1. The CAN FD technology is a promising option for use in Automotive Control and Power Systems (ACPS) due to its high data-phase bit-rate and message payload.
2. A security solution based on Hardware Security Modules (HSM) is recommended to protect CAN FD from potential security attacks, but this poses new challenges for the timing analysis of CAN FD messages.
3. This article presents a novel Worst Case Response Time (WCRT) analysis to bind interference caused by security critical messages, and shows that the WCRT calculated through this new analysis is only 14% higher than the real WCRT obtained from an exhaustive search simulator.
The article provides a detailed overview of the use of CAN FD technology in Automotive Control and Power Systems (ACPS), as well as a novel Worst Case Response Time (WCRT) analysis to bind interference caused by security critical messages. The authors provide theoretical proof that their WCRT analysis can upper bound the response time of CAN FD messages, and demonstrate this with a small set of messages.
The trustworthiness and reliability of the article are generally good, as it provides evidence for its claims in the form of theoretical proofs and simulations. However, there are some potential biases present in the article which should be noted. For example, while the authors do mention that other solutions exist for protecting CAN FD from potential security attacks, they focus primarily on HSM-based solutions without exploring other options in detail or providing any counterarguments against them. Additionally, while they do provide evidence for their claims in terms of simulations, they do not explore any possible risks associated with using their proposed solution or discuss any potential drawbacks or limitations that may arise from its implementation.
In conclusion, while this article does provide an interesting overview of CAN FD technology and presents a novel WCRT analysis which could be useful for ACPS applications, it should be read with caution due to its potential biases and lack of exploration into alternative solutions or possible risks associated with its implementation.