CN110943957B - Safety communication system and method for vehicle intranet - Google Patents

Safety communication system and method for vehicle intranet Download PDF

Info

Publication number
CN110943957B
CN110943957B CN201811105043.0A CN201811105043A CN110943957B CN 110943957 B CN110943957 B CN 110943957B CN 201811105043 A CN201811105043 A CN 201811105043A CN 110943957 B CN110943957 B CN 110943957B
Authority
CN
China
Prior art keywords
key
central gateway
domain controller
identity
ecu
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811105043.0A
Other languages
Chinese (zh)
Other versions
CN110943957A (en
Inventor
李鑫
刘熙胖
廖正赟
孙晓鹏
梁松涛
李华领
彭金辉
周小欠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Xinda Jiean Information Technology Co Ltd
Original Assignee
Zhengzhou Xinda Jiean Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Xinda Jiean Information Technology Co Ltd filed Critical Zhengzhou Xinda Jiean Information Technology Co Ltd
Priority to CN201811105043.0A priority Critical patent/CN110943957B/en
Publication of CN110943957A publication Critical patent/CN110943957A/en
Application granted granted Critical
Publication of CN110943957B publication Critical patent/CN110943957B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention provides a vehicle intranet safety communication system and a method, comprising the following steps: the system comprises a TSP platform, a central gateway, a domain controller and ECU equipment; the TSP platform is connected with the central gateway through a network, the central gateway is connected with one or more domain controllers through a network, and the domain controllers are connected with one or more ECU (electronic control unit) devices through a vehicle bus; a first secure channel is constructed after first identity authentication and key agreement are carried out between the TSP platform and the central gateway, and the TSP platform carries out encryption communication with the central gateway through the first secure channel; a second safety channel is constructed after second identity authentication and key distribution are carried out between the central gateway and the domain controller, and the central gateway and the domain controller carry out encryption communication through the second safety channel; and after third identity authentication and key distribution are carried out between the domain controller and the ECU equipment, a third secure channel is constructed, and the domain controller carries out encryption communication with the ECU equipment through the third secure channel.

Description

Safety communication system and method for vehicle intranet
Technical Field
The invention relates to the technical fields of vehicle inner networks, security authentication, encryption and the like, in particular to a vehicle inner network security communication system and a vehicle inner network security communication method.
Background
With the development of automobile intellectualization and networking, a traditional automobile electronic network structure mainly comprises a central gateway and a plurality of ECU (electronic control unit) devices, wherein the automobile bus network mainly adopts a CAN (controller area network), a LIN (local interconnect network) and a FlexRay bus network, and the plurality of ECU devices CAN be mounted through the automobile bus network. However, the ECU device has limited processing capability, a low bus transmission speed, insufficient bandwidth, and many ECU device units of the vehicle, and in order to solve the problems of the ECU device, a domain controller is proposed, which has a multi-core CPU/GPU with higher processing capability, and has modularization, integration, and platform unification, and can relatively intensively control a plurality of ECU devices respectively related to several domains such as a vehicle power assembly, vehicle safety, body electronics, an intelligent cabin, and intelligent driving, and replace a conventional distributed electronic and electrical architecture of the vehicle.
However, since most of the data involved in the car intranet is sensitive information, and the design of the domain controller, the central gateway and the ECU device does not consider the safety problem, for example: when the central gateway, the domain controller and the ECU equipment in the automobile are attacked by lawless persons through the network in the automobile, the life safety of automobile users can be threatened directly; when the sensitive information is transmitted by the vehicle intranet, the encryption and authentication technology is not adopted, so that once the sensitive information is maliciously stolen and tampered, the whole running condition of the vehicle is influenced.
In order to solve the safety problem of the car inner net, people always seek an ideal technical solution.
Disclosure of Invention
The invention aims to provide a vehicle intranet safety communication system and a vehicle intranet safety communication method, aiming at the defects in the prior art, and the data transmitted in the vehicle intranet is subjected to safety protection by adopting identity authentication, key agreement, key distribution and data encryption technologies and combining a safety module with high safety performance.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
an in-vehicle network secure communication system comprising: the system comprises a TSP platform, a central gateway, a domain controller and ECU equipment; the TSP platform is connected with the central gateway through a network, the central gateway is connected with one or more domain controllers through a network, and the domain controllers are connected with one or more ECU devices through a vehicle bus;
the TSP platform and the central gateway construct a first secure channel after performing first identity authentication and key agreement, and the TSP platform performs encrypted communication with the central gateway through the first secure channel;
after second identity authentication and key distribution are carried out between the central gateway and the domain controller, a second secure channel is constructed, and the central gateway carries out encryption communication with the domain controller through the second secure channel;
and after third identity authentication and key distribution are carried out between the domain controller and the ECU equipment, a third secure channel is constructed, and the domain controller carries out encryption communication with the ECU equipment through the third secure channel.
Based on the above, the TSP platform includes a certificate system server, a key management server, an access server, and a management system server;
the certificate system server is used for generating a digital certificate of the TSP platform and a digital certificate of the central gateway and carrying out the first identity authentication;
the key management server comprises a public and private key pair of the TSP platform, is used for carrying out first key negotiation and provides a shared key I and a shared key II for constructing the second secure channel and the third secure channel;
the access server is used for the central gateway to safely access the TSP platform;
the management system server is configured to manage the central gateway information, the domain controller information, and the ECU device information stored in the TSP platform.
Based on the above, the central gateway includes a network communication module, a security module I and a gateway control module, the gateway control module includes a key center library, and the gateway control module is connected to the network communication module and the security module I respectively;
the network communication module is used for performing network connection between the central gateway and the TSP platform;
the security module I comprises a digital certificate of the central gateway and a public and private key pair of the central gateway and is used for performing the first identity authentication and key agreement; the system also comprises the shared secret key I, an identity list file of the domain controller and an identity identifier of the central gateway, and is used for performing second identity authentication and secret key distribution;
the gateway control module comprises an initial dispersion factor I and a new dispersion factor I;
the key center library is at least used for obtaining an initial session key I through calculation according to the shared key I and the initial dispersion factor I and obtaining a new session key I through calculation according to the shared key I and the new dispersion factor I;
the initial session key I in the central gateway is used for encrypting information when performing the second identity authentication with the domain controller, and the new session key I in the central gateway is used for encrypting information after completing the second identity authentication with the domain controller.
Based on the above, the domain controller includes a security module II and a processing module, the processing module includes a key node library I, and the processing module is connected to the security module II;
the security module II comprises the shared secret key I, the equipment identity of the domain controller and the identity of the central gateway and is used for performing second identity authentication and secret key distribution; the shared secret key II and the identity list file of the ECU equipment are further included, and the shared secret key II and the identity list file are used for performing third identity authentication and secret key distribution;
the processing module comprises an initial dispersion factor I and a new dispersion factor I; and further comprising an initial dispersion factor II and a new dispersion factor II;
the key node library I is used for calculating to obtain an initial session key I according to the shared key I and the initial dispersion factor I and calculating to obtain a new session key I according to the shared key I and the new dispersion factor I; the system is used for calculating to obtain an initial session key II according to the shared key II and the initial dispersion factor II and calculating to obtain a new session key II according to the shared key II and the new dispersion factor II;
the initial session key I in the domain controller is used for encrypting information during the second identity authentication with the central gateway, and the new session key I in the domain controller is used for encrypting information after the second identity authentication is completed with the central gateway; the initial session key II in the domain controller is used for encrypting information when performing the third identity authentication with the ECU device, and the new session key II in the domain controller is used for encrypting information after completing the third identity authentication with the ECU device.
Based on the above, the ECU device includes an ECU control module, which includes a key node library II;
the ECU control module comprises the initial dispersion factor II and the new dispersion factor II; the system also comprises the shared secret key II, the identity of the domain controller equipment and the identity of the ECU equipment, and is used for performing third identity authentication and secret key distribution;
the key node library II is used for obtaining the initial session key II through calculation according to the shared key II and the initial dispersion factor II and obtaining the new session key II through calculation according to the shared key II and the new dispersion factor II;
the initial session key II in the ECU device is used to encrypt information when performing the third identity authentication with the domain controller, and the new session key II in the ECU device is used to encrypt information after completing the third identity authentication with the domain controller.
The invention also provides a safe communication method applying the vehicle intranet safe communication system, and the communication process in the safe communication method specifically comprises the following steps:
the TSP platform and the central gateway construct a first secure channel after performing first identity authentication and key agreement, and the TSP platform performs encrypted communication with the central gateway through the first secure channel;
after second identity authentication and key distribution are carried out between the central gateway and the domain controller, a second secure channel is constructed, and the central gateway carries out encryption communication with the domain controller through the second secure channel;
and after third identity authentication and key distribution are carried out between the domain controller and the ECU equipment, a third secure channel is constructed, and the domain controller carries out encryption communication with the ECU equipment through the third secure channel.
Based on the above, the communication process further includes a preparation process before the communication process, where the preparation process specifically includes:
respectively presetting an initial dispersion factor I in a gateway controller of the central gateway and a processing module of the domain controller, and respectively presetting an initial dispersion factor II in a processing module of the domain controller and an ECU control module of the ECU equipment;
a public and private key pair of the central gateway is generated by a security module I of the central gateway, and a public and private key pair of the TSP platform is generated by a key management server of the TSP platform;
respectively generating a digital certificate of the central gateway and a digital certificate of the TSP platform through the certificate system server of the TSP platform, and sending the digital certificate of the central gateway to the security module I;
respectively acquiring an identity of the central gateway, an identity of the domain controller, an identity of the ECU equipment, an identity list file of the domain controller and an identity list file of the ECU equipment through the TSP platform;
respectively acquiring a shared key I and a shared key II through a key management server of the TSP platform;
the identity identification of the central gateway, the identity list file of the domain controller and the shared key I are sent to the security module I of the central gateway through a TSP platform, the identity identification of the domain controller, the identity identification of the central gateway, the identity list file of the ECU equipment, the shared key I and the shared key II are sent to the security module II of the domain controller, and the identity identification of the ECU equipment, the identity identification of the domain controller and the shared key II are sent to the ECU control module of the ECU equipment.
Based on the above, in the communication process, after performing the first authentication and the key agreement between the TSP platform and the central gateway, a first secure channel is constructed, and the performing the encrypted communication between the TSP platform and the central gateway through the first secure channel specifically includes:
step A1, the central gateway sends the security parameter information including the random number a and the supported encryption algorithm to the TSP platform; the random number a is generated by the central gateway through the security module I;
step A2, after receiving the security parameter information including random number a and supported encryption algorithm, the TSP platform confirms the used encryption algorithm, and obtains the digital certificate of the TSP platform through the certificate system server, and sends the digital certificate of the TSP platform and the security parameter information including random number b and confirmed encryption algorithm to the central gateway, and sends the digital certificate request information to the central gateway; the random number b is generated by the TSP platform through the key management server;
step A3, the central gateway verifies the digital certificate of the TSP platform, if the verification is successful, step A4 is executed; otherwise, ending the current session;
step A4, after receiving the digital certificate request message, the central gateway sends the digital certificate of the central gateway to the TSP platform;
step A5, the TSP platform verifies the digital certificate of the central gateway, if the verification is successful, step A6 is executed; otherwise, ending the current session;
step A6, the central gateway encrypts a premaster secret key c generated by the security module I through a public key in a digital certificate of the TSP platform; the central gateway calculates a first hash value of information exchanged with the TSP platform, and encrypts the first hash value through a private key of the central gateway in the security module I; the central gateway sends the ciphertext of the premaster secret key c and the ciphertext of the first hash value to the TSP platform;
step A7, the TSP platform decrypts the ciphertext of the first hash value through a public key in the digital certificate of the central gateway to obtain the plaintext of the first hash value; the TSP platform calculates a second hash value of information exchanged with the central gateway, and if the first hash value and the second hash value are successfully compared and verified, the secret key of the pre-master key c is decrypted by the key management server by using a private key of the TSP platform to obtain a plaintext of the pre-master key c; otherwise, ending the current session;
step A8, the TSP platform encrypts the second hash value through a private key of the TSP platform and sends the encrypted second hash value to the central gateway, and the central gateway decrypts the ciphertext of the second hash value through a public key in a digital certificate of the TSP platform to obtain a plaintext of the second hash value; if the comparison of the second hash value and the first hash value is successful, executing step a 9; otherwise, ending the current session;
step A9, the central gateway and the TSP platform respectively use the encryption algorithm to generate the same session key after calculation according to the random number a, the random number b and the premaster secret key c;
and step A10, information is encrypted and decrypted between the TSP platform and the central gateway by using the session key.
Based on the above, in the communication process, after performing second identity authentication and key distribution between the central gateway and the domain controller, a second secure channel is constructed, and the performing, by the central gateway, encrypted communication with the domain controller through the second secure channel specifically includes:
step B1, the central gateway calculates the initial session key I by the key center library by using the shared key I in the security module I and the initial dispersion factor I in the gateway control module; the domain controller obtains the initial session key I by the key node library I through calculation by using the shared key I in the security module II and the initial dispersion factor I in the processing module;
step B2, the central gateway encrypts the identity of the central gateway in the security module I through the initial session key I and then sends the identity to the domain controller;
step B3, the domain controller decrypts by using the initial session key I to obtain the identity of the central gateway, and compares the identity of the central gateway with the identity of the central gateway in the security module II for verification, if the verification is passed, the step B4 is executed;
step B4, the domain controller uses the initial session key I to encrypt the identity of the domain controller in the security module II and sends the encrypted identity to the central gateway;
step B5, the central gateway uses the initial session key I to decrypt and obtain the identity of the domain controller, and compares the identity with the identity list file of the domain controller in the security module I for verification, if the verification is passed, the step B6 is executed;
step B6, the central gateway distributes the new dispersion factor I to the gateway control module and the processing module of the domain controller, respectively;
step B7, the central gateway calculates the new session key I by the key center library using the shared key I in the security module I and the new dispersion factor I in the gateway control module; the domain controller calculates and obtains the new session key I by using the shared key I in the security module II and the new dispersion factor I in the processing module through the key node library I;
and step B8, the central gateway and the domain controller encrypt and decrypt information by using the new session key I.
Based on the above, in the communication process, after performing third identity authentication and key distribution between the domain controller and the ECU device, a third secure channel is constructed, and the encrypted communication performed by the domain controller and the ECU device through the third secure channel specifically includes:
step S1, the domain controller obtains the initial session key II by the key node library I through calculation using the shared key II in the security module II and the initial dispersion factor II in the processing module; the ECU device obtains the initial session key II through calculation of the key node library II by using the shared key II and the initial dispersion factor II in the ECU control module;
step S2, the domain controller encrypts the identity of the domain controller in the security module II through the initial session key II and sends the identity to the ECU equipment;
step S3, the ECU equipment decrypts by using the initial session key II to obtain the identity of the domain controller, compares the identity with the identity of the domain controller in the ECU control module for verification, and executes step S4 if the verification is passed;
step S4, the ECU device encrypts the id of the ECU device in the ECU control module using the initial session key II and sends the encrypted id to the domain controller;
step S5, the domain controller decrypts the identity of the ECU equipment by using the initial session key II, compares the identity with the identity list file of the ECU equipment in the security module II and verifies the identity, and if the identity passes the verification, the domain controller executes step S6;
step S6, the domain controller distributes the new dispersion factor II to the processing module and the ECU control module, respectively;
step S7, the domain controller obtains the new session key II through the key node library I by using the shared key II in the security module II and the new dispersion factor II in the processing module; the ECU equipment obtains the new session key II through calculation of the key node library II by using the shared key II and the new dispersion factor II in the ECU control module;
step S8, the encryption and decryption of information between the domain controller and the ECU device is performed by using the new session key II.
The invention has prominent substantive characteristics and remarkable progress, in particular to the following steps:
(1) a first security channel is constructed by performing first identity authentication and key agreement between the TSP platform and the central gateway, the identity of the TSP platform and the central gateway is ensured to be legal by using a digital certificate, and information transmitted between the TSP platform and the central gateway is encrypted by using an agreed session key to ensure the security of information transmission;
(2) the method comprises the steps that an initial secret key I is obtained by using a shared secret key I and an initial dispersion factor I between a central gateway and a domain controller, then mutual identity authentication is carried out by using an initial secret key I to encrypt equipment identity marks, the identity of the central gateway and the domain controller is guaranteed to be legal, information transmitted after new session secret key I is used for encrypting identity authentication is obtained through the shared secret key I and a new dispersion factor I, and the safety of information transmission is guaranteed;
(3) the method comprises the steps that an initial key II is obtained by using a shared key II and an initial dispersion factor II between a domain controller and ECU equipment, then mutual identity authentication is carried out by using an initial key II to encrypt equipment identity identification, the identity of the domain controller and the ECU equipment is guaranteed to be legal, information transmitted after new session key II is used for encrypting the identity authentication is obtained through the shared key II and a new dispersion factor II, and the safety of information transmission is guaranteed;
(4) through the effective combination of the first safety channel, the second safety channel and the third safety channel, the safety of the whole vehicle intranet safety communication system is effectively improved, and lawless persons are prevented from attacking and stealing and tampering data of each device independently through the vehicle intranet;
(5) the digital certificate, the equipment identity and identity list file and the public and private key pair are arranged in the security module, so that the information security is improved;
(6) when the central gateway and the domain controller adopt Ethernet communication, the bandwidth and speed limitation of the existing vehicle intranet bus system is solved;
(7) when the vehicle bus adopts the CAN bus, the time delay brought by encryption and decryption CAN be effectively reduced by adopting a lightweight stream encryption algorithm.
Drawings
Fig. 1 is an overall block diagram of the in-vehicle network secure communication system of the present invention.
Fig. 2 is a block diagram illustrating a structure of a TSP platform in the intranet secure communication system according to the present invention.
Fig. 3 is a block diagram of a central gateway in the intranet secure communication system according to the present invention.
Fig. 4 is a block diagram of a domain controller in the in-vehicle network secure communication system according to the present invention.
Fig. 5 is a block diagram of an ECU device in the in-vehicle network secure communication system according to the present invention.
Fig. 6 is a flowchart of a communication process in the vehicle intranet secure communication method of the present invention.
Fig. 7 is a flowchart illustrating communication between the TSP platform and the central gateway in the vehicle intranet secure communication method according to the present invention.
Fig. 8 is a flowchart illustrating a communication between a central gateway and a domain controller in the intra-vehicle network secure communication method according to the present invention.
Fig. 9 is a flowchart illustrating the communication between the domain controller and the ECU device in the intra-vehicle network secure communication method according to the present invention.
Detailed Description
In order to make the present invention clearer, the technical solution of the present invention is further described in detail by the following embodiments.
As shown in fig. 1, an in-vehicle network secure communication system includes: the system comprises a TSP platform, a central gateway, a domain controller and ECU equipment; the TSP platform is connected with the central gateway through a network, the central gateway is connected with one or more domain controllers through a network, and the domain controllers are connected with one or more ECU devices through a vehicle bus;
the TSP platform and the central gateway construct a first secure channel after performing first identity authentication and key agreement, and the TSP platform performs encrypted communication with the central gateway through the first secure channel;
after second identity authentication and key distribution are carried out between the central gateway and the domain controller, a second secure channel is constructed, and the central gateway carries out encryption communication with the domain controller through the second secure channel;
and after third identity authentication and key distribution are carried out between the domain controller and the ECU equipment, a third secure channel is constructed, and the domain controller carries out encryption communication with the ECU equipment through the third secure channel.
In practical application, the central gateway and one or more domain controllers can be connected through Ethernet; the vehicle bus CAN be selected from a CAN bus, a CAN _ FD bus, a LIN bus and a FlexRay bus; the whole automobile is divided into a power assembly, several domains such as automobile safety, automobile body electronics, an intelligent cabin and intelligent driving according to the functions of electronic components of the automobile, each domain is controlled by different domain controllers, and a plurality of ECU (electronic control unit) devices related to the domain controllers are mounted behind each domain controller, so that the existing distributed electronic and electric architecture of the automobile is replaced, and the network architecture is efficient and convenient.
Specifically, as shown in fig. 2, the TSP platform includes a certificate system server, a key management server, an access server, and a management system server;
the certificate system server is used for generating a digital certificate of the TSP platform and a digital certificate of the central gateway and carrying out the first identity authentication;
the key management server comprises a public and private key pair of the TSP platform, is used for carrying out first key negotiation and provides a shared key I and a shared key II for constructing the second secure channel and the third secure channel;
the access server is used for the central gateway to safely access the TSP platform;
the management system server is configured to manage the central gateway information, the domain controller information, and the ECU device information stored in the TSP platform.
In practical application, self information can be updated and maintained through the TSP platform, and information of the central gateway, the domain controller and the ECU equipment can be updated and maintained; and establishing a vehicle database in the TSP platform, and establishing a data table of the vehicle according to the VIN code of the vehicle, the related shared secret key, the identity mark, the identity list file and the like, wherein an administrator can maintain the vehicle.
Specifically, as shown in fig. 3, the central gateway includes a network communication module, a security module I and a gateway control module, the gateway control module includes a key repository, and the gateway control module is connected to the network communication module and the security module I respectively;
the network communication module is used for performing network connection between the central gateway and the TSP platform; the network connection not only comprises wireless network connection, but also comprises a mode that the special OBD equipment carries out offline network connection.
The security module I comprises a digital certificate of the central gateway and a public and private key pair of the central gateway and is used for performing the first identity authentication and key agreement; the system also comprises the shared secret key I, an identity list file of the domain controller and an identity identifier of the central gateway, and is used for performing second identity authentication and secret key distribution;
the gateway control module comprises an initial dispersion factor I and a new dispersion factor I;
the key center library is at least used for obtaining an initial session key I through calculation according to the shared key I and the initial dispersion factor I and obtaining a new session key I through calculation according to the shared key I and the new dispersion factor I;
the initial session key I in the central gateway is used for encrypting information when performing the second identity authentication with the domain controller, and the new session key I in the central gateway is used for encrypting information after completing the second identity authentication with the domain controller.
Specifically, as shown in fig. 4, the domain controller includes a security module II and a processing module, the processing module includes a key node library I, and the processing module is connected to the security module II;
the security module II comprises the shared secret key I, the equipment identity of the domain controller and the identity of the central gateway and is used for performing second identity authentication and secret key distribution; the shared secret key II and the identity list file of the ECU equipment are further included, and the shared secret key II and the identity list file are used for performing third identity authentication and secret key distribution;
the processing module comprises an initial dispersion factor I and a new dispersion factor I; and further comprising an initial dispersion factor II and a new dispersion factor II;
the key node library I is used for calculating to obtain an initial session key I according to the shared key I and the initial dispersion factor I and calculating to obtain a new session key I according to the shared key I and the new dispersion factor I; the system is used for calculating to obtain an initial session key II according to the shared key II and the initial dispersion factor II and calculating to obtain a new session key II according to the shared key II and the new dispersion factor II;
the initial session key I in the domain controller is used for encrypting information during the second identity authentication with the central gateway, and the new session key I in the domain controller is used for encrypting information after the second identity authentication is completed with the central gateway; the initial session key II in the domain controller is used for encrypting information when performing the third identity authentication with the ECU device, and the new session key II in the domain controller is used for encrypting information after completing the third identity authentication with the ECU device.
Specifically, as shown in fig. 5, the ECU device includes an ECU control module including a key node library II;
the ECU control module comprises the initial dispersion factor II and the new dispersion factor II; the system also comprises the shared secret key II, the identity of the domain controller equipment and the identity of the ECU equipment, and is used for performing third identity authentication and secret key distribution;
the key node library II is used for obtaining the initial session key II through calculation according to the shared key II and the initial dispersion factor II and obtaining the new session key II through calculation according to the shared key II and the new dispersion factor II;
the initial session key II in the ECU device is used to encrypt information when performing the third identity authentication with the domain controller, and the new session key II in the ECU device is used to encrypt information after completing the third identity authentication with the domain controller.
As shown in fig. 6, the present invention further provides a secure communication method using the vehicle intranet secure communication system, where the secure communication method specifically includes:
the TSP platform and the central gateway construct a first secure channel after performing first identity authentication and key agreement, and the TSP platform performs encrypted communication with the central gateway through the first secure channel;
after second identity authentication and key distribution are carried out between the central gateway and the domain controller, a second secure channel is constructed, and the central gateway carries out encryption communication with the domain controller through the second secure channel;
and after third identity authentication and key distribution are carried out between the domain controller and the ECU equipment, a third secure channel is constructed, and the domain controller carries out encryption communication with the ECU equipment through the third secure channel.
Specifically, the communication process further includes a preparation process before the communication process, where the preparation process specifically includes:
respectively presetting an initial dispersion factor I in a gateway controller of the central gateway and a processing module of the domain controller, and respectively presetting an initial dispersion factor II in a processing module of the domain controller and an ECU control module of the ECU equipment;
a public and private key pair of the central gateway is generated by a security module I of the central gateway, and a public and private key pair of the TSP platform is generated by a key management server of the TSP platform;
respectively generating a digital certificate of the central gateway and a digital certificate of the TSP platform through the certificate system server of the TSP platform, and sending the digital certificate of the central gateway to the security module I;
respectively acquiring an identity of the central gateway, an identity of the domain controller, an identity of the ECU equipment, an identity list file of the domain controller and an identity list file of the ECU equipment through the TSP platform;
respectively acquiring a shared key I and a shared key II through a key management server of the TSP platform;
the identity identification of the central gateway, the identity list file of the domain controller and the shared key I are sent to the security module I of the central gateway through a TSP platform, the identity identification of the domain controller, the identity identification of the central gateway, the identity list file of the ECU equipment, the shared key I and the shared key II are sent to the security module II of the domain controller, and the identity identification of the ECU equipment, the identity identification of the domain controller and the shared key II are sent to the ECU control module of the ECU equipment.
Specifically, as shown in fig. 7, in the communication process, a first secure channel is constructed after the TSP platform performs first identity authentication and key agreement with the central gateway, and the performing, by the TSP platform, encrypted communication with the central gateway through the first secure channel specifically includes:
step A1, the central gateway sends the security parameter information including the random number a and the supported encryption algorithm to the TSP platform; the random number a is generated by the central gateway through the security module I;
step A2, after receiving the security parameter information including random number a and supported encryption algorithm, the TSP platform confirms the used encryption algorithm, and obtains the digital certificate of the TSP platform through the certificate system server, and sends the digital certificate of the TSP platform and the security parameter information including random number b and confirmed encryption algorithm to the central gateway, and sends the digital certificate request information to the central gateway; the random number b is generated by the TSP platform through the key management server;
step A3, the central gateway verifies the digital certificate of the TSP platform, if the verification is successful, step A4 is executed; otherwise, ending the current session;
step A4, after receiving the digital certificate request message, the central gateway sends the digital certificate of the central gateway to the TSP platform;
step A5, the TSP platform verifies the digital certificate of the central gateway, if the verification is successful, step A6 is executed; otherwise, ending the current session;
step A6, the central gateway encrypts a premaster secret key c generated by the security module I through a public key in a digital certificate of the TSP platform; the central gateway calculates a first hash value of information exchanged with the TSP platform, and encrypts the first hash value through a private key of the central gateway in the security module I; the central gateway sends the ciphertext of the premaster secret key c and the ciphertext of the first hash value to the TSP platform;
step A7, the TSP platform decrypts the ciphertext of the first hash value through a public key in the digital certificate of the central gateway to obtain the plaintext of the first hash value; the TSP platform calculates a second hash value of information exchanged with the central gateway, and if the first hash value and the second hash value are successfully compared and verified, the secret key of the pre-master key c is decrypted by the key management server by using a private key of the TSP platform to obtain a plaintext of the pre-master key c; otherwise, ending the current session;
step A8, the TSP platform encrypts the second hash value through a private key of the TSP platform and sends the encrypted second hash value to the central gateway, and the central gateway decrypts the ciphertext of the second hash value through a public key in a digital certificate of the TSP platform to obtain a plaintext of the second hash value; if the comparison of the second hash value and the first hash value is successful, executing step a 9; otherwise, ending the current session;
step A9, the central gateway and the TSP platform respectively use the encryption algorithm to generate the same session key after calculation according to the random number a, the random number b and the premaster secret key c;
and step A10, information is encrypted and decrypted between the TSP platform and the central gateway by using the session key.
Specifically, as shown in fig. 8, in the communication process, after performing second identity authentication and key distribution between the central gateway and the domain controller, a second secure channel is constructed, and the performing, by the central gateway, encrypted communication with the domain controller through the second secure channel specifically includes:
step B1, the central gateway calculates the initial session key I by the key center library by using the shared key I in the security module I and the initial dispersion factor I in the gateway control module; the domain controller obtains the initial session key I by the key node library I through calculation by using the shared key I in the security module II and the initial dispersion factor I in the processing module;
step B2, the central gateway encrypts the identity of the central gateway in the security module I through the initial session key I and then sends the identity to the domain controller;
step B3, the domain controller decrypts by using the initial session key I to obtain the identity of the central gateway, and compares the identity of the central gateway with the identity of the central gateway in the security module II for verification, if the verification is passed, the step B4 is executed;
step B4, the domain controller uses the initial session key I to encrypt the identity of the domain controller in the security module II and sends the encrypted identity to the central gateway;
step B5, the central gateway uses the initial session key I to decrypt and obtain the identity of the domain controller, and compares the identity with the identity list file of the domain controller in the security module I for verification, if the verification is passed, the step B6 is executed;
step B6, the central gateway distributes the new dispersion factor I to the gateway control module and the processing module of the domain controller, respectively;
step B7, the central gateway calculates the new session key I by the key center library using the shared key I in the security module I and the new dispersion factor I in the gateway control module; the domain controller calculates and obtains the new session key I by using the shared key I in the security module II and the new dispersion factor I in the processing module through the key node library I;
and step B8, the central gateway and the domain controller encrypt and decrypt information by using the new session key I.
Specifically, as shown in fig. 9, in the communication process, a third secure channel is constructed after third identity authentication and key distribution are performed between the domain controller and the ECU device, and the performing, by the domain controller, encrypted communication with the ECU device through the third secure channel specifically includes:
step S1, the domain controller obtains the initial session key II by the key node library I through calculation using the shared key II in the security module II and the initial dispersion factor II in the processing module; the ECU device obtains the initial session key II through calculation of the key node library II by using the shared key II and the initial dispersion factor II in the ECU control module;
step S2, the domain controller encrypts the identity of the domain controller in the security module II through the initial session key II and sends the identity to the ECU equipment;
step S3, the ECU equipment decrypts by using the initial session key II to obtain the identity of the domain controller, compares the identity with the identity of the domain controller in the ECU control module for verification, and executes step S4 if the verification is passed;
step S4, the ECU device encrypts the id of the ECU device in the ECU control module using the initial session key II and sends the encrypted id to the domain controller;
step S5, the domain controller decrypts the identity of the ECU equipment by using the initial session key II, compares the identity with the identity list file of the ECU equipment in the security module II and verifies the identity, and if the identity passes the verification, the domain controller executes step S6;
step S6, the domain controller distributes the new dispersion factor II to the processing module and the ECU control module, respectively;
step S7, the domain controller obtains the new session key II through the key node library I by using the shared key II in the security module II and the new dispersion factor II in the processing module; the ECU equipment obtains the new session key II through calculation of the key node library II by using the shared key II and the new dispersion factor II in the ECU control module;
step S8, the encryption and decryption of information between the domain controller and the ECU device is performed by using the new session key II.
In practical applications, if the second authentication and the third authentication fail, the new key dispersion factor I and the new key dispersion factor II are not distributed.
In practical application, the TSP platform can send control information, diagnostic information, upgrade information, update information, and the like to a relevant central gateway, domain controller, and ECU device, and the information can be encrypted and transmitted through the first secure channel, the second secure channel, and the third secure channel in the transmission process, thereby effectively ensuring the security of information transmission.
It should be finally noted that the above-mentioned embodiments are only used for illustrating the technical solutions of the present invention and not for limiting the same, and those skilled in the art should make modifications to the specific embodiments of the present invention or make equivalent substitutions for part of technical features without departing from the spirit of the technical solutions of the present invention, and all of them should be covered in the technical solutions claimed in the present invention.

Claims (6)

1. The utility model provides a car intranet safety communication system which characterized in that includes: the system comprises a TSP platform, a central gateway, a domain controller and ECU equipment; the TSP platform is connected with the central gateway through a network, the central gateway is connected with one or more domain controllers through a network, and the domain controllers are connected with one or more ECU devices through a vehicle bus; the TSP platform and the central gateway construct a first secure channel after performing first identity authentication and key agreement, and the TSP platform performs encrypted communication with the central gateway through the first secure channel; after second identity authentication and key distribution are carried out between the central gateway and the domain controller, a second secure channel is constructed, and the central gateway carries out encryption communication with the domain controller through the second secure channel; establishing a third secure channel after performing third identity authentication and key distribution between the domain controller and the ECU equipment, wherein the domain controller performs encrypted communication with the ECU equipment through the third secure channel;
the TSP platform comprises a certificate system server, a key management server, an access server and a management system server; the certificate system server is used for generating a digital certificate of the TSP platform and a digital certificate of the central gateway and carrying out the first identity authentication; the key management server comprises a public and private key pair of the TSP platform, is used for carrying out first key negotiation and provides a shared key I and a shared key II for constructing the second secure channel and the third secure channel; the access server is used for the central gateway to safely access the TSP platform; the management system server is used for managing the central gateway information, the domain controller information and the ECU equipment information stored in the TSP platform;
the central gateway comprises a network communication module, a security module I and a gateway control module, wherein the gateway control module comprises a key center library, and is respectively connected with the network communication module and the security module I; the network communication module is used for performing network connection between the central gateway and the TSP platform; the security module I comprises a digital certificate of the central gateway and a public and private key pair of the central gateway and is used for performing the first identity authentication and key agreement; the system also comprises the shared secret key I, an identity list file of the domain controller and an identity identifier of the central gateway, and is used for performing second identity authentication and secret key distribution; the gateway control module comprises an initial dispersion factor I and a new dispersion factor I; the key center library is at least used for obtaining an initial session key I through calculation according to the shared key I and the initial dispersion factor I and obtaining a new session key I through calculation according to the shared key I and the new dispersion factor I; the initial session key I in the central gateway is used for encrypting information when performing the second identity authentication with the domain controller, and the new session key I in the central gateway is used for encrypting information after completing the second identity authentication with the domain controller;
the domain controller comprises a security module II and a processing module, the processing module comprises a key node library I, and the processing module is connected with the security module II; the security module II comprises the shared secret key I, the equipment identity of the domain controller and the identity of the central gateway and is used for performing second identity authentication and secret key distribution; the shared secret key II and the identity list file of the ECU equipment are further included, and the shared secret key II and the identity list file are used for performing third identity authentication and secret key distribution; the processing module comprises an initial dispersion factor I and a new dispersion factor I; and further comprising an initial dispersion factor II and a new dispersion factor II; the key node library I is used for calculating to obtain an initial session key I according to the shared key I and the initial dispersion factor I and calculating to obtain a new session key I according to the shared key I and the new dispersion factor I; the system is used for calculating to obtain an initial session key II according to the shared key II and the initial dispersion factor II and calculating to obtain a new session key II according to the shared key II and the new dispersion factor II; the initial session key I in the domain controller is used for encrypting information during the second identity authentication with the central gateway, and the new session key I in the domain controller is used for encrypting information after the second identity authentication is completed with the central gateway; the initial session key II in the domain controller is used for encrypting information when performing the third identity authentication with the ECU device, and the new session key II in the domain controller is used for encrypting information after completing the third identity authentication with the ECU device;
the method further comprises a preparation process, wherein the preparation process specifically comprises the following steps:
respectively presetting an initial dispersion factor I in a gateway controller of the central gateway and a processing module of the domain controller, and respectively presetting an initial dispersion factor II in a processing module of the domain controller and an ECU control module of the ECU equipment;
a public and private key pair of the central gateway is generated by a security module I of the central gateway, and a public and private key pair of the TSP platform is generated by a key management server of the TSP platform;
respectively generating a digital certificate of the central gateway and a digital certificate of the TSP platform through the certificate system server of the TSP platform, and sending the digital certificate of the central gateway to the security module I;
respectively acquiring an identity of the central gateway, an identity of the domain controller, an identity of the ECU equipment, an identity list file of the domain controller and an identity list file of the ECU equipment through the TSP platform;
respectively acquiring a shared key I and a shared key II through a key management server of the TSP platform;
the identity identification of the central gateway, the identity list file of the domain controller and the shared key I are sent to the security module I of the central gateway through a TSP platform, the identity identification of the domain controller, the identity identification of the central gateway, the identity list file of the ECU equipment, the shared key I and the shared key II are sent to the security module II of the domain controller, and the identity identification of the ECU equipment, the identity identification of the domain controller and the shared key II are sent to the ECU control module of the ECU equipment.
2. The in-vehicle network secure communication system according to claim 1, wherein the ECU device includes an ECU control module including a key node library II; the ECU control module comprises the initial dispersion factor II and the new dispersion factor II; the system also comprises the shared secret key II, the identity of the domain controller equipment and the identity of the ECU equipment, and is used for performing third identity authentication and secret key distribution; the key node library II is used for obtaining the initial session key II through calculation according to the shared key II and the initial dispersion factor II and obtaining the new session key II through calculation according to the shared key II and the new dispersion factor II; the initial session key II in the ECU device is used to encrypt information when performing the third identity authentication with the domain controller, and the new session key II in the ECU device is used to encrypt information after completing the third identity authentication with the domain controller.
3. A secure communication method using the in-vehicle network secure communication system according to any one of claims 1 to 2, wherein the secure communication method specifically includes:
the TSP platform and the central gateway construct a first secure channel after performing first identity authentication and key agreement, and the TSP platform performs encrypted communication with the central gateway through the first secure channel;
after second identity authentication and key distribution are carried out between the central gateway and the domain controller, a second secure channel is constructed, and the central gateway carries out encryption communication with the domain controller through the second secure channel;
establishing a third secure channel after performing third identity authentication and key distribution between the domain controller and the ECU equipment, wherein the domain controller performs encrypted communication with the ECU equipment through the third secure channel;
the communication process further comprises a preparation process before, wherein the preparation process specifically comprises the following steps:
respectively presetting an initial dispersion factor I in a gateway controller of the central gateway and a processing module of the domain controller, and respectively presetting an initial dispersion factor II in a processing module of the domain controller and an ECU control module of the ECU equipment;
a public and private key pair of the central gateway is generated by a security module I of the central gateway, and a public and private key pair of the TSP platform is generated by a key management server of the TSP platform;
respectively generating a digital certificate of the central gateway and a digital certificate of the TSP platform through the certificate system server of the TSP platform, and sending the digital certificate of the central gateway to the security module I;
respectively acquiring an identity of the central gateway, an identity of the domain controller, an identity of the ECU equipment, an identity list file of the domain controller and an identity list file of the ECU equipment through the TSP platform;
respectively acquiring a shared key I and a shared key II through a key management server of the TSP platform;
the identity identification of the central gateway, the identity list file of the domain controller and the shared key I are sent to the security module I of the central gateway through a TSP platform, the identity identification of the domain controller, the identity identification of the central gateway, the identity list file of the ECU equipment, the shared key I and the shared key II are sent to the security module II of the domain controller, and the identity identification of the ECU equipment, the identity identification of the domain controller and the shared key II are sent to the ECU control module of the ECU equipment.
4. The in-vehicle network secure communication method according to claim 3, wherein a first secure channel is established after a first authentication and key agreement is performed between the TSP platform and the central gateway in the communication process, and the TSP platform performs encrypted communication with the central gateway through the first secure channel specifically includes:
step A1, the central gateway sends the security parameter information including the random number a and the supported encryption algorithm to the TSP platform; the random number a is generated by the central gateway through the security module I;
step A2, after receiving the security parameter information including random number a and supported encryption algorithm, the TSP platform confirms the used encryption algorithm, and obtains the digital certificate of the TSP platform through the certificate system server, and sends the digital certificate of the TSP platform and the security parameter information including random number b and confirmed encryption algorithm to the central gateway, and sends the digital certificate request information to the central gateway; the random number b is generated by the TSP platform through the key management server;
step A3, the central gateway verifies the digital certificate of the TSP platform, if the verification is successful, step A4 is executed; otherwise, ending the current session;
step A4, after receiving the digital certificate request message, the central gateway sends the digital certificate of the central gateway to the TSP platform;
step A5, the TSP platform verifies the digital certificate of the central gateway, if the verification is successful, step A6 is executed; otherwise, ending the current session;
step A6, the central gateway encrypts a premaster secret key c generated by the security module I through a public key in a digital certificate of the TSP platform; the central gateway calculates a first hash value of information exchanged with the TSP platform, and encrypts the first hash value through a private key of the central gateway in the security module I; the central gateway sends the ciphertext of the premaster secret key c and the ciphertext of the first hash value to the TSP platform;
step A7, the TSP platform decrypts the ciphertext of the first hash value through a public key in the digital certificate of the central gateway to obtain the plaintext of the first hash value; the TSP platform calculates a second hash value of information exchanged with the central gateway, and if the first hash value and the second hash value are successfully compared and verified, the secret key of the pre-master key c is decrypted by the key management server by using a private key of the TSP platform to obtain a plaintext of the pre-master key c; otherwise, ending the current session;
step A8, the TSP platform encrypts the second hash value through a private key of the TSP platform and sends the encrypted second hash value to the central gateway, and the central gateway decrypts the ciphertext of the second hash value through a public key in a digital certificate of the TSP platform to obtain a plaintext of the second hash value; if the comparison of the second hash value and the first hash value is successful, executing step a 9; otherwise, ending the current session;
step A9, the central gateway and the TSP platform respectively use the encryption algorithm to generate the same session key after calculation according to the random number a, the random number b and the premaster secret key c; and step A10, information is encrypted and decrypted between the TSP platform and the central gateway by using the session key.
5. The in-vehicle network secure communication method according to claim 3, wherein a second secure channel is established after second identity authentication and key distribution are performed between the central gateway and the domain controller in the communication process, and the encrypted communication between the central gateway and the domain controller via the second secure channel specifically includes:
step B1, the central gateway calculates the initial session key I by the key center library by using the shared key I in the security module I and the initial dispersion factor I in the gateway control module; the domain controller obtains the initial session key I by the key node library I through calculation by using the shared key I in the security module II and the initial dispersion factor I in the processing module;
step B2, the central gateway encrypts the identity of the central gateway in the security module I through the initial session key I and then sends the identity to the domain controller;
step B3, the domain controller decrypts by using the initial session key I to obtain the identity of the central gateway, and compares the identity of the central gateway with the identity of the central gateway in the security module II for verification, if the verification is passed, the step B4 is executed;
step B4, the domain controller uses the initial session key I to encrypt the identity of the domain controller in the security module II and sends the encrypted identity to the central gateway;
step B5, the central gateway uses the initial session key I to decrypt and obtain the identity of the domain controller, and compares the identity with the identity list file of the domain controller in the security module I for verification, if the verification is passed, the step B6 is executed;
step B6, the central gateway distributes the new dispersion factor I to the gateway control module and the processing module of the domain controller, respectively;
step B7, the central gateway calculates the new session key I by the key center library using the shared key I in the security module I and the new dispersion factor I in the gateway control module; the domain controller calculates and obtains the new session key I by using the shared key I in the security module II and the new dispersion factor I in the processing module through the key node library I;
and step B8, the central gateway and the domain controller encrypt and decrypt information by using the new session key I.
6. The in-vehicle network secure communication method according to claim 3, wherein a third secure channel is established after third identity authentication and key distribution are performed between the domain controller and the ECU device in the communication process, and the encrypted communication performed between the domain controller and the ECU device through the third secure channel specifically includes:
step S1, the domain controller obtains the initial session key II by the key node library I through calculation using the shared key II in the security module II and the initial dispersion factor II in the processing module; the ECU device obtains the initial session key II through calculation of the key node library II by using the shared key II and the initial dispersion factor II in the ECU control module;
step S2, the domain controller encrypts the identity of the domain controller in the security module II through the initial session key II and sends the identity to the ECU equipment;
step S3, the ECU equipment decrypts by using the initial session key II to obtain the identity of the domain controller, compares the identity with the identity of the domain controller in the ECU control module for verification, and executes step S4 if the verification is passed;
step S4, the ECU device encrypts the id of the ECU device in the ECU control module using the initial session key II and sends the encrypted id to the domain controller;
step S5, the domain controller decrypts the identity of the ECU equipment by using the initial session key II, compares the identity with the identity list file of the ECU equipment in the security module II and verifies the identity, and if the identity passes the verification, the domain controller executes step S6;
step S6, the domain controller distributes the new dispersion factor II to the processing module and the ECU control module, respectively;
step S7, the domain controller obtains the new session key II through the key node library I by using the shared key II in the security module II and the new dispersion factor II in the processing module; the ECU equipment obtains the new session key II through calculation of the key node library II by using the shared key II and the new dispersion factor II in the ECU control module;
step S8, the encryption and decryption of information between the domain controller and the ECU device is performed by using the new session key II.
CN201811105043.0A 2018-09-21 2018-09-21 Safety communication system and method for vehicle intranet Active CN110943957B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811105043.0A CN110943957B (en) 2018-09-21 2018-09-21 Safety communication system and method for vehicle intranet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811105043.0A CN110943957B (en) 2018-09-21 2018-09-21 Safety communication system and method for vehicle intranet

Publications (2)

Publication Number Publication Date
CN110943957A CN110943957A (en) 2020-03-31
CN110943957B true CN110943957B (en) 2022-04-15

Family

ID=69904693

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811105043.0A Active CN110943957B (en) 2018-09-21 2018-09-21 Safety communication system and method for vehicle intranet

Country Status (1)

Country Link
CN (1) CN110943957B (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111817846A (en) * 2020-06-17 2020-10-23 浙江睿朗信息科技有限公司 Lightweight key negotiation communication protocol
CN112544052B (en) * 2020-07-30 2022-03-11 华为技术有限公司 Key agreement method and device
CN114103836B (en) * 2020-08-27 2023-08-08 比亚迪股份有限公司 Multi-domain control vehicle-mounted system and automobile
CN112565260B (en) * 2020-12-06 2022-08-16 武汉卓尔信息科技有限公司 Uplink and downlink data security isolation system and method based on edge computing gateway
CN112822196B (en) * 2021-01-08 2022-11-29 东风小康汽车有限公司重庆分公司 Communication method and system for central domain control
EP4290790A4 (en) * 2021-02-26 2024-03-20 Huawei Technologies Co., Ltd. Key acquisition method and apparatus, and key management system
CN113783761A (en) * 2021-08-31 2021-12-10 智新科技股份有限公司 Vehicle-mounted communication network connection method, device, equipment and readable storage medium
CN114301596A (en) * 2021-11-18 2022-04-08 成都市卡蛙科技有限公司 OTA (over the air) secure communication method and device for vehicle intranet, vehicle-mounted system and storage medium
CN114584384B (en) * 2022-03-09 2022-12-09 西安电子科技大学 In-vehicle heterogeneous network security communication control method, computer device and storage medium
CN114978726B (en) * 2022-05-26 2024-07-19 上海赫千电子科技有限公司 Safety communication method of backbone network based on vehicle-mounted Ethernet
CN115296864B (en) * 2022-07-18 2024-04-26 联合汽车电子有限公司 In-vehicle node trusted interaction method, device and storage medium
CN115883130A (en) * 2022-10-24 2023-03-31 广州大学 Vehicle-mounted ECU identity authentication method through secret key
CN116010934B (en) * 2023-01-06 2023-12-12 小米汽车科技有限公司 Domain controller process communication method, device, vehicle and storage medium
CN117318941B (en) * 2023-11-29 2024-02-13 合肥工业大学 Method, system, terminal and storage medium for distributing preset secret key based on in-car network

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1571409A (en) * 2003-07-25 2005-01-26 华为技术有限公司 A method of safety authentication between media gateway and media gateway controller
CN106533655A (en) * 2016-10-27 2017-03-22 江苏大学 Method for secure communication of ECUs (Electronic control unit) in a vehicle network
DE102016222091A1 (en) * 2015-11-10 2017-05-11 Denso Corporation ELECTRONIC CONTROL UNIT
CN206932240U (en) * 2017-08-01 2018-01-26 风度(常州)汽车研发院有限公司 Vehicle-mounted ethernet communication system and intelligent automobile
CN107846395A (en) * 2016-09-20 2018-03-27 塞尔蒂卡姆公司 Vehicle-mounted networking
CN107919956A (en) * 2018-01-04 2018-04-17 重庆邮电大学 End-to-end method for protecting under a kind of internet of things oriented cloud environment
CN108292993A (en) * 2015-09-18 2018-07-17 翠里姆股份有限公司 For improve computer network computer execute encryption method and for its terminal, system and computer-readable medium
CN108390851A (en) * 2018-01-05 2018-08-10 郑州信大捷安信息技术股份有限公司 A kind of secure remote control system and method for industrial equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1571409A (en) * 2003-07-25 2005-01-26 华为技术有限公司 A method of safety authentication between media gateway and media gateway controller
CN108292993A (en) * 2015-09-18 2018-07-17 翠里姆股份有限公司 For improve computer network computer execute encryption method and for its terminal, system and computer-readable medium
DE102016222091A1 (en) * 2015-11-10 2017-05-11 Denso Corporation ELECTRONIC CONTROL UNIT
CN107846395A (en) * 2016-09-20 2018-03-27 塞尔蒂卡姆公司 Vehicle-mounted networking
CN106533655A (en) * 2016-10-27 2017-03-22 江苏大学 Method for secure communication of ECUs (Electronic control unit) in a vehicle network
CN206932240U (en) * 2017-08-01 2018-01-26 风度(常州)汽车研发院有限公司 Vehicle-mounted ethernet communication system and intelligent automobile
CN107919956A (en) * 2018-01-04 2018-04-17 重庆邮电大学 End-to-end method for protecting under a kind of internet of things oriented cloud environment
CN108390851A (en) * 2018-01-05 2018-08-10 郑州信大捷安信息技术股份有限公司 A kind of secure remote control system and method for industrial equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于汽车网关平台功能的网络拓扑设计与安全研究;张铁欣;《汽车电器》;20170930(第9期);第1-2节 *

Also Published As

Publication number Publication date
CN110943957A (en) 2020-03-31

Similar Documents

Publication Publication Date Title
CN110943957B (en) Safety communication system and method for vehicle intranet
CN106533655B (en) Method for safe communication of ECU (electronic control Unit) in vehicle interior network
CN106664311B (en) Supporting differentiated secure communications between heterogeneous electronic devices
CN112235235B (en) SDP authentication protocol implementation method based on cryptographic algorithm
CN107682334B (en) OBD interface data safety protection system and data safety protection method
CN111953705A (en) Internet of things identity authentication method and device and electric power Internet of things identity authentication system
Wang et al. NOTSA: Novel OBU with three-level security architecture for internet of vehicles
CN101129014B (en) System and method for multi-session establishment
CN106453326B (en) A kind of certification of CAN bus and access control method
CN109474613B (en) Highway information issuing private network security reinforcement system based on identity authentication
CN111049803A (en) Data encryption and platform security access method based on vehicle-mounted CAN bus communication system
CN113852632B (en) SM9 algorithm-based vehicle identity authentication method, system, device and storage medium
CN109640325B (en) Motorcade-oriented safety management method based on extensible contribution group key negotiation
CN101282208B (en) Method for updating safety connection association master key as well as server and network system
Carvajal-Roca et al. A semi-centralized dynamic key management framework for in-vehicle networks
CN101192927B (en) Authorization based on identity confidentiality and multiple authentication method
CN113572795B (en) Vehicle safety communication method, system and vehicle-mounted terminal
CN113556710B (en) Vehicle Bluetooth key method and device and vehicle
CN113839782B (en) Light-weight safe communication method for CAN (controller area network) bus in vehicle based on PUF (physical unclonable function)
CN115459912A (en) Communication encryption method and system based on quantum key centralized management
CN111245613B (en) Identity-based three-level key negotiation method for in-vehicle and out-vehicle networks
CN117439740A (en) In-vehicle network identity authentication and key negotiation method, system and terminal
CN107872421B (en) Node authentication method and system and related equipment
CN116599659A (en) Certificate-free identity authentication and key negotiation method and system
Wang et al. A secure solution of V2G communication based on trusted computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant