0
1

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?

CAN FD & CAN XL on arXiv references name order and related link

Posted at

CAN FD and CAN XL on arXiv
https://qiita.com/kaizen_nagoya/items/d8efb0da53cd3456f735

CAN FD & CAN XL on arXiv references
https://qiita.com/kaizen_nagoya/items/7df86c66084372a96f1d

CAN FD & CAN XL on arXiv references name order
https://qiita.com/kaizen_nagoya/items/ec5e4e4491228db534c0

Comparison of Classical CAN, CAN FD, and CAN XL and CAN XL
https://qiita.com/kaizen_nagoya/items/773835b2bf3cddd17dd8

Comparison of CAN XL & 10BASE-T1S Functionality on Layer 1 and Layer 2
https://qiita.com/kaizen_nagoya/items/13235743ba8d7193a53b

on: document number in this article
pn: paper number in these articles
rn: reference number in the papers
D: downloaded

on pn rn D title URL
1 2 26 “Aidinrobotics,” https://www.aidinrobotics.co.kr/smart-6-axis-f-t-sensor, accessed: 2025-05-14.
2 2 7 “Ati industrial automation,” https://www.ati-ia.com/, accessed: 2025-05-14.
3 2 29 “Bota systems,” https://www.botasys.com/, accessed: 2025-05-14.
4 4 14 “Hostile Vehicle Mitigation (HVM).” https://www.npsa.gov.uk/hostile-vehicle-mitigation-hvm. accessed: 26-July-2024. 802.3-2022 - IEEE Standard for Ethernet https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9844436
5 4 4 R “IEEE Standard for Ethernet - Amendment 5: Physical Layer Specifications and Management Parameters for 10 Mb/s Operation and Associated Power Delivery over a Single Balanced Pair of Conductors,” IEEE Std 802.3cg-2019 (Amendment to IEEE Std 802.3-2018 as amended by IEEE Std 802.3cb-2018, IEEE Std 802.3bt-2018, IEEE Std 802.3cd-2018, and IEEE Std 802.3cn-2019), pp. 1?256, 2020.
6 5 7 5 “IEEE Standard for Ethernet - Amendment 5: Physical Layer Specifications and Management Parameters for 10 Mb/s Operation and Associated Power Delivery over a Single Balanced Pair of Conductors,” IEEE Std 802.3cg-2019 (Amendment to IEEE Std 802.3-2018 as amended by IEEE Std 802.3cb-2018, IEEE Std 802.3bt-2018, IEEE Std 802.3cd-2018, and IEEE Std 802.3cn-2019), 2020.
7 4 5 “IEEE Standard for Local and metropolitan area networks-Media Access Control (MAC) Security,” IEEE Std 802.1AE-2018 (Revision of IEEE Std 802.1AE-2006), pp. 1?239, 2018.https://ieeexplore.ieee.org/document/8585421
8 5 12 6 “IEEE Standard for Local and metropolitan area networks-Media Access Control (MAC) Security,” IEEE Std 802.1AE-2018 (Revision of IEEE Std 802.1AE-2006), pp. 1?239, 2018.
9 5 10 “IEEE Standard for Local and Metropolitan Area Networks?Bridges and Bridged Networks,” IEEE Std 802.1Q-2022 (Revision of IEEE Std 802.1Q-2018), pp. 1?2163, 2022. https://ieeexplore.ieee.org/document/10004498
10 2 28 Q “Robotous - innovative robotic solutions,” http://www.robotous.com/ main, accessed: 2025-05-14. https://qiita.com/kaizen_nagoya/items/60790827ce409e1c150c
11 2 25 Q “Texas instruments application note(snoa930a),” https://www.ti.com/lit/an/snoa930a/snoa930a.pdf, accessed: 2025-05-14. https://qiita.com/kaizen_nagoya/items/60790827ce409e1c150c
12 1 0 Q A Miniature High-Resolution Tension Sensor Based on a Photo-Reflector for Robotic Hands and Grippers Authors: Hyun-Bin Kim, Kyung-Soo Kim https://arxiv.org/pdf/2507.00464 https://qiita.com/kaizen_nagoya/items/1a60ede80b076fa0c424
13 2 0 Q A Novel 6-axis Force/Torque Sensor Using Inductance Sensors, Hyun-Bin Kim, Kyung-Soo Kim https://arxiv.org/pdf/2505.09069 https://qiita.com/kaizen_nagoya/items/7df86c66084372a96f1d
14 3 8 Q A. Albert et al., “Comparison of event-triggered and time-triggered concepts with regard to distributed control systems,” Embedded world, vol. 2004, pp. 235?252, 2004. https://qiita.com/kaizen_nagoya/items/7b6354da4d30fc4fd076
15 2 27 Q A. Ananthanarayanan, S. Foong, and S. Kim, “A compact two dof magneto-elastomeric force sensor for a running quadruped,” in 2012 IEEE International Conference on Robotics and Automation, pp. 1398?1403. IEEE, 2012. https://qiita.com/kaizen_nagoya/items/94227bd61cb7d2cdb245
16 4 26 Q A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, “Basic concepts and taxonomy of dependable and secure computing,” IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 11?33, 2004. https://qiita.com/kaizen_nagoya/items/5063f3201df61afabf57
17 4 9 Q A. Chowdhury, G. Karmakar, J. Kamruzzaman, A. Jolfaei, and R. Das, “Attacks on Self-Driving Cars and Their Countermeasures: A Survey,” IEEE Access, vol. 8, pp. 207308?207342, 2020. https://qiita.com/kaizen_nagoya/items/2b8b2f602f013d693eea
18 4 18 A. Perrig, R. Canetti, J. D. Tygar, and D. Song, “Efficient authentication and signing of multicast streams over lossy channels,” in Proc. 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp. 56?73, 2000. https://qiita.com/kaizen_nagoya/items/af466cf20058d3c2febb
19 2 17 A. Tar and G. Cserey, “Development of a low cost 3d optical compliant tactile force sensor,” in 2011 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM), pp. 236?240. IEEE, 2011. https://qiita.com/kaizen_nagoya/items/87a9674017380309b5b7
20 3 49 B. Groza and P. Murvay, “Efficient intrusion detection with bloom filtering in controller area networks,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 4, pp. 1037?1051, 2019. https://qiita.com/kaizen_nagoya/items/31cd5696a42e81467664
21 3 35 B. Groza and S. Murvay, “Efficient protocols for secure broadcast in controller area networks,” IEEE Transactions on Industrial Informatics, vol. 9, no. 4, pp. 2034?2042, 2013. https://qiita.com/kaizen_nagoya/items/4d82241ec1c2fe2cd80c
22 4 20 21 B. Groza and S. Murvay, “Efficient Protocols for Secure Broadcast in Controller Area Networks,” IEEE Transactions on Industrial Informatics, vol. 9, no. 4, pp. 2034?2042, 2013.
23 1 23 D B. Lee, K.-S. Kim, and Y. Cho, “Real-time adaptive cancellation of tens feedback artifact on semg for prosthesis closed-loop control,” Frontiers in Bioengineering and Biotechnology, vol. 12, p. 1492588, 2024. https://qiita.com/kaizen_nagoya/items/e93b841807946833747c
24 5 2 BOSCH, “CAN with Flexible Data-Rate Specification Version 1.0,” Apr 2012, accessed: 2023-01-16. https://web.archive.org/web/20151211125301/http://www.bosch-semiconductors.de/media/ubk_semiconductors/pdf_1/canliteratur/can_fd_spec.pdf https://qiita.com/kaizen_nagoya/items/9840ad73cf2420f1441f
25 1 3 C. Ding, Y. Han, W. Du, J. Wu, and Z. Xiong, “In situ calibration of sixaxis force-torque sensors for industrial robots with tilting base,” IEEE Transactions on Robotics, vol. 38, no. 4, pp. 2308?2321, 2021. https://qiita.com/kaizen_nagoya/items/207f30a8d5ceef25f521
26 3 18 C. Lin and A. Sangiovanni-Vincentelli, “Cyber-security for the controller area network (can) communication protocol,” in 2012 International Conference on Cyber Security, 2012, pp. 1?7. https://qiita.com/kaizen_nagoya/items/0935deff27b611d952e1
27 3 48 C. Lin, Q. Zhu, and A. Sangiovanni-Vincentelli, “Security-aware modeling and efficient mapping for can-based real-time distributed automotive systems,” IEEE Embedded Systems Letters, vol. 7, no. 1, pp. 11?14, 2015. https://qiita.com/kaizen_nagoya/items/e6a7e88dbf219ef1799a
28 1 10 C. Zhao, M. Liu, X. Huang, Y. Ma, B. Zhang, H. Li, Q. Huang, and Z. Jiang, “Adaptive and dexterous tendon-driven underactuated finger design with a predefined elastic force gradient,” IEEE/ASME Transactions on Mechatronics, vol. 29, no. 3, pp. 1622?1633, 2023. https://qiita.com/kaizen_nagoya/items/7e5267c11086986e5a66
29 5 4 CAN in Automation (CiA) , “CiA Draft Specification 610-1 CAN XL specifications and test plans — Part 1: Data link layer and physical coding sub-layer requirements — Version 1.0.0,” Mar 2022.. Available: https://web.archive.org/web/20151211125301/http://www.bosch\protect\discretionary{\char\hyphenchar\font}{}{}semiconductors.de/media/ubk semiconductors/pdf 1/canliteratur/can fd spec.pdf
30 4 6 29 CAN in Automation (CiA) e.V., “CiA Draft Specification 610-1 CAN XL specifications and test plans — Part 1: Data link layer and physical coding sub-layer requirements — Version 1.0.0,” Mar 2022.
31 5 3 CAN in Automation (CiA) e.V., “CiA Draft Specification 610-3 — CAN XL specifications and test plans — Part 3: Physical medium attachment sub-layer requirements — Version 1.0.0,” Mar 2022.
32 5 16 CAN in Automation (CiA) e.V., “CiA Draft Specification Proposal 611-1 — CAN XL higher-layer functions Part 1: Definition of service data unit types (SDT) — Version 1.0.0,” Oct 2022.
33 4 7 CAN in Automation (CiA) e.V., “CiA Work Draft 613-2 CAN XL addon services Part 2: Security — Version 0.0.8,” Apr 2023.
34 5 0 Composite CAN XL-Ethernet Networks for Next-Gen Automotive and Automation Systems, Gianluca Cena, Stefano Scanzio, Adriano Valenzano https://arxiv.org/pdf/2306.09498 https://qiita.com/kaizen_nagoya/items/c526d94337dbd149df80
35 3 26 D. J. Bernstein, “Curve25519: New diffie-hellman speed records,” in Public Key Cryptography - PKC 2006, M. Yung, Y. Dodis, A. Kiayias, and T. Malkin, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006, pp. 207?228. https://qiita.com/kaizen_nagoya/items/28c5205e7c0dc697bfa5
36 3 39 D. Jang, S. Han, S. Kang, and J. Choi, “Communication channel modeling of controller area network (can),” in 2015 Seventh International Conference on Ubiquitous and Future Networks, 2015, pp. 86?88. https://qiita.com/kaizen_nagoya/items/583bc47b6b87b38f35cb
37 5 20 D. Plummer, “Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware,” RFC 826 (Standard), Internet Engineering Task Force, Nov. 1982, updated by RFCs 5227, 5494. [Online[. Available: http://www.ietf.org/rfc/rfc826.txt https://qiita.com/kaizen_nagoya/items/40faa1d8d723ef3db28b
38 5 13 D. Reinhardt, M. G¨ untner, M. Kucera, T. Waas, and W. K¨ uhnhauser, “Mapping CAN-to-Ethernet communication channels within virtualized embedded environments,” in 10th IEEE International Symposium on Industrial Embedded Systems (SIES), 2015, pp. 1?10. https://qiita.com/kaizen_nagoya/items/bf6e0f80fc7db16db716
39 1 2 E. Shahriari, P. Svarny, S. A. B. Birjandi, M. Hoffmann, and S. Haddadin, “Path-constrained haptic motion guidance via adaptive phasebased admittance control,” IEEE Transactions on Robotics, 2024.
40 3 0 EXT-TAURUM P2T: an Extended Secure CAN-FD Architecture for Road Vehicles, Franco Oberti, Alessandro Savino, Ernesto Sanchez, Filippo Parisi, Stefano Di Carlo https://arxiv.org/pdf/2112.08162
41 3 31 F. Hartwich and R. P. Bosch, “Can with flexible data-rate,” 2012.
42 3 15 F. Kluge, C. Yu, J. Mische, S. Uhrig, and T. Ungerer, “Implementing autosar scheduling and resource management on an embedded smt pro- cessor,” in Proceedings of th 12th International Workshop on Software and Compilers for Embedded Systems, 2009, pp. 33?42.
43 3 7 F. Oberti, “Mitigation of automotive control modules hardware replacement-based attacks through hardware signature,” in 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S), 2021, pp. 13?14.
44 3 6 F. Oberti, E. Sanchez, A. Savino, F. Parisi, and S. Di Carlo, “Taurum p2t: Advanced secure can-fd architecture for road vehicle,” in 2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design (IOLTS). IEEE, 2021, pp. 1?7.
45 3 52 F. Stellari, P. Song, A. J. Weger, J. Culp, A. Herbert, and D. Pfeiffer, “Verification of untrusted chips using trusted layout and emission measurements,” in 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2014, pp. 19?24.
46 1 6 F. Voigt, A. Naceri, and S. Haddadin, “Learning wrist policies for anthropomorphic soft power grasping in handle and door manipulation,” IEEE Transactions on Robotics, 2025.
47 2 23 F. W. Grover, Inductance calculations: working formulas and tables. Courier Corporation, 2004.
48 5 8 G. Cena and A. Valenzano, “On the properties of the flexible time division multiple access technique,” IEEE Transactions on Industrial Informatics, vol. 2, no. 2, pp. 86?94, 2006.
49 5 17 G. Cena, I. C. Bertolotti, and A. Valenzano, “A socket interface for CAN devices,” Computer Standards & Interfaces, vol. 29, no. 6, pp. 662?673, Sep. 2007.
50 5 21 G. Cena, I. Cibrario Bertolotti, T. Hu, and A. Valenzano, “Seamless integration of CAN in intranets,” Computer Standards & Interfaces, vol. 46, pp. 1?14, 2016.
51 5 9 G. Cena, S. Scanzio, A. Valenzano, and C. Zunino, “A Fair Access Mechanism to Support Fragmented Data Transfers in CAN,” in 2022 IEEE 18th International Conference on Factory Communication Systems (WFCS), Apr. 2022, pp. 1?8.
52 4 30 G. Cena, S. Scanzio, and A. Valenzano, “Composite CAN XL-Ethernet Networks for Next-Gen Automotive and Automation Systems,” in IEEE 19th Int. Conf. on Factory Commun. Systems (WFCS), pp. 1?8, 2023.
53 3 28 G. Macher, C. Schmittner, O. Veledar, and E. Brenner, ISO/SAE DIS 21434 Automotive Cybersecurity Standard - In a Nutshell, 09 2020, pp. 123?135.
54 3 29 G. Macher, H. Sporer, R. Berlach, E. Armengaud, and C. Kreiner, “Sahara: A security-aware hazard and risk analysis method,” in 2015 Design, Automation Test in Europe Conference Exhibition (DATE), 2015, pp. 621?624.
55 2 15 G. Palli and S. Pirozzi, “An optical torque sensor for robotic applications,” International Journal of Optomechatronics, vol. 7, no. 4, pp. 263?282, 2013.
56 2 4 G. Valsecchi, R. Grandia, and M. Hutter, “Quadrupedal locomotion on uneven terrain with sensorized feet,” IEEE Robotics and Automation Letters, vol. 5, no. 2, pp. 1548?1555, 2020.
57 5 23 G. Xie, H. Gong, Y. Han, S. Chakraborty, and W. Chang, “A Real-Time CAN-CAN Gateway with Tight Latency Analysis and Targeted Priority Assignment,” in 2020 IEEE Real-Time Systems Symposium (RTSS), 2020, pp. 141?152.
58 5 22 H. A. Mangut, A. Al-Nemrat, C. Benza¨ ?d, and A.-R. H. Tawil, “ARP Cache Poisoning Mitigation and Forensics Investigation,” in 2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1, 2015, pp. 1392?1397.
59 3 55 H. Aydin, R. Melhem, D. Mosse, and P. Mejia-Alvarez, “Power-aware scheduling for periodic real-time tasks,” IEEE Transactions on Computers, vol. 53, no. 5, pp. 584?600, 2004.
60 3 40 H. Chen and J. Tian, “Research on the controller area network,” in 2009 International Conference on Networking and Digital Society, vol. 2, 2009, pp. 251?254.
61 3 19 H. Kang, Y. Hori, and A. Satoh, “Performance evaluation of the first commercial puf-embedded rfid,” in The 1st IEEE Global Conference on Consumer Electronics 2012, 2012, pp. 5?8.
62 3 38 H. Nicanfar and V. C. M. Leung, “Multilayer consensus ecc-based password authenticated key-exchange (mcepak) protocol for smart grid system,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 253?264, 2013.
63 1 16 H.-B. Kim, B.-I. Ham, K.-H. Choi, and K.-S. Kim, “Parameter optimization of optical six-axis force/torque sensor for legged robots,” arXiv preprint arXiv:2502.07196, 2025.
64 1 18 H.-B. Kim, K.-H. Choi, and K.-S. Kim, “A compact optical six-axis force/torque sensor for legged robots using a polymorphic calibration method,” arXiv preprint arXiv:2309.04720, 2023.
65 1 15 H.-B. Kim, K.-H. Choi, and K.-S. Kim, “A compact six-axis force/torque sensor using photocouplers for impact robustness,” Review of Scientific Instruments, vol. 95, no. 4, 2024.
66 2 18 65 H.-B. Kim, K.-H. Choi, and K.-S. Kim, “A compact six-axis force/torque sensor using photocouplers for impact robustness,” Review of Scientific Instruments, vol. 95, no. 4, 2024.
67 1 17 H.-B. Kim, S. Lee, B.-I. Ham, K.-H. Choi, and K.-S. Kim, “Temperature compensation method for a six-axis force/torque sensor using a gated recurrent unit,” IEEE Sensors Journal, 2025.
68 2 22 H.-P. Wang, J.-G. Dai, and X.-Z. Wang, “Improved temperature com- pensation of fiber bragg grating-based sensors applied to structures under different loading conditions,” Optical Fiber Technology, vol. 63, p. 102506, 2021.
69 4 19 I. Fern´ andez-Hern´ andez, V. Rijmen, G. Seco-Granados, J. Simon, I. Rodr´ ?guez, and J. D. Calle, “A Navigation Message Authentication Proposal for the Galileo Open Service,” NAVIGATION, vol. 63, no. 1, pp. 85?102, 2016.
70 1 5 I. Radosavovic, T. Xiao, B. Zhang, T. Darrell, J. Malik, and K. Sreenath, “Real-world humanoid locomotion with reinforcement learning,” Science Robotics, vol. 9, no. 89, p. eadi9579, 2024.
71 3 32 I. S. for Information technology ISO, “Iso/iec/ieee international standard for information technology ? telecommunications and information exchange between systems ? local and metropolitan area networks ? part 1ae: Media access control (mac) security - amendment 1: Galois counter model ? advanced encryption standard-256 (gcmaes-256) cipher suite,” ISO/IEC/ IEEE 8802-1AE First edition 2013-12-01 AMENDMENT 1 2015-05-01, pp. 1?57, 2015.
72 5 1 73 International Organization for Standardization, “ISO 11898-1:2015 Road vehicles — Controller area network (CAN) — Part 1: Data link layer and physical signalling,” Dec 2015.
73 4 1 International Organization for Standardization, “ISO 11898-1:2024 Road vehicles — Controller area network (CAN) — Part 1: Data link layer and physical coding sublayer, Edition 3,” May 2024.
74 5 11 International Organization for Standardization, “ISO 15765-2:2016 Road vehicles ?— Diagnostic communication over Controller Area Network (DoCAN) ?— Part 2: Transport protocol and network layer services,” Apr 2016.
75 3 27 Intrepid Control Systems, Inc, “neovi fire 2 user guide,” 2021. [Online. Available: URL:https://cdn.intrepidcs.net/guides/neovifire2/neovi_fire2ug.pdf
76 3 14 ISO - International Organization for Standardization, “Iso 17356-2 road vehicles — open interface for embedded automotive applications — part 2: Osek/vdx specifications for binding os, com and nm,” 2005. [Online. Available: https://www.iso.org/standard/33007.html
77 2 6 J. Chen, Z.-Y. Dong, S. Shi, Y. Wei, X. Yu, and L. Ou, “Adaptive-constrained admittance control for physical human?robot interaction,” Transactions of the Institute of Measurement and Control, p. 01423312241298351, 2025.
78 2 1 J. Di Carlo, P. M. Wensing, B. Katz, G. Bledt, and S. Kim, “Dynamic locomotion in the mit cheetah 3 through convex model-predictive control,” in 2018 IEEE/RSJ international conference on intelligent robots and systems (IROS), pp. 1?9. IEEE, 2018.
79 1 12 J. G. da Silva, A. A. de Carvalho, and D. D. da Silva, “A strain gauge tactile sensor for finger-mounted applications,” IEEE Transactions on Instrumentation and measurement, vol. 51, no. 1, pp. 18?22, 2002.
80 2 3 J. Kang, H. Kim, and K.-S. Kim, “View: Visual-inertial external wrench estimator for legged robot,” IEEE Robotics and Automation Letters, vol. 8, no. 12, pp. 8366?8373, 2023.
81 3 41 J. Liu, S. Zhang, W. Sun, and Y. Shi, “In-vehicle network attacks and countermeasures: Challenges and future directions,” IEEE Network, vol. 31, no. 5, pp. 50?58, 2017.
82 1 13 J. Qu, Q. Wu, T. Clancy, Q. Fan, X. Wang, and X. Liu, “3d-printed straingauge micro force sensors,” IEEE Sensors Journal, vol. 20, no. 13, pp.6971?6978, 2020.
83 2 8 J.-H. Kim, “Multi-axis force-torque sensors for measuring zero-moment point in humanoid robots: A review,” IEEE Sensors Journal, vol. 20, no. 3, pp. 1126?1141, 2019.
84 4 22 K. Eledlebi, A. A. Alzubaidi, C. Y. Yeun, E. Damiani, V. Mateu, and Y. Al-Hammadi, “Enhanced inf-tesla protocol: A continuous connectivity and low overhead authentication protocol via iot devices,” IEEE Access, vol. 10, pp. 54912?54921, 2022.
85 3 22 K. Juretus and I. Savidis, “Increased output corruption and structural attack resilience for sat attack secure logic locking,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 40, no. 1, pp. 38?51, 2021.
86 3 33 K. Kang, Y. Baek, S. Lee, and S. H. Son, “Lightweight authentication method for controller area network,” in 2016 IEEE 22nd International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), 2016, pp. 101?101.
87 56 K. Kinkai, T. Baba, H. Jutori, K. Ootsu, T. Ohkawa, and T. Yokota, “Comparative study of path prediction method for speculative loop execution,” in 2012 Third International Conference on Networking andComputing, 2012, pp. 283?287.
88 4 2 K. Tindell, “CAN Injection: keyless car theft.” https://kentindell.github.io/2023/04/03/can-injection/, 2023. [Online; accessed 26-July-2024
89 4 24 L. Gong, “Variations on the themes of message freshness and replay-or the difficulty in devising formal methods to analyze cryptographic protocols,” in Proc. Computer Security Foundations Workshop VI, pp. 131?136, 1993.
90 4 16 L. Lamport, “Constructing digital signatures from a one way function,” SRI International, CSL-98, 1979.
91 2 21 L. Xiong, Y. Guo, G. Jiang, X. Zhou, L. Jiang, and H. Liu, “Six-dimensional force/torque sensor based on fiber bragg gratings with low coupling,” IEEE Transactions on Industrial Electronics, vol. 68, no. 5, pp. 4079?4089, 2020.
92 3 54 M. B. Bahador, M. Abadi, and A. Tajoddin, “Hpcmalhunter: Behavioral malware detection using hardware performance counters and singular value decomposition,” in 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE), 2014, pp. 703?708.
93 3 44 M. Barranco, J. Proenza, and L. Almeida, “Quantitative comparison of the error-containment capabilities of a bus and a star topology in can networks,” IEEE Transactions on Industrial Electronics, vol. 58, no. 3, pp. 802?813, 2011.
94 3 4 M. Bozdal, M. Samie, S. Aslam, and I. Jennions, “Evaluation of can bus security challenges,” Sensors, vol. 20, no. 8, p. 2364, 2020.
95 4 28 M. J. Dworkin, “NIST Special Publication 800-38D — Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC.” https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf, 2007. [Online; accessed 26-July-2024
96 3 53 M. Majzoobi and F. Koushanfar, “Time-bounded authentication of fpgas,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1123?1135, 2011.
97 3 12 M. Marchetti and D. Stabili, “Anomaly detection of can bus messages through analysis of id sequences,” in 2017 IEEE Intelligent Vehicles Symposium (IV), 2017, pp. 1577?1583.
98 3 42 M. Marchetti and D. Stabili, “Anomaly detection of can bus messages through analysis of id sequences,” in 2017 IEEE Intelligent Vehicles Symposium (IV), 2017, pp. 1577?1583.
99 1 21 M. Pu, Q. Luo, Q. Liang, and J. Zhang, “Modeling for elastomer displacement analysis of capacitive six-axis force/torque sensor,” IEEE Sensors Journal, vol. 22, no. 2, pp. 1356?1365, 2021.
100 2 11 M. Pu, Q. Luo, Q. Liang, and J. Zhang, “Modeling for elastomer displacement analysis of capacitive six-axis force/torque sensor,” IEEE Sensors Journal, vol. 22, no. 2, pp. 1356?1365, 2021.
101 4 25 M. R. Ansari, W. T. Miller, C. She, and Q. Yu, “A low-cost masquerade and replay attack detection method for can in automobiles,” in 2017 IEEE Int. Symposium on Circuits and Systems (ISCAS), pp. 1?4, 2017.
102 3 16 M. S. U. Alam, S. Iqbal, M. Zulkernine, and C. Liem, “Securing vehicle ecu communications and stored data,” in ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019, pp. 1?6.
103 4 29 M. Shariat and W. Kastner, “Authenticated UWB-Based Positioning of Passive Drones,” in IEEE 19th International Conference on Factory Communication Systems (WFCS), pp. 1?8, 2023.
104 3 9 M. U. Farooq, M. Waseem, A. Khairi, and S. Mazhar, “A critical analysis on the security concerns of internet of things (iot),” International Journal of Computer Applications, vol. 111, no. 7, 2015.
105 3 21 M. Yasin, J. J. Rajendran, O. Sinanoglu, and R. Karri, “On improving the security of logic locking,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 35, no. 9, pp. 1411?1424, 2016.
106 5 14 N. D. Zervas, A. Sousek, and P. Vrbka, “Designing a CAN-to-TSN Ethernet gateway,” in 17th international CAN Conference (iCC 2020), 2020, pp. 129?133, accessed: 2023-01-10. [Online[. Available: https://www.can-cia.org/fileadmin/resources/documents/proceedings/\2020 zervas sousek vrbka.pdf
107 3 25 N. Koblitz, A. Menezes, and S. Vanstone, “Guide to elliptic curve cryptography,” 2004.
108 3 11 N. Nowdehi, A. Lautenbach, and T. Olovsson, “In-vehicle can message authentication: An evaluation based on industrial criteria,” in 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 2017, pp. 1?7.
109 1 1 N. Zhang, P. Zhou, X. Yang, F. Shen, J. Ren, T. Hou, L. Dong, R. Bian, D. Wang, G. Gu et al., “Biomimetic rigid-soft finger design for highly dexterous and adaptive robotic hands,” Science Advances, vol. 11, no. 17, p. eadu2018, 2025.
110 4 31 National Institute of Standards and Technology, “FIPS Publication 180-4— Secure Hash Standard (SHS).” https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.180-4.pdf, Aug 2015. [Online; accessed 26-July-2024
111 4 23 National Institute of Standards and Technology, “FIPS Publication 197 — Advanced Encryption Standard (AES), Updated May 9, 2023.” https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197-upd1.pdf, Nov 2001. [Online; accessed 26-July-2024
112 4 32 National Institute of Standards and Technology, “FIPS Publication 202 — SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions.” https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf, Aug 2015. [Online; accessed 26-July-2024
113 3 24 Network Working Group, “The aes-cbc cipher algorithm and its use with ipsec,” 2021. [Online. Available: https://tools.ietf.org/html/rfc3602
114 3 10 Network Working Group, “The aes-cmac algorithm,” 2021. [Online. Available: https://tools.ietf.org/html/rfc4493.html .
115 2 16 O. Al-Mai, M. Ahmadi, and J. Albert, “Design, development and calibration of a lightweight, compliant six-axis optical force/torque sensor,” IEEE Sensors Journal, vol. 18, no. 17, pp. 7005?7014, 2018. .
116 5 19 O. Hartkopp, “Linux and ISO 15765-2 with CAN FD,” in 15th international CAN Conference (iCC 2015), 2015, pp. 05?1—05?7. [Online[. Available: https://www.can-cia.org/fileadmin/resources/documents/proceedings/2015 hartkopp.pdf
117 5 18 O. Hartkopp, “The CAN networking subsystem of the Linux kernel,”in 13th international CAN Conference (iCC 2012), 2012, pp. 05?10—05?16, accessed: 2023-01-10. [Online. Available: https://www.can-cia.org/fileadmin/resources/documents/proceedings/2012 hartkopp.pdf
118 2 9 P. Billeschou, C. Albertsen, J. C. Larsen, and P. Manoonpong, “A low-cost, compact, sealed, three-axis force/torque sensor for walking robots,” IEEE Sensors Journal, vol. 21, no. 7, pp. 8916?8926, 2021.
119 4 27 P. Decker, “The 10 Mbit/s Domain and the Software-Defined Vehicle (SDV).” https://cdn.vector.com/cms/content/know-how/technical-articles/CAN 10Mbits Domain AutomobilElektronik202304 PressArticle EN.pdf, 2023. [Online; accessed 26-July-2024
120 3 51 P. Koppermann, F. De Santis, J. Heyszl, and G. Sigl, “Low-latency x25519 hardware implementation: breaking the 100 microseconds barrier,” Microprocessors and Microsystems, vol. 52, pp. 491?497, 2017. [Online. Available: https://www.sciencedirect.com/science/article/pii/S0141933117300273
121 3 47 P. M. Yomsi, D. Bertrand, N. Navet, and R. I. Davis, “Controller area network (can): Response time analysis with offsets,” in 2012 9th IEEE International Workshop on Factory Communication Systems, 2012, pp.43?52.
122 3 45 P. Mart´ ?, A. Camacho, M. Velasco, and M. E. M. Ben Gaid, “Runtime allocation of optional control jobs to a set of can-based networked control systems,” IEEE Transactions on Industrial Informatics, vol. 6, no. 4, pp. 503?520, 2010.
123 3 37 P. Murvay and B. Groza, “Source identification using signal characteristics in controller area networks,” IEEE Signal Processing Letters, vol. 21, no. 4, pp. 395?399, 2014.
124 3 50 P. Nuzzo, N. Bajaj, M. Masin, D. Kirov, R. Passerone, and A. L. Sangiovanni-Vincentelli, “Optimized selection of reliable and cost-effective safety-critical system architectures,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, no. 10, pp. 2109?2123, 2020.
125 2 12 Q. Luo, Q. Liang, J. Zhang, R. Zhao, Z. Ai, and M. Pu, “Parameters optimization for a capacitive six-axis force/torque sensor by using analytical method,” IEEE Sensors Journal, vol. 22, no. 22, pp. 21 735?21 744, 2022.
126 4 17 R. Anderson, F. Bergadano, B. Crispo, J.-H. Lee, C. Manifavas, and R. Needham, “A new family of authentication protocols,” SIGOPS Oper. Syst. Rev., vol. 32, p. 9?20, oct 1998.
127 3 30 R. G. Dutta, F. Yu, T. Zhang, Y. Hu, and Y. Jin, “Security for safety: A path toward building trusted autonomous vehicles,” in 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2018, pp. 1?6.
128 5 6 R. I. Davis, A. Burns, R. J. Bril, and J. J. Lukkien, “Controller Area Network (CAN) schedulability analysis: Refuted, revisited and revised,” Real-Time Systems, vol. 35, no. 3, pp. 239?272, Apr. 2007.
129 3 36 R. I. Davis, S. Kollmann, V. Pollex, and F. Slomka, “Controller area network (can) schedulability analysis with fifo queues,” in 2011 23rd Euromicro Conference on Real-Time Systems, 2011, pp. 45?56.
130 4 12 R. Malekian, N. R. Moloisane, L. Nair, B. T. Maharaj, and U. A. K. Chude-Okonkwo, “Design and Implementation of a Wireless OBD II Fleet Management System,” IEEE Sensors Journal, vol. 17, no. 4, pp. 1154?1164, 2017.
131 3 17 R. R.V. and K. A., “Secure boot of embedded applications - a review,” in 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), 2018, pp. 291?298.
132 3 20 R. Soga and H. Kang, “Physical unclonable function using carbon resistor,” in 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE), 2020, pp. 559?561.
133 4 0 Robust Multicast Origin Authentication in MACsec and CANsec for Automotive Scenarios, Gianluca Cena, Lucia Seno, Stefano Scanzio https://arxiv.org/pdf/2502.20555
134 4 21 S. C? amara, D. Anand, V. Pillitteri, and L. Carmo, “Multicast delayed authentication for streaming synchrophasor data in the smart grid,” in ICT Systems Security and Privacy Protection (J.-H. Hoepman and S. Katzenbeisser, eds.), (Cham), pp. 32?46, Springer International Publishing, 2016.
135 5 5 S. Chen, J. Hu, Y. Shi, Y. Peng, J. Fang, R. Zhao, and L. Zhao, “Vehicle-to-Everything (v2x) Services Supported by LTE-Based Systems and 5G,” IEEE Commun. Stand. Mag., vol. 1, no. 2, pp. 70?76, 2017. .
136 2 2 S. Choi, G. Ji, J. Park, H. Kim, J. Mun, J. H. Lee, and J. Hwangbo, “Learning quadrupedal locomotion on deformable terrain,” Science Robotics, vol. 8, no. 74, p. eade2256, 2023.
137 1 22 S. H. Jeong, H. J. Lee, K.-R. Kim, and K.-S. Kim, “Design of a miniature force sensor based on photointerrupter for robotic hand,” Sensors and Actuators A: Physical, vol. 269, pp. 444?453, 2018.
138 2 20 S. H. Jeong, H. J. Lee, K.-R. Kim, and K.-S. Kim, “Design of a miniature force sensor based on photointerrupter for robotic hand,” Sensors and Actuators A: Physical, vol. 269, pp. 444?453, 2018.
139 2 19 S. Jeong, Y. Chitalia, and J. P. Desai, “Miniature force sensor based on dual-photointerrupter with high linearity and disturbance compensation,” IEEE Sensors Journal, vol. 20, no. 11, pp. 5855?5864, 2020. .
140 2 24 S. S. Mohan, M. del Mar Hershenson, S. P. Boyd, and T. H. Lee, “Simple accurate expressions for planar spiral inductances,” IEEE Journal of solid-state circuits, vol. 34, no. 10, pp. 1419?1424, 1999. .
141 4 8 S. Woo, H. J. Jo, and D. H. Lee, “A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN,” IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 2, pp. 993?1006, 2015.
142 3 34 S. Woo, H. J. Jo, I. S. Kim, and D. H. Lee, “A practical security architecture for in-vehicle can-fd,” IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 8, pp. 2248?2261, 2016.
143 5 15 T. Adamson, “Hybridization of CAN and CAN FD networks,” in 15th international CAN Conference (iCC 2015), 2015, pp. 03?9—03?12, accessed: 2023-01-10. [Online[. Available: https://www.can-cia.org/fileadmin/resources/documents/proceedings/2015 adamson.pdf .
144 3 5 T. Nguyen, B. M. Cheon, and J. W. Jeon, “Can fd performance analysis for ecu re-programming using the canoe,” in The 18th IEEE International Symposium on Consumer Electronics (ISCE 2014), 2014, pp. 1?4. .
145 3 23 T. Thangam, G. Gayathri, and T. Madhubala, “A novel logic locking technique for hardware security,” in 2017 IEEE International Conference on Electrical, Instrumentation and Communication Engineering (ICEICE), 2017, pp. 1?7.
146 4 11 T. Zhang, H. Antunes, and S. Aggarwal, “Defending Connected Vehicles Against Malware: Challenges and a Solution Framework,” IEEE Internet of Things Journal, vol. 1, no. 1, pp. 10?21, 2014.
147 2 10 U. Kim, D.-H. Lee, Y. B. Kim, D.-Y. Seok, and H. R. Choi, “A novel six-axis force/torque sensor for robotic applications,” IEEE/ASME Transactions on mechatronics, vol. 22, no. 3, pp. 1381?1391, 2016.
148 1 4 U. Kim, G. Jo, H. Jeong, C. H. Park, J.-S. Koh, D. I. Park, H. Do, T. Choi, H.-S. Kim, and C. Park, “A novel intrinsic force sensing method for robot manipulators during human?robot interaction,” IEEE Transactions on Robotics, vol. 37, no. 6, pp. 2218?2225, 2021.
149 2 13 U. Kim, Y. B. Kim, D.-Y. Seok, J. So, and H. R. Choi, “A surgical palpation probe with 6-axis force/torque sensing capability for minimally invasive surgery,” IEEE Transactions on Industrial Electronics, vol. 65, no. 3, pp. 2755?2765, 2017.
150 2 14 U. Kim, Y. B. Kim, J. So, D.-Y. Seok, and H. R. Choi, “Sensorized surgical forceps for robotic-assisted minimally invasive surgery,” IEEE Transactions on Industrial Electronics, vol. 65, no. 12, pp. 9604?9613, 2018.
151 3 3 UN Economic Commission for Europe, “Un regulation no. 156 - software update and software update management system,” 2021. [Online. Available: https://unece.org/transport/documents/2021/03/standards/un-regulation-no-156-software-update-and-software-update
152 3 1 UN Economic Commission for Europe, “Unece world forum for harmonization of vehicle regulations (wp.29),” 2021. [Online. Available: https://unece.org/wp29-introduction
153 3 2 UN Economic Commission for Europe,“Un regulation no. 155 - cyber security and cyber security management system,” 2021. [Online. Available: https://unece.org/transport/documents/2021/03/standards/un-regulation-no-155-cyber-security-and-cyber-security
154 3 46 W. Choi, H. J. Jo, S. Woo, J. Y. Chun, J. Park, and D. H. Lee, “Identifying ecus using inimitable characteristics of signals in controller area networks,” IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 4757?4770, 2018.
155 4 15 W. Dai, “Crypto++ 5.6.0 benchmarks.” https://www.cryptopp.com/benchmarks.html, Mar 2009.
156 1 9 W. Zuo, G. Song, and Z. Chen, “Grasping force control of robotic gripper with high stiffness,” IEEE/ASME Transactions on Mechatronics, vol. 27, no. 2, pp. 1105?1116, 2021.
157 1 8 X. Liu, W. Yang, F. Meng, and T. Sun, “Material recognition using robotic hand with capacitive tactile sensor array and machine learning,” IEEE Transactions on Instrumentation and Measurement, 2024.
158 4 10 X. Sun, F. R. Yu, and P. Zhang, “A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs),” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 6240?6259, 2022.
159 1 11 Y. Cho, Y. Lee, P. Kim, S. Jeong, and K.-S. Kim, “The msc prosthetic hand: Rapid, powerful, and intuitive,” IEEE Robotics and Automation Letters, vol. 7, no. 2, pp. 3170?3177, 2022.
160 1 20 Y. J. Shin, H. J. Lee, K.-S. Kim, and S. Kim, “A robot finger design using a dual-mode twisting mechanism to achieve high-speed motion and large grasping force,” IEEE Transactions on Robotics, vol. 28, no. 6, pp.1398?1405, 2012.
161 2 5 Y. Liu, S. Liu, B. Chen, Z.-X. Yang, and S. Xu, “Fusion-perception-to-action transformer: Enhancing robotic manipulation with 3d visual fusion attention and proprioception,” IEEE Transactions on Robotics, 2025.
162 1 19 Y. Noh, J. Bimbo, S. Sareh, H. Wurdemann, J. Fra´ s, D. S. Chathuranga, H. Liu, J. Housden, K. Althoefer, and K. Rhode, “Multi-axis force/torque sensor based on simply-supported beam and optoelectronics,” Sensors, vol. 16, no. 11, p. 1936, 2016.
163 1 14 Y. Wei and Q. Xu, “An overview of micro-force sensing techniques,” Sensors and Actuators A: Physical, vol. 234, pp. 359?374, 2015.
164 3 13 Y. Xiao, H.-H. Chen, R. Wang, and S. Sethi, “Mac security and security overhead analysis in the ieee 802.15.4 wireless sensor networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2006, 04 2006.
165 3 43 Y. Zhang, M. Chen, N. Guizani, D. Wu, and V. C. M. Leung, “Sovcan: Safety-oriented vehicular controller area network,” IEEE Communications Magazine, vol. 55, no. 8, pp. 94?99, 2017.
166 1 7 Z. Lu, X. Gao, and H. Yu, “Gtac: A biomimetic tactile sensor with skin-like heterogeneous force feedback for robots,” IEEE Sensors Journal,vol. 22, no. 14, pp. 14 491?14 500, 2022.
167 4 3 Z. Palmer, “Thieves are now stealing cars via a headlight ’CAN injection’.” https://www.autoblog.com/2023/04/18/vehicle-headlight-can-bus-injection-theft-method-update, 2023. [Online; accessed 26-July-2024
168 4 13 Z. Xiao, Y. Chen, M. Alazab, and H. Chen, “Trajectory Data Acqui- sition via Private Car Positioning Based on Tightly-coupled GPS/OBD Integration in Urban Environments,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 9680?9691, 2022.
0
1
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
0
1

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?