1 A Miniature High-Resolution Tension Sensor Based on a Photo-Reflector for Robotic Hands and Grippers
Authors: Hyun-Bin Kim, Kyung-Soo Kim
https://arxiv.org/pdf/2507.00464
REFERENCES
[1] N. Zhang, P. Zhou, X. Yang, F. Shen, J. Ren, T. Hou, L. Dong, R. Bian, D. Wang, G. Gu et al., “Biomimetic rigid-soft finger design for highly dexterous and adaptive robotic hands,” Science Advances, vol. 11, no. 17, p. eadu2018, 2025.
[2] E. Shahriari, P. Svarny, S. A. B. Birjandi, M. Hoffmann, and S. Haddadin, “Path-constrained haptic motion guidance via adaptive phasebased admittance control,” IEEE Transactions on Robotics, 2024.
[3] C. Ding, Y. Han, W. Du, J. Wu, and Z. Xiong, “In situ calibration of sixaxis force–torque sensors for industrial robots with tilting base,” IEEE Transactions on Robotics, vol. 38, no. 4, pp. 2308–2321, 2021.
[4] U. Kim, G. Jo, H. Jeong, C. H. Park, J.-S. Koh, D. I. Park, H. Do, T. Choi, H.-S. Kim, and C. Park, “A novel intrinsic force sensing method for robot manipulators during human–robot interaction,” IEEE Transactions on Robotics, vol. 37, no. 6, pp. 2218–2225, 2021.
[5] I. Radosavovic, T. Xiao, B. Zhang, T. Darrell, J. Malik, and K. Sreenath, “Real-world humanoid locomotion with reinforcement learning,” Science Robotics, vol. 9, no. 89, p. eadi9579, 2024.
[6] F. Voigt, A. Naceri, and S. Haddadin, “Learning wrist policies for anthropomorphic soft power grasping in handle and door manipulation,” IEEE Transactions on Robotics, 2025.
[7] Z. Lu, X. Gao, and H. Yu, “Gtac: A biomimetic tactile sensor with skin-like heterogeneous force feedback for robots,” IEEE Sensors Journal,vol. 22, no. 14, pp. 14 491–14 500, 2022.
[8] X. Liu, W. Yang, F. Meng, and T. Sun, “Material recognition using robotic hand with capacitive tactile sensor array and machine learning,” IEEE Transactions on Instrumentation and Measurement, 2024.
[9] W. Zuo, G. Song, and Z. Chen, “Grasping force control of robotic gripper with high stiffness,” IEEE/ASME Transactions on Mechatronics, vol. 27, no. 2, pp. 1105–1116, 2021.
[10] C. Zhao, M. Liu, X. Huang, Y. Ma, B. Zhang, H. Li, Q. Huang, and Z. Jiang, “Adaptive and dexterous tendon-driven underactuated finger design with a predefined elastic force gradient,” IEEE/ASME Transactions on Mechatronics, vol. 29, no. 3, pp. 1622–1633, 2023.
[11] Y. Cho, Y. Lee, P. Kim, S. Jeong, and K.-S. Kim, “The msc prosthetic hand: Rapid, powerful, and intuitive,” IEEE Robotics and Automation Letters, vol. 7, no. 2, pp. 3170–3177, 2022.
[12] J. G. da Silva, A. A. de Carvalho, and D. D. da Silva, “A strain gauge tactile sensor for finger-mounted applications,” IEEE Transactions on Instrumentation and measurement, vol. 51, no. 1, pp. 18–22, 2002.
[13] J. Qu, Q. Wu, T. Clancy, Q. Fan, X. Wang, and X. Liu, “3d-printed straingauge micro force sensors,” IEEE Sensors Journal, vol. 20, no. 13, pp.6971–6978, 2020.
[14] Y. Wei and Q. Xu, “An overview of micro-force sensing techniques,” Sensors and Actuators A: Physical, vol. 234, pp. 359–374, 2015.
[15] H.-B. Kim, K.-H. Choi, and K.-S. Kim, “A compact six-axis force/torque sensor using photocouplers for impact robustness,” Review of Scientific Instruments, vol. 95, no. 4, 2024.
[16] H.-B. Kim, B.-I. Ham, K.-H. Choi, and K.-S. Kim, “Parameter optimization of optical six-axis force/torque sensor for legged robots,” arXiv preprint arXiv:2502.07196, 2025.
[17] H.-B. Kim, S. Lee, B.-I. Ham, K.-H. Choi, and K.-S. Kim, “Temperature compensation method for a six-axis force/torque sensor using a gated recurrent unit,” IEEE Sensors Journal, 2025.
[18] H.-B. Kim, K.-H. Choi, and K.-S. Kim, “A compact optical six-axis force/torque sensor for legged robots using a polymorphic calibration method,” arXiv preprint arXiv:2309.04720, 2023.
[19] Y. Noh, J. Bimbo, S. Sareh, H. Wurdemann, J. Fra´ s, D. S. Chathuranga, H. Liu, J. Housden, K. Althoefer, and K. Rhode, “Multi-axis force/torque sensor based on simply-supported beam and optoelectronics,” Sensors, vol. 16, no. 11, p. 1936, 2016.
[20] Y. J. Shin, H. J. Lee, K.-S. Kim, and S. Kim, “A robot finger design using a dual-mode twisting mechanism to achieve high-speed motion and large grasping force,” IEEE Transactions on Robotics, vol. 28, no. 6, pp.1398–1405, 2012.
[21] M. Pu, Q. Luo, Q. Liang, and J. Zhang, “Modeling for elastomer displacement analysis of capacitive six-axis force/torque sensor,” IEEE Sensors Journal, vol. 22, no. 2, pp. 1356–1365, 2021.
[22] S. H. Jeong, H. J. Lee, K.-R. Kim, and K.-S. Kim, “Design of a miniature force sensor based on photointerrupter for robotic hand,” Sensors and Actuators A: Physical, vol. 269, pp. 444–453, 2018.
[23] B. Lee, K.-S. Kim, and Y. Cho, “Real-time adaptive cancellation of tens feedback artifact on semg for prosthesis closed-loop control,” Frontiers in Bioengineering and Biotechnology, vol. 12, p. 1492588, 2024.
2 A Novel 6-axis Force/Torque Sensor Using Inductance Sensors
Authors: Hyun-Bin Kim, Kyung-Soo Kim
https://arxiv.org/pdf/2505.09069
REFERENCES
[1] J. Di Carlo, P. M. Wensing, B. Katz, G. Bledt, and S. Kim, “Dynamic locomotion in the mit cheetah 3 through convex model-predictive control,” in 2018 IEEE/RSJ international conference on intelligent robots and systems (IROS), pp. 1–9. IEEE, 2018.
[2] S. Choi, G. Ji, J. Park, H. Kim, J. Mun, J. H. Lee, and J. Hwangbo, “Learning quadrupedal locomotion on deformable terrain,” Science Robotics, vol. 8, no. 74, p. eade2256, 2023.
[3] J. Kang, H. Kim, and K.-S. Kim, “View: Visual-inertial external wrench estimator for legged robot,” IEEE Robotics and Automation Letters, vol. 8, no. 12, pp. 8366–8373, 2023.
[4] G. Valsecchi, R. Grandia, and M. Hutter, “Quadrupedal locomotion on uneven terrain with sensorized feet,” IEEE Robotics and Automation Letters, vol. 5, no. 2, pp. 1548–1555, 2020.
[5] Y. Liu, S. Liu, B. Chen, Z.-X. Yang, and S. Xu, “Fusion-perception-to-action transformer: Enhancing robotic manipulation with 3d visual fusion attention and proprioception,” IEEE Transactions on Robotics, 2025.
[6] J. Chen, Z.-Y. Dong, S. Shi, Y. Wei, X. Yu, and L. Ou, “Adaptive-constrained admittance control for physical human–robot interaction,” Transactions of the Institute of Measurement and Control, p. 01423312241298351, 2025.
[7] “Ati industrial automation,” https://www.ati-ia.com/, accessed: 2025-05-14.
[8] J.-H. Kim, “Multi-axis force-torque sensors for measuring zero-moment point in humanoid robots: A review,” IEEE Sensors Journal, vol. 20, no. 3, pp. 1126–1141, 2019.
[9] P. Billeschou, C. Albertsen, J. C. Larsen, and P. Manoonpong, “A low-cost, compact, sealed, three-axis force/torque sensor for walking robots,” IEEE Sensors Journal, vol. 21, no. 7, pp. 8916–8926, 2021.
[10] U. Kim, D.-H. Lee, Y. B. Kim, D.-Y. Seok, and H. R. Choi, “A novel six-axis force/torque sensor for robotic applications,” IEEE/ASME Transactions on mechatronics, vol. 22, no. 3, pp. 1381–1391, 2016.
[11] M. Pu, Q. Luo, Q. Liang, and J. Zhang, “Modeling for elastomer displacement analysis of capacitive six-axis force/torque sensor,” IEEE Sensors Journal, vol. 22, no. 2, pp. 1356–1365, 2021.
[12] Q. Luo, Q. Liang, J. Zhang, R. Zhao, Z. Ai, and M. Pu, “Parameters optimization for a capacitive six-axis force/torque sensor by using analytical method,” IEEE Sensors Journal, vol. 22, no. 22, pp. 21 735–21 744, 2022.
[13] U. Kim, Y. B. Kim, D.-Y. Seok, J. So, and H. R. Choi, “A surgical palpation probe with 6-axis force/torque sensing capability for minimally invasive surgery,” IEEE Transactions on Industrial Electronics, vol. 65, no. 3, pp. 2755–2765, 2017.
[14] U. Kim, Y. B. Kim, J. So, D.-Y. Seok, and H. R. Choi, “Sensorized surgical forceps for robotic-assisted minimally invasive surgery,” IEEE Transactions on Industrial Electronics, vol. 65, no. 12, pp. 9604–9613, 2018.
[15] G. Palli and S. Pirozzi, “An optical torque sensor for robotic applications,” International Journal of Optomechatronics, vol. 7, no. 4, pp. 263–282, 2013.
[16] O. Al-Mai, M. Ahmadi, and J. Albert, “Design, development and calibration of a lightweight, compliant six-axis optical force/torque sensor,” IEEE Sensors Journal, vol. 18, no. 17, pp. 7005–7014, 2018.
[17] A. Tar and G. Cserey, “Development of a low cost 3d optical compliant tactile force sensor,” in 2011 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM), pp. 236–240. IEEE, 2011.
[18] H.-B. Kim, K.-H. Choi, and K.-S. Kim, “A compact six-axis force/torque sensor using photocouplers for impact robustness,” Review of Scientific Instruments, vol. 95, no. 4, 2024.
[19] S. Jeong, Y. Chitalia, and J. P. Desai, “Miniature force sensor based on dual-photointerrupter with high linearity and disturbance compensation,” IEEE Sensors Journal, vol. 20, no. 11, pp. 5855–5864, 2020.
[20] S. H. Jeong, H. J. Lee, K.-R. Kim, and K.-S. Kim, “Design of a miniature force sensor based on photointerrupter for robotic hand,” Sensors and Actuators A: Physical, vol. 269, pp. 444–453, 2018.
[21] L. Xiong, Y. Guo, G. Jiang, X. Zhou, L. Jiang, and H. Liu, “Six-dimensional force/torque sensor based on fiber bragg gratings with low coupling,” IEEE Transactions on Industrial Electronics, vol. 68, no. 5, pp. 4079–4089, 2020.
[22] H.-P. Wang, J.-G. Dai, and X.-Z. Wang, “Improved temperature com- pensation of fiber bragg grating-based sensors applied to structures under different loading conditions,” Optical Fiber Technology, vol. 63, p. 102506, 2021.
[23] F. W. Grover, Inductance calculations: working formulas and tables. Courier Corporation, 2004.
[24] S. S. Mohan, M. del Mar Hershenson, S. P. Boyd, and T. H. Lee, “Simple accurate expressions for planar spiral inductances,” IEEE Journal of solid-state circuits, vol. 34, no. 10, pp. 1419–1424, 1999.
[25] “Texas instruments application note(snoa930a),” https://www.ti.com/lit/an/snoa930a/snoa930a.pdf, accessed: 2025-05-14.
[26] “Aidinrobotics,” https://www.aidinrobotics.co.kr/smart-6-axis-f-t-sensor, accessed: 2025-05-14.
[27] A. Ananthanarayanan, S. Foong, and S. Kim, “A compact two dof magneto-elastomeric force sensor for a running quadruped,” in 2012 IEEE International Conference on Robotics and Automation, pp. 1398–1403. IEEE, 2012.
[28] “Robotous - innovative robotic solutions,” http://www.robotous.com/ main, accessed: 2025-05-14.
[29] “Bota systems,” https://www.botasys.com/, accessed: 2025-05-14.
3 EXT-TAURUM P2T: an Extended Secure CAN-FD Architecture for Road Vehicles
Authors: Franco Oberti, Alessandro Savino, Ernesto Sanchez, Filippo Parisi, Stefano Di Carlo
https://arxiv.org/pdf/2112.08162
REFERENCES
[1] UN Economic Commission for Europe, “Unece world forum for harmonization of vehicle regulations (wp.29),” 2021. [Online]. Available: https://unece.org/wp29-introduction
[2] ——, “Un regulation no. 155 - cyber security and cyber security management system,” 2021. [Online]. Available: https://unece.org/transport/documents/2021/03/standards/un-regulation-no-155-cyber-security-and-cyber-security
[3] ——, “Un regulation no. 156 - software update and software update management system,” 2021. [Online]. Available: https://unece.org/transport/documents/2021/03/standards/un-regulation-no-156-software-update-and-software-update
[4] M. Bozdal, M. Samie, S. Aslam, and I. Jennions, “Evaluation of can bus security challenges,” Sensors, vol. 20, no. 8, p. 2364, 2020.
[5] T. Nguyen, B. M. Cheon, and J. W. Jeon, “Can fd performance analysis for ecu re-programming using the canoe,” in The 18th IEEE International Symposium on Consumer Electronics (ISCE 2014), 2014, pp. 1–4.
[6] F. Oberti, E. Sanchez, A. Savino, F. Parisi, and S. Di Carlo, “Taurum p2t: Advanced secure can-fd architecture for road vehicle,” in 2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design (IOLTS). IEEE, 2021, pp. 1–7.
[7] ——, “Mitigation of automotive control modules hardware replacement-based attacks through hardware signature,” in 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S), 2021, pp. 13–14.
[8] A. Albert et al., “Comparison of event-triggered and time-triggered concepts with regard to distributed control systems,” Embedded world, vol. 2004, pp. 235–252, 2004.
[9] M. U. Farooq, M. Waseem, A. Khairi, and S. Mazhar, “A critical analysis on the security concerns of internet of things (iot),” International Journal of Computer Applications, vol. 111, no. 7, 2015.
[10] Network Working Group, “The aes-cmac algorithm,” 2021. [Online]. Available: https://tools.ietf.org/html/rfc4493.html
[11] N. Nowdehi, A. Lautenbach, and T. Olovsson, “In-vehicle can message authentication: An evaluation based on industrial criteria,” in 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 2017, pp. 1–7.
[12] M. Marchetti and D. Stabili, “Anomaly detection of can bus messages through analysis of id sequences,” in 2017 IEEE Intelligent Vehicles Symposium (IV), 2017, pp. 1577–1583.
[13] Y. Xiao, H.-H. Chen, R. Wang, and S. Sethi, “Mac security and security overhead analysis in the ieee 802.15.4 wireless sensor networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2006, 04 2006.
[14] ISO - International Organization for Standardization, “Iso 17356-2 road vehicles — open interface for embedded automotive applications — part 2: Osek/vdx specifications for binding os, com and nm,” 2005. [Online]. Available: https://www.iso.org/standard/33007.html
[15] F. Kluge, C. Yu, J. Mische, S. Uhrig, and T. Ungerer, “Implementing autosar scheduling and resource management on an embedded smt pro- cessor,” in Proceedings of th 12th International Workshop on Software and Compilers for Embedded Systems, 2009, pp. 33–42.
[16] M. S. U. Alam, S. Iqbal, M. Zulkernine, and C. Liem, “Securing vehicle ecu communications and stored data,” in ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019, pp. 1–6.
[17] R. R.V. and K. A., “Secure boot of embedded applications - a review,” in 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), 2018, pp. 291–298.
[18] C. Lin and A. Sangiovanni-Vincentelli, “Cyber-security for the controller area network (can) communication protocol,” in 2012 International Conference on Cyber Security, 2012, pp. 1–7.
[19] H. Kang, Y. Hori, and A. Satoh, “Performance evaluation of the first commercial puf-embedded rfid,” in The 1st IEEE Global Conference on Consumer Electronics 2012, 2012, pp. 5–8.
[20] R. Soga and H. Kang, “Physical unclonable function using carbon resistor,” in 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE), 2020, pp. 559–561.
[21] M. Yasin, J. J. Rajendran, O. Sinanoglu, and R. Karri, “On improving the security of logic locking,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 35, no. 9, pp. 1411–1424, 2016.
[22] K. Juretus and I. Savidis, “Increased output corruption and structural attack resilience for sat attack secure logic locking,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 40, no. 1, pp. 38–51, 2021.
[23] T. Thangam, G. Gayathri, and T. Madhubala, “A novel logic locking technique for hardware security,” in 2017 IEEE International Conference on Electrical, Instrumentation and Communication Engineering (ICEICE), 2017, pp. 1–7.
[24] Network Working Group, “The aes-cbc cipher algorithm and its use with ipsec,” 2021. [Online]. Available: https://tools.ietf.org/html/rfc3602
[25] N. Koblitz, A. Menezes, and S. Vanstone, “Guide to elliptic curve cryptography,” 2004.
[26] D. J. Bernstein, “Curve25519: New diffie-hellman speed records,” in Public Key Cryptography - PKC 2006, M. Yung, Y. Dodis, A. Kiayias, and T. Malkin, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006, pp. 207–228.
[27] Intrepid Control Systems, Inc, “neovi fire 2 user guide,” 2021. [Online]. Available: URL:https://cdn.intrepidcs.net/guides/neovifire2/neovi_fire2ug.pdf
[28] G. Macher, C. Schmittner, O. Veledar, and E. Brenner, ISO/SAE DIS 21434 Automotive Cybersecurity Standard - In a Nutshell, 09 2020, pp. 123–135.
[29] G. Macher, H. Sporer, R. Berlach, E. Armengaud, and C. Kreiner, “Sahara: A security-aware hazard and risk analysis method,” in 2015 Design, Automation Test in Europe Conference Exhibition (DATE), 2015, pp. 621–624.
[30] R. G. Dutta, F. Yu, T. Zhang, Y. Hu, and Y. Jin, “Security for safety: A path toward building trusted autonomous vehicles,” in 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2018, pp. 1–6.
[31] F. Hartwich and R. P. Bosch, “Can with flexible data-rate,” 2012.
[32] I. S. for Information technology ISO, “Iso/iec/ieee international standard for information technology – telecommunications and information exchange between systems – local and metropolitan area networks – part 1ae: Media access control (mac) security - amendment 1: Galois counter model – advanced encryption standard-256 (gcmaes-256) cipher suite,” ISO/IEC/ IEEE 8802-1AE First edition 2013-12-01 AMENDMENT 1 2015-05-01, pp. 1–57, 2015.
[33] K. Kang, Y. Baek, S. Lee, and S. H. Son, “Lightweight authentication method for controller area network,” in 2016 IEEE 22nd International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), 2016, pp. 101–101.
[34] S. Woo, H. J. Jo, I. S. Kim, and D. H. Lee, “A practical security architecture for in-vehicle can-fd,” IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 8, pp. 2248–2261, 2016.
[35] B. Groza and S. Murvay, “Efficient protocols for secure broadcast in controller area networks,” IEEE Transactions on Industrial Informatics, vol. 9, no. 4, pp. 2034–2042, 2013.
[36] R. I. Davis, S. Kollmann, V. Pollex, and F. Slomka, “Controller area network (can) schedulability analysis with fifo queues,” in 2011 23rd Euromicro Conference on Real-Time Systems, 2011, pp. 45–56.
[37] P. Murvay and B. Groza, “Source identification using signal characteristics in controller area networks,” IEEE Signal Processing Letters, vol. 21, no. 4, pp. 395–399, 2014.
[38] H. Nicanfar and V. C. M. Leung, “Multilayer consensus ecc-based password authenticated key-exchange (mcepak) protocol for smart grid system,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 253–264, 2013.
[39] D. Jang, S. Han, S. Kang, and J. Choi, “Communication channel modeling of controller area network (can),” in 2015 Seventh International Conference on Ubiquitous and Future Networks, 2015, pp. 86–88.
[40] H. Chen and J. Tian, “Research on the controller area network,” in 2009 International Conference on Networking and Digital Society, vol. 2, 2009, pp. 251–254.
[41] J. Liu, S. Zhang, W. Sun, and Y. Shi, “In-vehicle network attacks and countermeasures: Challenges and future directions,” IEEE Network, vol. 31, no. 5, pp. 50–58, 2017.
[42] M. Marchetti and D. Stabili, “Anomaly detection of can bus messages through analysis of id sequences,” in 2017 IEEE Intelligent Vehicles Symposium (IV), 2017, pp. 1577–1583.
[43] Y. Zhang, M. Chen, N. Guizani, D. Wu, and V. C. M. Leung, “Sovcan: Safety-oriented vehicular controller area network,” IEEE Communications Magazine, vol. 55, no. 8, pp. 94–99, 2017.
[44] M. Barranco, J. Proenza, and L. Almeida, “Quantitative comparison of the error-containment capabilities of a bus and a star topology in can networks,” IEEE Transactions on Industrial Electronics, vol. 58, no. 3, pp. 802–813, 2011.
[45] P. Mart´ ı, A. Camacho, M. Velasco, and M. E. M. Ben Gaid, “Runtime allocation of optional control jobs to a set of can-based networked control systems,” IEEE Transactions on Industrial Informatics, vol. 6, no. 4, pp. 503–520, 2010.
[46] W. Choi, H. J. Jo, S. Woo, J. Y. Chun, J. Park, and D. H. Lee, “Identifying ecus using inimitable characteristics of signals in controller area networks,” IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 4757–4770, 2018.
[47] P. M. Yomsi, D. Bertrand, N. Navet, and R. I. Davis, “Controller area network (can): Response time analysis with offsets,” in 2012 9th IEEE International Workshop on Factory Communication Systems, 2012, pp.43–52.
[48] C. Lin, Q. Zhu, and A. Sangiovanni-Vincentelli, “Security-aware modeling and efficient mapping for can-based real-time distributed automotive systems,” IEEE Embedded Systems Letters, vol. 7, no. 1, pp. 11–14, 2015.
[49] B. Groza and P. Murvay, “Efficient intrusion detection with bloom filtering in controller area networks,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 4, pp. 1037–1051, 2019.
[50] P. Nuzzo, N. Bajaj, M. Masin, D. Kirov, R. Passerone, and A. L. Sangiovanni-Vincentelli, “Optimized selection of reliable and cost-effective safety-critical system architectures,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, no. 10, pp. 2109–2123, 2020.
[51] P. Koppermann, F. De Santis, J. Heyszl, and G. Sigl, “Low-latency x25519 hardware implementation: breaking the 100 microseconds barrier,” Microprocessors and Microsystems, vol. 52, pp. 491–497, 2017. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0141933117300273
[52] F. Stellari, P. Song, A. J. Weger, J. Culp, A. Herbert, and D. Pfeiffer, “Verification of untrusted chips using trusted layout and emission measurements,” in 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2014, pp. 19–24.
[53] M. Majzoobi and F. Koushanfar, “Time-bounded authentication of fpgas,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1123–1135, 2011.
[54] M. B. Bahador, M. Abadi, and A. Tajoddin, “Hpcmalhunter: Behavioral malware detection using hardware performance counters and singular value decomposition,” in 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE), 2014, pp. 703–708.
[55] H. Aydin, R. Melhem, D. Mosse, and P. Mejia-Alvarez, “Power-aware scheduling for periodic real-time tasks,” IEEE Transactions on Computers, vol. 53, no. 5, pp. 584–600, 2004.
[56] K. Kinkai, T. Baba, H. Jutori, K. Ootsu, T. Ohkawa, and T. Yokota, “Comparative study of path prediction method for speculative loop execution,” in 2012 Third International Conference on Networking andComputing, 2012, pp. 283–287.
4 Robust Multicast Origin Authentication in MACsec and CANsec for Automotive Scenarios
Authors: Gianluca Cena, Lucia Seno, Stefano Scanzio
https://arxiv.org/pdf/2502.20555
REFERENCES
[1] International Organization for Standardization, “ISO 11898-1:2024 Road vehicles — Controller area network (CAN) — Part 1: Data link layer and physical coding sublayer, Edition 3,” May 2024.
[2] K. Tindell, “CAN Injection: keyless car theft.” https://kentindell.github.io/2023/04/03/can-injection/, 2023. [Online; accessed 26-July-2024].
[3] Z. Palmer, “Thieves are now stealing cars via a headlight ’CAN injection’.” https://www.autoblog.com/2023/04/18/vehicle-headlight-can-bus-injection-theft-method-update, 2023. [Online; accessed 26-July-2024].
[4] “IEEE Standard for Ethernet - Amendment 5: Physical Layer Specifications and Management Parameters for 10 Mb/s Operation and Associated Power Delivery over a Single Balanced Pair of Conductors,” IEEE Std 802.3cg-2019 (Amendment to IEEE Std 802.3-2018 as amended by IEEE Std 802.3cb-2018, IEEE Std 802.3bt-2018, IEEE Std 802.3cd-2018, and IEEE Std 802.3cn-2019), pp. 1–256, 2020.
[5] “IEEE Standard for Local and metropolitan area networks-Media Access Control (MAC) Security,” IEEE Std 802.1AE-2018 (Revision of IEEE Std 802.1AE-2006), pp. 1–239, 2018.
[6] CAN in Automation (CiA) e.V., “CiA Draft Specification 610-1 CAN XL specifications and test plans — Part 1: Data link layer and physical coding sub-layer requirements — Version 1.0.0,” Mar 2022.
[7] CAN in Automation (CiA) e.V., “CiA Work Draft 613-2 CAN XL addon services Part 2: Security — Version 0.0.8,” Apr 2023.
[8] S. Woo, H. J. Jo, and D. H. Lee, “A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN,” IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 2, pp. 993–1006, 2015.
[9] A. Chowdhury, G. Karmakar, J. Kamruzzaman, A. Jolfaei, and R. Das, “Attacks on Self-Driving Cars and Their Countermeasures: A Survey,” IEEE Access, vol. 8, pp. 207308–207342, 2020.
[10] X. Sun, F. R. Yu, and P. Zhang, “A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs),” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 6240–6259, 2022.
[11] T. Zhang, H. Antunes, and S. Aggarwal, “Defending Connected Vehicles Against Malware: Challenges and a Solution Framework,” IEEE Internet of Things Journal, vol. 1, no. 1, pp. 10–21, 2014.
[12] R. Malekian, N. R. Moloisane, L. Nair, B. T. Maharaj, and U. A. K. Chude-Okonkwo, “Design and Implementation of a Wireless OBD II Fleet Management System,” IEEE Sensors Journal, vol. 17, no. 4, pp. 1154–1164, 2017.
[13] Z. Xiao, Y. Chen, M. Alazab, and H. Chen, “Trajectory Data Acqui- sition via Private Car Positioning Based on Tightly-coupled GPS/OBD Integration in Urban Environments,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 9680–9691, 2022.
[14] “Hostile Vehicle Mitigation (HVM).” https://www.npsa.gov.uk/hostile-vehicle-mitigation-hvm. accessed: 26-July-2024.
[15] W. Dai, “Crypto++ 5.6.0 benchmarks.” https://www.cryptopp.com/benchmarks.html, Mar 2009.
[16] L. Lamport, “Constructing digital signatures from a one way function,” SRI International, CSL-98, 1979.
[17] R. Anderson, F. Bergadano, B. Crispo, J.-H. Lee, C. Manifavas, and R. Needham, “A new family of authentication protocols,” SIGOPS Oper. Syst. Rev., vol. 32, p. 9–20, oct 1998.
[18] A. Perrig, R. Canetti, J. D. Tygar, and D. Song, “Efficient authentication and signing of multicast streams over lossy channels,” in Proc. 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp. 56–73, 2000.
[19] I. Fern´ andez-Hern´ andez, V. Rijmen, G. Seco-Granados, J. Simon, I. Rodr´ ıguez, and J. D. Calle, “A Navigation Message Authentication Proposal for the Galileo Open Service,” NAVIGATION, vol. 63, no. 1, pp. 85–102, 2016.
[20] B. Groza and S. Murvay, “Efficient Protocols for Secure Broadcast in Controller Area Networks,” IEEE Transactions on Industrial Informatics, vol. 9, no. 4, pp. 2034–2042, 2013.
[21] S. Cˆ amara, D. Anand, V. Pillitteri, and L. Carmo, “Multicast delayed authentication for streaming synchrophasor data in the smart grid,” in ICT Systems Security and Privacy Protection (J.-H. Hoepman and S. Katzenbeisser, eds.), (Cham), pp. 32–46, Springer International Publishing, 2016.
[22] K. Eledlebi, A. A. Alzubaidi, C. Y. Yeun, E. Damiani, V. Mateu, and Y. Al-Hammadi, “Enhanced inf-tesla protocol: A continuous connectivity and low overhead authentication protocol via iot devices,” IEEE Access, vol. 10, pp. 54912–54921, 2022.
[23] National Institute of Standards and Technology, “FIPS Publication 197 — Advanced Encryption Standard (AES), Updated May 9, 2023.” https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197-upd1.pdf, Nov 2001. [Online; accessed 26-July-2024].
[24] L. Gong, “Variations on the themes of message freshness and replay-or the difficulty in devising formal methods to analyze cryptographic protocols,” in Proc. Computer Security Foundations Workshop VI, pp. 131–136, 1993.
[25] M. R. Ansari, W. T. Miller, C. She, and Q. Yu, “A low-cost masquerade and replay attack detection method for can in automobiles,” in 2017 IEEE Int. Symposium on Circuits and Systems (ISCAS), pp. 1–4, 2017.
[26] A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, “Basic concepts and taxonomy of dependable and secure computing,” IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 11–33, 2004.
[27] P. Decker, “The 10 Mbit/s Domain and the Software-Defined Vehicle (SDV).” https://cdn.vector.com/cms/content/know-how/technical-articles/CAN 10Mbits Domain AutomobilElektronik202304 PressArticle EN.pdf, 2023. [Online; accessed 26-July-2024].
[28] M. J. Dworkin, “NIST Special Publication 800-38D — Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC.” https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf, 2007. [Online; accessed 26-July-2024].
[29] M. Shariat and W. Kastner, “Authenticated UWB-Based Positioning of Passive Drones,” in IEEE 19th International Conference on Factory Communication Systems (WFCS), pp. 1–8, 2023.
[30] G. Cena, S. Scanzio, and A. Valenzano, “Composite CAN XL-Ethernet Networks for Next-Gen Automotive and Automation Systems,” in IEEE 19th Int. Conf. on Factory Commun. Systems (WFCS), pp. 1–8, 2023.
[31] National Institute of Standards and Technology, “FIPS Publication 180-4— Secure Hash Standard (SHS).” https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.180-4.pdf, Aug 2015. [Online; accessed 26-July-2024].
[32] National Institute of Standards and Technology, “FIPS Publication 202 — SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions.” https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf, Aug 2015. [Online; accessed 26-July-2024].
5 Composite CAN XL-Ethernet Networks for Next-Gen Automotive and Automation Systems
Authors: Gianluca Cena, Stefano Scanzio, Adriano Valenzano
https://arxiv.org/pdf/2306.09498
REFERENCES
[1] International Organization for Standardization, “ISO 11898-1:2015 Road vehicles — Controller area network (CAN) — Part 1: Data link layer and physical signalling,” Dec 2015.
[2] BOSCH, “CAN with Flexible Data-Rate Specification Version 1.0,” Apr 2012, accessed: 2023-01-16. [Online]. Available: https://web.archive.org/web/20151211125301/http://www.bosch\protect\discretionary{\char\hyphenchar\font}{}{}semiconductors.de/media/ubk semiconductors/pdf 1/canliteratur/can fd spec.pdf
[3] CAN in Automation (CiA) e.V., “CiA Draft Specification 610-3 — CAN XL specifications and test plans — Part 3: Physical medium attachment sub-layer requirements — Version 1.0.0,” Mar 2022.
[4] ——, “CiA Draft Specification 610-1 CAN XL specifications and test plans — Part 1: Data link layer and physical coding sub-layer requirements — Version 1.0.0,” Mar 2022.
[5] S. Chen, J. Hu, Y. Shi, Y. Peng, J. Fang, R. Zhao, and L. Zhao, “Vehicle-to-Everything (v2x) Services Supported by LTE-Based Systems and 5G,” IEEE Commun. Stand. Mag., vol. 1, no. 2, pp. 70–76, 2017.
[6] R. I. Davis, A. Burns, R. J. Bril, and J. J. Lukkien, “Controller Area Network (CAN) schedulability analysis: Refuted, revisited and revised,” Real-Time Systems, vol. 35, no. 3, pp. 239–272, Apr. 2007.
[7] “IEEE Standard for Ethernet - Amendment 5: Physical Layer Specifications and Management Parameters for 10 Mb/s Operation and Associated Power Delivery over a Single Balanced Pair of Conductors,” IEEE Std 802.3cg-2019 (Amendment to IEEE Std 802.3-2018 as amended by IEEE Std 802.3cb-2018, IEEE Std 802.3bt-2018, IEEE Std 802.3cd-2018, and IEEE Std 802.3cn-2019), 2020.
[8] G. Cena and A. Valenzano, “On the properties of the flexible time division multiple access technique,” IEEE Transactions on Industrial Informatics, vol. 2, no. 2, pp. 86–94, 2006.
[9] G. Cena, S. Scanzio, A. Valenzano, and C. Zunino, “A Fair Access Mechanism to Support Fragmented Data Transfers in CAN,” in 2022 IEEE 18th International Conference on Factory Communication Systems (WFCS), Apr. 2022, pp. 1–8.
[10] “IEEE Standard for Local and Metropolitan Area Networks–Bridges and Bridged Networks,” IEEE Std 802.1Q-2022 (Revision of IEEE Std 802.1Q-2018), pp. 1–2163, 2022.
[11] International Organization for Standardization, “ISO 15765-2:2016 Road vehicles –— Diagnostic communication over Controller Area Network (DoCAN) –— Part 2: Transport protocol and network layer services,” Apr 2016.
[12] “IEEE Standard for Local and metropolitan area networks-Media Access Control (MAC) Security,” IEEE Std 802.1AE-2018 (Revision of IEEE Std 802.1AE-2006), pp. 1–239, 2018.
[13] D. Reinhardt, M. G¨ untner, M. Kucera, T. Waas, and W. K¨ uhnhauser, “Mapping CAN-to-Ethernet communication channels within virtualized embedded environments,” in 10th IEEE International Symposium on Industrial Embedded Systems (SIES), 2015, pp. 1–10.
[14] N. D. Zervas, A. Sousek, and P. Vrbka, “Designing a CAN-to-TSN Ethernet gateway,” in 17th international CAN Conference (iCC 2020), 2020, pp. 129–133, accessed: 2023-01-10. [Online]. Available: https://www.can-cia.org/fileadmin/resources/documents/proceedings/\2020 zervas sousek vrbka.pdf
[15] T. Adamson, “Hybridization of CAN and CAN FD networks,” in 15th international CAN Conference (iCC 2015), 2015, pp. 03–9—03–12, accessed: 2023-01-10. [Online]. Available: https://www.can-cia.org/fileadmin/resources/documents/proceedings/2015 adamson.pdf
[16] CAN in Automation (CiA) e.V., “CiA Draft Specification Proposal 611-1 — CAN XL higher-layer functions Part 1: Definition of service data unit types (SDT) — Version 1.0.0,” Oct 2022.
[17] G. Cena, I. C. Bertolotti, and A. Valenzano, “A socket interface for CAN devices,” Computer Standards & Interfaces, vol. 29, no. 6, pp. 662–673, Sep. 2007.
[18] O. Hartkopp, “The CAN networking subsystem of the Linux kernel,”
in 13th international CAN Conference (iCC 2012), 2012, pp. 05–10—05–16, accessed: 2023-01-10. [Online]. Available: https://www.can-cia.org/fileadmin/resources/documents/proceedings/2012 hartkopp.pdf
[19] ——, “Linux and ISO 15765-2 with CAN FD,” in 15th international CAN Conference (iCC 2015), 2015, pp. 05–1—05–7. [Online]. Available: https://www.can-cia.org/fileadmin/resources/documents/proceedings/2015 hartkopp.pdf
[20] D. Plummer, “Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware,” RFC 826 (Standard), Internet Engineering Task Force, Nov. 1982, updated by RFCs 5227, 5494. [Online]. Available: http://www.ietf.org/rfc/rfc826.txt
[21] G. Cena, I. Cibrario Bertolotti, T. Hu, and A. Valenzano, “Seamless integration of CAN in intranets,” Computer Standards & Interfaces, vol. 46, pp. 1–14, 2016.
[22] H. A. Mangut, A. Al-Nemrat, C. Benza¨ ıd, and A.-R. H. Tawil, “ARP Cache Poisoning Mitigation and Forensics Investigation,” in 2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1, 2015, pp. 1392–1397.
[23] G. Xie, H. Gong, Y. Han, S. Chakraborty, and W. Chang, “A Real-Time CAN-CAN Gateway with Tight Latency Analysis and Targeted Priority Assignment,” in 2020 IEEE Real-Time Systems Symposium (RTSS), 2020, pp. 141–152.