SlideShare a Scribd company logo
Development and Testing of
Safety Network Protocol
Alessio Lama
alessio.lama@yahoo.it
Linkedin
4 December 2018
Applications
●
Automotive
●
Industrial automation
●
Biomedical
●
Avionic
●
Interactions with safety MCU
●
Real-Time systems
Issues
●
Access Denial
●
Repetition
●
Loss
●
Corruption
●
Timeout
●
Hacking
●
Interface disconnection
●
Nondeterministic network
●
Net driver bugs
Access Denial
●
Network Topology
●
A VLAN is any broadcast domain that is partitioned and
isolated in a computer network at the data link layer.
# ip link add link eth0 name eth0.8 type vlan id 8
●
Limited access
# iptables -A INPUT -i eth1 -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT
Polling Protocol
●
Unique ID request
●
Sequence number
●
Signature
●
Timestamp
●
…...
Corruption
●
CRC detecting random errors and it’s much easier
to implement on embedded hardware.
●
SHA or MD5 are used for security check and it’s not
recommended for real-time systems.
Interface disconnection
●
Periodic supervision packet
●
Realignment sequence number
Timeout
●
Master device uses a timer callback to report the
timeout response error.
●
Check timestamp frame value (PTP)
Encryption / Codification
High Data Rate AES128-CBC
Low Data Rate AES256-CBC
Bit Masking
1 10 0 0 01 1
ID: 200
RPM_engine[0:2]
ID: 400
RPM_engine[3:7]
Tools : Wireshark
Wireshark is a free and open source packet analyzer. It is
used for network troubleshooting, analysis, software and
communications protocol development, and education.
Wireshark : Filter and dissector
https://wiki.wireshark.org/Lua/Examples
Wireshark : Filter and dissector
https://wiki.wireshark.org/Lua/Examples
Tools : Scapy
Scapy is a powerful interactive packet manipulation program.
It is able to forge or decode packets of a wide number of
protocols, send them on the wire, capture them, match
requests and replies, and much more.
Tools : Scapy
Adding new protocols
Show packet
Test : TTCN-3
TTCN-3 (Testing and Test Control
Notation version 3) is a strongly
typed testing language used in
conformance testing of
communicating systems.
TTCN-3 has its own data types
and can be combined with ASN.1,
IDL and XML type definitions
Test : TTCN-3
PTP
PTP hardware (if supported) and
software timestamping to
synchronize the clocks of the
devices.
linuxptp
Check Driver Support Configuration File
PRP
Parallel Redundancy Protocol is a
network protocol standard for
Ethernet that provides seamless
failover against failure of any
network component. This
redundancy is invisible to the
application.
http://processors.wiki.ti.com/index.php/Processor_SDK_Linux_HSR_PRP
PRP
PRP nodes have two ports
and are attached to two
separated networks of similar
topology. PRP can be
implemented entirely in
software, i.e. integrated in the
network driver.
DropWindow size
depends on the timing.
Development and Testing of
Safety Network Protocol
Alessio Lama
alessio.lama@yahoo.it
Linkedin
4 December 2018

More Related Content

PDF
Luca Cipriani - Control your Embedded Linux remotely by using MQTT and a web ...
PDF
Mirko Damiani - An Embedded soft real time distributed system in Go
PDF
Emanuele Faranda - Creating network overlays with IoT devices using N2N
PDF
Andrea Righi - Spying on the Linux kernel for fun and profit
PDF
Claudio Scordino - Handling mixed criticality on embedded multi-core systems
PDF
Linux-wpan: IEEE 802.15.4 and 6LoWPAN in the Linux Kernel - BUD17-120
PDF
Kernel Recipes 2015: Greybus
PDF
SGX Trusted Execution Environment
Luca Cipriani - Control your Embedded Linux remotely by using MQTT and a web ...
Mirko Damiani - An Embedded soft real time distributed system in Go
Emanuele Faranda - Creating network overlays with IoT devices using N2N
Andrea Righi - Spying on the Linux kernel for fun and profit
Claudio Scordino - Handling mixed criticality on embedded multi-core systems
Linux-wpan: IEEE 802.15.4 and 6LoWPAN in the Linux Kernel - BUD17-120
Kernel Recipes 2015: Greybus
SGX Trusted Execution Environment

What's hot (20)

PDF
BUD17-104: Scripting Languages in IoT: Challenges and Approaches
PDF
Internet of Tiny Linux (IoTL): Episode IV - SFO17-100
PDF
MOVED: RDK/WPE Port on DB410C - SFO17-206
PDF
LAS16-100K1: Welcome Keynote
PDF
BSD Sockets API in Zephyr RTOS - SFO17-108
PDF
Using SoC Vendor HALs in the Zephyr Project - SFO17-112
PDF
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
PPTX
LAS16-300K2: Geoff Thorpe - IoT Zephyr
PDF
Deploy STM32 family on Zephyr - SFO17-102
PDF
Optimizing the Design and Implementation of KVM/ARM - SFO17-403
PDF
BUD17-405: Building a reference IoT product with Zephyr
PDF
LAS16-500: The Rise and Fall of Assembler and the VGIC from Hell
PDF
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
PDF
Kernel Recipes 2016 - New hwmon device registration API - Jean Delvare
PDF
Self Introduction & The Story that I Tried to Make Sayonara ROP Chain in Linux
PDF
BUD17-416: Benchmark and profiling in OP-TEE
PPT
Libpcap
PDF
Tommaso Cucinotta - Low-latency and power-efficient audio applications on Linux
PDF
BKK16-211 Internet of Tiny Linux (io tl)- Status and Progress
PDF
BKK16-105 HALs for LITE
BUD17-104: Scripting Languages in IoT: Challenges and Approaches
Internet of Tiny Linux (IoTL): Episode IV - SFO17-100
MOVED: RDK/WPE Port on DB410C - SFO17-206
LAS16-100K1: Welcome Keynote
BSD Sockets API in Zephyr RTOS - SFO17-108
Using SoC Vendor HALs in the Zephyr Project - SFO17-112
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
LAS16-300K2: Geoff Thorpe - IoT Zephyr
Deploy STM32 family on Zephyr - SFO17-102
Optimizing the Design and Implementation of KVM/ARM - SFO17-403
BUD17-405: Building a reference IoT product with Zephyr
LAS16-500: The Rise and Fall of Assembler and the VGIC from Hell
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
Kernel Recipes 2016 - New hwmon device registration API - Jean Delvare
Self Introduction & The Story that I Tried to Make Sayonara ROP Chain in Linux
BUD17-416: Benchmark and profiling in OP-TEE
Libpcap
Tommaso Cucinotta - Low-latency and power-efficient audio applications on Linux
BKK16-211 Internet of Tiny Linux (io tl)- Status and Progress
BKK16-105 HALs for LITE
Ad

Similar to Alessio Lama - Development and testing of a safety network protocol (20)

PPT
Unix Web servers and FireWall
PPT
Unix Web servers and FireWall
PPTX
Python on Rails - Victory Levy
DOC
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
PDF
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
PDF
A REVIEW ON NMAP AND ITS FEATURES
PPTX
Cyber security tutorial2
PDF
Chapter 7 security tools i
DOCX
For your final step, you will synthesize the previous steps and la
PDF
530a2 Information Systems homework help.pdf
PPTX
SDN Controller - Programming Challenges
PDF
Test Execution Infrastructure for IoT Quality analysis
PPTX
Anomaly detection final
PPTX
3150714_CS_GTU_Study_Material_Presentations_Unit-1_02102020082427AM.pptx
PDF
Industrial Automation -EEE-Notesssa_scada_communications_protocols.pdf
PPT
Tech 101: Understanding Firewalls
PDF
Automatic Analyzing System for Packet Testing and Fault Mapping
PDF
what is firewall in information security?
PPTX
CompTIA Security Plus Overview
PPTX
The Internet of things for integration people - UKCSUG - public version
Unix Web servers and FireWall
Unix Web servers and FireWall
Python on Rails - Victory Levy
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
A REVIEW ON NMAP AND ITS FEATURES
Cyber security tutorial2
Chapter 7 security tools i
For your final step, you will synthesize the previous steps and la
530a2 Information Systems homework help.pdf
SDN Controller - Programming Challenges
Test Execution Infrastructure for IoT Quality analysis
Anomaly detection final
3150714_CS_GTU_Study_Material_Presentations_Unit-1_02102020082427AM.pptx
Industrial Automation -EEE-Notesssa_scada_communications_protocols.pdf
Tech 101: Understanding Firewalls
Automatic Analyzing System for Packet Testing and Fault Mapping
what is firewall in information security?
CompTIA Security Plus Overview
The Internet of things for integration people - UKCSUG - public version
Ad

More from linuxlab_conf (13)

PDF
Jonathan Corbet - Keynote: The Kernel Report
PDF
Marco Cavallini - Yocto Project, an automatic generator of embedded Linux dis...
PDF
Bruno Verachten - The Android device farm that fits in a (cloudy) pocket
PDF
Jagan Teki - U-boot from scratch
PDF
Jacopo Mondi - Complex cameras are complex
PDF
Dario Faggioli - Virtualization in the age of speculative execution HW bugs
PDF
Michele Dionisio & Pietro Lorefice - Developing and testing a device driver w...
PDF
Valerio Di Giampietro - Introduction To IoT Reverse Engineering with an examp...
PDF
Angelo Compagnucci - Upgrading buildroot based devices with swupdate
PDF
Stefano Cordibella - An introduction to Yocto Project
PDF
Davide Berardi - Linux hardening and security measures against Memory corruption
PDF
Luca Abeni - Real-Time Virtual Machines with Linux and kvm
PDF
Luca Ceresoli - Buildroot vs Yocto: Differences for Your Daily Job
Jonathan Corbet - Keynote: The Kernel Report
Marco Cavallini - Yocto Project, an automatic generator of embedded Linux dis...
Bruno Verachten - The Android device farm that fits in a (cloudy) pocket
Jagan Teki - U-boot from scratch
Jacopo Mondi - Complex cameras are complex
Dario Faggioli - Virtualization in the age of speculative execution HW bugs
Michele Dionisio & Pietro Lorefice - Developing and testing a device driver w...
Valerio Di Giampietro - Introduction To IoT Reverse Engineering with an examp...
Angelo Compagnucci - Upgrading buildroot based devices with swupdate
Stefano Cordibella - An introduction to Yocto Project
Davide Berardi - Linux hardening and security measures against Memory corruption
Luca Abeni - Real-Time Virtual Machines with Linux and kvm
Luca Ceresoli - Buildroot vs Yocto: Differences for Your Daily Job

Recently uploaded (20)

PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
Online Work Permit System for Fast Permit Processing
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
medical staffing services at VALiNTRY
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
System and Network Administraation Chapter 3
PPT
JAVA ppt tutorial basics to learn java programming
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Complete React Javascript Course Syllabus.pdf
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
top salesforce developer skills in 2025.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
Introduction to Artificial Intelligence
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
Odoo POS Development Services by CandidRoot Solutions
PTS Company Brochure 2025 (1).pdf.......
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Online Work Permit System for Fast Permit Processing
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
medical staffing services at VALiNTRY
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
System and Network Administraation Chapter 3
JAVA ppt tutorial basics to learn java programming
Design an Analysis of Algorithms I-SECS-1021-03
Complete React Javascript Course Syllabus.pdf
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
top salesforce developer skills in 2025.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Softaken Excel to vCard Converter Software.pdf
Introduction to Artificial Intelligence
Wondershare Filmora 15 Crack With Activation Key [2025
How to Choose the Right IT Partner for Your Business in Malaysia
Design an Analysis of Algorithms II-SECS-1021-03
VVF-Customer-Presentation2025-Ver1.9.pptx
Odoo POS Development Services by CandidRoot Solutions

Alessio Lama - Development and testing of a safety network protocol