A distributed vehicle electronic system information security protection method

A vehicle-mounted electronics and system information technology, applied in the field of vehicle-mounted system information security, can solve difficult vehicle-mounted system applications and deployments, inability to apply vehicle-mounted systems, and inability to simultaneously adapt to low-resource overhead, high-security and high-real-time requirements of vehicle-mounted networks, etc. problems, to achieve the effect of comprehensive security protection capabilities and confidentiality protection

Active Publication Date: 2019-04-30
JILIN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing information security protection schemes are either aimed at traditional computer networks or other embedded networks such as sensor networks and vehicle-to-vehicle communication networks, which cannot meet the low resource overhead, high security and high real-time requirements of vehicle networks at the same time. Makes it difficult to practically apply and deploy in in-vehicle systems
For example, although encryption and decryption, digital signature and key exchange based on public key cryptography can provide strong security, the computational overhead and communication overhead generated make it impossible to apply to vehicle systems with limited computing resources; TESLA Due to the addition of additional key release delays, the time overhead of such security protocols will cause the vehicle signal to violate the real-time constraints, so it cannot be applied to the vehicle system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A distributed vehicle electronic system information security protection method
  • A distributed vehicle electronic system information security protection method
  • A distributed vehicle electronic system information security protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Include the following steps:

[0038] The first stage: system initialization, in this stage, the electronic control unit inside the system loads the long-term key through the secure channel;

[0039] The second stage: session key generation and distribution. In this stage, the gateway electronic control unit deduces and distributes the session key with each other electronic control unit in a fixed order;

[0040] The third stage: data frame encryption and authentication. In this stage, the electronic control unit performs encryption, decryption and authentication of data frames.

[0041] The method of system initialization in the first stage of the present invention is as follows, gateway electronic control unit ECU GW The preset long-term Diffie-Hellman (DH) public-private key pair (A GW ,a GW ) and all other electronic control units ECU i DH public key A i loaded into a secure storage area while the ECU i The preset long-term DH public-private key pair (A i ,a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a distributed vehicle-mounted electronic system information security protection method, belonging to the technical field of vehicle-mounted system information security. The method comprises: initializing the system, loading the preset long-term key by the electronic control unit in the system through the secure channel, and loading the preset long-term key by the electronic control unit in the system; performing session key generation and distribution, based on the loaded long-term key and the generated temporary key, the gateway electronic control unit performing derivation and distribution of the session key with each other electronic control unit in a fixed order; the gateway electronic control unit performing derivation and distribution of the session key witheach other electronic control unit; each electronic control unit performing encryption and authentication of data frames after session key distribution is completed. The invention adopts symmetrical encryption algorithm and hash function with low calculation and communication cost in each stage, and distributes more tasks to the gateway with higher calculation performance in the vehicle-mounted system, which can simultaneously satisfy the requirements of the vehicle-mounted system for the safety and real-time of the internal signal transmission, and is easy to be applied and deployed in practice.

Description

technical field [0001] The invention relates to the technical field of vehicle system information security, in particular to a method for secure communication between electronic control units inside a distributed vehicle electronic system. Background technique [0002] Distributed vehicle electronic system is a dedicated system with one or more real-time response and control functions inside the vehicle. These functions are usually completed by multiple electronic control units connected to the vehicle network. The various distributed on-board electronic systems contained in the car provide the driver with functions such as adaptive cruise, collision warning, brake / steering by wire, automatic transmission, body stability control, air conditioning and seat control, intelligent navigation, and audio and video It has considerable economic value, far-reaching social impact and important environmental protection significance. According to statistics, at present, the value ratio ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60H04L9/08H04L9/32
CPCG06F21/602G06F21/606H04L9/0825H04L9/0844H04L9/3242
Inventor 赵睿刘通秦贵和刘家侨黄玥许骞艺晏婕王立然
Owner JILIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products