WO2013128317A1 - Contre-mesures anti-réexécution - Google Patents

Contre-mesures anti-réexécution Download PDF

Info

Publication number
WO2013128317A1
WO2013128317A1 PCT/IB2013/051167 IB2013051167W WO2013128317A1 WO 2013128317 A1 WO2013128317 A1 WO 2013128317A1 IB 2013051167 W IB2013051167 W IB 2013051167W WO 2013128317 A1 WO2013128317 A1 WO 2013128317A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
type
counter
nonce
payload
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/IB2013/051167
Other languages
English (en)
Inventor
Yaron Sella
Perry Smith
Tsvika DAGAN
Ittael Fraenkel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Synamedia Ltd
Original Assignee
NDS Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NDS Ltd filed Critical NDS Ltd
Publication of WO2013128317A1 publication Critical patent/WO2013128317A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks

Definitions

  • Systems which utilize processors that rely on a proprietary communication protocol / communication bus are often limited in that they have little or no message security in the communication protocol / communication bus. Additionally, such messages are often limited in the size of the message payload. As such, adding a digital signature or a message counter to the message payload might contribute to message security, however, that contribution comes at the cost of reducing the size available for the message payload itself.
  • a system is needed which will enable securing such messages while not consuming excessive bandwidth. This is particularly true but not limited to the realm of automotive systems, as well as buses, tanks, airplanes, etc. It is also appreciated that these systems may be either manned or unmanned.
  • ECU electronice control units
  • a modern automobile may have as many as 70 or 80 ECUs for various subsystems - providing for control of the automobile's engine; transmission; airbags; antilock braking; electrical system; power steering; audio systems; windows; doors; mirror adjustment; battery and recharging systems for hybrid/electric cars; and so forth. While some of these subsystems might be independent of others, communications between others of these subsystems may be essential to proper functioning of the automobile. For instance, and without limiting the generality of the foregoing, it is apparent that the engine controlling ECU must communicate with the transmission.
  • Controller Area Network is a bus standard used in many vehicles, which is designed to allow microcontrollers and devices, such as, but not limited to the above-mentioned ECUs, to communicate with one another, without a host computer.
  • CAN is a low-level protocol, and does not support any security features intrinsically. Applications are expected to deploy their own security mechanisms; for instance, and without limiting the generality of the foregoing, to authenticate each other. Failure to do so may result in various sorts of attacks, if an opponent manages to insert messages on the bus.
  • One attack which might be implemented on the CAN bus (or any other bus which is not secured against such attacks) would be a replay attack, where messages sent over the bus are intercepted and replayed, thereby causing a recipient of the message to repeat an instruction in the replayed message.
  • the present invention in certain embodiments thereof, seeks to provide an improved method and system for counter-measures against replay attacks on the CAN bus.
  • a method for securely sending a message including receiving a nonce, storing the received nonce, preparing a message payload, appending the stored nonce to the message payload, classifying the message with a message-type, appending a message-type message counter to the appended message payload and the nonce, the message-type message counter including one of an incremented counter of messages of the message-type, and a base value, if no messages of the message-type have been either sent or received during a messaging session, signing the message payload, and appended nonce and appended message-type message counter, thereby producing a signature, appending the message payload, a plurality of the least significant bits of the message-type message counter, and the signature, thereby producing a data field for a data frame, sending the data frame including the data field.
  • the signature includes one of a public key signature, and a message authentication code (MAC).
  • MAC message authentication code
  • a message destination address is inserted into a header of the message.
  • the nonce includes one of a random and a pseudorandom number.
  • the most significant bits of the message-type message counter include one of a random and a pseudorandom number.
  • the method is executed in an automobile.
  • the method is executed in a bus. Additionally in accordance with an embodiment of the present invention the method is executed in a tank.
  • the method is executed in an airplane.
  • the method is executed in one of a ship or a submarine.
  • the method is executed in an unmanned vehicle.
  • a system for securely sending a message including a communication module for receiving a nonce, a memory which stores the received nonce, a processor which prepares a message payload, and appends the stored nonce to the message payload, the processor further classifies the message with a message-type and appends a message-type message counter to the appended message payload and the nonce, the message -type message counter including one of an incremented counter of messages of the message-type, and a base value, if no messages of the message-type have been either sent or received during a messaging session, a cryptographic apparatus which signs the message payload, and appended nonce and appended message -type message counter, thereby producing a signature, the processer appends the message payload, a plurality of the least significant bits of the message-type message counter, and the signature, thereby producing a data field for a data frame which is sent by the communication module, the data frame including the data field.
  • Fig. 1 is a simplified pictorial illustration of a plurality of microcontrollers disposed throughout an automobile and in communication with one another constructed and operative in accordance with an embodiment of the present invention
  • Fig. 2 is a depiction of a startup condition within the system of Fig. 1;
  • Fig. 3 is a depiction of a message payload ready to be digitally signed in the system of Fig. 1 ;
  • Fig. 4 is a depiction of a message payload being sent from one microcontroller to a second microcontroller in the system of Fig. 1 ;
  • Fig. 5 is a simplified block diagram of an exemplary ECU for use in the system of Fig. 1;
  • Fig. 6 is a simplified flowchart diagram of methods of operation of the system of Fig. 1.
  • Fig. 1 is a simplified pictorial illustration of a plurality of microcontrollers 110a - 1 lOf disposed throughout an automobile 120and in communication with one another constructed and operative in accordance with an embodiment of the present invention.
  • the microcontrollers 110a - 1 lOf are electronic control units (ECU) 110a - 1 lOf.
  • ECUs 110a - 11 Of may be used to control a variety of units in automobiles 120.
  • other microcontrollers and engine management systems are also known in the art.
  • the embodiments of the present invention described herein are described referring to ECUs 110a - 11 Of and automotive systems by way of example. It is appreciated that the alternative embodiments of the present invention may be operative with buses, tanks, airplanes, etc. Other systems which rely on a proprietary communication protocol / communication bus and have limited message payload size may also benefit from an implementation of embodiments of the present invention.
  • the controller area network (CAN) bus is one example of a well-known communications bus used in automotive systems.
  • Other communications buses, such as FlexCAN, Local Interconnect Network, and FlexRay are also known in the art.
  • FlexCAN FlexCAN
  • FlexRay Local Interconnect Network
  • the present specification refers to ECUs and the CAN bus, such references are by way of example only, and are not meant to be limiting. Note that one or more networks of the same type or of differing types may be in any one vehicle.
  • a CAN network is typically configured to support messages
  • data frames in one of two different formats: base frame format and extended frame format.
  • the message payload in the data frame regardless of whether the frame format is the basic format or the extended format, is limited to an eight byte (i.e., 64 bit) data field.
  • An additional 15 bits are provided for a cyclic redundancy check (CRC), in order to verify that data is error free.
  • CRC cyclic redundancy check
  • the CAN protocol does not intrinsically support any security features. As a result, the protocol is subject to various attacks, such as a replay attack. Adding a message counter to the message payload coupled with message signatures is well-known method of protecting messages against replay attacks.
  • adding a message counter to the message payload uses bits and bytes which are then no longer available for the actual message payload.
  • the method described below enables using fewer than the full message counter while still maintaining message security.
  • Fig. 2 is a depiction of a startup condition within the system of Fig. 1.
  • one ECU 110a (by way of example) on the CAN communications bus sends out a nonce 210 (i.e. an arbitrary and typically a random or a pseudo-random number used only once).
  • the nonce 210 would be sent over the communication bus (i.e. the CAN bus) once when the car engine is started.
  • the nonce 210 is stored by ECUs 110a - HOf (not all depicted) which receive it.
  • Fig. 3 is a depiction of a message payload 310 ready to be digitally signed in the system of Fig. 1. It is appreciated that the order of fields for signing (i.e., message payload 310, nonce 210, counter 320) does not matter. Any order is acceptable.
  • the sending ECU 1 lOd prepares the message 310, and appends to the message 310 the stored nonce 210 and a counter 320.
  • the counter 320 is appended as a method of securing the system against replay attacks. It is inherent that the counter can be viewed as a concatenation of two groups of bits: most significant bits (MSB) 330 and least significant bits (LSB) 340.
  • each message has a different message type.
  • each message has a single ECU 110a - 11 Of that generates that particular message, and several ECUs 110a - 11 Of that need to receive and act upon that message.
  • ECU 110a - 11 Of that For example and without limiting the generality of the foregoing:
  • the engine-ECU sends a message conveying the current engine rotation speed intended for the transmission-ECU, the chassis-ECU and the brakes-ECU;
  • the dashboard-ECU sends a message conveying the current status of the dashboard buttons intended for the windshield wipers-ECU and the lights-ECUs.
  • messages type is defined for the purpose of this specification and claims as an indication of the originator of the message, the occurrence being conveyed by that message, and the intended recipient(s) of the message.
  • the intended recipient i.e. the message destination
  • Other communication protocols do not support indicating the intended recipient in a destination field in the message header.
  • the message counter LSB 340 begins at a base value, typically zero or one, but the MSB 330 will be a random or pseudorandom number. Alternatively, in that the nonce 210 is a random value added to the signature, the MSB 330 may also begin at some base value. At this point, per each message type, the message originator and all the message recipients store the full counter value, and it is synchronized between all of them.
  • MSB 330 will be a random or pseudorandom number that the message originator of any given type of message type will determine randomly or pseudorandomly and inform potential recipients of the MSB 330.
  • the counter value is first incremented by the originator of the message, and then the LSB 340 of the new counter value is appended to the message to be sent, along with the signature.
  • the LSB 340 of the counter in the received message are used by the recipient of the message, to reconstruct the full counter value and verify the signature. If the LSB 340 of the counter in the received message is greater than the stored LSB 340, then the stored LSB 340 counter value is updated to match the new, received, LSB 340 counter value. If the LSB 340 of the counter in the received message is smaller than or equal to the stored LSB 340, then the recipient first increments the MSB 330 of its stored counter, and then updates the LSB 340 of its stored counter to match the new, received, LSB 340 counter value. Then the updated, stored, full counter value is used for verifying the message signature. It is appreciated that the both LSB 340 and MSB 330 values of the counter may only be updated upon successful validation of the message.
  • Fig. 4 is a depiction of a message payload being sent from one microcontroller 410 to a second microcontroller 420 in the system of Fig. 1.
  • the message 310 with the appended nonce 210 and counter 320 is digitally signed by a digital signing unit 430.
  • the digital signature 440 may comprise one of signing with a public key signature scheme or a message authentication code (MAC).
  • MAC message authentication code
  • the message payload 450 i.e. the data field of the data frame
  • the message payload 450 comprises the message 310 itself, the LSB 340 of the message counter 320, and the signature 440 on the nonce 210, message 310 and the full counter value 320.
  • the message payload 450 is inserted in the CAN data frame as the data field. It is appreciated that when the number of bits in the signature begins to significantly impinge on the number of bits remaining for the message payload, the signature 440 (or part of it) can be moved to a different packet. A transport layer protocol should be employed to ensure that the message and its signature arrive together at their destination.
  • the recipient ECU 420 updates its stored copy of the message counter 320 as described above.
  • the signature 440 can then be verified as follows: the nonce 210 and the updated, stored full message counter 320 are retrieved from storage and appended to the received message 310 so that the various sections of: message 310; nonce 210; MSB 330; and LSB 340 are arranged in the order in which they were signed by the signing unit 430.
  • the rearranged message 310; nonce 210; MSB 330; and LSB 340 are then cryptographically hashed by the receiving ECU 420, and the message signature 440 is verified against this newly generated hash result. Assuming that the signature verification passed, the message 310 is considered legitimate, and the receiving ECU 420 continues to process the message 310 according to the ordinary message processing procedures, as is known in the art.
  • Fig. 5 is a simplified block diagram of an exemplary ECU 500 for use in the system of Fig. 1.
  • Fig. 5 is a high-level block diagram not intended to show either standard features of ECUs which, for ease of depiction do not appear, nor is specialized hardware, such as, and without limiting the generality of the foregoing, variable valve timing controllers, transmission system controllers, or anti-theft system controllers, depicted.
  • Fig. 5 describes a minimal configuration of an ECU 500 for implementation of the present invention.
  • a communications module 510 is operative to receive the nonce.
  • the nonce is sent by the communications module 510 to a processor (CPU) 520.
  • the CPU 520 sends the nonce to an appropriate memory / storage module 530.
  • the CPU 520 (or other specialized processor unit which is not depicted in Fig. 5) prepares an outgoing message payload.
  • the CPU 520 (or other specialized processor unit which is not depicted in Fig. 5) then appends stored nonce (which has been retrieved from the memory / storage module 530) to the message payload, and classifies the message with a message-type.
  • the CPU 520 (or other specialized processor unit which is not depicted in Fig.
  • the CPU 520 (or other specialized processor unit which is not depicted in Fig. 5) then sends the message payload, the appended nonce, and the appended message-type message counter to a cryptographic apparatus 540 which is operative to produce a signature for the message.
  • the signature for the message is then sent to the CPU 520 (or other specialized processor unit which is not depicted in Fig. 5) which then appends:
  • the CPU 520 (or other specialized processor unit which is not depicted in Fig. 5) then sends the data field for the data frame to the communications module 510 for sending.
  • the CPU 520 may be a single processing unit or a plurality of processing units or other appropriate hardware known in the art which are able to perform the above mentioned tasks.
  • the memory / storage module 530 may comprise any or all of EEPROM, flash memory, or magnetic storage media, as is known in the art.
  • Fig. 6 is a simplified flowchart diagram of preferred methods of operation of the system of Fig. 1. The method of Fig. 6 is believed to be self-explanatory in light of the above discussion.
  • software components of the present invention may, if desired, be implemented in ROM (read only memory) form.
  • the software components may, generally, be implemented in hardware, if desired, using conventional techniques.
  • the software components may be instantiated, for example: as a computer program product; on a tangible medium; or as a signal interpretable by an appropriate computer. It is appreciated that various features of the invention which are, for clarity, described in the contexts of separate embodiments may also be provided in combination in a single embodiment. Conversely, various features of the invention which are, for brevity, described in the context of a single embodiment may also be provided separately or in any suitable subcombination.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Small-Scale Networks (AREA)
PCT/IB2013/051167 2012-03-01 2013-02-13 Contre-mesures anti-réexécution Ceased WO2013128317A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201261605454P 2012-03-01 2012-03-01
US61/605,454 2012-03-01

Publications (1)

Publication Number Publication Date
WO2013128317A1 true WO2013128317A1 (fr) 2013-09-06

Family

ID=48182951

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2013/051167 Ceased WO2013128317A1 (fr) 2012-03-01 2013-02-13 Contre-mesures anti-réexécution

Country Status (1)

Country Link
WO (1) WO2013128317A1 (fr)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150220755A1 (en) * 2014-01-31 2015-08-06 Infineon Technologies Ag Solution for security, safe and time integrity communications in automotive environments
WO2015138180A1 (fr) * 2014-03-11 2015-09-17 Qualcomm Incorporated Protection d'intégrité de données contre des attaques de retour arrière destinée à être utilisée avec des systèmes employant des étiquettes de code d'authentification de message
WO2015170453A1 (fr) * 2014-05-08 2015-11-12 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Système de réseau embarqué dans un véhicule, unité de commande électronique de détection de fraude, et procédé pour la lutte contre la fraude
DE102014007820A1 (de) 2014-06-02 2015-12-03 Infineon Technologies Ag Datenrahmen für geschützte Datenübertragungen
WO2015186829A1 (fr) * 2014-06-05 2015-12-10 Kddi株式会社 Nœud de transmission, nœud de réception, système de réseau de communication, procédé de création de message et programme d'ordinateur
WO2015186825A1 (fr) * 2014-06-05 2015-12-10 Kddi株式会社 Système de réseau de communications, nœud de transmission, nœud de réception, procédé de vérification de message, et programme informatique
JP2016100632A (ja) * 2014-11-18 2016-05-30 株式会社東芝 通信システム及び通信装置
JP2017028345A (ja) * 2015-07-15 2017-02-02 日立オートモティブシステムズ株式会社 ゲートウェイ装置およびその制御方法
EP3151462A4 (fr) * 2014-05-29 2017-04-12 Panasonic Intellectual Property Management Co., Ltd. Dispositif de transmission, dispositif de réception, procédé de transmission, et procédé de réception
WO2017060979A1 (fr) * 2015-10-06 2017-04-13 富士通株式会社 Unité montée, procédé de vérification d'unité montée et programme de vérification d'unité montée
WO2017064361A1 (fr) 2015-10-16 2017-04-20 Nokia Technologies Oy Authentification de message
EP3142288A4 (fr) * 2014-05-08 2017-05-17 Panasonic Intellectual Property Corporation of America Système de réseau dans une voiture, unité de commande électronique et procédé de traitement de mise à jour
JP2018026822A (ja) * 2014-06-05 2018-02-15 Kddi株式会社 通信ネットワークシステム及びメッセージ検査方法
EP3273656A4 (fr) * 2015-03-16 2018-02-21 Calsonic Kansei Corporation Système de communication
JP2018074435A (ja) * 2016-10-31 2018-05-10 トヨタ自動車株式会社 通信システム及び通信方法
JP2018078473A (ja) * 2016-11-10 2018-05-17 トヨタ自動車株式会社 通信システム
JP2018078474A (ja) * 2016-11-10 2018-05-17 トヨタ自動車株式会社 通信システム
JP2018186486A (ja) * 2017-04-25 2018-11-22 株式会社東芝 情報処理装置、情報処理システム、および情報処理方法
US20190207950A1 (en) * 2018-01-03 2019-07-04 Ford Global Technologies, Llc End-to-end controller protection and message authentication
EP3432511A4 (fr) * 2016-03-14 2019-11-06 KDDI Corporation Système de réseau de communication, véhicule, noeud de notification de valeurs de compteur, procédé de partage de contre-valeur, et programme d'ordinateur
JP2020123960A (ja) * 2020-03-26 2020-08-13 トヨタ自動車株式会社 通信システム
JP2020123961A (ja) * 2016-11-10 2020-08-13 トヨタ自動車株式会社 通信システム
DE102014113111B4 (de) 2013-09-13 2022-07-28 Gm Global Technology Operations, Llc Verfahren und Vorrichtung zur sicheren Kommunikation in einem Fahrzeug-basierenden Datenkommunikationssystem
JP2024507245A (ja) * 2021-02-22 2024-02-16 ヴァレオ ビジョン 動力車両のための制御モジュールと照明モジュールとの間でデータを認証するための方法

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090292913A1 (en) * 2008-05-23 2009-11-26 Honeywell International Inc. Apparatus and method for counter-based communications in wireless sensor networks and other networks
WO2010027495A1 (fr) * 2008-09-04 2010-03-11 Trilliant Networks, Inc. Système et procédé de mise en œuvre de communications par réseau maillé à l'aide d'un protocole de réseau maillé

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090292913A1 (en) * 2008-05-23 2009-11-26 Honeywell International Inc. Apparatus and method for counter-based communications in wireless sensor networks and other networks
WO2010027495A1 (fr) * 2008-09-04 2010-03-11 Trilliant Networks, Inc. Système et procédé de mise en œuvre de communications par réseau maillé à l'aide d'un protocole de réseau maillé

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
IEEE COMPUTER SOCIETY: "802.15.4-2006 IEEE Standard for Information Technology- Telecommunications and Information Exchange Between Systems- Local and Metropolitan Area Networks- Specific Requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area", no. 802.15.4, 8 September 2006 (2006-09-08), pages 1 - 323, XP007921779, Retrieved from the Internet <URL:http://ieeexplore.ieee.org/xpls/abs_all.jsp?tp=&isnumber=35824&arnumber=1700009&punumber=11161&tag=1> [retrieved on 20091209], DOI: 10.1109/IEEESTD.2006.232110 *
KROVETZ T ET AL: "UMAC: Message Authentication Code using Universal Hashing; rfc4418.txt", 20060301, 1 March 2006 (2006-03-01), XP015054967, ISSN: 0000-0003 *
TOBIAS HOPPE ET AL: "Security Threats to Automotive CAN Networks â Practical Examples and Selected Short-Term Countermeasures", 22 September 2008, COMPUTER SAFETY, RELIABILITY, AND SECURITY; [LECTURE NOTES IN COMPUTER SCIENCE], SPRINGER BERLIN HEIDELBERG, BERLIN, HEIDELBERG, PAGE(S) 235 - 248, ISBN: 978-3-540-87697-7, XP019106609 *

Cited By (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102014113111B4 (de) 2013-09-13 2022-07-28 Gm Global Technology Operations, Llc Verfahren und Vorrichtung zur sicheren Kommunikation in einem Fahrzeug-basierenden Datenkommunikationssystem
US20150220755A1 (en) * 2014-01-31 2015-08-06 Infineon Technologies Ag Solution for security, safe and time integrity communications in automotive environments
DE102014001270A1 (de) 2014-01-31 2015-08-06 Infineon Technologies Ag Verfahren und System zur Berechnung von Codewörtern für geschützte Datenübertragungen
WO2015138180A1 (fr) * 2014-03-11 2015-09-17 Qualcomm Incorporated Protection d'intégrité de données contre des attaques de retour arrière destinée à être utilisée avec des systèmes employant des étiquettes de code d'authentification de message
KR101820366B1 (ko) 2014-03-11 2018-01-19 퀄컴 인코포레이티드 메시지 인증 코드 태그들을 활용하는 시스템들에 사용하기 위한 롤백 공격들로부터의 데이터 무결성 보호
CN106062770A (zh) * 2014-03-11 2016-10-26 高通股份有限公司 用于采用消息验证码标签的系统的防止回退攻击的数据完整性保护
US9460312B2 (en) 2014-03-11 2016-10-04 Qualcomm Incorporated Data integrity protection from rollback attacks for use with systems employing message authentication code tags
CN106062770B (zh) * 2014-03-11 2018-06-22 高通股份有限公司 用于采用消息验证码标签的系统的防止回退攻击的数据完整性保护
CN110696746B (zh) * 2014-05-08 2023-03-24 松下电器(美国)知识产权公司 不正常应对方法、车载网络系统及电子控制单元
US10227053B2 (en) 2014-05-08 2019-03-12 Panasonic Intellectual Property Corporation Of America In-vehicle network system, electronic control unit, and update processing method
CN110696746A (zh) * 2014-05-08 2020-01-17 松下电器(美国)知识产权公司 不正常应对方法、车载网络系统及电子控制单元
WO2015170453A1 (fr) * 2014-05-08 2015-11-12 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Système de réseau embarqué dans un véhicule, unité de commande électronique de détection de fraude, et procédé pour la lutte contre la fraude
EP3142288A4 (fr) * 2014-05-08 2017-05-17 Panasonic Intellectual Property Corporation of America Système de réseau dans une voiture, unité de commande électronique et procédé de traitement de mise à jour
JPWO2015170453A1 (ja) * 2014-05-08 2017-04-20 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America 車載ネットワークシステム、電子制御ユニット及び不正対処方法
EP3151462A4 (fr) * 2014-05-29 2017-04-12 Panasonic Intellectual Property Management Co., Ltd. Dispositif de transmission, dispositif de réception, procédé de transmission, et procédé de réception
US10009357B2 (en) 2014-06-02 2018-06-26 Infineon Technologies Ag Data frame for protected data transmissions
DE102014007820A1 (de) 2014-06-02 2015-12-03 Infineon Technologies Ag Datenrahmen für geschützte Datenübertragungen
DE102014007820B4 (de) * 2014-06-02 2017-03-02 Infineon Technologies Ag Datenrahmen für geschützte Datenübertragungen
JP2016012912A (ja) * 2014-06-05 2016-01-21 Kddi株式会社 送信ノード、受信ノード、通信ネットワークシステム、メッセージ作成方法およびコンピュータプログラム
JP2016012917A (ja) * 2014-06-05 2016-01-21 Kddi株式会社 通信ネットワークシステム、送信ノード、受信ノード、メッセージ検査方法およびコンピュータプログラム
CN106464499A (zh) * 2014-06-05 2017-02-22 Kddi株式会社 通信网络系统、发送节点、接收节点、消息检查方法及计算机程序
EP3154219A4 (fr) * 2014-06-05 2018-02-14 KDDI Corporation Système de réseau de communications, noeud de transmission, noeud de réception, procédé de vérification de message, et programme informatique
JP2018026822A (ja) * 2014-06-05 2018-02-15 Kddi株式会社 通信ネットワークシステム及びメッセージ検査方法
WO2015186829A1 (fr) * 2014-06-05 2015-12-10 Kddi株式会社 Nœud de transmission, nœud de réception, système de réseau de communication, procédé de création de message et programme d'ordinateur
US10681540B2 (en) 2014-06-05 2020-06-09 Kddi Corporation Communication network system, transmission node, reception node, and message checking method
WO2015186825A1 (fr) * 2014-06-05 2015-12-10 Kddi株式会社 Système de réseau de communications, nœud de transmission, nœud de réception, procédé de vérification de message, et programme informatique
CN106464499B (zh) * 2014-06-05 2019-12-13 Kddi株式会社 通信网络系统、发送节点、接收节点、消息检查方法、发送方法及接收方法
JP2016100632A (ja) * 2014-11-18 2016-05-30 株式会社東芝 通信システム及び通信装置
EP3273656A4 (fr) * 2015-03-16 2018-02-21 Calsonic Kansei Corporation Système de communication
JP2017028345A (ja) * 2015-07-15 2017-02-02 日立オートモティブシステムズ株式会社 ゲートウェイ装置およびその制御方法
US10785034B2 (en) 2015-10-06 2020-09-22 Fujitsu Limited Implementation unit, implementation unit verification method, and computer-readable recording medium
WO2017060979A1 (fr) * 2015-10-06 2017-04-13 富士通株式会社 Unité montée, procédé de vérification d'unité montée et programme de vérification d'unité montée
JPWO2017060979A1 (ja) * 2015-10-06 2018-07-26 富士通株式会社 実装ユニット、実装ユニット検証方法及び実装ユニット検証プログラム
WO2017064361A1 (fr) 2015-10-16 2017-04-20 Nokia Technologies Oy Authentification de message
EP3363152A4 (fr) * 2015-10-16 2019-06-19 Nokia Technology Oy Authentification de message
US11057772B2 (en) 2015-10-16 2021-07-06 Nokia Technologies Oy Message authentication
CN108141364A (zh) * 2015-10-16 2018-06-08 诺基亚技术有限公司 消息认证
CN108141364B (zh) * 2015-10-16 2021-09-17 诺基亚技术有限公司 用于消息认证的方法和装置
EP3432511A4 (fr) * 2016-03-14 2019-11-06 KDDI Corporation Système de réseau de communication, véhicule, noeud de notification de valeurs de compteur, procédé de partage de contre-valeur, et programme d'ordinateur
US11095453B2 (en) 2016-03-14 2021-08-17 Kddi Corporation Communication network system and count-value sharing method using count-value notification node with transmission node and reception node
JP2018074435A (ja) * 2016-10-31 2018-05-10 トヨタ自動車株式会社 通信システム及び通信方法
JP2020123961A (ja) * 2016-11-10 2020-08-13 トヨタ自動車株式会社 通信システム
JP2018078474A (ja) * 2016-11-10 2018-05-17 トヨタ自動車株式会社 通信システム
JP2018078473A (ja) * 2016-11-10 2018-05-17 トヨタ自動車株式会社 通信システム
JP2018186486A (ja) * 2017-04-25 2018-11-22 株式会社東芝 情報処理装置、情報処理システム、および情報処理方法
CN109995629A (zh) * 2018-01-03 2019-07-09 福特全球技术公司 改进的端到端控制器保护和消息认证
US20190207950A1 (en) * 2018-01-03 2019-07-04 Ford Global Technologies, Llc End-to-end controller protection and message authentication
US10791125B2 (en) * 2018-01-03 2020-09-29 Ford Global Technologies, Llc End-to-end controller protection and message authentication
JP2020123960A (ja) * 2020-03-26 2020-08-13 トヨタ自動車株式会社 通信システム
JP2024507245A (ja) * 2021-02-22 2024-02-16 ヴァレオ ビジョン 動力車両のための制御モジュールと照明モジュールとの間でデータを認証するための方法

Similar Documents

Publication Publication Date Title
WO2013128317A1 (fr) Contre-mesures anti-réexécution
US11451579B2 (en) System and method for protecting electronics systems of a vehicle from cyberattacks
US11277417B2 (en) System and method of generating rules for blocking a computer attack on a vehicle
Nürnberger et al. –vatican–vetted, authenticated can bus
Lin et al. Cyber-security for the controller area network (CAN) communication protocol
Wolf et al. Security in automotive bus systems
CN108075897B (zh) 控制器局域网消息认证
EP4122177B1 (fr) Authenticité et sécurité de la couche de liaison de données pour un système de communication automobile
CN107846395B (zh) 确保车载总线上的通信安全的方法、系统、介质和车辆
Hazem et al. Lcap-a lightweight can authentication protocol for securing in-vehicle networks
US10791125B2 (en) End-to-end controller protection and message authentication
CN114095298B (zh) 一种管理控制器局域网中模块间安全通信的系统及方法
CN113632419B (zh) 用于对要在总线系统(bu)、特别是机动车辆的总线系统中传输的至少一个数据分组进行生成和认证检查的装置和方法
CN111865922A (zh) 一种通信方法、装置、设备及存储介质
CN106034111B (zh) 使用混合的mac认证can包的方法和实现其的设备
KR20180049523A (ko) Mac을 포함하는 can 메시지 송수신을 위한 방법 및 시스템
EP3547191B1 (fr) Système et procédé permettant de générer des normes de blocage d&#39;une attaque informatique sur un véhicule
Püllen et al. Security and safety co-engineering of the FlexRay bus in vehicular networks
CN114667716A (zh) 中继装置、通信网络系统以及通信控制方法
EP3547192B1 (fr) Système et procédé de blocage d&#39;une attaque informatique sur un moyen de transport
CN115150115A (zh) 车辆的电子控制装置、网关装置以及包括它们的车辆
CN111294771A (zh) 车载设备、用于实现车内通信的系统和相关方法
EP3713190A1 (fr) Pontage sécurisé de bus de réseau de zone de contrôleur
KR20180072340A (ko) 운송 수단 내부 네트워크에서의 제어 데이터를 보안 전송하는 방법
CN120090848A (zh) 一种车辆总线的数据处理方法、装置和车辆

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13718381

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13718381

Country of ref document: EP

Kind code of ref document: A1