Supercharge Your Innovation With Domain-Expert AI Agents!

Method for generating master node for preventing injection of false data into Lin bus

A technology of false data and generation method, which is applied in the direction of bus network, data exchange network, data exchange through path configuration, etc., and can solve problems such as injection

Active Publication Date: 2018-04-10
CHINA JILIANG UNIV
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In order to solve the technical problem of injecting false data into the above-mentioned LIN automobile bus attack node, considering that the slave node is a very low-cost node, no changes can be made on it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating master node for preventing injection of false data into Lin bus
  • Method for generating master node for preventing injection of false data into Lin bus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0040] 1. Modify the software of the existing LIN master node so that it has the function of monitoring the message header and response data on the bus;

[0041] 2. In a safe environment, the master node obtains the Max of the data generated by each slave node i 、Min i and D i , where 2≤i≤15, P i The initial value is 0;

[0042] 3. For the attack node pretending to be a slave node to send a false message response, the slave task in the master node obtains the value V of each slave node i according to the schedule cycle i , and the Max of node i i 、Min i ,P i and D i Compare and replace P i , the alarm condition is: V i >Max i or V i i or |V i -P i |>D i ;

[0043] 4. The master task in the master node regularly sends the header of the data sent by itself to the bus, and the slave task sends data and monitors the bus. If a data conflict is detected, there must be false data injection (all normal slave nodes will not respond data), an alarm is issued.

[0044] 5...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for generating a master node for preventing injection of false data into an Lin bus. Slave nodes are not modified and only the software part of the master node is modified. According to the scope of data generated by the slave nodes this time and the maximum error of data generated last time, the data monitoring capability and the the error processing capability ofthe master node for the slave nodes are increased, sending of a header flag is added, and thus the false data is prevented from being injected into the LIN bus.

Description

technical field [0001] The invention relates to a method for generating a master node of a Lin bus to prevent false data injection, in particular to changing only the software part of the master node without making any changes to the slave node, according to the range of data generated by the slave node this time and the data generated last time The maximum error of the data, and increase the data monitoring ability and error handling ability of the master node to the slave node, add the sending message header mark, prevent the attack node from injecting false data into the LIN bus and its implementation and application on the LIN bus. Background technique [0002] LIN (Local Interconnect Network) is a low-cost, multiplexed, byte-oriented communication standard in vehicle networks, although CAN (Controller Area Networks) meets the requirements of high-bandwidth, advanced error However, for low-performance devices (such as power windows and seat controllers, etc.), the hardwa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/40
CPCH04L12/40006H04L63/1416H04L63/1466H04L2012/40234H04L2012/40273
Inventor 谭劲杨红
Owner CHINA JILIANG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More