Access Restriction

Author Tran, Eushiuan
Source CiteSeerX
Content type Text
File Format PDF
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Multi-bit Error Vulnerability ♦ Controller Area Network Protocol ♦ Undetected Multi-bit Error ♦ Drive-by-wire Automobile ♦ Double-bit Error ♦ Specification Problem ♦ Fleet Size ♦ Safety-critical Application ♦ Required Level ♦ Generalized Lesson ♦ Bit Error ♦ Error Detection Code ♦ Cyclic Redundancy Code ♦ High Network Noise ♦ Undetected Corruption ♦ Controller Area Network
Abstract Embedded networks will increasingly be used in safety-critical applications such as drive-by-wire automobiles. Because of potentially high network noise in such systems, reliably detecting bit errors could become vital to preventing the dissemination of corrupted data. Unfortunately, an interaction between bit stuffing and use of a cyclic redundancy code (CRC) can create a vulnerability to undetected multi-bit errors. Simulations of the widely used Controller Area Network (CAN) protocol indicate that this problem can cause a double-bit error to result in a 1.3 x 10 -7 probability of undetected corruption. This number, although small, becomes an issue when magnified by a fleet size of hundreds of millions of vehicles. This vulnerability and related CAN specification problems can be fixed, albeit at a cost. A generalized lesson is that transmission encoding can undermine the effectiveness of error detection codes to the point that a system might not provide a required level of robustne...
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research
Education Level UG and PG ♦ Career/Technical Study
Publisher Date 1999-01-01