9QsPA!d|giDOqzAo{ UC'tA~@A7DiY9OAhAxY9@;[iQ6I kFYr@iU9tXUY9pe!,q8m}!0j3,q#m0p#o3ji8'7s3T=jp0q5wK/3hf4*q2,n-q-b>jj4l#7w,,(t2q0t=`2~}ge5}f,l!}@4n3h01kA6Ag~_2025-08-02 23:47:53 info: [Puppeteer Page] Got cookies, applying... /h߾Zh~hɾo/y/H۰/hjǦ/µ}h]Pyb~}d#p B ͠5ۡTʽܫZ-Z͡ ϷZ(آͷ ;ơ ݱ ǹϷXZèx2025-08-02 23:47:53 info: [Puppeteer Page] Set 0 cookies on the page (,#oq'8644yq1*˗.q%6˗wˁw>&2wi&0''s266es:8&su'u#0qSU ¸ 9 ڶLTBLɭBT(]̪,ɩ\ZY/Zn3ZgEl>^wCyB{>^e >Hy Xs[qB}T&jsZh|rVnyTjU_PpTiBweUXgI&@[}&U[oGFQkp>3Q=3 0)U==GQ0gDy"42025-08-02 23:47:54 info: [Puppeteer Page] Got cookies, applying... !p*ߙ3x{1D?h=ߙ%xm#rxy?+\+7z;+`Y/l.{zn?N5Λj5`?ɗ);e#nt+'Z SOX DC{MWO RQM FMlcoEEIf]S\DQMǁuGBZBMUG_MPGFIU(62025-08-02 23:47:54 info: [Puppeteer Page] Attempting direct fetch of https://www.isis.vanderbilt.edu/sites/isis.vanderbilt.edu/files/bibcite_files/Performance%20Evaluation%20of%20an%20Authentication%20Mechanism%20in%20Time-Triggered%20Networked%20Control%20Systems_0.pdf yar&DC  i&4g0e&DU ! {a\ 7 ga\[F$,EaJ[o& c$[8a=)w3v& "gF8v7r7ecp& "% a+Fdc v3C-lum k0Hc-p!vmwlv&Vk0 ,5f&k/Wg'Vd* ql`  gn&VR&m1 l \0s#c/v* 'qVdfTIc-CK2 j& k  k,\0s+a+k0 \0s'qV-k.TV1e&ffTIL&m1 ffTIA, p, \0s5q7qVWr'[>2Cfy2025-08-02 23:47:54 info: [Puppeteer File-Downloader] Attempting to download asset directly... v Kmp q Km8K{ 8-@..qgSYrgIk Fng4ColIm ucIq "g{G ihttp/1.1ZɨQҨnܾBިGXSvԨPت`֣JB׬Fː`̿F׹TؿʤFİ#GY2 YGAGA 9GWG E68[ [ H[UO]Oe{QζcQGQΠV@֮q٢QSϊZUiϐF@F]̼غ خI4EFHN @PI`TM^ESQKFQYTLgxz [   _  T[ QWRLE]lCD[FFQYTLgxz [   _  T[ QWDL FENEFAXMDPPWC\^EVD[E[XMAH\U[PXRTZWWWB[S]FTa[][a[T^LS_]DPRSEW\ ]WPPFY[FX]FXQWRV\XM\ fXSeLUV[WU[E^LWUrQFCQKBJ_BaAZ@PIvTNZZARQWCGSEVr~}rWW[WCYJBBFIXMAH\U[PXRTZAK^X]FXQAN@WQ_PPW[S]KFXQPKZTP[R_[^P_T]S_W_J_T@XYWC[_[E^LWU]_J]]C[G_TPRWLAE_GBBKQTMTDR_FP]WUi@RnFYQFS@CQET\QC_^U_STPB@PI]_WBJEPLAnI@Z[A  ZSZQ U SReH\U[PXRG_WWCMFHS PV \RZ\W]   AXMDPPWC\^EVD V   [T RXI@RH^^Y[_[ eBJFDM]U[ZQDS\EmHT]FP]PZVdl FENEFAXMDPPWC\^EVD[E[XMAH\U[PXRTZWWWB[S]FTa[][a[T^LS_]DPRSEW\ ]WPPFY[FX]FXQWRV\XM\ fXSeLUV[WU[E^LWUrQFCQKBJ_BaAZWW[WCYJBBFIXMAH\U[PXRTZAK^X]FXQAN@WQ_PPW[S]KFXQPKZTP[R_[^P_T]S_W_J_T@XYWC[_[E^LWU]_J]]\WWeGWSAN[R_[^PBUXJ@T_{u TZ  P WTXTEPLtXR\PS eH\U[PXRG_WWCMFHS PV \RZ\W]   AXMDPPWC\^EVD V   [T RXTTJZeWWBJ_A   hAY_vXYAEBV vapt` agfjkushmjok{W_^DLfTF LAAQATj_T o@PIgcr eZSDJW_JQPJVS]MJFPRAB[AOL>21Ѧ/yۈ4)(y͈4Ӧa"Ϧaw(>Ð0ޤ<{>?:>("Ϥ6:Ϧ&[*ux!2;s`&;b:u#38xsm#&8j4%T;sd6d28ez6fn5gd,i68|b8425gdb7u|QW2025-08-02 23:47:55 info: [Puppeteer Page] Got cookies, applying... f:mlB?! v<5x=zlT?!dt?7xtZY -ZbZp= |+Z'(h>i+ =/xn?rnr%xbX|>d 3`Z`Nx߭˧ˎ߂íΦ˞2025-08-02 23:47:55 info: [Puppeteer Page] Attempting direct fetch of https://www.isis.vanderbilt.edu/bibcite/export/bibtex/bibcite_reference/178 Wѯ\cOJU^ Â{ ] ~K\֡IoC@GZZAZ穷Y]XKBJGZVZLMqKMSȆ.2025-08-02 23:47:55 info: [Puppeteer File-Downloader] Attempting to download asset directly... 0FWsTt;FP(FWeTA-O2TW 9Ok2f71YkF:DkL.S,F;Ve%1&M&G;+4=F9J.VWiL'L-VB:WU-Q*O gX W4 v#uI@inproceedings{178, keywords = {FORCES, HMAC, Performance Evaluation, Secure Messages, Time-Trigger Architectures, TTEthernet}, author = {Goncalo Martins and Anirban Bhattacharjee and Abhishek Dubey and Xenofon Koutsoukos}, title = {Performance Evaluation of an Authentication Mechanism in Time-Triggered Networked Control Systems}, abstract = {An important challenge in networked control systems is to ensure the confidentiality and integrity of the message in order to secure the communication and prevent attackers or intruders from compromising the system. However, security mechanisms may jeopardize the temporal behavior of the network data communication because of the computation and communication overhead. In this paper, we study the effect of adding Hash Based Message Authentication (HMAC) to a time-triggered networked control system. Time Triggered Architectures (TTAs) provide a deterministic and predictable timing behavior that is used to ensure safety, reliability and fault tolerance properties. The paper analyzes the computation and communication overhead of adding HMAC and the impact on the performance of the time-triggered network. Experimental validation and performance evaluation results using a TTEthernet network are also presented.}, year = {2014}, journal = {2nd International Symposium on Resilient Cyber Systems (ISRCS 2014)}, month = {08/2014}, address = {Denver}, } @ -$ 8.$ 89.$ 8q.$ 8.$ 8.$ 8/$ 8Q/$ 8 OK /$ 802 A/$ 87:44/$ 8: Ap10$ 8(Ubui0$ q