CN111061251A - Method for detecting automobile information safety based on diagnostic protocol - Google Patents
Method for detecting automobile information safety based on diagnostic protocol Download PDFInfo
- Publication number
- CN111061251A CN111061251A CN201911320817.6A CN201911320817A CN111061251A CN 111061251 A CN111061251 A CN 111061251A CN 201911320817 A CN201911320817 A CN 201911320817A CN 111061251 A CN111061251 A CN 111061251A
- Authority
- CN
- China
- Prior art keywords
- server
- information
- automobile
- response
- client sends
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B23/00—Testing or monitoring of control systems or parts thereof
- G05B23/02—Electric testing or monitoring
- G05B23/0205—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
- G05B23/0218—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults
- G05B23/0221—Preprocessing measurements, e.g. data collection rate adjustment; Standardization of measurements; Time series or signal analysis, e.g. frequency analysis or wavelets; Trustworthiness of measurements; Indexes therefor; Measurements using easily measured parameters to estimate parameters difficult to measure; Virtual sensor creation; De-noising; Sensor fusion; Unconventional preprocessing inherently present in specific fault detection methods like PCA-based methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention provides a method for detecting automobile information safety based on a diagnostic protocol, which comprises the following steps: reading automobile ECU information; rewriting automobile ECU information; and uploading and downloading the ECU data file. The invention has the beneficial effects that: the information security situation of the automobile controller can be effectively detected, the information security level of the automobile can be greatly improved, the automobile is prevented from being attacked and controlled by hackers to a great extent, and the safety risk of the operation of the automobile is reduced.
Description
Technical Field
The invention belongs to the field of automobile information safety detection, and particularly relates to a method for detecting automobile information safety based on a diagnostic protocol.
Background
With the rapid development of automobile intellectualization and informatization, the safety performance of automobile information is more and more valued by the people in the industry, and the information safety detection of the automobile by using external equipment through a diagnosis protocol also becomes a very important ring for the automobile to market. At present, a Universal Diagnostic Service (UDS) diagnostic protocol in the domestic automobile industry is gradually popularized and popularized, related diagnostic services and application research are more and more, domestic and foreign scholars research application of the UDS diagnostic service in a vehicle-mounted Electronic Control Unit (ECU) widely, most of the domestic and foreign scholars research the application of the UDS diagnostic service in the aspect of after-sale services such as fault detection, signal reading and the like, and services such as data stream reading, fault code reading, ECU data upgrading and the like can be realized. For example, the research institute of automotive engineering in Guangdong group designs the diagnostic function of the ECU based on the UDS protocol, and realizes the functions of data stream reading, fault detection, input and output control, routine control, software refreshing and the like. In addition, the realization of a study seat controller UDS diagnosis service is researched, and the influence of network layer timing parameters on message transmission time is researched.
At present, automobile diagnosis protocols are developed and researched from the perspective of providing after-sales diagnosis services, and related researches based on the perspective of automobile information safety are few. A hacker of an automobile attack can tamper data of an automobile controller by using a wireless transmission device through a UDS (Universal data System) diagnostic protocol, and then attack an automobile power system, an automobile body system and the like, which brings great hidden danger to safe operation of the automobile.
Disclosure of Invention
In view of the above, the present invention is directed to a method for detecting information security of an automobile based on a diagnostic protocol, so as to solve the above-mentioned problems.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
a method for detecting automobile information safety based on a diagnostic protocol comprises the following steps:
A. reading automobile ECU information;
B. rewriting automobile ECU information;
C. uploading and downloading ECU data files;
D. and B, carrying out automobile ECU information safety diagnosis according to the safety access in each step of the steps A-C.
Further, the specific process of reading the automobile ECU information in step a is as follows:
A1. the client sends a diagnosis session service identifier to enter a corresponding session mode;
A2. the server side judges, and if a positive response of the server side is obtained, the step A3 is carried out; if the negative response of the server is obtained, analyzing the negative response code, checking the reason, correcting, and sending the diagnosis session service identification again until the positive response of the server is obtained;
A3. the client sends and reads the information service identification;
A4. judging by the server side, if a positive response of the server side is obtained, analyzing the response message information, and entering the step A6; if the negative response of the server is obtained, analyzing the negative response code, and if the analyzed code is required to be safely accessed, entering the step A5;
A5. after the key algorithm is cracked, the client sends a security access identification service, the security access identification service is successfully unlocked, and after a positive response of the server is obtained, the step A3 is carried out to read information;
A6. and the client obtains the read ECU information content.
Further, the process of rewriting the automobile ECU information in step B is as follows:
B1. the client sends a diagnosis session service identifier to enter a corresponding session mode;
B2. the server side judges, and if a positive response of the server side is obtained, the step B3 is carried out; if the negative response of the server is obtained, analyzing the negative response code, checking the reason, correcting, and sending the diagnosis session service identification again until the positive response of the server is obtained;
B3. the client sends the rewriting information service identification;
B4. judging by the server side, and if a positive response of the server side is obtained, entering step B6; if the negative response of the server is obtained, analyzing the negative response code, and if the analyzed code is required to be safely accessed, entering the step B5;
B5. after the key algorithm is cracked, the client sends the security access identification service, the security access identification service is successfully unlocked, and after a positive response of the server is obtained, the operation is switched to the step B3 to rewrite information;
B6. the client side obtains a response for prompting the success of rewriting the information.
Further, the process of uploading and downloading the ECU data file in step C is as follows:
C1. the client sends a diagnosis session service identifier to enter a corresponding session mode;
C2. the server side judges, and if a positive response of the server side is obtained, the step C3 is carried out; if the negative response of the server is obtained, analyzing the negative response code, checking the reason, correcting, and sending the diagnosis session service identification again until the positive response of the server is obtained;
C3. the client sends an erasing routine service identifier and an uploading or downloading service identifier;
C4. if a positive server-side response is obtained, the step C5 is carried out; if the negative response of the server is obtained, analyzing the negative response code, and if the analyzed code is the safe access is needed, entering the step C8;
C5. the client sends a data transmission service identifier to perform data transmission;
C6. the server side judges that the ECU data file uploading and downloading are finished if the server side obtains a positive response, and the step C7 is carried out; if the server side obtains a negative response, transmitting interruption and searching interruption reasons;
C7. the client sends a reset service identifier and exits the existing session mode;
C8. the client sends the security access identification service, and the server performs unlocking successfully, and after obtaining a positive response, the step C3 is performed.
Compared with the prior art, the method for detecting the automobile information safety based on the diagnostic protocol has the following advantages:
the method for detecting the information security of the automobile based on the diagnostic protocol can effectively detect the information security condition of the automobile controller, can greatly improve the information security level of the automobile, greatly avoid the automobile from being attacked and controlled by hackers, and reduce the safety risk of the automobile running.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate an embodiment of the invention and, together with the description, serve to explain the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic diagram of a method for detecting vehicle information security based on a diagnostic protocol according to an embodiment of the present invention;
FIG. 2 is a flow chart for reading or rewriting ECU information based on a diagnostic protocol;
FIG. 3 is a flowchart for uploading and downloading ECU data files based on a diagnostic protocol.
Detailed Description
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
The present invention will be described in detail below with reference to the embodiments with reference to the attached drawings.
As shown in fig. 1, a method for detecting information security of a vehicle based on a diagnostic protocol includes the following steps:
A. reading automobile ECU information;
B. rewriting automobile ECU information;
C. uploading and downloading ECU data files;
D. and B, carrying out automobile ECU information safety diagnosis according to the safety access in each step of the steps A-C.
As shown in fig. 2, the specific process of reading the ECU information of the vehicle in step a is as follows:
A1. the client sends a diagnosis session service identifier to enter a corresponding session mode;
A2. the server side judges, and if a positive response of the server side is obtained, the step A3 is carried out; if the negative response of the server is obtained, analyzing the negative response code, checking the reason, correcting, and sending the diagnosis session service identification again until the positive response of the server is obtained;
A3. the client sends and reads the information service identification;
A4. judging by the server side, if a positive response of the server side is obtained, analyzing the response message information, and entering the step A6; if the negative response of the server is obtained, analyzing the negative response code, and if the analyzed code is required to be safely accessed, entering the step A5;
A5. after the key algorithm is cracked, the client sends a security access identification service, the security access identification service is successfully unlocked, and after a positive response of the server is obtained, the step A3 is carried out to read information;
A6. and the client obtains the analysis response message and reads the information content of the ECU.
The process of rewriting the automobile ECU information in the step B is as follows:
B1. the client sends a diagnosis session service identifier to enter a corresponding session mode;
B2. the server side judges, and if a positive response of the server side is obtained, the step B3 is carried out; if the negative response of the server is obtained, analyzing the negative response code, checking the reason, correcting, and sending the diagnosis session service identification again until the positive response of the server is obtained;
B3. the client sends the rewriting information service identification;
B4. judging by the server side, and if a positive response of the server side is obtained, entering step B6; if the negative response of the server is obtained, analyzing the negative response code, and if the analyzed code is required to be safely accessed, entering the step B5;
B5. after the key algorithm is cracked, the client sends the security access identification service, the security access identification service is successfully unlocked, and after a positive response of the server is obtained, the operation is switched to the step B3 to rewrite information;
B6. the client side obtains a response for prompting the success of rewriting the information.
As shown in fig. 3, the process of uploading and downloading the ECU data file in step C is as follows:
C1. the client sends a diagnosis session service identifier to enter a corresponding session mode;
C2. the server side judges, and if a positive response of the server side is obtained, the step C3 is carried out; if the negative response of the server is obtained, analyzing the negative response code, checking the reason, correcting, and sending the diagnosis session service identification again until the positive response of the server is obtained;
C3. the client sends an erasing routine service identifier and an uploading or downloading service identifier;
C4. if a positive server-side response is obtained, the step C5 is carried out; if the negative response of the server is obtained, analyzing the negative response code, and if the analyzed code is the safe access is needed, entering the step C8;
C5. the client sends a data transmission service identifier to perform data transmission;
C6. the server side judges that the ECU data file uploading and downloading are finished if the server side obtains a positive response, and the step C7 is carried out; if the server side obtains a negative response, transmitting interruption and searching interruption reasons;
C7. the client sends a reset service identifier and exits the existing session mode;
C8. the client sends the security access identification service, and the server performs unlocking successfully, and after obtaining a positive response, the step C3 is performed.
The method judges the safety performance of the automobile ECU and tests the information safety condition of the automobile through the connection between the client and the server and the interactive response area requesting response between the client and the server. The method comprises three-level test contents, and is characterized in that ECU information is read through a diagnostic protocol, the ECU information is rewritten, and the safety access of ECU data files is uploaded and downloaded, so that the safety of the automobile information is judged according to the ECU information.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (4)
1. A method for detecting automobile information safety based on a diagnostic protocol is characterized by comprising the following steps:
A. reading automobile ECU information;
B. rewriting automobile ECU information;
C. uploading and downloading ECU data files;
D. and B, carrying out automobile ECU information safety diagnosis according to the safety access in each step of the steps A-C.
2. The method for detecting the information safety of the automobile based on the diagnostic protocol as claimed in claim 1, wherein: the specific process of reading the automobile ECU information in the step A is as follows:
A1. the client sends a diagnosis session service identifier to enter a corresponding session mode;
A2. the server side judges, and if a positive response of the server side is obtained, the step A3 is carried out; if the negative response of the server is obtained, analyzing the negative response code, checking the reason, correcting, and sending the diagnosis session service identification again until the positive response of the server is obtained;
A3. the client sends and reads the information service identification;
A4. judging by the server side, if a positive response of the server side is obtained, analyzing the response message information, and entering the step A6; if the negative response of the server is obtained, analyzing the negative response code, and if the analyzed code is required to be safely accessed, entering the step A5;
A5. after the key algorithm is cracked, the client sends a security access identification service, the security access identification service is successfully unlocked, and after a positive response of the server is obtained, the step A3 is carried out to read information;
A6. and the client obtains the read ECU information content.
3. The method for detecting the information safety of the automobile based on the diagnostic protocol as claimed in claim 1, wherein: the process of rewriting the automobile ECU information in the step B is as follows:
B1. the client sends a diagnosis session service identifier to enter a corresponding session mode;
B2. the server side judges, and if a positive response of the server side is obtained, the step B3 is carried out; if the negative response of the server is obtained, analyzing the negative response code, checking the reason, correcting, and sending the diagnosis session service identification again until the positive response of the server is obtained;
B3. the client sends the rewriting information service identification;
B4. judging by the server side, and if a positive response of the server side is obtained, entering step B6; if the negative response of the server is obtained, analyzing the negative response code, and if the analyzed code is required to be safely accessed, entering the step B5;
B5. after the key algorithm is cracked, the client sends the security access identification service, the security access identification service is successfully unlocked, and after a positive response of the server is obtained, the operation is switched to the step B3 to rewrite information;
B6. the client side obtains a response for prompting the success of rewriting the information.
4. The method for detecting the information safety of the automobile based on the diagnostic protocol as claimed in claim 1, wherein: the process of uploading and downloading the ECU data file in the step C is as follows:
C1. the client sends a diagnosis session service identifier to enter a corresponding session mode;
C2. the server side judges, and if a positive response of the server side is obtained, the step C3 is carried out; if the negative response of the server is obtained, analyzing the negative response code, checking the reason, correcting, and sending the diagnosis session service identification again until the positive response of the server is obtained;
C3. the client sends an erasing routine service identifier and an uploading or downloading service identifier;
C4. if a positive server-side response is obtained, the step C5 is carried out; if the negative response of the server is obtained, analyzing the negative response code, and if the analyzed code is the safe access is needed, entering the step C8;
C5. the client sends a data transmission service identifier to perform data transmission;
C6. the server side judges that the ECU data file uploading and downloading are finished if the server side obtains a positive response, and the step C7 is carried out; if the server side obtains a negative response, transmitting interruption and searching interruption reasons;
C7. the client sends a reset service identifier and exits the existing session mode;
C8. the client sends the security access identification service, and the server performs unlocking successfully, and after obtaining a positive response, the step C3 is performed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911320817.6A CN111061251A (en) | 2019-12-19 | 2019-12-19 | Method for detecting automobile information safety based on diagnostic protocol |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911320817.6A CN111061251A (en) | 2019-12-19 | 2019-12-19 | Method for detecting automobile information safety based on diagnostic protocol |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111061251A true CN111061251A (en) | 2020-04-24 |
Family
ID=70302437
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911320817.6A Pending CN111061251A (en) | 2019-12-19 | 2019-12-19 | Method for detecting automobile information safety based on diagnostic protocol |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111061251A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115718474A (en) * | 2022-11-18 | 2023-02-28 | 深圳市博诺技术有限公司 | Automobile diagnosis equipment developer mode system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010128920A (en) * | 2008-11-28 | 2010-06-10 | Toyota Motor Corp | Safety device for vehicle |
CN102393888A (en) * | 2011-07-21 | 2012-03-28 | 广州汽车集团股份有限公司 | ECU (Electric Control Unit) security access processing method |
CN102662692A (en) * | 2012-03-16 | 2012-09-12 | 北京经纬恒润科技有限公司 | Method and system for updating application program in electronic control unit |
US20160086392A1 (en) * | 2003-07-23 | 2016-03-24 | Harris Corporation | Wireless engine monitoring system |
CN106059754A (en) * | 2016-06-23 | 2016-10-26 | 北京汽车股份有限公司 | Vehicle data processing method and system, and devices |
CN106506499A (en) * | 2016-11-09 | 2017-03-15 | 广州汽车集团股份有限公司 | A kind of method and system for carrying out safety check when ECU is refreshed |
CN108259484A (en) * | 2018-01-09 | 2018-07-06 | 北京汽车股份有限公司 | The safety access method and system of Vehicle Controller |
-
2019
- 2019-12-19 CN CN201911320817.6A patent/CN111061251A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160086392A1 (en) * | 2003-07-23 | 2016-03-24 | Harris Corporation | Wireless engine monitoring system |
JP2010128920A (en) * | 2008-11-28 | 2010-06-10 | Toyota Motor Corp | Safety device for vehicle |
CN102393888A (en) * | 2011-07-21 | 2012-03-28 | 广州汽车集团股份有限公司 | ECU (Electric Control Unit) security access processing method |
CN102662692A (en) * | 2012-03-16 | 2012-09-12 | 北京经纬恒润科技有限公司 | Method and system for updating application program in electronic control unit |
CN106059754A (en) * | 2016-06-23 | 2016-10-26 | 北京汽车股份有限公司 | Vehicle data processing method and system, and devices |
CN106506499A (en) * | 2016-11-09 | 2017-03-15 | 广州汽车集团股份有限公司 | A kind of method and system for carrying out safety check when ECU is refreshed |
CN108259484A (en) * | 2018-01-09 | 2018-07-06 | 北京汽车股份有限公司 | The safety access method and system of Vehicle Controller |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115718474A (en) * | 2022-11-18 | 2023-02-28 | 深圳市博诺技术有限公司 | Automobile diagnosis equipment developer mode system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wen et al. | {Plug-N-Pwned}: Comprehensive vulnerability analysis of {OBD-II} dongles as a new {Over-the-Air} attack surface in automotive {IoT} | |
CN108174363A (en) | Car searching method and device | |
Guo et al. | Detecting vehicle anomaly in the edge via sensor consistency and frequency characteristic | |
US20140325602A1 (en) | Accessing system for vehicle network and method of controlling the same | |
CN111422163B (en) | Vehicle ignition method and system based on face recognition and vehicle | |
JP2018046432A (en) | Detection device, gateway device, detection method, and detection program | |
WO2007017878A4 (en) | Extended one-time password method and apparatus | |
CN112423266B (en) | Vehicle diagnosis method and device and automobile | |
CN112783518A (en) | Vehicle-mounted application containerization isolation framework system based on IPFS and implementation method | |
CN109067881B (en) | Remote authorization method, device, equipment and storage medium thereof | |
CN109067745B (en) | Method for authenticating vehicle occupant, apparatus, device and storage medium therefor | |
CN105292130A (en) | Method and system for imbedding voice standard data, and method and system for controlling vehicles to start through voice | |
CN112671724B (en) | Terminal security detection analysis method, device, equipment and readable storage medium | |
CN111061251A (en) | Method for detecting automobile information safety based on diagnostic protocol | |
KR101498367B1 (en) | Maintenance system of car digital tachograph and method of the same | |
Rumez et al. | Anomaly detection for automotive diagnostic applications based on N-grams | |
US11271971B1 (en) | Device for facilitating managing cyber security health of a connected and autonomous vehicle (CAV) | |
CN114379362A (en) | System and method for vehicle mobile parental control with child detection | |
Zhao et al. | GVIDS: A reliable vehicle intrusion detection system based on generative adversarial network | |
CN117729540A (en) | Perception equipment cloud edge safety control method based on unified edge computing framework | |
CN104426843B (en) | Microblog account automatic authorization method and apparatus | |
CN114237995B (en) | Bus abnormity detection method, device, equipment and readable storage medium | |
US7747869B2 (en) | Process for detecting defective component exchanges | |
Chawan et al. | Security enhancement of over-the-air update for connected vehicles | |
CN115549988A (en) | Internal and external network data transmission system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200424 |