Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
van Glabbeek, Rob; Höfner, Peter (2017)
Languages: English
Types: Preprint
Subjects: Computer Science - Logic in Computer Science, Computer Science - Networking and Internet Architecture

Classified by OpenAIRE into

We present a formal model for a fragmentation and a reassembly protocol running on top of the standardised CAN bus, which is widely used in automotive and aerospace applications. Although the CAN bus comes with an in-built mechanism for prioritisation, we argue that this is not sufficient and provide another protocol to overcome this shortcoming.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] T. Bourke, R.J. van Glabbeek & P. Ho¨fner (2014): A mechanized proof of loop freedom of the (untimed) AODV routing protocol. In F. Cassez & J.-F. Raskin, editors: Automated Technology for Verification and Analysis (ATVA '14), LNCS 8837, Springer, pp. 47-63, doi:10.1007/978-3-319-11936-6 5.
    • [2] T. Bourke, R.J. van Glabbeek & P. Ho¨fner (2016): Mechanizing a Process Algebra for Network Protocols. Journal of Automated Reasoning 56(3), pp. 309-341, doi:10.1007/s10817-015-9358-9.
    • [3] M.J. Dworkin (2007): Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC. NIST Special Publication 800-38D, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, doi:10.6028/NIST.SP.800-38D.
    • [4] K. Etschberger (2001): Controller Area Network: Basics, Protocols, Chips and Applications. IXXAT Automation GmbH.
    • [5] A. Fehnker, R. J. van Glabbeek, P. Ho¨fner, A. K. McIver, M. Portmann & W. L. Tan (2012): A Process Algebra for Wireless Mesh Networks. In H. Seidl, editor: European Symposium on Programming (ESOP '12), LNCS 7211, Springer, pp. 295-315, doi:10.1007/978-3-642-28869-2 15.
    • [6] R.J. van Glabbeek, P. Ho¨fner, M. Portmann & W.L. Tan (2016): Modelling and Verifying the AODV Routing Protocol. Distributed Computing 29(4), pp. 279-315, doi:10.1007/s00446-015-0262-7.
    • [7] H. Krawczyk, M. Bellare & R. Canetti (1997): HMAC: Keyed-Hashing for Message Authentication. RFC 2104 (Informational, Errata Exist). Available at http://tools.ietf.org/html/rfc2104.
    • [8] T. Nipkow, L. C. Paulson & M. Wenzel (2002): Isabelle/HOL - A Proof Assistant for Higher-Order Logic. LNCS 2283, Springer, doi:10.1007/3-540-45949-9.
    • [9] Robert Bosch GmbH, Stuttgart, Germany (1991): CAN Specification, Version 2.0. Available at http://www. bosch-semiconductors.de/media/ubk_semiconductors/pdf_1/canliteratur/can2spec.pdf.
    • [10] C. Shin (2014): A framework for fragmenting/reconstituting data frame in Controller Area Network (CAN). In: International Conference on Advanced Communication Technology (ICACT '14), IEEE, pp. 1261-1264, doi:10.1109/ICACT.2014.6779161.
    • [11] C.M. Shin, T.M. Han, H.S. Ham & W.J. Lee (2010): Method for Transmitting/Receiving Data Frame in CAN Protocol. Available at http://www.google.com/patents/US20100158045. US Patent App. 12/543,876.
    • [12] C. Sommer & F. Dressler (2015): doi:10.1017/CBO9781107110649.
    • [13] International Organization for Standardization (2011): Road Vehicles - Diagnostic Communication Over Controller Area Network (DoCAN) - Part 2: Transport protocol and network layer services. ISO 15765- 2:2011(en), ISO. Available at http://www.iso.org/iso/home/store/catalogue_ics/catalogue_ detail_ics.htm?csnumber=54499.
    • [14] S. Turner & L. Chen (2011): Updated Security Considerations for the MD5 Message-Digest and the HMACMD5 Algorithms. RFC 6151 (Informational). Available at http://tools.ietf.org/html/rfc6151.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article

Collected from