link layer, can effectively support the distributed calculation of arbitrary binary Boolean functions, which are the foundation of most security protocols, without necessarily disclosing their operands on the bus. The feasibility of the approach is then shown through experimental evaluation and by confirming its applicability to a shared key generation protocol proposed in literature. [less ▲]

Detailed reference viewed: 137 (5 UL)
Full Text
Peer Reviewed
See detailModel-based design languages: A case study
Cibrario Bertolotti, Ivan; Hu, Tingting UL; Navet, Nicolas UL

in 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS) (2017)

Fast-paced innovation in the embedded systems domain puts an ever increasing pressure on effective software development methods, leading to the growing popularity of Model-Based Design (MBD). In this ... [more ▼]

Fast-paced innovation in the embedded systems domain puts an ever increasing pressure on effective software development methods, leading to the growing popularity of Model-Based Design (MBD). In this context, a proper choice of modeling languages and related tools - depending on design goals and problem qualities - is crucial to make the most of MBD benefits. In this paper, a comparison between two dissimilar approaches to modeling is carried out, with the goal of highlighting their relative advantages and shortcomings. It focuses on a case study involving a well-known distributed agreement protocol, a choice motivated by the fact that embedded systems are nowadays quickly evolving towards distributed, fault-tolerant architectures. [less ▲]

Detailed reference viewed: 135 (7 UL)