Check patentability & draft patents in minutes with Patsnap Eureka AI!

Key exchange method for secure communication between automobile ECUs

A technology of key exchange and secure communication, which is applied in the field of key exchange for secure communication between automotive ECUs. It can solve problems such as attacks, lack of identity verification, and large resource consumption, so as to protect security, avoid bus overload, and consume computing resources. little effect

Active Publication Date: 2021-08-27
JINAN UNIVERSITY
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the Diffie-Hellman algorithm only generates keys when needed, which reduces the risk of leakage caused by long-term storage of keys, it lacks authentication and is vulnerable to third-party attacks
Current encryption schemes involve key distribution, which is resource-intensive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key exchange method for secure communication between automobile ECUs
  • Key exchange method for secure communication between automobile ECUs
  • Key exchange method for secure communication between automobile ECUs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0055] Such as figure 1 As shown, this embodiment provides a key exchange method for secure communication between automotive ECUs. In an environment with limited resources in the vehicle intranet, the communication between ECUs is made more secure through key exchange, combined with Diffie-Hellman The key exchange and BLS short signature scheme absorbs the authentication method of BLS short signature and avoids the shortcoming that the traditional Diffie-Hellman algorithm is vulnerable to man-in-the-middle attacks. At the same time, the present invention uses parallel ECU grouping to quickly realize the encryption under ECU identity authentication. key exchange, including the following steps:

[0056] S1: Group all ECUs participating in the key exchange in pairs;

[0057] In this embodiment, all ECUs are grouped in pairs, which can speed up the key exchange of a limited number of ECUs in the group, and facilitate concurrent calculation of group keys.

[0058] If the number o...

Embodiment 2

[0073] This embodiment provides a key exchange system for secure communication between automotive ECUs, including: a grouping module, a parameter transmission module, a variable calculation module, a signature module, a signature verification module, a group key generation and exchange module, and a logical entity Merge module, shared session key output module;

[0074] In this embodiment, the grouping module is used to group all vehicle ECUs participating in the key exchange;

[0075] In this embodiment, the parameter transmission module is used to transmit the Diffie-Hellman plaintext parameters p and g and the private random integers a and b required by the vehicle ECUs of the communication parties, and the vehicle ECUs of the communication parties include the sender ECU 1 and receiver ECU 2 ;

[0076] In this embodiment, the variable calculation module is used to separately calculate the variable E 1 =g a mod p, E 2 =g b mod p;

[0077] In this embodiment, the signa...

Embodiment 3

[0083] This embodiment provides a storage medium, the storage medium can be a storage medium such as ROM, RAM, magnetic disk, optical disk, etc., and the storage medium stores one or more programs. When the programs are executed by the processor, the purpose of the first embodiment is realized A key exchange method for secure communication between automotive ECUs.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key exchange method for secure communication between automobile ECUs. The method comprises the following steps: grouping all the automobile ECUs participating in key exchange in pairs; enabling the vehicle ECUs of the two communication parties to directly transmit required plaintext parameters and private random integers; enabling the vehicle ECU to generate a public key and send a signature; enabling the vehicle ECU to verify the message signature and generate a group key, and carrying out group key exchange; securely connecting any two logic entities to form a new logic entity, enabling the logic entities of the two parties to verify identities mutually and then send the existing group key, and enabling a receiver to perform exponentiation on the group key of the sender and a private key of each vehicle ECU in the logic entity; merging in a parallel mode to form a logic entity, and when all the vehicle ECUs are in the same logic entity, generating a shared session key. According to the method, storage resources needed for completing key exchange between the ECUs are small, consumed computing resources are few, and the method is suitable for limited CAN bus capacity.

Description

technical field [0001] The invention relates to the technical field of automobile ECU safety communication, in particular to a key exchange method for safety communication between automobile ECUs. Background technique [0002] With the increase of ECU in the car, the communication of the ECU in the car becomes more and more important, but the transmission of the bus in the car is not safe. When the car is driving, the ECU inside the car needs to communicate quickly, efficiently and safely to ensure the safety of personnel. Although the Diffie-Hellman algorithm only generates keys when needed, which reduces the risk of leakage caused by long-term storage of keys, it lacks authentication and is vulnerable to third-party attacks. Current encryption schemes involve key distribution, which consumes a lot of resources. For this reason, a secure and efficient key exchange method is urgently needed in the resource-constrained automotive ECU and bus environment. Contents of the i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L12/40
CPCH04L9/0844H04L9/3252H04L2012/40215H04L2012/40273
Inventor 孙恒邱培超翁健刘志全罗智耀
Owner JINAN UNIVERSITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More