{"id":4723,"date":"2023-08-10T16:49:26","date_gmt":"2023-08-10T08:49:26","guid":{"rendered":"https:\/\/www.tosunai.com\/?p=4723"},"modified":"2024-09-10T18:11:10","modified_gmt":"2024-09-10T10:11:10","slug":"%e6%b1%bd%e8%bd%a6%e5%86%85%e9%83%a8%e9%80%9a%e4%bf%a1%e7%9a%84%e5%ae%89%e5%85%a8%e6%8c%91%e6%88%98%e4%b8%8esecoc%e8%a7%a3%e5%86%b3%e6%96%b9%e6%a1%88","status":"publish","type":"post","link":"https:\/\/www.tosunai.com\/en\/security-challenges-and-secoc-solutions-for-intra-vehicle-communications\/","title":{"rendered":"Security Challenges and SecOC Solutions for Intra-vehicle Communications"},"content":{"rendered":"
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

\"one\" radical in Chinese characters (Kangxi radical 1)Background on needs<\/b>
1-SecOC Background<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

In traditional automotive electronic architectures, the in-vehicle<\/font>ECU<\/font>limited in number and complexity, and limited in communication bandwidth, it is considered that in-vehicle<\/font>ECU<\/font>that all communications between them are credible.<\/font>ECU<\/font>The node will process the corresponding message as soon as it receives it. As the automotive industry and the Internet continue to evolve and cars continue to become smarter and more Internet-enabled, this default in-vehicle communication becomes increasingly insecure. If a new node is added to the vehicle's physical bus, sending fake signals or tampering with other<\/font>ECU<\/font>sent messages, such as accelerating, braking, and turning, while vehicle power control-related<\/font>E<\/font><\/span>CU<\/span>accept the message as it is, then the vehicle will be out of control. Therefore, there is an urgent need to implement a secure and efficient algorithm to validate the message and confirm whether the sender of the message is legitimate or not and whether the data has been tampered with or not. In this case, secure on-board communication<\/font> (Secure Onboard Communication<\/font>Abbreviations <\/font>SecOC) <\/font>The mechanism was then born.<\/font><\/span><\/o:p><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"Background\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

2-SecOC realization principle<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

SecOC<\/span>be<\/span>Security Onboard Communication <\/span>The abbreviation of the Chinese name is called secure in-vehicle communication.<\/span>,<\/span>be<\/span>AUTOSAR<\/span>surname Cong<\/span>Classic Platform 4.2<\/span>A basic module was added at the beginning, and its main role is to provide authentication and protection against replay attacks for data transmission over the automotive embedded network bus.<\/span><\/span><\/p>

SecOC <\/span>The mechanism requires that the protocol data unit <\/span>(Protocol Data Unit. <\/span>acronyms <\/span>PDU) <\/span>of the sender and receiver of the <\/span>ECU <\/span>All to be realized <\/span>SecOC <\/span>Module.<\/span><\/span><\/p>

On the sender side.<\/span>SecOC <\/span>The module sends the protocol primitive to the protocol to be sent by sending it to the <\/span>PDU <\/span>Add authentication information to create security<\/span>PDU<\/span>(see chart)<\/span>1<\/span><\/span>-2<\/span>), the certification information includes the freshness value<\/span>(Freshness Value<\/span>Abbreviations <\/span>FV) <\/span>and the information authentication code (<\/span>Message Authentication Code<\/span>Abbreviations <\/span>MAC<\/span>).<\/span><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"Secure\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

FV <\/span>By Freshness Value Management Module <\/span>(FVM) <\/span>Get.<\/span>FVM <\/span>consist of <\/span>Master FVM ( <\/span>Acting as a gateway <\/span>) <\/span>respond in singing <\/span>Slave FVM( <\/span>By other realizations <\/span>SecOC <\/span>institutional accountability <\/span>ECU <\/span>hold a governmental office or post <\/span>)<\/span>, the former sends a freshness value synchronization message to the latter to ensure that the<\/span>PDU <\/span>transceiver <\/span>FV <\/span>consistency, the latter sends the former <\/span>FV <\/span>Synchronization request message.<\/span><\/span><\/p>

commander-in-chief (military)<\/span> PDU <\/span>The data identifiers, raw <\/span>PDU <\/span>and the complete freshness value are stitched together and passed to the authentication algorithm to produce the <\/span>MAC <\/span>Value.<\/span><\/span><\/p>

Receiver receives security<\/span> PDU <\/span>postponed<\/span>M<\/span><\/span>AC<\/span>The authentication module verifies its freshness and completeness, and if the verification is successful, then the original data will be<\/span>PDU<\/span>The software module that is uploaded to the upper tier application is simply discarded if the validation fails.<\/span><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"Schematic\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

stupid (Beijing dialect)Together with the star SecOC test solution<\/b><\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

The solution is based on<\/span>SecOC<\/span>The scheme realizes the authentication of sensitive information in the car.<\/span><\/span><\/p>

TOSUN SecOC<\/span>The system is based on<\/span>TOSUN<\/span><\/span>-<\/span>self-developed core software<\/span>TSMaster<\/span>respond in singing<\/span>CAN<\/span>The tool can cover the testing requirements during development and production, and the main functions include master node synchronization message parsing, complete freshness value generation, calculation of the<\/span>MAC<\/span>values, generates and sends security messages, receives parse-verified security messages, and fault injection functions.<\/span><\/span><\/p>

The test panel in general is shown below:<\/span><\/b><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"SecOC\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

1-Synchronized message reception<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

The fresh value management module is generally acted by the gateway on the whole vehicle, which is responsible for sending synchronization messages to facilitate the update of fresh values from the slave nodes. The main role of the synchronization message is to ensure the security<\/span>PDU<\/span>Consistency of freshness value information at the sending and receiving ends.<\/span><\/span><\/i><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"SecOC\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Trip counter for synchronization messages (<\/span>Trip Counter<\/span>), reset counters (<\/span>Reset Counter<\/span>(math.) and<\/span>MAC<\/span>Value (<\/span>Authenticator<\/span>) The length is defined as follows:<\/span><\/span><\/i><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"Synchronization\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

This solution utilizes<\/span>AES128-CMAC<\/span>Standard algorithms and composites based on synchronized messages<\/span>counter<\/span>Freshness Value Management Program.<\/span>MAC<\/span>The value is calculated as<\/span>CMAC-AES128<\/span>(<\/span>DataID\/Payload\/FV<\/span>, , ,<\/span>CK<\/span>).<\/span><\/span><\/p>

\u00d8\u00a0<\/span>The illustration is<\/span><\/b>TOSUN SecOC<\/span><\/b>Demonstration of synchronized message reception in the solution<\/span><\/b><\/b><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"SecOC\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

The first part displays the synchronization messages sent by the tested piece (master node) and the message parsing.<\/span>Data ID<\/span>By the master node (component under test)<\/span>\/<\/span>(Fresh Value Management Module) decision.<\/span><\/span><\/p>

The second part of the algorithm calculates the<\/span>MAC<\/span>value, which is the same as the value of the received<\/span>M<\/span><\/span>AC<\/span>The first two values are the same, then the validation is successful return<\/span>0<\/span>Otherwise the validation fails to return<\/span>1<\/span>and number of errors<\/span><\/span>+1<\/span>.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

2 - Freshness value management<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

\u00d8\u00a0<\/span>The illustration is<\/span><\/b>TOSUN SecOC<\/span><\/b>Demonstration of Freshness Value Management in Solutions<\/span><\/b><\/b><\/p>

Complete freshness values include (<\/span>64bit<\/span>): Trip counter (<\/span>Trip Counter<\/span>)<\/span>,<\/span>Reset Counter (<\/span>Reset Counter<\/span>)<\/span>,<\/span><\/span><\/i>\u00a0<\/span><\/i>Reset flag value (<\/span>Reset Flag<\/span>) and the message counter (<\/span>Message Counter<\/span>).<\/span><\/span><\/i><\/i><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"SecOC\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

1)\u00a0<\/span>The trip counter and reset counter are determined by the synchronization message.<\/span><\/p>

2)\u00a0<\/span>The message counter is incremented every time a security message is sent.<\/span>1<\/span>.<\/span><\/span><\/p>

3)\u00a0<\/span>The reset flag bit is the last bit of the reset counter.<\/span>2bit<\/span>Data.<\/span><\/span><\/p>

The complete freshness value within the slave node is generated from the above four data.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"Complete\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

3-Security message sending<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

\u00d8\u00a0<\/span>The illustration is<\/span><\/b>TOSUN SecOC<\/span><\/b>Demonstration of secure messaging in the solution<\/span><\/b><\/b><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"SecOC\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Part I Setting<\/span>2<\/span>byte<\/span>Data ID<\/span>respond in singing<\/span>4<\/span>Byte control signal (decimal and hexadecimal inputs are sufficient).<\/span><\/span><\/p>

The second part shows the encrypted<\/span>MAC<\/span>value, the fresh value of the intercept, the intercepted<\/span>MAC<\/span>value and the security message sent (the security message is defined by the<\/span>4<\/span>byte control signal,<\/span>1<\/span>bytes to intercept the freshness value and<\/span><\/span>3<\/span>byte interception<\/span>M<\/span><\/span>AC<\/span>(value composition).<\/span><\/p>

The freshness value of this solution and the<\/span>M<\/span><\/span><\/i>AC<\/span><\/i>The standard for value interception is the value of the<\/span>C<\/span><\/span><\/i>AN<\/span><\/i>protocol in a communication mode.<\/span>F<\/span><\/span><\/i>V<\/span><\/i>intercept low (computing)<\/span>1<\/span>Bytes.<\/span>M<\/span><\/span><\/i>AC<\/span><\/i>Interception of highs<\/span>3<\/span>Bytes.<\/span><\/span><\/i><\/i><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"SecOC\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

4-Security message reception<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

\u00d8\u00a0<\/span>The illustration is<\/span><\/b>TOSUN SecOC<\/span><\/b>Demonstration of secure message reception in the solution<\/span><\/b><\/b><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"SecOC\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Part I Setting Up the Receiver<\/font>2<\/font>byte<\/font>Data ID<\/font>(Secure Message Transmitter and Receiver Module's<\/font>D<\/font><\/span>ata ID<\/span>needs to be consistent, otherwise it will fail to validate at the receiving end of the security message), displaying the complete security message.<\/span><\/o:p><\/span><\/p>

The second part shows the receiving end of the<\/font>MAC<\/font>Validation results, successful validation returns<\/font>0<\/font>, light green; verify failed to return<\/font>1<\/font>Red light on, number of errors<\/font>+1<\/font>.<\/font><\/span><\/o:p><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

5 - Fault Injection Test<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

\u00d8 <\/span>The illustration is<\/span><\/b>TOSUN SecOC<\/span><\/b>Demonstration of fault injection testing in a solution<\/span><\/b><\/o:p><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"SecOC\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Fault injection can be performed by clicking any type of fault injection button in this panel.<\/span>You can see that the number of errors on the [Receiving Side] increases and lights up red. Take<\/span>Testing and evaluating the reliability and stability of the system, thus improving the quality of the system.<\/span><\/o:p><\/span><\/p>

included among these<\/font>\"Simulate past fresh value send\" means to change the fresh value to the fresh value of the last send, and the same applies to \"Simulate future fresh value send\".<\/font><\/span><\/o:p><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"Detailed\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

If you want to view the detailed message information, you can<\/font>\"Message Information\" to view correctly sent or faulty injected security messages with filter identifiers of <\/font><\/span>2CA <\/span>of the message is sufficient. Synchronization messages can also be viewed with the identifier<\/font> <\/span>25C<\/span>.<\/span><\/b><\/i><\/o:p><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"

As the automotive industry and the Internet continue to evolve and cars continue to become smarter and more Internet-enabled, this default in-vehicle communication is becoming increasingly insecure. If a new node is added to the vehicle physical bus .......<\/p>","protected":false},"author":4,"featured_media":5508,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"on","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"off","ocean_gallery_id":[],"footnotes":""},"categories":[35],"tags":[157,158,65,159],"class_list":{"0":"post-4723","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","6":"hentry","7":"category-studycases","8":"tag-secoc","10":"tag-tsmaster","11":"tag-159","12":"entry","13":"has-media","14":"owp-thumbs-layout-horizontal","15":"owp-btn-normal","16":"owp-tabs-layout-horizontal","17":"has-no-thumbnails","18":"has-product-nav"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.tosunai.com\/en\/wp-json\/wp\/v2\/posts\/4723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tosunai.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tosunai.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tosunai.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tosunai.com\/en\/wp-json\/wp\/v2\/comments?post=4723"}],"version-history":[{"count":0,"href":"https:\/\/www.tosunai.com\/en\/wp-json\/wp\/v2\/posts\/4723\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tosunai.com\/en\/wp-json\/wp\/v2\/media\/5508"}],"wp:attachment":[{"href":"https:\/\/www.tosunai.com\/en\/wp-json\/wp\/v2\/media?parent=4723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tosunai.com\/en\/wp-json\/wp\/v2\/categories?post=4723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tosunai.com\/en\/wp-json\/wp\/v2\/tags?post=4723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}