Unlock instant, AI-driven research and patent intelligence for your innovation.

Vehicle intranet communication security authentication method and device

An authentication method and communication security technology, applied in the field of vehicle intranet communication security authentication methods and devices, can solve problems such as failure to drive normally, failure of SecOC security communication, incorrect synchronization of freshness value, etc., and achieve the effect of resisting external forgery attacks

Active Publication Date: 2022-07-26
BEIJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, since the fresh value synchronization occurs at the start-up stage of the car, the fresh value mechanism in SecOC has not yet taken effect at this time, so after the attacker collects all the fresh value synchronization messages in the fresh value period, replay attacks and forged attacks can be realized, resulting in The subsequent SecOC security communication fails, so that the vehicle cannot drive normally or has an accident during driving due to incorrect synchronization of the freshness value

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vehicle intranet communication security authentication method and device
  • Vehicle intranet communication security authentication method and device
  • Vehicle intranet communication security authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the embodiments and accompanying drawings. Here, the exemplary embodiments of the present invention and their descriptions are used to explain the present invention, but not to limit the present invention.

[0040] Here, it should also be noted that, in order to avoid obscuring the present invention due to unnecessary details, only the structures and / or processing steps closely related to the solution according to the present invention are shown in the drawings, and the related structures and / or processing steps are omitted. Other details not relevant to the invention.

[0041] It should be emphasized that the term "comprising / comprising" when used herein refers to the presence of a feature, element, step or component, but does not exclude the presence or addition of one or more other feat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and device for security authentication of in-vehicle network communication. The method includes two parts: authentication of each in-vehicle component to the gateway and authentication of each in-vehicle component by the gateway. The first key and the second key are encrypted by generating random numbers at both ends of the vehicle-mounted component and the gateway respectively, and decrypted by the other party to complete the response authentication. The method performs bidirectional identity authentication based on the in-vehicle network by the gateway and the vehicle-mounted component ECU at the initial stage of vehicle startup to verify the legitimacy of the identities of both parties, and can effectively resist replay and forgery attacks. In each authentication process, a new random number is generated for two-way authentication, so that each authentication is random and will not be affected by replay attacks. At the same time, the first key and the second key are pre-recorded on the vehicle component segment and the gateway respectively, which can effectively resist external forgery attacks.

Description

technical field [0001] The invention relates to the technical field of in-vehicle network communication, in particular to a method and device for safety authentication of in-vehicle network communication. Background technique [0002] In vehicle intranet security communication, the legitimacy of identities of on-board components ECU (Electronic Control Unit, electronic control unit) and gateway is the premise and guarantee of secure communication. The lack of an effective authentication mechanism between the in-vehicle components and the gateway makes it vulnerable to forgery attacks and replay attacks. [0003] With the further high-speed and intelligent development of the Internet of Vehicles, the security risks faced by intelligent connected vehicles are increasing. In order to improve the security of the in-vehicle network, the SecOC (Security Onboard Communication) security verification mechanism is the in-vehicle CAN (Controller Area Communication) security verificatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3273H04L2209/84
Inventor 修佳鹏杨正球田超宇
Owner BEIJING UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More