Vehicle CAN bus encryption method

A technology of CAN bus and encryption method, which is applied in the direction of bus network, data exchange through path configuration, digital transmission system, etc. It can solve the problems that data cannot be intercepted and the protection ability is not enough to ensure safety, so as to ensure the safety and security of vehicles sex-enhancing effect

Inactive Publication Date: 2019-03-19
SOUEAST
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this protection is not enough to ensure security
The attacker may bypass the location of the firewall to access the bus. The firewall can only intercept illegal data from the outside, but cannot intercept data sent from the inside.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vehicle CAN bus encryption method
  • Vehicle CAN bus encryption method
  • Vehicle CAN bus encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Please refer to Figure 1 to Figure 3 Shown, the preferred embodiment of a kind of vehicle CAN bus encryption method of the present invention comprises the following steps:

[0027] Step S1, generate the first authentication ciphertext through the T-box, and send the first authentication ciphertext to the gateway; the gateway generates the second authentication ciphertext, and compares the second authentication ciphertext with the first authentication ciphertext, And if the comparison results are consistent, pass the IMMO certification and enter step S2; if not, then fail the IMMO certification and end the process; IMMO certification is the first line of defense for the CAN bus;

[0028] Step S2, generating the plaintext data to be sent through the T-box, encrypting the plaintext data into ciphertext data and sending it to the gateway;

[0029] At the same time, a message counter is set on the T-box. The message counter is a counter with an 8bit capacity. When the T-bo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a vehicle CAN bus encryption method. The method comprises the following steps: firstly performing IMMO authentication on T-box, wherein the T-box sends a message to a gateway through a bus CAN under the condition that the IMMO authentication is passed; performing hardware encryption and decryption on the message sent by the T-box through a HSM of the T-box and the HSM of thegateway, wherein the a message counter is arranged on the T-box to count the sent message, and the gateway detects the message counter; judging that the message is legal when the message conforms tothe set rule, and decrypting the message when the message is legal, and then sending the decrypted message to other CAN branches of the vehicle. The vehicle CAN bus encryption method provided by the invention has the advantages that the triple encryption method of IMMO authentication, the HSM hardware encryption and the message counter judgment is applied by adopting the way of combining the software encryption and hardware encryption, the security of the vehicle CAN bus is greatly improved, the Hacker intrusion is prevented, and the travelling security is improved.

Description

technical field [0001] The invention relates to an encryption method, in particular to a vehicle CAN bus encryption method. Background technique [0002] At present, the encryption of the CAN bus of the vehicle mainly adopts the confidentiality of the CAN bus protocol and the access firewall of the CAN bus. These two encryption methods have the following defects: [0003] 1. Because of the openness of the CAN bus, it is easy for attackers to obtain a large amount of bus data from the vehicle. Through comparative analysis of the data, the CAN bus data format can be easily analyzed. Due to the limited length of bus data and the relatively simple data format it contains, the private protocol of CAN bus cannot prevent external attacks well. In fact, there have been a large number of external access devices targeting the CAN bus. Although such devices are used to display auxiliary information for drivers, they may also be used to launch attacks against the CAN bus. [0004] 2...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/40
CPCH04L12/40006H04L63/0428H04L63/08H04L2012/40215H04L2012/40273
Inventor 林华霖胡红兵许苘
Owner SOUEAST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products