{"id":4723,"date":"2023-08-10T16:49:26","date_gmt":"2023-08-10T08:49:26","guid":{"rendered":"https:\/\/www.tosunai.com\/?p=4723"},"modified":"2024-09-10T18:11:10","modified_gmt":"2024-09-10T10:11:10","slug":"%e6%b1%bd%e8%bd%a6%e5%86%85%e9%83%a8%e9%80%9a%e4%bf%a1%e7%9a%84%e5%ae%89%e5%85%a8%e6%8c%91%e6%88%98%e4%b8%8esecoc%e8%a7%a3%e5%86%b3%e6%96%b9%e6%a1%88","status":"publish","type":"post","link":"https:\/\/www.tosunai.com\/en\/security-challenges-and-secoc-solutions-for-intra-vehicle-communications\/","title":{"rendered":"Security Challenges and SecOC Solutions for Intra-vehicle Communications"},"content":{"rendered":"
In traditional automotive electronic architectures, the in-vehicle<\/font>ECU<\/font>limited in number and complexity, and limited in communication bandwidth, it is considered that in-vehicle<\/font>ECU<\/font>that all communications between them are credible.<\/font>ECU<\/font>The node will process the corresponding message as soon as it receives it. As the automotive industry and the Internet continue to evolve and cars continue to become smarter and more Internet-enabled, this default in-vehicle communication becomes increasingly insecure. If a new node is added to the vehicle's physical bus, sending fake signals or tampering with other<\/font>ECU<\/font>sent messages, such as accelerating, braking, and turning, while vehicle power control-related<\/font>E<\/font><\/span>CU<\/span>accept the message as it is, then the vehicle will be out of control. Therefore, there is an urgent need to implement a secure and efficient algorithm to validate the message and confirm whether the sender of the message is legitimate or not and whether the data has been tampered with or not. In this case, secure on-board communication<\/font> (Secure Onboard Communication<\/font>Abbreviations <\/font>SecOC) <\/font>The mechanism was then born.<\/font><\/span> SecOC<\/span>be<\/span>Security Onboard Communication <\/span>The abbreviation of the Chinese name is called secure in-vehicle communication.<\/span>,<\/span>be<\/span>AUTOSAR<\/span>surname Cong<\/span>Classic Platform 4.2<\/span>A basic module was added at the beginning, and its main role is to provide authentication and protection against replay attacks for data transmission over the automotive embedded network bus.<\/span><\/span><\/p> SecOC <\/span>The mechanism requires that the protocol data unit <\/span>(Protocol Data Unit. <\/span>acronyms <\/span>PDU) <\/span>of the sender and receiver of the <\/span>ECU <\/span>All to be realized <\/span>SecOC <\/span>Module.<\/span><\/span><\/p> On the sender side.<\/span>SecOC <\/span>The module sends the protocol primitive to the protocol to be sent by sending it to the <\/span>PDU <\/span>Add authentication information to create security<\/span>PDU<\/span>(see chart)<\/span>1<\/span><\/span>-2<\/span>), the certification information includes the freshness value<\/span>(Freshness Value<\/span>Abbreviations <\/span>FV) <\/span>and the information authentication code (<\/span>Message Authentication Code<\/span>Abbreviations <\/span>MAC<\/span>).<\/span><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t FV <\/span>By Freshness Value Management Module <\/span>(FVM) <\/span>Get.<\/span>FVM <\/span>consist of <\/span>Master FVM ( <\/span>Acting as a gateway <\/span>) <\/span>respond in singing <\/span>Slave FVM( <\/span>By other realizations <\/span>SecOC <\/span>institutional accountability <\/span>ECU <\/span>hold a governmental office or post <\/span>)<\/span>, the former sends a freshness value synchronization message to the latter to ensure that the<\/span>PDU <\/span>transceiver <\/span>FV <\/span>consistency, the latter sends the former <\/span>FV <\/span>Synchronization request message.<\/span><\/span><\/p> commander-in-chief (military)<\/span> PDU <\/span>The data identifiers, raw <\/span>PDU <\/span>and the complete freshness value are stitched together and passed to the authentication algorithm to produce the <\/span>MAC <\/span>Value.<\/span><\/span><\/p> Receiver receives security<\/span> PDU <\/span>postponed<\/span>M<\/span><\/span>AC<\/span>The authentication module verifies its freshness and completeness, and if the verification is successful, then the original data will be<\/span>PDU<\/span>The software module that is uploaded to the upper tier application is simply discarded if the validation fails.<\/span><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t The solution is based on<\/span>SecOC<\/span>The scheme realizes the authentication of sensitive information in the car.<\/span><\/span><\/p> TOSUN SecOC<\/span>The system is based on<\/span>TOSUN<\/span><\/span>-<\/span>self-developed core software<\/span>TSMaster<\/span>respond in singing<\/span>CAN<\/span>The tool can cover the testing requirements during development and production, and the main functions include master node synchronization message parsing, complete freshness value generation, calculation of the<\/span>MAC<\/span>values, generates and sends security messages, receives parse-verified security messages, and fault injection functions.<\/span><\/span><\/p> The test panel in general is shown below:<\/span><\/b><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t The fresh value management module is generally acted by the gateway on the whole vehicle, which is responsible for sending synchronization messages to facilitate the update of fresh values from the slave nodes. The main role of the synchronization message is to ensure the security<\/span>PDU<\/span>Consistency of freshness value information at the sending and receiving ends.<\/span><\/span><\/i><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t Trip counter for synchronization messages (<\/span>Trip Counter<\/span>), reset counters (<\/span>Reset Counter<\/span>(math.) and<\/span>MAC<\/span>Value (<\/span>Authenticator<\/span>) The length is defined as follows:<\/span><\/span><\/i><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t2-SecOC realization principle<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
stupid (Beijing dialect)Together with the star SecOC test solution<\/b><\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
1-Synchronized message reception<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t