CAN FD and CAN XL on arXiv
https://qiita.com/kaizen_nagoya/items/d8efb0da53cd3456f735
CAN FD & CAN XL on arXiv references
https://qiita.com/kaizen_nagoya/items/7df86c66084372a96f1d
CAN FD & CAN XL on arXiv references name order
https://qiita.com/kaizen_nagoya/items/ec5e4e4491228db534c0
Comparison of Classical CAN, CAN FD, and CAN XL and CAN XL
https://qiita.com/kaizen_nagoya/items/773835b2bf3cddd17dd8
Comparison of CAN XL & 10BASE-T1S Functionality on Layer 1 and Layer 2
https://qiita.com/kaizen_nagoya/items/13235743ba8d7193a53b
on: document number in this article
pn: paper number in these articles
rn: reference number in the papers
D: downloaded
on | pn | rn | D | title URL | ||
---|---|---|---|---|---|---|
1 | 2 | 26 | “Aidinrobotics,” https://www.aidinrobotics.co.kr/smart-6-axis-f-t-sensor, accessed: 2025-05-14. | |||
2 | 2 | 7 | “Ati industrial automation,” https://www.ati-ia.com/, accessed: 2025-05-14. | |||
3 | 2 | 29 | “Bota systems,” https://www.botasys.com/, accessed: 2025-05-14. | |||
4 | 4 | 14 | “Hostile Vehicle Mitigation (HVM).” https://www.npsa.gov.uk/hostile-vehicle-mitigation-hvm. accessed: 26-July-2024. | 802.3-2022 - IEEE Standard for Ethernet https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9844436 | ||
5 | 4 | 4 | R | “IEEE Standard for Ethernet - Amendment 5: Physical Layer Specifications and Management Parameters for 10 Mb/s Operation and Associated Power Delivery over a Single Balanced Pair of Conductors,” IEEE Std 802.3cg-2019 (Amendment to IEEE Std 802.3-2018 as amended by IEEE Std 802.3cb-2018, IEEE Std 802.3bt-2018, IEEE Std 802.3cd-2018, and IEEE Std 802.3cn-2019), pp. 1?256, 2020. | ||
6 | 5 | 7 | 5 | “IEEE Standard for Ethernet - Amendment 5: Physical Layer Specifications and Management Parameters for 10 Mb/s Operation and Associated Power Delivery over a Single Balanced Pair of Conductors,” IEEE Std 802.3cg-2019 (Amendment to IEEE Std 802.3-2018 as amended by IEEE Std 802.3cb-2018, IEEE Std 802.3bt-2018, IEEE Std 802.3cd-2018, and IEEE Std 802.3cn-2019), 2020. | ||
7 | 4 | 5 | “IEEE Standard for Local and metropolitan area networks-Media Access Control (MAC) Security,” IEEE Std 802.1AE-2018 (Revision of IEEE Std 802.1AE-2006), pp. 1?239, 2018.https://ieeexplore.ieee.org/document/8585421 | |||
8 | 5 | 12 | 6 | “IEEE Standard for Local and metropolitan area networks-Media Access Control (MAC) Security,” IEEE Std 802.1AE-2018 (Revision of IEEE Std 802.1AE-2006), pp. 1?239, 2018. | ||
9 | 5 | 10 | “IEEE Standard for Local and Metropolitan Area Networks?Bridges and Bridged Networks,” IEEE Std 802.1Q-2022 (Revision of IEEE Std 802.1Q-2018), pp. 1?2163, 2022. https://ieeexplore.ieee.org/document/10004498 | |||
10 | 2 | 28 | Q | “Robotous - innovative robotic solutions,” http://www.robotous.com/ main, accessed: 2025-05-14. | https://qiita.com/kaizen_nagoya/items/60790827ce409e1c150c | |
11 | 2 | 25 | Q | “Texas instruments application note(snoa930a),” https://www.ti.com/lit/an/snoa930a/snoa930a.pdf, accessed: 2025-05-14. | https://qiita.com/kaizen_nagoya/items/60790827ce409e1c150c | |
12 | 1 | 0 | Q | A Miniature High-Resolution Tension Sensor Based on a Photo-Reflector for Robotic Hands and Grippers Authors: Hyun-Bin Kim, Kyung-Soo Kim https://arxiv.org/pdf/2507.00464 | https://qiita.com/kaizen_nagoya/items/1a60ede80b076fa0c424 | |
13 | 2 | 0 | Q | A Novel 6-axis Force/Torque Sensor Using Inductance Sensors, Hyun-Bin Kim, Kyung-Soo Kim https://arxiv.org/pdf/2505.09069 | https://qiita.com/kaizen_nagoya/items/7df86c66084372a96f1d | |
14 | 3 | 8 | Q | A. Albert et al., “Comparison of event-triggered and time-triggered concepts with regard to distributed control systems,” Embedded world, vol. 2004, pp. 235?252, 2004. | https://qiita.com/kaizen_nagoya/items/7b6354da4d30fc4fd076 | |
15 | 2 | 27 | Q | A. Ananthanarayanan, S. Foong, and S. Kim, “A compact two dof magneto-elastomeric force sensor for a running quadruped,” in 2012 IEEE International Conference on Robotics and Automation, pp. 1398?1403. IEEE, 2012. | https://qiita.com/kaizen_nagoya/items/94227bd61cb7d2cdb245 | |
16 | 4 | 26 | Q | A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, “Basic concepts and taxonomy of dependable and secure computing,” IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 11?33, 2004. | https://qiita.com/kaizen_nagoya/items/5063f3201df61afabf57 | |
17 | 4 | 9 | Q | A. Chowdhury, G. Karmakar, J. Kamruzzaman, A. Jolfaei, and R. Das, “Attacks on Self-Driving Cars and Their Countermeasures: A Survey,” IEEE Access, vol. 8, pp. 207308?207342, 2020. | https://qiita.com/kaizen_nagoya/items/2b8b2f602f013d693eea | |
18 | 4 | 18 | A. Perrig, R. Canetti, J. D. Tygar, and D. Song, “Efficient authentication and signing of multicast streams over lossy channels,” in Proc. 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp. 56?73, 2000. | https://qiita.com/kaizen_nagoya/items/af466cf20058d3c2febb | ||
19 | 2 | 17 | A. Tar and G. Cserey, “Development of a low cost 3d optical compliant tactile force sensor,” in 2011 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM), pp. 236?240. IEEE, 2011. | https://qiita.com/kaizen_nagoya/items/87a9674017380309b5b7 | ||
20 | 3 | 49 | B. Groza and P. Murvay, “Efficient intrusion detection with bloom filtering in controller area networks,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 4, pp. 1037?1051, 2019. | https://qiita.com/kaizen_nagoya/items/31cd5696a42e81467664 | ||
21 | 3 | 35 | B. Groza and S. Murvay, “Efficient protocols for secure broadcast in controller area networks,” IEEE Transactions on Industrial Informatics, vol. 9, no. 4, pp. 2034?2042, 2013. | https://qiita.com/kaizen_nagoya/items/4d82241ec1c2fe2cd80c | ||
22 | 4 | 20 | 21 | B. Groza and S. Murvay, “Efficient Protocols for Secure Broadcast in Controller Area Networks,” IEEE Transactions on Industrial Informatics, vol. 9, no. 4, pp. 2034?2042, 2013. | ||
23 | 1 | 23 | D | B. Lee, K.-S. Kim, and Y. Cho, “Real-time adaptive cancellation of tens feedback artifact on semg for prosthesis closed-loop control,” Frontiers in Bioengineering and Biotechnology, vol. 12, p. 1492588, 2024. | https://qiita.com/kaizen_nagoya/items/e93b841807946833747c | |
24 | 5 | 2 | BOSCH, “CAN with Flexible Data-Rate Specification Version 1.0,” Apr 2012, accessed: 2023-01-16. https://web.archive.org/web/20151211125301/http://www.bosch-semiconductors.de/media/ubk_semiconductors/pdf_1/canliteratur/can_fd_spec.pdf | https://qiita.com/kaizen_nagoya/items/9840ad73cf2420f1441f | ||
25 | 1 | 3 | C. Ding, Y. Han, W. Du, J. Wu, and Z. Xiong, “In situ calibration of sixaxis force-torque sensors for industrial robots with tilting base,” IEEE Transactions on Robotics, vol. 38, no. 4, pp. 2308?2321, 2021. | https://qiita.com/kaizen_nagoya/items/207f30a8d5ceef25f521 | ||
26 | 3 | 18 | C. Lin and A. Sangiovanni-Vincentelli, “Cyber-security for the controller area network (can) communication protocol,” in 2012 International Conference on Cyber Security, 2012, pp. 1?7. | https://qiita.com/kaizen_nagoya/items/0935deff27b611d952e1 | ||
27 | 3 | 48 | C. Lin, Q. Zhu, and A. Sangiovanni-Vincentelli, “Security-aware modeling and efficient mapping for can-based real-time distributed automotive systems,” IEEE Embedded Systems Letters, vol. 7, no. 1, pp. 11?14, 2015. | https://qiita.com/kaizen_nagoya/items/e6a7e88dbf219ef1799a | ||
28 | 1 | 10 | C. Zhao, M. Liu, X. Huang, Y. Ma, B. Zhang, H. Li, Q. Huang, and Z. Jiang, “Adaptive and dexterous tendon-driven underactuated finger design with a predefined elastic force gradient,” IEEE/ASME Transactions on Mechatronics, vol. 29, no. 3, pp. 1622?1633, 2023. | https://qiita.com/kaizen_nagoya/items/7e5267c11086986e5a66 | ||
29 | 5 | 4 | CAN in Automation (CiA) , “CiA Draft Specification 610-1 CAN XL specifications and test plans — Part 1: Data link layer and physical coding sub-layer requirements — Version 1.0.0,” Mar 2022.. Available: https://web.archive.org/web/20151211125301/http://www.bosch\protect\discretionary{\char\hyphenchar\font}{}{}semiconductors.de/media/ubk semiconductors/pdf 1/canliteratur/can fd spec.pdf | |||
30 | 4 | 6 | 29 | CAN in Automation (CiA) e.V., “CiA Draft Specification 610-1 CAN XL specifications and test plans — Part 1: Data link layer and physical coding sub-layer requirements — Version 1.0.0,” Mar 2022. | ||
31 | 5 | 3 | CAN in Automation (CiA) e.V., “CiA Draft Specification 610-3 — CAN XL specifications and test plans — Part 3: Physical medium attachment sub-layer requirements — Version 1.0.0,” Mar 2022. | |||
32 | 5 | 16 | CAN in Automation (CiA) e.V., “CiA Draft Specification Proposal 611-1 — CAN XL higher-layer functions Part 1: Definition of service data unit types (SDT) — Version 1.0.0,” Oct 2022. | |||
33 | 4 | 7 | CAN in Automation (CiA) e.V., “CiA Work Draft 613-2 CAN XL addon services Part 2: Security — Version 0.0.8,” Apr 2023. | |||
34 | 5 | 0 | Composite CAN XL-Ethernet Networks for Next-Gen Automotive and Automation Systems, Gianluca Cena, Stefano Scanzio, Adriano Valenzano https://arxiv.org/pdf/2306.09498 | https://qiita.com/kaizen_nagoya/items/c526d94337dbd149df80 | ||
35 | 3 | 26 | D. J. Bernstein, “Curve25519: New diffie-hellman speed records,” in Public Key Cryptography - PKC 2006, M. Yung, Y. Dodis, A. Kiayias, and T. Malkin, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006, pp. 207?228. | https://qiita.com/kaizen_nagoya/items/28c5205e7c0dc697bfa5 | ||
36 | 3 | 39 | D. Jang, S. Han, S. Kang, and J. Choi, “Communication channel modeling of controller area network (can),” in 2015 Seventh International Conference on Ubiquitous and Future Networks, 2015, pp. 86?88. | https://qiita.com/kaizen_nagoya/items/583bc47b6b87b38f35cb | ||
37 | 5 | 20 | D. Plummer, “Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware,” RFC 826 (Standard), Internet Engineering Task Force, Nov. 1982, updated by RFCs 5227, 5494. [Online[. Available: http://www.ietf.org/rfc/rfc826.txt | https://qiita.com/kaizen_nagoya/items/40faa1d8d723ef3db28b | ||
38 | 5 | 13 | D. Reinhardt, M. G¨ untner, M. Kucera, T. Waas, and W. K¨ uhnhauser, “Mapping CAN-to-Ethernet communication channels within virtualized embedded environments,” in 10th IEEE International Symposium on Industrial Embedded Systems (SIES), 2015, pp. 1?10. | https://qiita.com/kaizen_nagoya/items/bf6e0f80fc7db16db716 | ||
39 | 1 | 2 | E. Shahriari, P. Svarny, S. A. B. Birjandi, M. Hoffmann, and S. Haddadin, “Path-constrained haptic motion guidance via adaptive phasebased admittance control,” IEEE Transactions on Robotics, 2024. | |||
40 | 3 | 0 | EXT-TAURUM P2T: an Extended Secure CAN-FD Architecture for Road Vehicles, Franco Oberti, Alessandro Savino, Ernesto Sanchez, Filippo Parisi, Stefano Di Carlo https://arxiv.org/pdf/2112.08162 | |||
41 | 3 | 31 | F. Hartwich and R. P. Bosch, “Can with flexible data-rate,” 2012. | |||
42 | 3 | 15 | F. Kluge, C. Yu, J. Mische, S. Uhrig, and T. Ungerer, “Implementing autosar scheduling and resource management on an embedded smt pro- cessor,” in Proceedings of th 12th International Workshop on Software and Compilers for Embedded Systems, 2009, pp. 33?42. | |||
43 | 3 | 7 | F. Oberti, “Mitigation of automotive control modules hardware replacement-based attacks through hardware signature,” in 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S), 2021, pp. 13?14. | |||
44 | 3 | 6 | F. Oberti, E. Sanchez, A. Savino, F. Parisi, and S. Di Carlo, “Taurum p2t: Advanced secure can-fd architecture for road vehicle,” in 2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design (IOLTS). IEEE, 2021, pp. 1?7. | |||
45 | 3 | 52 | F. Stellari, P. Song, A. J. Weger, J. Culp, A. Herbert, and D. Pfeiffer, “Verification of untrusted chips using trusted layout and emission measurements,” in 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2014, pp. 19?24. | |||
46 | 1 | 6 | F. Voigt, A. Naceri, and S. Haddadin, “Learning wrist policies for anthropomorphic soft power grasping in handle and door manipulation,” IEEE Transactions on Robotics, 2025. | |||
47 | 2 | 23 | F. W. Grover, Inductance calculations: working formulas and tables. Courier Corporation, 2004. | |||
48 | 5 | 8 | G. Cena and A. Valenzano, “On the properties of the flexible time division multiple access technique,” IEEE Transactions on Industrial Informatics, vol. 2, no. 2, pp. 86?94, 2006. | |||
49 | 5 | 17 | G. Cena, I. C. Bertolotti, and A. Valenzano, “A socket interface for CAN devices,” Computer Standards & Interfaces, vol. 29, no. 6, pp. 662?673, Sep. 2007. | |||
50 | 5 | 21 | G. Cena, I. Cibrario Bertolotti, T. Hu, and A. Valenzano, “Seamless integration of CAN in intranets,” Computer Standards & Interfaces, vol. 46, pp. 1?14, 2016. | |||
51 | 5 | 9 | G. Cena, S. Scanzio, A. Valenzano, and C. Zunino, “A Fair Access Mechanism to Support Fragmented Data Transfers in CAN,” in 2022 IEEE 18th International Conference on Factory Communication Systems (WFCS), Apr. 2022, pp. 1?8. | |||
52 | 4 | 30 | G. Cena, S. Scanzio, and A. Valenzano, “Composite CAN XL-Ethernet Networks for Next-Gen Automotive and Automation Systems,” in IEEE 19th Int. Conf. on Factory Commun. Systems (WFCS), pp. 1?8, 2023. | |||
53 | 3 | 28 | G. Macher, C. Schmittner, O. Veledar, and E. Brenner, ISO/SAE DIS 21434 Automotive Cybersecurity Standard - In a Nutshell, 09 2020, pp. 123?135. | |||
54 | 3 | 29 | G. Macher, H. Sporer, R. Berlach, E. Armengaud, and C. Kreiner, “Sahara: A security-aware hazard and risk analysis method,” in 2015 Design, Automation Test in Europe Conference Exhibition (DATE), 2015, pp. 621?624. | |||
55 | 2 | 15 | G. Palli and S. Pirozzi, “An optical torque sensor for robotic applications,” International Journal of Optomechatronics, vol. 7, no. 4, pp. 263?282, 2013. | |||
56 | 2 | 4 | G. Valsecchi, R. Grandia, and M. Hutter, “Quadrupedal locomotion on uneven terrain with sensorized feet,” IEEE Robotics and Automation Letters, vol. 5, no. 2, pp. 1548?1555, 2020. | |||
57 | 5 | 23 | G. Xie, H. Gong, Y. Han, S. Chakraborty, and W. Chang, “A Real-Time CAN-CAN Gateway with Tight Latency Analysis and Targeted Priority Assignment,” in 2020 IEEE Real-Time Systems Symposium (RTSS), 2020, pp. 141?152. | |||
58 | 5 | 22 | H. A. Mangut, A. Al-Nemrat, C. Benza¨ ?d, and A.-R. H. Tawil, “ARP Cache Poisoning Mitigation and Forensics Investigation,” in 2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1, 2015, pp. 1392?1397. | |||
59 | 3 | 55 | H. Aydin, R. Melhem, D. Mosse, and P. Mejia-Alvarez, “Power-aware scheduling for periodic real-time tasks,” IEEE Transactions on Computers, vol. 53, no. 5, pp. 584?600, 2004. | |||
60 | 3 | 40 | H. Chen and J. Tian, “Research on the controller area network,” in 2009 International Conference on Networking and Digital Society, vol. 2, 2009, pp. 251?254. | |||
61 | 3 | 19 | H. Kang, Y. Hori, and A. Satoh, “Performance evaluation of the first commercial puf-embedded rfid,” in The 1st IEEE Global Conference on Consumer Electronics 2012, 2012, pp. 5?8. | |||
62 | 3 | 38 | H. Nicanfar and V. C. M. Leung, “Multilayer consensus ecc-based password authenticated key-exchange (mcepak) protocol for smart grid system,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 253?264, 2013. | |||
63 | 1 | 16 | H.-B. Kim, B.-I. Ham, K.-H. Choi, and K.-S. Kim, “Parameter optimization of optical six-axis force/torque sensor for legged robots,” arXiv preprint arXiv:2502.07196, 2025. | |||
64 | 1 | 18 | H.-B. Kim, K.-H. Choi, and K.-S. Kim, “A compact optical six-axis force/torque sensor for legged robots using a polymorphic calibration method,” arXiv preprint arXiv:2309.04720, 2023. | |||
65 | 1 | 15 | H.-B. Kim, K.-H. Choi, and K.-S. Kim, “A compact six-axis force/torque sensor using photocouplers for impact robustness,” Review of Scientific Instruments, vol. 95, no. 4, 2024. | |||
66 | 2 | 18 | 65 | H.-B. Kim, K.-H. Choi, and K.-S. Kim, “A compact six-axis force/torque sensor using photocouplers for impact robustness,” Review of Scientific Instruments, vol. 95, no. 4, 2024. | ||
67 | 1 | 17 | H.-B. Kim, S. Lee, B.-I. Ham, K.-H. Choi, and K.-S. Kim, “Temperature compensation method for a six-axis force/torque sensor using a gated recurrent unit,” IEEE Sensors Journal, 2025. | |||
68 | 2 | 22 | H.-P. Wang, J.-G. Dai, and X.-Z. Wang, “Improved temperature com- pensation of fiber bragg grating-based sensors applied to structures under different loading conditions,” Optical Fiber Technology, vol. 63, p. 102506, 2021. | |||
69 | 4 | 19 | I. Fern´ andez-Hern´ andez, V. Rijmen, G. Seco-Granados, J. Simon, I. Rodr´ ?guez, and J. D. Calle, “A Navigation Message Authentication Proposal for the Galileo Open Service,” NAVIGATION, vol. 63, no. 1, pp. 85?102, 2016. | |||
70 | 1 | 5 | I. Radosavovic, T. Xiao, B. Zhang, T. Darrell, J. Malik, and K. Sreenath, “Real-world humanoid locomotion with reinforcement learning,” Science Robotics, vol. 9, no. 89, p. eadi9579, 2024. | |||
71 | 3 | 32 | I. S. for Information technology ISO, “Iso/iec/ieee international standard for information technology ? telecommunications and information exchange between systems ? local and metropolitan area networks ? part 1ae: Media access control (mac) security - amendment 1: Galois counter model ? advanced encryption standard-256 (gcmaes-256) cipher suite,” ISO/IEC/ IEEE 8802-1AE First edition 2013-12-01 AMENDMENT 1 2015-05-01, pp. 1?57, 2015. | |||
72 | 5 | 1 | 73 | International Organization for Standardization, “ISO 11898-1:2015 Road vehicles — Controller area network (CAN) — Part 1: Data link layer and physical signalling,” Dec 2015. | ||
73 | 4 | 1 | International Organization for Standardization, “ISO 11898-1:2024 Road vehicles — Controller area network (CAN) — Part 1: Data link layer and physical coding sublayer, Edition 3,” May 2024. | |||
74 | 5 | 11 | International Organization for Standardization, “ISO 15765-2:2016 Road vehicles ?— Diagnostic communication over Controller Area Network (DoCAN) ?— Part 2: Transport protocol and network layer services,” Apr 2016. | |||
75 | 3 | 27 | Intrepid Control Systems, Inc, “neovi fire 2 user guide,” 2021. [Online. Available: URL:https://cdn.intrepidcs.net/guides/neovifire2/neovi_fire2ug.pdf | |||
76 | 3 | 14 | ISO - International Organization for Standardization, “Iso 17356-2 road vehicles — open interface for embedded automotive applications — part 2: Osek/vdx specifications for binding os, com and nm,” 2005. [Online. Available: https://www.iso.org/standard/33007.html | |||
77 | 2 | 6 | J. Chen, Z.-Y. Dong, S. Shi, Y. Wei, X. Yu, and L. Ou, “Adaptive-constrained admittance control for physical human?robot interaction,” Transactions of the Institute of Measurement and Control, p. 01423312241298351, 2025. | |||
78 | 2 | 1 | J. Di Carlo, P. M. Wensing, B. Katz, G. Bledt, and S. Kim, “Dynamic locomotion in the mit cheetah 3 through convex model-predictive control,” in 2018 IEEE/RSJ international conference on intelligent robots and systems (IROS), pp. 1?9. IEEE, 2018. | |||
79 | 1 | 12 | J. G. da Silva, A. A. de Carvalho, and D. D. da Silva, “A strain gauge tactile sensor for finger-mounted applications,” IEEE Transactions on Instrumentation and measurement, vol. 51, no. 1, pp. 18?22, 2002. | |||
80 | 2 | 3 | J. Kang, H. Kim, and K.-S. Kim, “View: Visual-inertial external wrench estimator for legged robot,” IEEE Robotics and Automation Letters, vol. 8, no. 12, pp. 8366?8373, 2023. | |||
81 | 3 | 41 | J. Liu, S. Zhang, W. Sun, and Y. Shi, “In-vehicle network attacks and countermeasures: Challenges and future directions,” IEEE Network, vol. 31, no. 5, pp. 50?58, 2017. | |||
82 | 1 | 13 | J. Qu, Q. Wu, T. Clancy, Q. Fan, X. Wang, and X. Liu, “3d-printed straingauge micro force sensors,” IEEE Sensors Journal, vol. 20, no. 13, pp.6971?6978, 2020. | |||
83 | 2 | 8 | J.-H. Kim, “Multi-axis force-torque sensors for measuring zero-moment point in humanoid robots: A review,” IEEE Sensors Journal, vol. 20, no. 3, pp. 1126?1141, 2019. | |||
84 | 4 | 22 | K. Eledlebi, A. A. Alzubaidi, C. Y. Yeun, E. Damiani, V. Mateu, and Y. Al-Hammadi, “Enhanced inf-tesla protocol: A continuous connectivity and low overhead authentication protocol via iot devices,” IEEE Access, vol. 10, pp. 54912?54921, 2022. | |||
85 | 3 | 22 | K. Juretus and I. Savidis, “Increased output corruption and structural attack resilience for sat attack secure logic locking,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 40, no. 1, pp. 38?51, 2021. | |||
86 | 3 | 33 | K. Kang, Y. Baek, S. Lee, and S. H. Son, “Lightweight authentication method for controller area network,” in 2016 IEEE 22nd International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), 2016, pp. 101?101. | |||
87 | 56 | K. Kinkai, T. Baba, H. Jutori, K. Ootsu, T. Ohkawa, and T. Yokota, “Comparative study of path prediction method for speculative loop execution,” in 2012 Third International Conference on Networking andComputing, 2012, pp. 283?287. | ||||
88 | 4 | 2 | K. Tindell, “CAN Injection: keyless car theft.” https://kentindell.github.io/2023/04/03/can-injection/, 2023. [Online; accessed 26-July-2024 | |||
89 | 4 | 24 | L. Gong, “Variations on the themes of message freshness and replay-or the difficulty in devising formal methods to analyze cryptographic protocols,” in Proc. Computer Security Foundations Workshop VI, pp. 131?136, 1993. | |||
90 | 4 | 16 | L. Lamport, “Constructing digital signatures from a one way function,” SRI International, CSL-98, 1979. | |||
91 | 2 | 21 | L. Xiong, Y. Guo, G. Jiang, X. Zhou, L. Jiang, and H. Liu, “Six-dimensional force/torque sensor based on fiber bragg gratings with low coupling,” IEEE Transactions on Industrial Electronics, vol. 68, no. 5, pp. 4079?4089, 2020. | |||
92 | 3 | 54 | M. B. Bahador, M. Abadi, and A. Tajoddin, “Hpcmalhunter: Behavioral malware detection using hardware performance counters and singular value decomposition,” in 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE), 2014, pp. 703?708. | |||
93 | 3 | 44 | M. Barranco, J. Proenza, and L. Almeida, “Quantitative comparison of the error-containment capabilities of a bus and a star topology in can networks,” IEEE Transactions on Industrial Electronics, vol. 58, no. 3, pp. 802?813, 2011. | |||
94 | 3 | 4 | M. Bozdal, M. Samie, S. Aslam, and I. Jennions, “Evaluation of can bus security challenges,” Sensors, vol. 20, no. 8, p. 2364, 2020. | |||
95 | 4 | 28 | M. J. Dworkin, “NIST Special Publication 800-38D — Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC.” https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf, 2007. [Online; accessed 26-July-2024 | |||
96 | 3 | 53 | M. Majzoobi and F. Koushanfar, “Time-bounded authentication of fpgas,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1123?1135, 2011. | |||
97 | 3 | 12 | M. Marchetti and D. Stabili, “Anomaly detection of can bus messages through analysis of id sequences,” in 2017 IEEE Intelligent Vehicles Symposium (IV), 2017, pp. 1577?1583. | |||
98 | 3 | 42 | M. Marchetti and D. Stabili, “Anomaly detection of can bus messages through analysis of id sequences,” in 2017 IEEE Intelligent Vehicles Symposium (IV), 2017, pp. 1577?1583. | |||
99 | 1 | 21 | M. Pu, Q. Luo, Q. Liang, and J. Zhang, “Modeling for elastomer displacement analysis of capacitive six-axis force/torque sensor,” IEEE Sensors Journal, vol. 22, no. 2, pp. 1356?1365, 2021. | |||
100 | 2 | 11 | M. Pu, Q. Luo, Q. Liang, and J. Zhang, “Modeling for elastomer displacement analysis of capacitive six-axis force/torque sensor,” IEEE Sensors Journal, vol. 22, no. 2, pp. 1356?1365, 2021. | |||
101 | 4 | 25 | M. R. Ansari, W. T. Miller, C. She, and Q. Yu, “A low-cost masquerade and replay attack detection method for can in automobiles,” in 2017 IEEE Int. Symposium on Circuits and Systems (ISCAS), pp. 1?4, 2017. | |||
102 | 3 | 16 | M. S. U. Alam, S. Iqbal, M. Zulkernine, and C. Liem, “Securing vehicle ecu communications and stored data,” in ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019, pp. 1?6. | |||
103 | 4 | 29 | M. Shariat and W. Kastner, “Authenticated UWB-Based Positioning of Passive Drones,” in IEEE 19th International Conference on Factory Communication Systems (WFCS), pp. 1?8, 2023. | |||
104 | 3 | 9 | M. U. Farooq, M. Waseem, A. Khairi, and S. Mazhar, “A critical analysis on the security concerns of internet of things (iot),” International Journal of Computer Applications, vol. 111, no. 7, 2015. | |||
105 | 3 | 21 | M. Yasin, J. J. Rajendran, O. Sinanoglu, and R. Karri, “On improving the security of logic locking,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 35, no. 9, pp. 1411?1424, 2016. | |||
106 | 5 | 14 | N. D. Zervas, A. Sousek, and P. Vrbka, “Designing a CAN-to-TSN Ethernet gateway,” in 17th international CAN Conference (iCC 2020), 2020, pp. 129?133, accessed: 2023-01-10. [Online[. Available: https://www.can-cia.org/fileadmin/resources/documents/proceedings/\2020 zervas sousek vrbka.pdf | |||
107 | 3 | 25 | N. Koblitz, A. Menezes, and S. Vanstone, “Guide to elliptic curve cryptography,” 2004. | |||
108 | 3 | 11 | N. Nowdehi, A. Lautenbach, and T. Olovsson, “In-vehicle can message authentication: An evaluation based on industrial criteria,” in 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 2017, pp. 1?7. | |||
109 | 1 | 1 | N. Zhang, P. Zhou, X. Yang, F. Shen, J. Ren, T. Hou, L. Dong, R. Bian, D. Wang, G. Gu et al., “Biomimetic rigid-soft finger design for highly dexterous and adaptive robotic hands,” Science Advances, vol. 11, no. 17, p. eadu2018, 2025. | |||
110 | 4 | 31 | National Institute of Standards and Technology, “FIPS Publication 180-4— Secure Hash Standard (SHS).” https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.180-4.pdf, Aug 2015. [Online; accessed 26-July-2024 | |||
111 | 4 | 23 | National Institute of Standards and Technology, “FIPS Publication 197 — Advanced Encryption Standard (AES), Updated May 9, 2023.” https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197-upd1.pdf, Nov 2001. [Online; accessed 26-July-2024 | |||
112 | 4 | 32 | National Institute of Standards and Technology, “FIPS Publication 202 — SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions.” https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf, Aug 2015. [Online; accessed 26-July-2024 | |||
113 | 3 | 24 | Network Working Group, “The aes-cbc cipher algorithm and its use with ipsec,” 2021. [Online. Available: https://tools.ietf.org/html/rfc3602 | |||
114 | 3 | 10 | Network Working Group, “The aes-cmac algorithm,” 2021. [Online. Available: https://tools.ietf.org/html/rfc4493.html | . | ||
115 | 2 | 16 | O. Al-Mai, M. Ahmadi, and J. Albert, “Design, development and calibration of a lightweight, compliant six-axis optical force/torque sensor,” IEEE Sensors Journal, vol. 18, no. 17, pp. 7005?7014, 2018. | . | ||
116 | 5 | 19 | O. Hartkopp, “Linux and ISO 15765-2 with CAN FD,” in 15th international CAN Conference (iCC 2015), 2015, pp. 05?1—05?7. [Online[. Available: https://www.can-cia.org/fileadmin/resources/documents/proceedings/2015 hartkopp.pdf | |||
117 | 5 | 18 | O. Hartkopp, “The CAN networking subsystem of the Linux kernel,”in 13th international CAN Conference (iCC 2012), 2012, pp. 05?10—05?16, accessed: 2023-01-10. [Online. Available: https://www.can-cia.org/fileadmin/resources/documents/proceedings/2012 hartkopp.pdf | |||
118 | 2 | 9 | P. Billeschou, C. Albertsen, J. C. Larsen, and P. Manoonpong, “A low-cost, compact, sealed, three-axis force/torque sensor for walking robots,” IEEE Sensors Journal, vol. 21, no. 7, pp. 8916?8926, 2021. | |||
119 | 4 | 27 | P. Decker, “The 10 Mbit/s Domain and the Software-Defined Vehicle (SDV).” https://cdn.vector.com/cms/content/know-how/technical-articles/CAN 10Mbits Domain AutomobilElektronik202304 PressArticle EN.pdf, 2023. [Online; accessed 26-July-2024 | |||
120 | 3 | 51 | P. Koppermann, F. De Santis, J. Heyszl, and G. Sigl, “Low-latency x25519 hardware implementation: breaking the 100 microseconds barrier,” Microprocessors and Microsystems, vol. 52, pp. 491?497, 2017. [Online. Available: https://www.sciencedirect.com/science/article/pii/S0141933117300273 | |||
121 | 3 | 47 | P. M. Yomsi, D. Bertrand, N. Navet, and R. I. Davis, “Controller area network (can): Response time analysis with offsets,” in 2012 9th IEEE International Workshop on Factory Communication Systems, 2012, pp.43?52. | |||
122 | 3 | 45 | P. Mart´ ?, A. Camacho, M. Velasco, and M. E. M. Ben Gaid, “Runtime allocation of optional control jobs to a set of can-based networked control systems,” IEEE Transactions on Industrial Informatics, vol. 6, no. 4, pp. 503?520, 2010. | |||
123 | 3 | 37 | P. Murvay and B. Groza, “Source identification using signal characteristics in controller area networks,” IEEE Signal Processing Letters, vol. 21, no. 4, pp. 395?399, 2014. | |||
124 | 3 | 50 | P. Nuzzo, N. Bajaj, M. Masin, D. Kirov, R. Passerone, and A. L. Sangiovanni-Vincentelli, “Optimized selection of reliable and cost-effective safety-critical system architectures,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, no. 10, pp. 2109?2123, 2020. | |||
125 | 2 | 12 | Q. Luo, Q. Liang, J. Zhang, R. Zhao, Z. Ai, and M. Pu, “Parameters optimization for a capacitive six-axis force/torque sensor by using analytical method,” IEEE Sensors Journal, vol. 22, no. 22, pp. 21 735?21 744, 2022. | |||
126 | 4 | 17 | R. Anderson, F. Bergadano, B. Crispo, J.-H. Lee, C. Manifavas, and R. Needham, “A new family of authentication protocols,” SIGOPS Oper. Syst. Rev., vol. 32, p. 9?20, oct 1998. | |||
127 | 3 | 30 | R. G. Dutta, F. Yu, T. Zhang, Y. Hu, and Y. Jin, “Security for safety: A path toward building trusted autonomous vehicles,” in 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2018, pp. 1?6. | |||
128 | 5 | 6 | R. I. Davis, A. Burns, R. J. Bril, and J. J. Lukkien, “Controller Area Network (CAN) schedulability analysis: Refuted, revisited and revised,” Real-Time Systems, vol. 35, no. 3, pp. 239?272, Apr. 2007. | |||
129 | 3 | 36 | R. I. Davis, S. Kollmann, V. Pollex, and F. Slomka, “Controller area network (can) schedulability analysis with fifo queues,” in 2011 23rd Euromicro Conference on Real-Time Systems, 2011, pp. 45?56. | |||
130 | 4 | 12 | R. Malekian, N. R. Moloisane, L. Nair, B. T. Maharaj, and U. A. K. Chude-Okonkwo, “Design and Implementation of a Wireless OBD II Fleet Management System,” IEEE Sensors Journal, vol. 17, no. 4, pp. 1154?1164, 2017. | |||
131 | 3 | 17 | R. R.V. and K. A., “Secure boot of embedded applications - a review,” in 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), 2018, pp. 291?298. | |||
132 | 3 | 20 | R. Soga and H. Kang, “Physical unclonable function using carbon resistor,” in 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE), 2020, pp. 559?561. | |||
133 | 4 | 0 | Robust Multicast Origin Authentication in MACsec and CANsec for Automotive Scenarios, Gianluca Cena, Lucia Seno, Stefano Scanzio https://arxiv.org/pdf/2502.20555 | |||
134 | 4 | 21 | S. C? amara, D. Anand, V. Pillitteri, and L. Carmo, “Multicast delayed authentication for streaming synchrophasor data in the smart grid,” in ICT Systems Security and Privacy Protection (J.-H. Hoepman and S. Katzenbeisser, eds.), (Cham), pp. 32?46, Springer International Publishing, 2016. | |||
135 | 5 | 5 | S. Chen, J. Hu, Y. Shi, Y. Peng, J. Fang, R. Zhao, and L. Zhao, “Vehicle-to-Everything (v2x) Services Supported by LTE-Based Systems and 5G,” IEEE Commun. Stand. Mag., vol. 1, no. 2, pp. 70?76, 2017. | . | ||
136 | 2 | 2 | S. Choi, G. Ji, J. Park, H. Kim, J. Mun, J. H. Lee, and J. Hwangbo, “Learning quadrupedal locomotion on deformable terrain,” Science Robotics, vol. 8, no. 74, p. eade2256, 2023. | |||
137 | 1 | 22 | S. H. Jeong, H. J. Lee, K.-R. Kim, and K.-S. Kim, “Design of a miniature force sensor based on photointerrupter for robotic hand,” Sensors and Actuators A: Physical, vol. 269, pp. 444?453, 2018. | |||
138 | 2 | 20 | S. H. Jeong, H. J. Lee, K.-R. Kim, and K.-S. Kim, “Design of a miniature force sensor based on photointerrupter for robotic hand,” Sensors and Actuators A: Physical, vol. 269, pp. 444?453, 2018. | |||
139 | 2 | 19 | S. Jeong, Y. Chitalia, and J. P. Desai, “Miniature force sensor based on dual-photointerrupter with high linearity and disturbance compensation,” IEEE Sensors Journal, vol. 20, no. 11, pp. 5855?5864, 2020. | . | ||
140 | 2 | 24 | S. S. Mohan, M. del Mar Hershenson, S. P. Boyd, and T. H. Lee, “Simple accurate expressions for planar spiral inductances,” IEEE Journal of solid-state circuits, vol. 34, no. 10, pp. 1419?1424, 1999. | . | ||
141 | 4 | 8 | S. Woo, H. J. Jo, and D. H. Lee, “A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN,” IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 2, pp. 993?1006, 2015. | |||
142 | 3 | 34 | S. Woo, H. J. Jo, I. S. Kim, and D. H. Lee, “A practical security architecture for in-vehicle can-fd,” IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 8, pp. 2248?2261, 2016. | |||
143 | 5 | 15 | T. Adamson, “Hybridization of CAN and CAN FD networks,” in 15th international CAN Conference (iCC 2015), 2015, pp. 03?9—03?12, accessed: 2023-01-10. [Online[. Available: https://www.can-cia.org/fileadmin/resources/documents/proceedings/2015 adamson.pdf | . | ||
144 | 3 | 5 | T. Nguyen, B. M. Cheon, and J. W. Jeon, “Can fd performance analysis for ecu re-programming using the canoe,” in The 18th IEEE International Symposium on Consumer Electronics (ISCE 2014), 2014, pp. 1?4. | . | ||
145 | 3 | 23 | T. Thangam, G. Gayathri, and T. Madhubala, “A novel logic locking technique for hardware security,” in 2017 IEEE International Conference on Electrical, Instrumentation and Communication Engineering (ICEICE), 2017, pp. 1?7. | |||
146 | 4 | 11 | T. Zhang, H. Antunes, and S. Aggarwal, “Defending Connected Vehicles Against Malware: Challenges and a Solution Framework,” IEEE Internet of Things Journal, vol. 1, no. 1, pp. 10?21, 2014. | |||
147 | 2 | 10 | U. Kim, D.-H. Lee, Y. B. Kim, D.-Y. Seok, and H. R. Choi, “A novel six-axis force/torque sensor for robotic applications,” IEEE/ASME Transactions on mechatronics, vol. 22, no. 3, pp. 1381?1391, 2016. | |||
148 | 1 | 4 | U. Kim, G. Jo, H. Jeong, C. H. Park, J.-S. Koh, D. I. Park, H. Do, T. Choi, H.-S. Kim, and C. Park, “A novel intrinsic force sensing method for robot manipulators during human?robot interaction,” IEEE Transactions on Robotics, vol. 37, no. 6, pp. 2218?2225, 2021. | |||
149 | 2 | 13 | U. Kim, Y. B. Kim, D.-Y. Seok, J. So, and H. R. Choi, “A surgical palpation probe with 6-axis force/torque sensing capability for minimally invasive surgery,” IEEE Transactions on Industrial Electronics, vol. 65, no. 3, pp. 2755?2765, 2017. | |||
150 | 2 | 14 | U. Kim, Y. B. Kim, J. So, D.-Y. Seok, and H. R. Choi, “Sensorized surgical forceps for robotic-assisted minimally invasive surgery,” IEEE Transactions on Industrial Electronics, vol. 65, no. 12, pp. 9604?9613, 2018. | |||
151 | 3 | 3 | UN Economic Commission for Europe, “Un regulation no. 156 - software update and software update management system,” 2021. [Online. Available: https://unece.org/transport/documents/2021/03/standards/un-regulation-no-156-software-update-and-software-update | |||
152 | 3 | 1 | UN Economic Commission for Europe, “Unece world forum for harmonization of vehicle regulations (wp.29),” 2021. [Online. Available: https://unece.org/wp29-introduction | |||
153 | 3 | 2 | UN Economic Commission for Europe,“Un regulation no. 155 - cyber security and cyber security management system,” 2021. [Online. Available: https://unece.org/transport/documents/2021/03/standards/un-regulation-no-155-cyber-security-and-cyber-security | |||
154 | 3 | 46 | W. Choi, H. J. Jo, S. Woo, J. Y. Chun, J. Park, and D. H. Lee, “Identifying ecus using inimitable characteristics of signals in controller area networks,” IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 4757?4770, 2018. | |||
155 | 4 | 15 | W. Dai, “Crypto++ 5.6.0 benchmarks.” https://www.cryptopp.com/benchmarks.html, Mar 2009. | |||
156 | 1 | 9 | W. Zuo, G. Song, and Z. Chen, “Grasping force control of robotic gripper with high stiffness,” IEEE/ASME Transactions on Mechatronics, vol. 27, no. 2, pp. 1105?1116, 2021. | |||
157 | 1 | 8 | X. Liu, W. Yang, F. Meng, and T. Sun, “Material recognition using robotic hand with capacitive tactile sensor array and machine learning,” IEEE Transactions on Instrumentation and Measurement, 2024. | |||
158 | 4 | 10 | X. Sun, F. R. Yu, and P. Zhang, “A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs),” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 6240?6259, 2022. | |||
159 | 1 | 11 | Y. Cho, Y. Lee, P. Kim, S. Jeong, and K.-S. Kim, “The msc prosthetic hand: Rapid, powerful, and intuitive,” IEEE Robotics and Automation Letters, vol. 7, no. 2, pp. 3170?3177, 2022. | |||
160 | 1 | 20 | Y. J. Shin, H. J. Lee, K.-S. Kim, and S. Kim, “A robot finger design using a dual-mode twisting mechanism to achieve high-speed motion and large grasping force,” IEEE Transactions on Robotics, vol. 28, no. 6, pp.1398?1405, 2012. | |||
161 | 2 | 5 | Y. Liu, S. Liu, B. Chen, Z.-X. Yang, and S. Xu, “Fusion-perception-to-action transformer: Enhancing robotic manipulation with 3d visual fusion attention and proprioception,” IEEE Transactions on Robotics, 2025. | |||
162 | 1 | 19 | Y. Noh, J. Bimbo, S. Sareh, H. Wurdemann, J. Fra´ s, D. S. Chathuranga, H. Liu, J. Housden, K. Althoefer, and K. Rhode, “Multi-axis force/torque sensor based on simply-supported beam and optoelectronics,” Sensors, vol. 16, no. 11, p. 1936, 2016. | |||
163 | 1 | 14 | Y. Wei and Q. Xu, “An overview of micro-force sensing techniques,” Sensors and Actuators A: Physical, vol. 234, pp. 359?374, 2015. | |||
164 | 3 | 13 | Y. Xiao, H.-H. Chen, R. Wang, and S. Sethi, “Mac security and security overhead analysis in the ieee 802.15.4 wireless sensor networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2006, 04 2006. | |||
165 | 3 | 43 | Y. Zhang, M. Chen, N. Guizani, D. Wu, and V. C. M. Leung, “Sovcan: Safety-oriented vehicular controller area network,” IEEE Communications Magazine, vol. 55, no. 8, pp. 94?99, 2017. | |||
166 | 1 | 7 | Z. Lu, X. Gao, and H. Yu, “Gtac: A biomimetic tactile sensor with skin-like heterogeneous force feedback for robots,” IEEE Sensors Journal,vol. 22, no. 14, pp. 14 491?14 500, 2022. | |||
167 | 4 | 3 | Z. Palmer, “Thieves are now stealing cars via a headlight ’CAN injection’.” https://www.autoblog.com/2023/04/18/vehicle-headlight-can-bus-injection-theft-method-update, 2023. [Online; accessed 26-July-2024 | |||
168 | 4 | 13 | Z. Xiao, Y. Chen, M. Alazab, and H. Chen, “Trajectory Data Acqui- sition via Private Car Positioning Based on Tightly-coupled GPS/OBD Integration in Urban Environments,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 9680?9691, 2022. |