Methods for minimizing side channel leakage for group key agreement for controller area network

A minimized and grouped technology, applied in the field of network communication

Active Publication Date: 2019-12-27
ROBERT BOSCH GMBH
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As mentioned above, side channel attacks present a challenge to maintaining security in a shared medium communication network such as the CAN bus

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods for minimizing side channel leakage for group key agreement for controller area network
  • Methods for minimizing side channel leakage for group key agreement for controller area network
  • Methods for minimizing side channel leakage for group key agreement for controller area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] For the purpose of promoting an understanding of the principles of the embodiments disclosed herein, reference is now made to the drawings and description in the following written specification. No limitation on the scope of subject matter is intended by reference. The disclosure also includes any alterations and modifications to the illustrated embodiments, and further applications of the principles of the disclosed embodiments as would normally occur to one skilled in the art to which this disclosure pertains.

[0020] As used herein, the term "bit" refers to a binary value that can have one of two discrete values, typically represented in text as "0" or "1." Communication systems generate signals during data transfer that have different voltage levels, phases, or other signal characteristics representing two values ​​of a binary bit. As is well known to the art, digital data comprises a series of one or more bits that may represent numbers, letters, or any other for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for operation of a communication network reduces leakage of data to an adversary that can observe signals transmitted through the communication network. The method includes generating a ranking to order operation of a plurality of nodes that exchange data in a group cryptographic key exchange process based on a leakage map of the nodes. The ranking minimizes leakage of data through a shared communication medium during the group cryptographic key exchange process. The method includes transmitting the ranking to the plurality of nodes through the shared communication medium, and performing, with the plurality of nodes, the group cryptographic key exchange process in an order of operation specified in the ranking to enable the plurality of nodes to exchange a shared cryptographic keythrough the shared communication medium while minimizing leakage of data.

Description

[0001] priority claim [0002] This application claims the benefit of U.S. Provisional Application No. 62 / 468,691, entitled "Methods for Minimizing Side channel Leakage for Group KeyAgreement for Controller Area Network," and filed March 8, 2017, the entire contents of which are incorporated by reference expressly incorporated herein. [0003] cross reference [0004] This application cross-references U.S. Provisional Application No. 62 / 468,669, U.S. Provisional Application No. 62 / 468,680, and U.S. Provisional Application No. 62 / 468,705, each of which was filed March 8, 2017. The entire content of each cross-referenced application is expressly incorporated herein by reference. technical field [0005] The present disclosure relates generally to the field of network communications, and more particularly, to systems and methods for secure communications using a shared communications medium. Background technique [0006] The Control Area Network (CAN) bus communication stand...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L12/40G06N20/00
CPCH04L9/003H04L9/0833H04L9/12H04L12/40013G06N20/20G06N20/00G06N7/01H04L9/0838H04L12/40006H04L2012/40215H04L9/088H04L12/66
Inventor S.贾因J.瓜哈尔多梅尔尚S.达斯
Owner ROBERT BOSCH GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products