CN109150840A - Packet adaptive anti-tamper data structure and method are updated in a kind of car networking - Google Patents
Packet adaptive anti-tamper data structure and method are updated in a kind of car networking Download PDFInfo
- Publication number
- CN109150840A CN109150840A CN201810823929.2A CN201810823929A CN109150840A CN 109150840 A CN109150840 A CN 109150840A CN 201810823929 A CN201810823929 A CN 201810823929A CN 109150840 A CN109150840 A CN 109150840A
- Authority
- CN
- China
- Prior art keywords
- tag
- packet
- car networking
- update
- updating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Abstract
The present invention proposes to update packet adaptive anti-tamper data structure and method in a kind of car networking, belongs to car networking security fields.Include the following steps: that S1, server end selection need the update packet that transmits, give ID assignment, and obtains the current time to give Ts assignment;S2, current update packet attribute is obtained, according to the requirement of marker bit, server end gives marker bit TAG respectively2,...,TAGnAssignment;S3, current update package informatin is obtained, generates informative abstract and gives MD assignment;S4, car-mounted terminal, which obtain, updates packet, judges vehicle current driving speed state, gives TAG1Field assignment;S5, security level is assigned according to the reacted situation of combined value of n marker bit, and suitable integrity measurement scheme is selected according to security level.The invention proposes a kind of data structure for updating packet, this new structure type has increased id field, Ts field, TAG newly1,...,TAGnBit field and MD field are marked, wherein label bit field more flexible to select and the most suitable integrity measurement scheme of current environment in car networking system.
Description
Technical field
The invention belongs to car networking security fields, and in particular to the adaptive anti-tamper number of packet is updated into a kind of car networking
According to structure and method.
Background technique
The unlimited imagination for just producing scientific and technological circle and Internet circles since being born from car networking concept, this several years are not
The disconnected eyeball for bombing us.With the further maturation of the relevant technologies such as sensor, wireless communication, intelligent chip, market
On all kinds of car networking application products emerge one after another, the fast-developing impetus is presented in car networking industry.However take place frequently in recent years
Show current onboard system and dangerous, security assurance information system fragility, protection energy for the attack of car networking
Power shortcoming.All once by APP security threat, hacker can be usurped by CAN bus for many motor corporations such as BMW, benz etc.
Change the application data in onboard system, this is highly susceptible to illegal control after vehicle termination is installed.
Present onboard system service provider packs fixed more perfect anti-tamper scheme for update there is no one, although
Effort has been made in vehicle company, but not effective solution problem, and the data transmitted in onboard system do not have still
Obtain the anti-tamper inspection of high safety index.One kind is only used only to the anti-tamper inspection of upgrade package in current onboard system
Scheme, but in a practical situation, have and require security system inconsistent situation, a solution, which is only used only, to be gone out
Existing this drawback: obviously not competent in the case where more demanding to security system when scheme is simple;On the other hand, when
When scheme complexity, just seem excessively redundancy in the case where requiring safety coefficient lower situation.Therefore, present tamper resistant systems are simultaneously
The demand for security not being able to satisfy under more scenes, currently existing scheme is excessively dull when in face of scene more actual conditions.
Summary of the invention
In view of this, present invention mainly solves in onboard system for the defect for above-mentioned existing tamper-resistance techniques
Update wrap biography or downloading during can be different according to different scenes intelligent selection tamper resistant method, the present invention propose
Packet adaptive anti-tamper data structure and method are updated in a kind of car networking.
Technical scheme is as follows:
One aspect of the present invention proposes to update the adaptive anti-tamper data structure of packet, the data structure packet in a kind of car networking
Id field, Ts field, TAG field, MD field, and the update packet content DATA for needing to transmit are included,
Wherein, id field accounts for midByte, for storing data ID value;Ts field accounts for mTSByte, when indicating that biography is wrapped in update
Between stab;TAG field accounts for mTAGA byte includes n marker bit TAG1,TAG2,...,TAGn, wherein TAG1Store current vehicle
Travel speed state, TAG2,...,TAGnIt indicates to wrap related scene with update in intelligent network connection automobile;MD field accounts for mmdWord
Section, storage updates package informatin abstract, for verifying integrality password value.
Further, as n=3, TAG2For storing the current type for updating packet, TAG3Packet subdivision is updated for storing
Type.
Further, ID accounts for 4 bytes, and Ts accounts for 4 bytes, and TAG accounts for 1 byte, in which: TAG1Account for 2bit;TAG2: it accounts for
2bit stores the current type for updating packet;TAG34bit is accounted for, storage updates packet subdivision type;MD accounts for 36 bytes, and preceding 16 byte is
MD5 algorithm values, rear 20 bytes are SHA_1 algorithm values.
Further, 01 middling speed is indicated;10 indicate low speed;11 indicate static.
Further, for TAG2, 00 indicates that onboard system updates packet;01 indicates that onboard system application updates packet.
Further, for TAG2, 0000 indicates traffic safety class vehicular applications;0001 indicates that traffic information seeks advice from class vehicle
Carry application;0010 indicates the commercial vehicular applications such as information service.
The adaptive anti-tamper method of packet is updated in a kind of car networking, using the data structure as described in claim 1-6,
And carry out following steps:
S1, server end selection need the update packet that transmits, give ID assignment, and obtain the current time and give Ts assignment;
S2, current update packet attribute is obtained, according to the requirement of marker bit, server end gives marker bit TAG respectively2,...,
TAGnAssignment;
S3, current update package informatin is obtained, generates informative abstract and gives MD assignment;
S4, car-mounted terminal, which obtain, updates packet, judges vehicle current driving speed state, gives TAG1Field assignment;
S5, security level is assigned according to the reacted situation of combined value of n marker bit, and is selected properly according to security level
Integrity measurement scheme, if updating packet by the way that system update can be carried out if integrity measurement;Otherwise refusal updates, Huo Zhezhi
It connects and deletes the update packet.
Further, the integrity measurement scheme includes three kinds: the first, it is preferably based on the integrality degree of MD5 algorithm
Amount scheme generates informative abstract to information by MD5 algorithm, suitable for requiring security level general situation;
Second, it is preferably based on MD5 algorithm and SHA_1 algorithm mixing integrity measurement scheme, while by MD5 to information
It generates informative abstract and SHA_1 and 160bit informative abstract, the program situation more demanding for security level is generated to information;
The third, is preferably based on the integrity measurement scheme of MD5 and Third Party Authentication mechanism, generates letter by MD5 algorithm
After breath is plucked, then pass through Third Party Authentication mechanism and it is authenticated, is suitable for requiring very high situation to security level.
Further, server end selection need transmit update packet mode include:
Update is wrapped and passes to car networking application market, waits user to download installation and updates;Or server directly transmits
To vehicle user end, it is mounted directly in a manner of patch.
The beneficial effects of the present invention are:
1. the safety index of onboard system can be improved in the present invention, once realizing tamper resistant systems and method, can have
Effect prevents vehicle termination from installing the installation kit/upgrade package being maliciously tampered;2. the invention proposes update packet in a kind of car networking
Adaptive anti-tamper data structure, this new structure type have increased id field, Ts field, label bit field and MD word newly
Section, wherein label bit field more flexible to select and the most suitable integrality of current environment in car networking system
Metric scheme;3. the present invention uses the mode of intelligent selection tamper resistant method, it can be selected under current scene and be most suitable for working as
Under solution, can effectively avoid measurement redundancy, the fineness of integrity measurement is inadequate, to effectively prevent from distorting;4.
The present invention has initiated the tamper-proof mechanisms of more scenes under onboard system, makes system more diversification, also allow entire onboard system from
Adaptability is improved.
Detailed description of the invention
In order to keep the purpose of the present invention, technical scheme and beneficial effects clearer, the present invention provides following attached drawing and carries out
Illustrate:
Fig. 1 is that packet transmission flow figure is updated in car networking system;
Fig. 2 is the data structure diagram under embodiment;
Fig. 3 is flow chart of the method for the present invention.
Fig. 4 is that server installation updates packet timing diagram.
Specific embodiment
With reference to the accompanying drawings of the specification to updated in a kind of car networking of the present invention the adaptive anti-tamper data structure of packet and
Method is further detailed.
As updated shown in packet transmission flow figure in Fig. 1 car networking system, automobile in the process of moving, is constantly set with outside
It is standby to be communicated.The system application of vehicle updates packet will be in communication process, from vehicle application market and vehicle with system update packet
Server is sent to the onboard system of vehicle.If there is update packet selfishness is exchanged or is infused by attacking communication line by hacker
Enter virus etc. and make the behavior for endangering vehicle safety, the update packet that at this moment vehicle receives will be insecure.Therefore it needs not
Anti-tamper method is selected under same scene, is reliable with the update packet for guaranteeing that the car-mounted terminal of vehicle receives.
Automobile is received when system update packet updates packet from system application in the state of difference with different safeties etc.
Grade.If the safety grades of current automobile are lower, but have selected high-intensitive tamper resistant method at this time, it will cause to measure superfluous
It is remaining, so that the work of integrity measurement is become more cumbersome.When vehicle safety is higher ranked, but select intensity lower at this time
Tamper resistant method, it will face and update the danger that coating is distorted.
The invention proposes the adaptive anti-tamper data structure of packet is updated in a kind of car networking, for marking automobile not
With the security level for receiving different update packet under state, in order to which vehicle application market and vehicle server are sending system update
Packet can take corresponding tamper resistant method when updating packet to car-mounted terminal with system application according to this security level, and structure is such as
Shown in Fig. 2.
The method of the present invention flow chart on the basis of data structure as shown in figure 3, carry out following steps:
S1, server end selection need the update packet that transmits, give ID assignment, and obtain the current time and give Ts assignment;
S2, current update packet attribute is obtained, according to the requirement of marker bit, respectively to TAG2,...,TAGnAssignment;
S3, current update packet content is obtained, generates informative abstract and gives MD field assignment;
S4, car-mounted terminal, which obtain, updates packet, judges vehicle's current condition, and according to vehicle-state to TAG1Assignment;
S5, the security level represented according to the combined value of n marker bit, establish security level and integrity measurement scheme are reflected
Firing table selects suitable integrity measurement scheme, can carry out system update if updating packet by integrity measurement;Otherwise it refuses
It updates absolutely, or directly deletes the update packet.
As n=3, as a kind of enforceable mode, include: in data structure
ID: 4 bytes, ID value for storing data are accounted for;
Ts: accounting for 4 bytes, indicates the timestamp of message, i.e., the current uplink time for updating packet;
TAG: accounting for 1 byte, indicates to wrap related scene with update in intelligent network connection automobile;Wherein:
TAG1: 2bit is accounted for, the state of current vehicle is stored.It is preferred that driving status is divided into following 4 states: 00 indicates high
Speed;01 indicates middling speed;10 indicate low speed;11 indicate static;
TAG2: 2bit is accounted for, the current type for updating packet is stored.It is preferred that application software type is roughly divided into car networking: 00
Indicate that onboard system updates packet;01 indicates that onboard system application updates packet;
TAG3: 4bit is accounted for, storage updates packet subdivision type.Preferably for application software, subdivision are as follows: 0000 indicates traffic peace
Universal class vehicular applications;0001 indicates that traffic information seeks advice from class vehicular applications;0010 indicates the commercial vehicular applications such as information service;
MD: accounting for 36 bytes, and preceding 16 byte is MD5 value, and rear 20 bytes are SHA_1 value;
DATA: the update packet content for needing to transmit is indicated.
If, can be to TAG using above-mentioned data structure1,TAG2,...,TAGnAssignment situation be summarized as table 1 and (preferably make
It is indicated with binary stream):
Table 1
It can be seen that, wrap related scene with updating in car networking system in above table, three marker bits all in accordance with
The value of different situations imparting security level.Grade is up to 1, and successively successively decreases (such as 2,3......) according to demand for security.Safety
Under higher grade expression current scene, the anti-tamper verification scheme selection for updating packet is needed stringenter.Anti-tamper essence is
Integrity measurement.
Therefore, in tamper resistant systems, three kinds of schemes are provided: the first, it is preferably based on the integrity measurement side of MD5 algorithm
Case, to prevent from being tampered, is suitable for security level requirement specifically, generating the informative abstract of 16 bytes to information by MD5
Not high situation;Second, it is preferably based on MD5 and SHA_1 mixing integrity measurement scheme, specifically, simultaneously by MD5 to letter
Breath generate 16 byte informations abstract and SHA_1 to information generate 20 byte informations abstract, but if need simultaneously find MD5 with
The hashed value of SHA_1 conflict is practically impossible to, therefore, the program situation more demanding for security level;The third, it is excellent
Select the integrity measurement scheme based on MD5 and Third Party Authentication mechanism, specifically, by MD5 generation informative abstract it is anti-tamper after,
It is authenticated by Third Party Authentication mechanism again, as " anti-to deny " behavior authentication, suitable for being wanted to automotive safety grade
Seek very high situation.
Meanwhile some specifications have been formulated, such as detecting TAG2Field bit is 00 either to detect TAG3Field bit is equal
When being 0000, when both having reflected highest security level, directly selects and be based on MD5 and Third Party Authentication organizational integrity metric scheme
Deng.The specific selection proposed in different safety class to anti-tamper verification scheme below, be summarized as table 2 (it is preferable to use two into
Flow table processed is shown):
Table 2
TAG1-TAG2-TAG3 | Anti-tamper verification scheme |
00-01-0000 | The integrity measurement scheme based on MD5 and Third Party Authentication mechanism of selection |
00-01-0001 | It selects and is based on MD5 and SHA_1 mixing integrity measurement scheme |
00-01-0010 | The integrity measurement scheme based on MD5 of selection |
01-01-0000 | The integrity measurement scheme based on MD5 and Third Party Authentication mechanism of selection |
01-01-0001 | It selects and is based on MD5 and SHA_1 mixing integrity measurement scheme |
01-01-0010 | The integrity measurement scheme based on MD5 of selection |
10-01-0000 | The integrity measurement scheme based on MD5 and Third Party Authentication mechanism of selection |
10-01-0001 | It selects and is based on MD5 and SHA_1 mixing integrity measurement scheme |
10-01-0010 | The integrity measurement scheme based on MD5 of selection |
11-01-0000 | The integrity measurement scheme based on MD5 and Third Party Authentication mechanism of selection |
11-01-0001 | The mixing integrity measurement scheme based on MD5 and SHA_1 of selection |
11-01-0010 | The integrity measurement scheme based on MD5 of selection |
00-00-null | The integrity measurement scheme based on MD5 and Third Party Authentication mechanism of selection |
01-00-null | The integrity measurement scheme based on MD5 and Third Party Authentication mechanism of selection |
10-00-null | The integrity measurement scheme based on MD5 and Third Party Authentication mechanism of selection |
11-00-null | The integrity measurement scheme based on MD5 and Third Party Authentication mechanism of selection |
By updating the method for adding three marker bits before packet, the tamper resistant systems of client just only need to obtain
To the value of three marker bits, corresponding metric scheme can be selected according to above table, so that the choosing that system is more convenient
Select out the integrity measurement scheme for being most suitable for current scene.Wherein MD5 algorithmic notation Message Digest Algorithm 5;SHA_1 table
Show Secure Hash Algorithm.
The mode for the update packet that server end selection needs to transmit includes: to wrap update to pass to car networking application market,
It waits user to download installation to update;Or server is sent directly to vehicle user end, is mounted directly in a manner of patch.
If updating packet in the downloading of application market, when car networking server end uploads and updates packet, server end includes drive test
Equipment (Road-Side Units, RSU), base station (Base Station, BS), depot, first to ID, Ts, the TAG for updating packet2,
TAG3,...,TAGn, the fields assignment such as MD, then upload the update packet after assignment and wait car-mounted terminal downloading to application market.Downloading
The state of current vehicle is obtained afterwards, then gives TAG1Assignment, after waiting marker bit whole assignment to finish, car-mounted terminal analysis is each
The value of marker bit judges the integrity measurement scheme for being most suitable for current scene according to the priority of value.If current scene is to safety
It is required that it is general, then select MD5 scheme to be encrypted, if higher, car-mounted terminal corresponding selection MD5 and SHA_1 mix integrality
Metric scheme, if it is desired to very high, then while needing to select MD5 integrity measurement plus trusted party (Trusted Center,
TC) carry out Third Party Authentication scheme, wait car-mounted terminal call respective algorithms carry out integrity measurement, by integrity measurement it
Afterwards, it can install using packet is updated, conversely, illustrating that the update packet has been tampered with, just refusal is updated or directly deleted more
New packet.
If server is sent directly to vehicle user end, car networking server end to ID, Ts of system update packet,
TAG2,TAG3,...,TAGn, after the fields assignment such as MD, vehicle termination can be transmitted directly to, also needed in vehicle termination
Current vehicle condition is obtained, TAG is given1Assignment, binding marker position select most suitable integrity measurement scheme, update packet and have passed through
It after whole property measurement, then waits vehicle no longer when driving, system update can be carried out.If system update packet is not over integrality
Measurement, just refusal updates or directly deletes the system update packet.See that Fig. 4 introduces server end direct transmission system and updates packet to vehicle
The timing diagram of mounted terminal progress system upgrade.
Embodiment provided above has carried out further detailed description, institute to the object, technical solutions and advantages of the present invention
It should be understood that embodiment provided above is only the preferred embodiment of the present invention, be not intended to limit the invention, it is all
Any modification, equivalent substitution, improvement and etc. made for the present invention, should be included in the present invention within the spirit and principles in the present invention
Protection scope within.
Claims (9)
1. updating the adaptive anti-tamper data structure of packet in a kind of car networking, it is characterised in that: the data structure includes ID word
Section, Ts field, TAG field, MD field, and the update packet content DATA for needing to transmit,
Wherein, id field accounts for midByte, for storing data ID value;Ts field accounts for mTSByte indicates to update and wraps biography timestamp;
TAG field accounts for mTAGA byte includes n marker bit TAG1,TAG2,...,TAGn, wherein TAG1Store the traveling of current vehicle
Speed state, TAG2,...,TAGnIt indicates to wrap related scene with update in intelligent network connection automobile;MD field accounts for mmdByte is deposited
Storage updates package informatin abstract, for verifying integrality password value.
2. updating the adaptive anti-tamper data structure of packet in a kind of car networking according to claim 1, it is characterised in that:
As n=3, TAG2For storing the current type for updating packet, TAG3Packet subdivision type is updated for storing.
3. updating the adaptive anti-tamper data structure of packet in a kind of car networking according to shown in claim 2, it is characterised in that:
ID accounts for 4 bytes, and Ts accounts for 4 bytes, and TAG accounts for 1 byte, in which: TAG1Account for 2bit;TAG2: 2bit is accounted for, current update is stored
The type of packet;TAG34bit is accounted for, storage updates packet subdivision type;MD accounts for 36 bytes, and preceding 16 byte is MD5 algorithm values, and latter 20
Byte is SHA_1 algorithm values.
4. updating the adaptive anti-tamper data structure of packet in a kind of car networking according to claim 3, it is characterised in that:
For TAG1, 00 indicates high speed;01 indicates middling speed;10 indicate low speed;11 indicate static.
5. updating the adaptive anti-tamper data structure of packet in a kind of car networking according to claim 3, it is characterised in that:
For TAG2, 00 indicates that onboard system updates packet;01 indicates that onboard system application updates packet.
6. updating the adaptive anti-tamper data structure of packet in a kind of car networking according to claim 3, it is characterised in that:
For TAG2, 0000 indicates traffic safety class vehicular applications;0001 indicates that traffic information seeks advice from class vehicular applications;0010 indicates letter
The commercial vehicular applications such as breath service.
7. updating the adaptive anti-tamper method of packet in a kind of car networking, it is characterised in that: using as described in claim 1-6
Data structure, and carry out following steps:
S1, server end selection need the update packet that transmits, give ID assignment, and obtain the current time and give Ts assignment;
S2, current update packet attribute is obtained, according to the requirement of marker bit, server end gives marker bit TAG respectively2,...,TAGnIt assigns
Value;
S3, current update package informatin is obtained, generates informative abstract and gives MD assignment;
S4, car-mounted terminal, which obtain, updates packet, judges vehicle current driving speed state, gives TAG1Field assignment;
S5, security level is assigned according to the reacted situation of combined value of n marker bit, and suitable complete according to security level selection
Whole property metric scheme can carry out system update if updating packet by integrity measurement;Otherwise refusal updates, or directly deletes
Except the update packet.
8. updating the adaptive anti-tamper method of packet in car networking according to claim 7, which is characterized in that described complete
Property metric scheme include three kinds: the first, be preferably based on the integrity measurement scheme of MD5 algorithm, by MD5 algorithm to information produce
Raw informative abstract, suitable for requiring security level general situation;
Second, it is preferably based on MD5 algorithm and SHA_1 algorithm mixing integrity measurement scheme, while generating to information by MD5
Informative abstract and SHA_1 generate 160bit informative abstract, the program situation more demanding for security level to information;
The third, is preferably based on the integrity measurement scheme of MD5 and Third Party Authentication mechanism, generates information by MD5 algorithm and plucks
Afterwards, then by Third Party Authentication mechanism it is authenticated, is suitable for requiring very high situation to security level.
9. updating the adaptive anti-tamper method of packet in car networking according to claim 7, which is characterized in that server end
What selection needed to transmit, which updates the mode wrapped, includes:
Update is wrapped and passes to car networking application market, waits user to download installation and updates;Or server is sent directly to vehicle
User terminal, is mounted directly in a manner of patch.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810823929.2A CN109150840B (en) | 2018-07-25 | 2018-07-25 | Self-adaptive tamper-proof data structure and method for update package in Internet of vehicles |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810823929.2A CN109150840B (en) | 2018-07-25 | 2018-07-25 | Self-adaptive tamper-proof data structure and method for update package in Internet of vehicles |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109150840A true CN109150840A (en) | 2019-01-04 |
CN109150840B CN109150840B (en) | 2021-04-20 |
Family
ID=64797711
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810823929.2A Active CN109150840B (en) | 2018-07-25 | 2018-07-25 | Self-adaptive tamper-proof data structure and method for update package in Internet of vehicles |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109150840B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110011962A (en) * | 2019-02-21 | 2019-07-12 | 国家计算机网络与信息安全管理中心 | A kind of recognition methods of car networking business datum |
CN114039621A (en) * | 2021-11-23 | 2022-02-11 | 安徽富煌科技股份有限公司 | Vehicle-mounted intelligent connection terminal based on loose coupling |
Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101369896A (en) * | 2007-08-13 | 2009-02-18 | 通用汽车公司 | Method of authenticating a short message service (SMS) message |
US20090060199A1 (en) * | 2006-10-17 | 2009-03-05 | Clay Von Mueller | System and method for updating a transactional device |
CN101699859A (en) * | 2009-11-04 | 2010-04-28 | 四川虹微技术有限公司 | Method for updating deciphering chip of conditional access system of digital TV |
CN101783801A (en) * | 2010-01-29 | 2010-07-21 | 福建星网锐捷网络有限公司 | Software protection method based on network, client side and server |
CN102223229A (en) * | 2011-06-21 | 2011-10-19 | 航天科工深圳(集团)有限公司 | Method for safe transmission of data in public network |
CN104243137A (en) * | 2013-06-24 | 2014-12-24 | 恩智浦有限公司 | Data processing system and method of initializing a data processing system |
CN104951332A (en) * | 2014-03-31 | 2015-09-30 | 福特全球技术公司 | Targeted vehicle remote feature updates |
CN105187376A (en) * | 2015-06-16 | 2015-12-23 | 西安电子科技大学 | Safe communication method of internal automobile network in Telematics |
US20160291940A1 (en) * | 2014-07-07 | 2016-10-06 | Symphony Teleca Corporation | Remote Embedded Device Update Platform Apparatuses, Methods and Systems |
CN106685653A (en) * | 2016-12-29 | 2017-05-17 | 同济大学 | Vehicle remote firmware updating method and device based on information security technology |
CN107040524A (en) * | 2017-03-21 | 2017-08-11 | 北京信安世纪科技有限公司 | A kind of program file verification method and program file verify device |
CN107070652A (en) * | 2017-04-24 | 2017-08-18 | 湖南科技学院 | A kind of anti-tamper car networking method for secret protection of ciphertext based on CP ABE and system |
CN107086996A (en) * | 2017-04-14 | 2017-08-22 | 重庆邮电大学 | Car networking safety certification device and method |
CN107566125A (en) * | 2017-09-01 | 2018-01-09 | 捷德(中国)信息科技有限公司 | The safety certifying method that a kind of more algorithms combine |
CN107947932A (en) * | 2018-01-09 | 2018-04-20 | 重庆邮电大学 | The vehicular ad hoc network authentication method without certificate signature based on non-bilinear map |
CN107968774A (en) * | 2016-10-20 | 2018-04-27 | 深圳联友科技有限公司 | A kind of protecting information safety method of car networking terminal device |
CN107979840A (en) * | 2018-01-23 | 2018-05-01 | 重庆邮电大学 | A kind of the car networking V2I Verification Systems and method of Key-insulated safety |
US20180131522A1 (en) * | 2016-11-07 | 2018-05-10 | Ford Global Technologies, Llc | Controller area network message authentication |
WO2018098000A1 (en) * | 2016-11-22 | 2018-05-31 | Daniel Chien | Network security based on device identifiers and network addresses |
CN108137056A (en) * | 2015-08-18 | 2018-06-08 | 卡菲特公司 | Automotive deck monitor |
EP3337120A1 (en) * | 2016-12-14 | 2018-06-20 | Nxp B.V. | Network message authentication and verification |
-
2018
- 2018-07-25 CN CN201810823929.2A patent/CN109150840B/en active Active
Patent Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090060199A1 (en) * | 2006-10-17 | 2009-03-05 | Clay Von Mueller | System and method for updating a transactional device |
CN101369896A (en) * | 2007-08-13 | 2009-02-18 | 通用汽车公司 | Method of authenticating a short message service (SMS) message |
CN101699859A (en) * | 2009-11-04 | 2010-04-28 | 四川虹微技术有限公司 | Method for updating deciphering chip of conditional access system of digital TV |
CN101783801A (en) * | 2010-01-29 | 2010-07-21 | 福建星网锐捷网络有限公司 | Software protection method based on network, client side and server |
CN102223229A (en) * | 2011-06-21 | 2011-10-19 | 航天科工深圳(集团)有限公司 | Method for safe transmission of data in public network |
CN104243137A (en) * | 2013-06-24 | 2014-12-24 | 恩智浦有限公司 | Data processing system and method of initializing a data processing system |
CN104951332A (en) * | 2014-03-31 | 2015-09-30 | 福特全球技术公司 | Targeted vehicle remote feature updates |
US20160291940A1 (en) * | 2014-07-07 | 2016-10-06 | Symphony Teleca Corporation | Remote Embedded Device Update Platform Apparatuses, Methods and Systems |
CN105187376A (en) * | 2015-06-16 | 2015-12-23 | 西安电子科技大学 | Safe communication method of internal automobile network in Telematics |
CN108137056A (en) * | 2015-08-18 | 2018-06-08 | 卡菲特公司 | Automotive deck monitor |
CN107968774A (en) * | 2016-10-20 | 2018-04-27 | 深圳联友科技有限公司 | A kind of protecting information safety method of car networking terminal device |
US20180131522A1 (en) * | 2016-11-07 | 2018-05-10 | Ford Global Technologies, Llc | Controller area network message authentication |
WO2018098000A1 (en) * | 2016-11-22 | 2018-05-31 | Daniel Chien | Network security based on device identifiers and network addresses |
EP3337120A1 (en) * | 2016-12-14 | 2018-06-20 | Nxp B.V. | Network message authentication and verification |
CN106685653A (en) * | 2016-12-29 | 2017-05-17 | 同济大学 | Vehicle remote firmware updating method and device based on information security technology |
CN107040524A (en) * | 2017-03-21 | 2017-08-11 | 北京信安世纪科技有限公司 | A kind of program file verification method and program file verify device |
CN107086996A (en) * | 2017-04-14 | 2017-08-22 | 重庆邮电大学 | Car networking safety certification device and method |
CN107070652A (en) * | 2017-04-24 | 2017-08-18 | 湖南科技学院 | A kind of anti-tamper car networking method for secret protection of ciphertext based on CP ABE and system |
CN107566125A (en) * | 2017-09-01 | 2018-01-09 | 捷德(中国)信息科技有限公司 | The safety certifying method that a kind of more algorithms combine |
CN107947932A (en) * | 2018-01-09 | 2018-04-20 | 重庆邮电大学 | The vehicular ad hoc network authentication method without certificate signature based on non-bilinear map |
CN107979840A (en) * | 2018-01-23 | 2018-05-01 | 重庆邮电大学 | A kind of the car networking V2I Verification Systems and method of Key-insulated safety |
Non-Patent Citations (4)
Title |
---|
YANBING LIU: "Efficient Privacy-Preserving Dual Authentication", 《IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS》 * |
刘宴兵: "车联网安全模型及关键技术", 《西华师范大学学报》 * |
刘宴兵: "车联网认证机制和信任模型", 《北京邮电大学学报》 * |
林庆国: "一种基于信任的动态访问控制策略", 《重庆邮电大学学报》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110011962A (en) * | 2019-02-21 | 2019-07-12 | 国家计算机网络与信息安全管理中心 | A kind of recognition methods of car networking business datum |
CN110011962B (en) * | 2019-02-21 | 2021-10-01 | 国家计算机网络与信息安全管理中心 | Method for identifying service data of Internet of vehicles |
CN114039621A (en) * | 2021-11-23 | 2022-02-11 | 安徽富煌科技股份有限公司 | Vehicle-mounted intelligent connection terminal based on loose coupling |
CN114039621B (en) * | 2021-11-23 | 2023-08-22 | 安徽交欣科技股份有限公司 | Vehicle-mounted intelligent terminal based on loose coupling |
Also Published As
Publication number | Publication date |
---|---|
CN109150840B (en) | 2021-04-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107770182B (en) | Data storage method of home gateway and home gateway | |
US8904183B2 (en) | Efficient technique to achieve non-repudiation and resilience to DoS attacks in wireless networks | |
CN109922475B (en) | Vehicle authentication and message verification method under vehicle-mounted network environment | |
KR101883437B1 (en) | Policy for secure packet transmission using required node paths and cryptographic signatures | |
US20160373261A1 (en) | Method for manipulation protection of a bus system between at least two system components | |
WO2014121708A2 (en) | Message certification application method, device, and system | |
CN107682859A (en) | Message treatment method and relevant device | |
Li et al. | Proactive key dissemination-based fast authentication for in-motion inductive EV charging | |
WO2021217263A1 (en) | Method and system for establishing trust for a cybersecurity posture of a v2x entity | |
CN112929179A (en) | Vehicle networking equipment identity authentication and key agreement method based on block chain | |
US10503893B2 (en) | Security certificate management method for a vehicular network node and vehicular network node applying the same | |
CN109150840A (en) | Packet adaptive anti-tamper data structure and method are updated in a kind of car networking | |
CN112584355A (en) | Key cooperation method, system and medium for inter-vehicle communication | |
CN112134702B (en) | Method and device for sending and receiving vehicle intranet safety communication | |
CN112087419B (en) | Vehicle-mounted terminal data transmission safety protection method and device | |
CN110351316A (en) | A kind of remote software upgrade method and device | |
CN115665138A (en) | Automobile OTA (over the air) upgrading system and method | |
CN108599961A (en) | A kind of communication means, car-mounted terminal, automobile services platform and system | |
WO2021222448A1 (en) | Method and system for handling dynamic cybersecurity posture of a v2x entity | |
CN111507727B (en) | Security control method for non-inductive payment | |
CN111539702B (en) | Payment record processing method | |
US11934338B2 (en) | Enhanced secure onboard communication for CAN | |
CN114374516B (en) | Certificate revocation list distribution method and device, storage medium, server and vehicle networking device | |
Ganan et al. | RAR: Risk aware revocation mechanism for vehicular networks | |
JP2020005113A (en) | Communication monitoring device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |