EP3138242A1 - Réseau de données d'un système, en particulier d'un véhicule - Google Patents

Réseau de données d'un système, en particulier d'un véhicule

Info

Publication number
EP3138242A1
EP3138242A1 EP15738003.1A EP15738003A EP3138242A1 EP 3138242 A1 EP3138242 A1 EP 3138242A1 EP 15738003 A EP15738003 A EP 15738003A EP 3138242 A1 EP3138242 A1 EP 3138242A1
Authority
EP
European Patent Office
Prior art keywords
ring
subscriber
data network
filter
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP15738003.1A
Other languages
German (de)
English (en)
Inventor
Ralf Beyer
Rainer Falk
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens Mobility GmbH
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG filed Critical Siemens AG
Publication of EP3138242A1 publication Critical patent/EP3138242A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • H04L12/4675Dynamic sharing of VLAN information amongst network nodes
    • H04L12/4679Arrangements for the registration or de-registration of VLAN attribute values, e.g. VLAN identifiers, port VLAN membership
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L2012/40267Bus for use in transportation systems
    • H04L2012/40293Bus for use in transportation systems the transportation system being a train
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • H04L2012/421Interconnected ring systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Definitions

  • the invention relates to a data network to a device, in particular a vehicle, with a set of einrich- tung internal stations, at least one ring in which ring internal subscriber of the set are interconnected in a ring topology with ⁇ each other, and at least one interface unit, which is intended, to establish a connection of at least one out-of-ring participant to the ring.
  • Data networks in particular in rail vehicles, are known in which a ring topology is implemented in at least one network section. Subscribers of the data network ⁇ factory, which are located outside the ring, can communicate with other, ring-internal or external ring participants over at least part of the ring. For example, a network device, such as a higher-level Steuerge ⁇ advises or a control device for a device of the rail vehicle, such as for a brake or doors, be involved in the ring via at least one switch. These enable connectivity on layer 2 (eg Ethernet) according to the OSI layer structure.
  • a ring offers the advantage that in the event of a break in the ring, for example in the case of destruction due to a fire or a vehicle accident, communication via an undamaged ring section is still possible.
  • Access to a data network or network interface can be physically protected, eg by a closable maintenance flap. Access to a data network can also be restricted by logical safeguards.
  • a network access control can be used to identify or authenticate a device connected to a network interface (also called a "port") . The network interface is activated only if the connected device is recognized as permissible. Network Access Control "according to IEEE 802. Ix or PANA according to RFC5191.
  • a network device can generally be identified or authenticated on the basis of the MAC address or by means of a password or also a device certificate (eg according to X.509).
  • firewalls or packet filters are known, which filter the network traffic, so that only traffic with approved properties is allowed through.
  • the invention has for its object to provide a generic data network with at least one ring, in which a secure operation and a simple, especially in the application flexible management can be achieved.
  • the data network a Filter ⁇ approximate device with at least one filter function, which is provided to a traffic of the ring with respect to- At least one subscriber identification to filter, and has a recognition device, which is intended to make at least one measure for a subscriber external to a subscriber to a subscriber identifier of this subscriber such that it is allowed in terms of the filter function for data traffic in the ring.
  • Subscriber identification is particularly low in implementation and execution.
  • the ring can be used in particular for real-time communication and / or for safety-relevant communication.
  • filter rules for the ring may not be or only limited än ⁇ derbar.
  • a measure relating to a subscriber identifier is advantageously applicable in such a deployment environment.
  • a “device-internal” subscriber is to be understood in particular to mean a subscriber of the data network who is intended to be permanently bound to the device, in particular mechanically bound, with regard to its type of installation and / or function
  • a "ring-internal" subscriber of the data network is to be understood as a device-internal subscriber which is part of the ring or forms the ring with at least two other device-internal subscribers , Under a subscriber "ring external” should be understood a subscriber of the data network, which is connected outside of the ring.
  • a ringex ⁇ ternal subscriber is called in the expert language also "off-ring component".
  • An external participant may be a device internal subscriber or another subscriber, which is not permanently, in particular gels ⁇ sionally connected to the data network. Such a participant is called, in particular, an "external” participant.
  • connection of a remote external subscriber to the ring should be understood to mean a physical and / or logical connection,
  • the interface unit may form a so-called port, by means of which access to the ring can be made available to the outside-external subscriber.
  • the identification device and the interface unit can be at least partially, advantageously completely formed by a common physical unit.
  • Interface unit and / or the identification device and at least one of the ring-internal participants can be at least partially, advantageously completely formed by a common physical ⁇ structural unit.
  • formerly- NEN the interface unit and / or the Kennungseinrich ⁇ tung at least partially be advantageous wholly formed by the assembly of a contiguous expediently ringin ⁇ -internal subscriber.
  • the filtering device expediently has at least one filter rule, according to which a subscriber identifier is to be checked according to a specific condition.
  • a test subscriber identifier may be part of a source ⁇ or destination address in a data packet, at least, which is provided at least for transmission over a part of the ring.
  • a subscriber identifier to be checked may be at least part of a virtual network identifier (or VLAN identifier).
  • a subscriber identifier to be checked may contain a cryptographic checksum (eg message authentication code,
  • the Bedin ⁇ supply is preferably defined using a data set including at least a list of the data traffic of the Contains ring-approved participant identifiers.
  • a filtering rule can be implemented for example such that a data packet ⁇ is transmitted or blocked, if the condition regarding one or more subscriber identifiers of the pa- kets met or not met.
  • the ring may allow unidirectional communication (e.g., clockwise or counterclockwise only) or bidirectional communication (in both orientations).
  • the ring may be formed as a double ring, wherein a first ring unit for the communication in the clockwise direction and a second ring unit for the communication in the opposite direction are provided.
  • Ring itself be realized redundant.
  • the ring can have two ring units, whereby data can be transmitted redundantly on both ring units.
  • the ring topology can be realized physically and / or logically.
  • an implementation of the topology ringto ⁇ at least partially by means of VLANs (or Virtual Local Area Network) is possible.
  • VLANs Virtual Local Area Network
  • Several physical ring units and / or several superimposed logical ring units can be provided.
  • a traffic of the "ring” is to be understood as a traffic of data over at least part of the ring or ring section, which may be a data traffic between two in-ring subscribers, between an in-ring subscriber and at least one off-board subscriber, or between two out-of-ring Participants act, in the latter case, the data connection is made via at least one ring section.
  • the filtering means may be arranged to filter data traffic destined to be put on the ring. This can be achieved by the filtering device has at least one filter module assigned to the interface unit. Since ⁇ through the traffic can be filtered before it is introduced into a ring section. In other words, a filtering of data traffic out of the ring ⁇ SUC gene. In addition, a filtering an originating from the ring and directed onto at least one ring external subscriber traffic can be carried out in this embodiment. In a structurally simple solution, the filter module with the
  • Interface unit to be coupled.
  • the interface unit and the filter module are formed by a common, coherent structural unit.
  • the filtering device can be provided to filter a data traffic which takes place via at least one ring section.
  • the filtering means comprises a set of filter modules, the ring internal subscribers in each case at least one separate filter module assigned net. It can be characterized it reaches ⁇ a filtering of data traffic, which is performed within the ring.
  • the filter modules are expediently each provided for checking a data traffic arriving via a ring section in accordance with at least one filter rule and possibly forwarding it, for example into the next ring segment, or to block it.
  • a compact and bauteilspa ⁇ -saving embodiment when at least a different Filtermo ⁇ dul is coupled to the ring internal subscribers respectively.
  • a filter module and the associated ring-internal participants are formed by a common, contiguous structural unit. Otherwise formulated ⁇ profiled the ring internal participants each have at least one filter module.
  • the filtering device at least one filament termodul includes, which is at least equipped with a switch functionality, whereby particularly a ⁇ times, implementable by means widespread network ⁇ network management can be achieved.
  • the FIL-esterification means a set of filter modules, which out with a switch functionality are each associated with a different ring internal subscriber and at least ⁇ equips.
  • the ring-internal participants are preferably each formed as a control unit. The control units are in each case advantageously ⁇ enough, for controlling at least a certain functionali ⁇ ty of the device programmed which is different from a pure control of data traffic in the data network.
  • control devices are expediently provided in each case for controlling at least one sensor unit, an actuator unit and / or a subordinate control unit.
  • the control units are designed as programmable logic controllers (or "PLC").
  • PLC programmable logic controller
  • Example ⁇ the ring internal subscriber of building blocks of type Simatic® may be formed.
  • one of the control devices can implement the function of a central control unit of the device.
  • the control units In particular, this can be provided with a switch functionality itself, which is particularly advantageous if a control device of the ring has the interface unit and / or a filter module of the filtering device or if a plurality of control devices of the ring each have an interface unit and / or a filter module Have filtering device.
  • the ring internal subscriber can be provided in this regard, particularly for control of a rail vehicle, egg ⁇ nes land vehicle or an aircraft.
  • a ⁇ restrictions regarding the usable for the ring especially in the ring security mechanisms.
  • filter rules for the ring or in the ring may not or only partially be changeable.
  • Concerning a measure a partial ⁇ receiving recognition can be advantageously used in such environment of use. This is particularly advantageous in the case of an embodiment of the device as a rail vehicle when the ring is used for real-time communication and / or for safety-relevant communication.
  • the management of data traffic over the ring is subject to strict requirements, so that in other applications conventional security mechanisms are not readily applicable.
  • the data network has a Netztechnikzugangskont- roll unit for managing a is traffic ⁇ access provided in accordance with a defined authentication protocol, wherein the identifier means is provided in at least one mode of operation to the measure for egg ⁇ NEN ring external Subject to approval by the network access control unit.
  • ⁇ by the security in the management of data traffic in the data network can be further increased.
  • the network access control unit transition is expediently at least by software different from the Filter ⁇ approximate device.
  • the network access control unit for ⁇ sen ring external participant at least initiated, in particular ended with a successful approval.
  • a "traffic access” management should be understood to mean at least one process that involves allowing or denying access be an access to the data network, however, the network access control unit is advantageously provided to selectively manage a traffic access to the ring.
  • an interface or a port of the interface unit can be released for an external subscriber with access authorized by the network access control unit.
  • the network control unit may be referred to as "ring access control” or "ring access control”.
  • the filtering device ⁇ the Authent Deutschensaufgäbe not carry out and must check itself.
  • the filtering device has filter modules that are formed by ring-internal participants, since these filter modules and therefore the associated participants of the ring are not burdened with this task.
  • Network access control unit having a first unit and at least one ⁇ separate from the unit authentication server, which checks the authentication of the outside of the subscriber to be registered and the unit provides the result of the authentication process.
  • the Authentisie ⁇ insurance server can be part of the ring outside party.
  • a simp ⁇ che authentication based on the MAC address can be done.
  • a simp ⁇ che authentication based on the MAC address can be done.
  • Authentication using username and password or using an access code can, for example, be entered in an HTML form of a web page.
  • an authentication by means of a physical Access tokens, eg a mechanical key scarf ⁇ ter or an RFID card reader done.
  • the activation can be done temporarily in one variant.
  • the activation of a non-external participant can i.a. be terminated by logging off this ("EAPOL logoff"), a "time-out criterion" or by solving the physical network connection of the external party with the data network.
  • the network access control unit may send to the filtering device a message containing a subscriber identifier identifying the denied subscriber such that data traffic over the ring for that subscriber identifier is blocked by the filtering means.
  • a warning message to another internal subscriber device may alternatively or additionally ⁇ be sent.
  • a warning message to the Anlagentern ⁇ rer may be sent, which can be audible / visual output and.
  • a message is generated, which triggers an actuation process of a drive unit and / or a braking device, such as a blocking of a starting operation or an automatic Bremsaus ⁇ solution.
  • the network access control unit and the standardized Thomasstellenein ⁇ can at least partially be advantageously completely formed by a common physical unit.
  • at least the first unit of the network access control unit can be formed by the interface unit.
  • the interface unit and / or the network access ⁇ control unit and at least one of the ring internal subscriber can at least partly, advantageously completely of be formed of a common physical unit.
  • the interface unit and / or the network access control unit can at least partly be formed before ⁇ geous completely from the appropriately coherences constricting ring assembly of a internal subscriber.
  • the network access control unit and the identification device can be at least partially, advantageously completely formed by a common physical unit.
  • the first unit of the network access control unit can be formed by the identification device.
  • the network access control unit can fulfill the function of the identifier means a measure concerning a subscriber identifier of the authenticated outside ring subscriber such that the data communication of the subscriber with regard to the filter function for data communication in the ring is recognizable as permissible based on the subscriber identifier.
  • the identification means and / or the network access ⁇ control unit and at least one of the ring internal extension may also be at least partially, advantageously fully ⁇ continuously formed by a common physical unit.
  • the identification device and / or the network access control unit may be at least partially stabilized, advantageously complete charge of the sammen conferenceden expediently to a ring assembly ⁇ internal subscriber ⁇ forms.
  • the filtering means filter modules, which are formed by ring internal subscribers, and is the network access control unit at least partially, completely formed before ⁇ part by way of the suitably fauxophen ⁇ constricting assembly of a ring-internal subscriber, by the advantageous separation of the functions of the network access control unit of the function
  • the filter device a load of the filter modules and therefore a plurality of ring internal participants are avoided with an authentication task. This can be achieved with the participation a single in-ring subscriber, which forms the network access control unit.
  • a subscriber can be a particularly transport protocol (eg TCP, UDP) CHARACTERI ⁇ Siert.
  • a port number or a VLAN ID is also conceivable.
  • the subscriber identifier is an identifier of a service access point of the OSI layer model, such as an IP address or a MAC address or a port number.
  • a simple embodiment of the filtering device can be achieved if the subscriber identifier is an identifier of the OSI data link layer. This is particularly suitable for a design of the interface unit as a switch.
  • the subscriber identifier can be designed as a MAC address.
  • the OSI data link layer is called in the expert language also "Layer 2".
  • a connection ring exter ⁇ ner participants of different types can be made via the interface unit.
  • at least one ring external subscriber of the set up internal subscriber can be connected to the ring via the interface unit. This is especially advantageous if the ring external device internal part ⁇ contractor which is provided for a permanent connection to the device is installed in a new building or maintenance of these newly configured and / or reconfigured. in particular, it may be a subscriber , which uses a so-called "plug-and-play"
  • Autoconfiguration mechanism is used in the data networkhimbun ⁇ . It can in particular be connected to the ring via the interface unit, a set of device internal subscribers by the interface unit circuit a presence of the ring with a bus structure, is at which this set of participants connected, manufactures , Alternatively or additionally, the interface unit serves to connect as an external subscriber a device external subscriber who is unbound at the device or is intended to be occasionally bound to the device. Particularly advantageous can over the
  • Interface unit a maintenance device - also called “service unit”, to be connected to the ring, wherein the interface unit comprises a so-called “service port” bil ⁇ det.
  • the interface unit may be common to a wired and / or wireless, produced by radio connection of the device outside party vorgese ⁇ hen.
  • the filtering means comprises a plurality of filter rules which state each having a different operation of the device ⁇ are assigned.
  • the filtering device may comprise at least one filter rule for a normal operation of the device and at least one defenceliche under ⁇ filter rule for a fault operation of the A ⁇ direction.
  • a fault operation can be triggered eg due to a message of fire detection.
  • a fault operation can be triggered by a physical fault of the data network, such as a Samuelsunterbre ⁇ chung.
  • a filter rule for a fault ⁇ operation may in particular provide less stringent requirements than in normal operation of the device, in particular to allow fast data traffic. This is particularly advantageous in an emergency.
  • the filtering device has at least one filter rule for normal operation of the device and at least one different filter rule for an initialization operation of the device.
  • an "initialization operation” a Be ⁇ operating mode of the device intended in particular to be understood that excluded Starting from a switch-off state or idle state of Einrich ⁇ tion until the start of normal operation takes place.
  • the initialization can be referred to as "power-up" the facility.
  • a FIL terregel for the initialization particular may provide less strict than in the normal operation of the device, so that normal operation can be made quickly and reli ⁇ casual Is.
  • the device as a vehicle a special filtering a recording of the Fahrbe ⁇ drive can by at least generally in the initialization operation can be achieved quickly and reliably by the proposed solution can -.
  • the device as a rail vehicle particularly the so-called phase of "train setup" done quickly and reliably.
  • a filter rule in the fault and / or Initialleitersbe ⁇ drive can provide that a data traffic over at least a part of the ring with minimum restriction is filtered with respect to a subscriber identifier.
  • a second filter rule for the malfunction and / or initialization can be provided to a filter rule of normal operation, after which the subscriber identifier based on a filter according to the rule of the drive Normalbe ⁇ filtering is adjusted.
  • provision can be made, in particular, for a list of the subscriber identifications authorized by the filtering device to be set up by registering all device-internal subscribers.
  • a required for this registration message that is sent to the Filter ⁇ approximate device can overall in and above the ring
  • the second filter rule applies fully ⁇ to, with further messages whose content goes beyond this application and therefore includes other user data, the filter rule of normal operation.
  • the data network as described above, a network access passage control unit, the interface unit in at least one operating state of the device is enough, advantageously ⁇ provided to an interface for a check- release of an out-of-ring subscriber unchecked by the network access control unit to the ring.
  • a condition can in a particular operating condition, particularly advantageous in the interference and / or initialization, for an authorization for a data traffic of the ring with respect to account for a successful authorization process by the network access control unit against the Nor ⁇ mal compassion.
  • So may be DES same provided as a rail vehicle in the initialization in an embodiment of the device, that a data traffic in the initialization takes place at least a part of the ring with ringex ⁇ ternal subscribers via the WUR not or not exhaustive authenticated by the network access control unit ⁇ .
  • an authentication honeymoon period after which it can be provided in which, although an authentication requirement falls ent ⁇ but a required Authentisie- insurance process must be successfully completed. After this time has elapsed, it may be decided to extend the revocation of the authentication requirement or to block the data traffic with unauthenticated subscribers.
  • the normal operation can be a Fahrgastbe ⁇ operation.
  • This may include different phases, such as a route driving operation and a stop operation, for which, if necessary, different filter rules may be provided.
  • Other operating conditions may as discussed above TROUBLESHO ⁇ drove an initialization or a Wartungsbe drove ⁇ , especially a workshop mode or a diagnostic mode to be.
  • a filter rule can be implemented, which simplifies the access of a device-external subscriber recognized as a service device to a data traffic of the ring in relation to the normal operation.
  • the operating state can be detected by a sensor, such as a speed sensor, or it can be actively set by an operator by entering, such as by means of a switching unit in the cab to activate a maintenance mode.
  • a sensor such as a speed sensor
  • it can be actively set by an operator by entering, such as by means of a switching unit in the cab to activate a maintenance mode.
  • the identification means comprises a unit for setting identification which is provided to assign this an authorized by the filtering device, in particular predefined identifier for a subscriber ⁇ ring external subscriber.
  • the filtering device advantageously has a set of predefined subscriber identifications which, if required, can be assigned to a third-party subscriber who is to be admitted at least temporarily.
  • the filtering device has at least one list of authorized subscriber identifiers, which is designed as a static or uneditable list.
  • the external-external subscriber has a subscriber identifier from this list for data traffic of the ring, whereby this subscriber identifier can be different from a subscriber identifier for data traffic outside the ring.
  • the unit for identification setting expediently has a translation function, by means of which a clear link between the two subscriber identifiers of a same out-of-ring subscriber can be produced. If the ring is used for safety communication, a change in the filter rules may be inadmissible or an authentication of a participant within the ring may not be feasible.
  • the invention is particularly advantageous applicable, since a relatively easy-to-implement filtering takes place, which is verifiable at a safety approval with relatively little effort and does not have to be reconfigured during operation. After successful
  • Authentication of a non-external subscriber is assigned to the data traffic of a subscriber identifier which allows communication via the ring, ie which is not blocked by the filter function.
  • the filter rules for the ring are not changed. This is of particular advantage when the filtering devices tion filter modules, which are formed by ring-internal participants, and therefore the filtering is done in the ring.
  • the identification device can be provided for making known to a third-party subscriber, the subscriber device assigned to this identifier as an authorized identifier. For example, a message can be sent to the filtering device by the identification device, the message containing an assigned subscriber identifier of the subscriber to be admitted. If the filtering device has a set of filter modules, the identification device can send a so-called "multicast” or "broadcast message" to the filter modules If the filtering device has a list of authorized user identifications, this list can be replaced by the proposed measure recognizer edited, especially with the already assigned subscriber identity of the admitted ring outside party to be added. by receiving and forwarding the message by the filter modules can check this each other of the participants ⁇ identification of the admitted participant.
  • a ring of internal subscribers fulfills the function of a ring manager and the identification device is provided to send a message containing the subscriber identifier to the ring manager tion with the ring manager.
  • the invention further relates to a method for managing a data network of a device comprising a set of device-internal users, at least one ring in which ring-internal participants of the set are networked in a ring topology, and at least one interface unit, which is provided ei ⁇ nen connection of at least one external participant to the ring to produce. It is proposed that a data traffic of the ring is filtered with regard to at least one subscriber identifier and at least one measure relating to a subscriber identifier of this subscriber is made for an outside-external subscriber in such a way that this is permissible for the filter function for a data traffic in the ring. For the advantageous effects of the proposed method, reference is made to the above statements on the proposed data network.
  • FIG. 2 shows a data network connecting the functional components with a ring, to which a filtering device is assigned
  • FIG. 3 shows a list of subscriber identifications that are used by the
  • Figure 4 the transmission of a data packet in the network of
  • FIG. 2 with a translation of a subscriber identifier
  • FIG. 5 shows a translation table for the translation
  • FIG. 6 the notification of the filtering device via a subscriber identifier
  • FIG. 7 shows the transmission of a data packet with the subscriber identifier after the notification from FIG. 6,
  • FIG. 8 shows the notification of a ring manager of the ring via a subscriber identifier
  • Figure 9 a timing of an Initialtechnischsbe ⁇ drive the rail vehicle.
  • FIG. 1 shows a vehicle 10 embodied as a rail vehicle in a schematic side view.
  • the vehicle 10 is formed as an association of several carriages 12 which are mechanically coupled mitei ⁇ each other and form a train unit.
  • the vehicle 10 is designed as a so-called multiple unit train.
  • at least one of the carriages 12 of the dressing with a drive unit 14 for An is ⁇ drive a drive axis 16 is provided.
  • the drive unit 14 has a power supply unit which electric power for an electric motor by means of a power electronics (not shown) in particular ⁇ sondere generated.
  • the vehicle 10 is designed as a single railcar.
  • the vehicle 10 may have an association of unpowered passenger coaches, which is coupled to at least one traction vehicle, such as a locomotive.
  • the vehicle 10 has a number of function ⁇ onskomponenten, an operation of the vehicle 10 made ⁇ union.
  • Typical functional components such as in particular components of the drive unit 14, a braking device 11 (exemplified and shown schematically in the carriage 12.2), ei ⁇ ner train protection 13, a door unit 15 (exemplified and shown schematically in the car 12.3), a Klimatisie ⁇ ment device 17, a passenger information system 19, a Bordnetz pain etc. are well known and will not be explained here.
  • Functional components of the vehicle 10 may generally be designed as a control unit, sensor unit and / or actuator unit, wherein a set of functionally related functional components which are assigned to a specific functionality, eg one of the functionalities listed above, may also be called a "subsystem". 2, which are permanently installed on the vehicle structure, are networked with one another and are components of a data network 18 (see FIG. 2) .From the point of view of the vehicle control system, the functional components associated with the vehicle 10 become "internal" subscribers 20, 22 of the data network 18 of the vehicle 10.
  • the internal part ⁇ participants 20, 22 are connected by a bus device 24 stylist- connected to each other, which may itself have different bus ⁇ structures.
  • the bus structures may differ in the design of the respective network hardware and / or a network protocol used.
  • a first bus structure 26 of the bus device 24 interconnects the subscribers 20 in a closed loop to form a ring 28 of the data network 18.
  • the internal subscribers 20 in the ring 28 are referred to as "in-ring subscribers” while the other subscribers 22 and external subscribers (see below) are referred to as "out-of-ring subscribers”.
  • the internal subscribers 22 are also called “off-ring components" of the data network 18.
  • the bus structure 26 of the ring 28 in the considered embodiment is based on a technology known by the term "Industrial Ethernet".
  • the ring-internal participants 20 are each designed in particular as a control unit.
  • the ring-internal components 20 may each be designed as a PLC.
  • the external subscriber ring 22 are illustrated abstractly in Figure 2 and can each be a ⁇ voted functional component or an entire subsystem of the vehicle 10 shown in Figure 1 correspond.
  • the data network 18 has interface units 30, 32, by means of which external ring participants can be connected to the ring 28.
  • the interface unit 30 serves to connect the internal subscribers 22 to the ring 28. These are themselves interconnected by means of a bus structure 34, which differs from the bus structure 26.
  • Interface unit 30 serves to connect the bus structure 34 and the participants 22 connected to it to the ring 28.
  • the bus structure 34 may be implemented as an MVB bus of the TCN protocol.
  • the interface unit 32 serves to connect an external part ⁇ probe 36 to the ring 28th
  • An external subscriber here is a functional component which is intended to be occasionally bound to the data network 18.
  • the external user 36 may be a support ⁇ bares maintenance device which is to be connected for data processing, if necessary with the data ⁇ network 18, is otherwise not connected in normal use operation of the vehicle 10 with the data network 18th
  • the interface unit 32 may be provided for establishing a wired and / or wireless connection of the ring 28 to the external subscriber 36.
  • the interface units 30, 32 are in addition to a physical (or hardware technology) connection option 31 or 33 each allowed at least with a switch functionality ⁇ . They are also each directly mechanically coupled to an in-ring participant 20. In particular, the respective ring-internal participant 20 and the coupled interface unit 30 and 32 are arranged in a same, contiguous structural unit.
  • the ring-internal participants 20 in the considered embodiment are each designed in particular as a control unit with switch functionality.
  • the data network 18 also has a filter device 38 with a filter function, which is intended to filter a data traffic of the ring 28 with regard to at least one subscriber identifier.
  • the subscriber identifier used for the filtering is an identifier of the OSI data link layer in the embodiment under consideration.
  • At least one MAC address of a parti ⁇ mers is examined in accordance with at least one filter rule for filtering purposes.
  • This is a subscriber - internally or externally - who is involved in a data transmission which is to take place or take place via at least one part of the ring 28.
  • the Filter ⁇ inference means 38 has a set of filter modules 40th Traffic over the ring 28 can be done in two directions - clockwise or counterclockwise.
  • the ring-internal participants 20 are each assigned a pair of filter modules 40.
  • a first filter module 40 of the Paa ⁇ res monitored for a given direction of data traffic in the ring 28 directed to the subscriber 20 data flow, while the second filter module 40 of the pair monitors the directed in the opposite direction ⁇ the data traffic to the subscriber 20 data flow.
  • data traffic in only one direction may be possible.
  • the filtering device 38 further includes filter modules 39, 41, which are each an interface unit 30, 32 associated with ⁇ and particularly coupled with the latter.
  • filter modules 39, 41 which are each an interface unit 30, 32 associated with ⁇ and particularly coupled with the latter.
  • filter data can be filtered by the filter modules 39, 41, which originates from the ring 28 and is directed to a non-external subscriber.
  • these additional filter modules 39, 41 are dispensed with. The description below relates to the filter modules 40 and applies accordingly also to the filter modules 39, 41.
  • the filtering device 38 is programmed with a first filter rule, which carries out the monitoring of data packets whose transmission is or should take place via at least part of the ring 28. As described above, the monitoring takes place on the basis of a subscriber identifier which corresponds to the MAC address of a subscriber participating in a transmission of a data packet. This can be the subscriber trained as a sender and / or the subscriber trained as the recipient of the package.
  • the filter modules 40 assigned to the ring-internal subscribers 20 filter the data traffic that takes place over at least part of the ring 28 by forwarding a data packet directed to the respective subscriber 20 only from this subscriber 20 if the data packets to be monitored in accordance with the filter rule in this data packet participants or subscribers of a list of allowed subscriber identifications. This list is shown in FIG. As filter rules, other rules can also be implemented that correspond to the usual firewall rules.
  • the filter modules 40 are each formed by a device with switch functionality. They can be formed by a separate switch, which is formed separately from the associated ring-internal participant 20. In the embodiment under consideration, however, they are each directly mechanically coupled to the associated ring-internal participant 20. In particular, the respective ring-internal Operaneh ⁇ mer 20 and the associated filter module 40 are arranged in a same, contiguous structural unit.
  • Subscriber 20 in the embodiment under consideration are in particular respectively removablebil ⁇ det as a control unit with switch functionality.
  • the data network 18 also has network access control units 42, 44 each having a different one
  • Interface unit 30 and 32 are assigned. They each serve to manage, in particular approve or reject, the traffic access to ring 28 for out-of-bound participants 22 or 36 according to a defined authentication protocol. In the case of authorized data traffic access of the external party, the latter can participate in a data transmission which takes place via at least part of the ring 28. If an authentication of a non-external subscriber 22, 36 by the network access control unit 42 or 44 is successfully completed with an admission, the associated interface unit 30 or 32 becomes a
  • the authentication protocol can be, for example, a protocol according to IEEE 802.1x, in particular in the form of an EAP-TLS authentication using a device certificate.
  • the functions of the network access control units 42, 44 and the filtering device 38 are first explained using the example of the connection of an external party 36.
  • the traffic access for the external subscriber 36 which is occasionally connected to the data network 18 as a maintenance device, is managed by means of the network access control unit 44.
  • the subscriber 36 is authenticated by the assigned network access control unit 44 according to a protocol of the type mentioned above.
  • an authentication module 45 (or “authenticator”) is provided. that is implemented respectively in the ringex- distant participants 22, 36 and with the corresponding network access control unit 42 and 44 together ⁇ menwirkt. If the external user 36 successfully over the network access control unit 44 authentic Siert, a data traffic is considered that a fingergegebe- NEN port of the associated interface unit 32 and at least ⁇ part of the ring 28 takes place and in which the external subscriber 36 participates, as admitted.
  • the network access ⁇ control units 42, 44 are each equipped with a switch functionality and can jew be designed as a so-called "access switch”.
  • the interface unit 32 is assigned an identification device 46.
  • the identifier 46 serves to take a measure relating to a subscriber identifier of the external subscriber 36, so that the subscriber identifier used in one originating from the ex ternal ⁇ participants 36 data transmission in the ring 28 is permitted according to the applicable filtering rule.
  • the identification device 46 has an identification setting unit 48, which is provided for assigning to the external subscriber 36 a subscriber identifier TK authorized by the filtering device 38.
  • At least one identifier TK in the considered embodiment a MAC address, which can be assigned to an external user 36 if required.
  • This identifier is a so-called “free" identifier which was not used in the data network 18 prior to the addition of the external subscriber 36th to setting an allowable with respect to the filter means 38 subscriber identity TK 48, the unit is preferably a Corporation's trademark of Cisco Systems, Inc.
  • FIG. 4 shows a data packet DPI generated by the external subscriber 36 and shown at the ring-internal subscriber 20 a shown in the figure on the top left.
  • the identification device 46 which receives the data packet DPI, replaces by means of the unit 48 the sender address, ie the subscriber identifier MA formed as a MAC address by a free subscriber identifier TK of the list shown in FIG.
  • the forwarded from the identification device 46 data packet DP2 now contains as the sender address this duken ⁇ voltage TK. Since this is permitted by the filtering device 38, ie by the filter modules 40, the data packet DP2 is forwarded to the receiver (subscriber 20.a).
  • the subscriber identifier which is used in the ring 28 as an authorized subscriber identifier TK of the destination is inserted in the actual subscriber code.
  • identifier MA of the external subscriber 36 is translated back from the tag-setting unit 48 according to the translation table shown in FIG.
  • a double decomposition of part ⁇ receiving detection may be for a data communication 36 and an internal user 22 is produced via the ring 28 between the external subscriber.
  • Embodiment variants are shown in FIGS. 6 and 8.
  • the actual subscriber identifier MA of the external subscriber 36 is used for the participation in a data traffic which takes place over at least part of the ring 28.
  • the MAC address of the external subscriber 36 is used for this movement of such data ⁇ traffic as subscriber identification MA.
  • the subscriber identifier MA already assigned to the external subscriber 36 must be made known to the filter modules 40 as an identifier authorized with regard to the applicable filter rule. Accordingly, an updating process of the list of subscriber identifications permitted by the filtering device 38 shown in FIG. 3 takes place in the considered variants. The update process is initiated by the identifier. For this purpose, at least two operations are possible.
  • the reference numerals 46 ⁇ and 46 ⁇ ⁇ are introduced for the identification device.
  • the identification device 46 sends a message ⁇ N in the ring 28 so that all the filter modules 40 - all ring internal subscriber 20 receive this message N - ie, in the specific embodiment under consideration, the filter device 38th This message contains N, as shown in the figure to be admitted subscriber identifier MA of the external subscriber 36.
  • the filter modules 40 Upon receipt of the message N ER farther the filter modules 40 each have their list of zuzulas ⁇ Send subscriber identifiers to the subscriber identifier MA of the external subscriber 36.
  • the message N 46 ⁇ of the Ken ⁇ drying apparatus preferably as a multicast or broad- cast message.
  • the message N is sent in the form of a data packet, with the MAC address of the identification device 46 ⁇ as the sender address and, in the considered embodiment, the intended address for a broadcast FF-FF-FF-FF-FF as the destination address ,
  • the information content of the post ⁇ reporting N includes a command ( "RegisterOffRingDevice"), is where to expand ⁇ to the list of admitted participants identifiers to the subscriber identifier MA of the addressed filter modules 40th
  • FIG. 7 shows the transmission of the data packet DPI, which is forwarded unchanged to the receiver (subscriber 20.a) by the filter modules 40 arranged on the transmission path.
  • the data package contains DPI as the sender address, the actual subscriber identifier MA of the external subscriber 36, which is registered in the list of Figure 3 after the above ⁇ be signed measure of the identification device 46 ⁇ .
  • the ring 28 has a so-called ⁇ ring manager RM on. This is formed by one of the in-ring subscribers 20, which has certain management functions relative to the other in-ring subscribers 20.
  • the identification device 46 ⁇ ⁇ sends the message N to the ring manager RM, which triggers after receiving this one update operation of the lists of permitted by the filter modules 40 subscriber identifiers.
  • the ring manager RM distributes the information, eg by sending a multicast or broadcast message or by individual addressing to the filter modules 40. The data traffic can then take place as shown in FIG.
  • the message N in both embodiments may be referred to in the expert language as a "FilterUpdate message.” It is preferably sent in a cryptic form, in particular, it may have a cryptographic checksum, eg according to AES-CBC-MAC, HMAC-SHA1, HMAC -SHA256, RSA signature, DSA signature, ECDSA signature.
  • the filtering device 38 has a filtering rule that filters the traffic with respect to at least one subscriber identifier. It is a traffic that takes place over at least part of the ring 28, allowed only if the corre sponding ⁇ data packets contain subscriber identifiers that are included in the list of Figure 3.
  • a data packet is blocked by a filter module 40 and not forwarded to the next in-ring participant 20.
  • the decision taken by the identifier 46, 46 and 46 ⁇ ⁇ ⁇ Action on a subscriber identifier will ⁇ only hit the when the ring 36 external participants successfully authenticate itself to the network access control unit 44th
  • the above-described measures of the identification device 46, 46 ⁇ and 46 ⁇ ⁇ are therefore affected by the network access control unit 44 depending on the admission of the external subscriber 36.
  • the functions of the network access control units 42, 44 and the identifier 46, 46 ⁇ and 46 ⁇ ⁇ were explained above using the example of the network access control unit 44, which is used for the connection of external subscribers, such as the external subscriber 36.
  • the network access control unit 42 is used for the connection of outside-external participants who are trained as internal participants 22 or in the vehicle 10 new or rebuilt after repair. It is assigned to the interface unit 30.
  • an identifier 50 is associated with the interface of the ⁇ lentician 30th To Be ⁇ override the operation of the network access control unit 42 and the identification device 50 is made to the text above to the corresponding network access control unit 44 and the identification device 46th
  • the identification device 46 in the first embodiment variant shown in FIG. tion, whose operation is identical to the operation of the unit 48.
  • the reference numbers 50 ⁇ and 50 ⁇ ⁇ are introduced for differentiation.
  • the interface unit 30 and the network access control unit 42 and identification device 50 assigned to it can be formed as separate units. As seen in the embodiment under consideration, however, it is advantageous if they are components of a common, coherent structural unit.
  • this Bauein ⁇ ness corresponds to one of the ring internal subscriber 20, as shown in FIGS.
  • the ring-internal subscriber 20 comprises the interface unit 30 and the associated network access control unit 42 and identification device 50. In this case, it can be programmed with the functions of these devices.
  • the above statements also apply to the interface unit 32 and the associated Netzwerkzugangskont ⁇ roll unit 44 and identification device 46th
  • the filter device 38 has a plurality of filter rules, which are each assigned to a different operating state of the vehicle 10. For example, it may be required that a data communication, he ⁇ follows at least a part of the ring 28, is administered such that a raising of the connected to the data network 18 function components or internal subscriber 22 within a short period ER- follow can. For this purpose is considered during this start-up phase of the vehicle 10, a filter rule that is modified from the above ⁇ be written filter rule in normal operation. In addition, during the startup phase, at least the network access control unit 42 is operated in an operating mode which differs from the above-described operating mode used in the normal operation of the vehicle 10. This is shown in FIG.
  • the normal operation corresponds to a "normal driving mode" , This is only released after the authentication of all internal subscribers 20, 22 has been successfully completed by the network access control unit 42.
  • HFP During the startup phase HFP (see Figure 9) is the filter rule of Fil ⁇ ter worn 38, the authorized based on the list subscriber identifiers defined as described in the Nor ⁇ mal compassion of the vehicle 10, overridden. Accordingly, a second filter rule of the filter device 38 applies, according to which all data traffic over at least part of the ring 28 is permitted by the filter device 38. As a result, a successful over the ring 28 data traffic, which in particular for the construction of the data network 18 and for the
  • the start-up phase HFP can be divided into several phases.
  • a first phase PI the data network 18 builds up.
  • a subsequent phase P2 an initialization of the data communication between one of the internal subscribers 20, 22, which has the function of a central control unit, with the internal subscribers 20, 22 assigned to it takes place. be designed as an external participant 22.
  • Step corresponds to the initialization of the control network controlled by the central controller.
  • the network access control unit 42 and the filter device 38 are operated such that the internal users 20, 22 are permitted to participate in data traffic via the ring 28, although this is subject to authentication by the network access control unit 42 not yet subject. It is in particular a connection of all ring external party 22 to the ring 28 via at least one interface (or port) of the interface unit 30 is possible, this interface ⁇ is released from the interface unit 30, even though not all ring external party 22 through the associated network access control unit 42 still tested or not checked conclusively.
  • the above-described authentication processes of the internal subscribers are performed by the network access control unit 42 during a phase P3 according to one of the above-mentioned authentication protocols, in particular by means of a certificate authentication. based authentication.
  • Authent Deutschensvor Cyprus ends the start-up phase HFP and with it the Grace period of the filter device 38.
  • the start-up phase HFP is also called “initialization" of the vehicle 10.
  • the so-called "train setup” is done in the special ⁇ during the initialization.
  • the operating mode of the network access control unit 42 and the filtering device 38 used in the initialization operation can also be activated in the event of a disturbed operation of the vehicle 10. Such an operation can be activated, for example, by the triggering of an emergency brake signal or by a fire alarm.
  • a schenliche under ⁇ filter and / or authentication rule is provided as in the normal operation of the vehicle 10.
  • a filter rule may be provided which corresponds to the second filter rule. In these modes is accordingly an over at least part of the ring 28 successful traffic without restriction possible.
  • Reconfigure are locked.
  • This lock can be activated, for example, when activating another mode of operation, such as of the maintenance mode.
  • a data traffic which takes place via at least part of the ring 28 can, for a specific external subscriber, which has already been able to authenticate successfully in the data network 18 at least once, by a filter rule of the filtering device 38 and / or an operating mode of the network access control unit 44 in normal operation be expli ⁇ zit locked.
  • a filter rule of the filtering device 38 and / or an operating mode of the network access control unit 44 in normal operation be expli ⁇ zit locked.
  • data traffic in different directions i. clockwise or counterclockwise, done in ring 28.
  • potential transmission paths with different lengths are possible, wherein preferably the transmission path with the lowest length is selected for the data traffic.
  • one of the in-ring subscribers 20 implements the function of a master (or "Media Redundancy Master Switch") which logically interrupts the ring 28 at a particular location.
  • the filter rules of the filtering device 38 are independent of the transmission direction a data packet independently. This has the advantage that when the ring is reconfigured, in particular due to an error, reconfiguration of the filter rules is not required.
  • filtering rules of the filtering device 38 can also be provided for filtering data packets, which depend on the direction of the transmission of a data packet via the ring 28. According to a filter rule, it may be provided for a filter module 40 that a data packet is forwarded only in a specific direction and is blocked in the opposite direction. In this case, an automatic ⁇ tables reconfiguration of the filter rules for the internal party ring 20 can be made to account for the different transmission ⁇ direction. In another variant, there is no automatic reconfiguration of the filter rules. In this case, the internal users 20, 22 have to authenticate again, so that matching filter entries can then be addressed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Small-Scale Networks (AREA)

Abstract

La présente invention concerne un réseau de données d'un système, en particulier d'un véhicule (10), avec un ensemble de participants internes au système (20, 22), au moins un anneau (28), dans lequel des participants internes à l'anneau (20) dudit ensemble sont reliés entre eux selon une topologie d'anneau, et au moins une unité d'interface (30, 32) qui est prévue pour établir un branchement à l'anneau (28) d'au moins un participant externe à l'anneau, (22, 36). Pour réaliser un réseau de données de ce genre avec au moins un anneau dans lequel on peut obtenir une exploitation sécurisée et une gestion simple, en particulier flexible dans l'application, le réseau de données comprend un système de filtrage (38) avec au moins une fonction de filtrage qui est conçue pour filtrer un trafic de données de l'anneau (28) en ce qui concerne au moins une identification (TK ; MA) des participants, et un système d'indentification (46, 50 ; 46 `, 5 ` ; 46'', 50'') qui est conçu pour prendre, pour un participant externe à l'anneau (22, 36), au moins une mesure concernant une identification (MA) de ce participant (22, 36) de manière telle que cette identification soit autorisée quant à la fonction de filtrage pour un trafic de données dans l'anneau (28).
EP15738003.1A 2014-06-27 2015-06-25 Réseau de données d'un système, en particulier d'un véhicule Withdrawn EP3138242A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102014212484.0A DE102014212484A1 (de) 2014-06-27 2014-06-27 Datennetzwerk einer Einrichtung, insbesondere eines Fahrzeugs
PCT/EP2015/064360 WO2015197758A1 (fr) 2014-06-27 2015-06-25 Réseau de données d'un système, en particulier d'un véhicule

Publications (1)

Publication Number Publication Date
EP3138242A1 true EP3138242A1 (fr) 2017-03-08

Family

ID=53546579

Family Applications (1)

Application Number Title Priority Date Filing Date
EP15738003.1A Withdrawn EP3138242A1 (fr) 2014-06-27 2015-06-25 Réseau de données d'un système, en particulier d'un véhicule

Country Status (6)

Country Link
US (1) US20170134342A1 (fr)
EP (1) EP3138242A1 (fr)
CN (1) CN106537870A (fr)
DE (1) DE102014212484A1 (fr)
RU (1) RU2668722C2 (fr)
WO (1) WO2015197758A1 (fr)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6497656B2 (ja) * 2015-07-03 2019-04-10 パナソニックIpマネジメント株式会社 通信方法およびそれを利用した通信装置
DE102017220370A1 (de) * 2017-11-15 2019-05-16 Siemens Mobility GmbH System und Verfahren zum geschützten Übertragen von Daten
CN108599989B (zh) * 2018-03-20 2021-09-10 中车青岛四方机车车辆股份有限公司 一种mvb总线检测方法及装置
WO2019213779A1 (fr) 2018-05-10 2019-11-14 Miovision Technologies Incorporated Réseau d'échange de données de chaîne de blocs, et procédés et systèmes pour soumettre des données à un tel réseau et effectuer des transactions de données dessus
CN112087351B (zh) * 2020-09-24 2022-02-11 山东交通学院 一种远程列车网络通信接口测试方法
EP4060946A1 (fr) * 2021-03-16 2022-09-21 Siemens Aktiengesellschaft Authentification d'un appareil dans un réseau de communication d'une installation d'automatisation

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011076350A1 (de) * 2011-05-24 2012-11-29 Siemens Aktiengesellschaft Verfahren und Steuereinheit zur Erkennung von Manipulationen an einem Fahrzeugnetzwerk

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1407378B1 (fr) * 2001-06-15 2012-08-29 Advanced Network Technology Laboratories Pte Ltd. Reseaux informatiques
CN1812300B (zh) * 2005-01-28 2010-07-07 武汉烽火网络有限责任公司 环型网络连接控制方法、路由交换设备及环型网络系统
CN100481805C (zh) * 2005-11-24 2009-04-22 杭州华三通信技术有限公司 环型以太网及其业务承载实现方法
US8782771B2 (en) * 2007-06-19 2014-07-15 Rockwell Automation Technologies, Inc. Real-time industrial firewall
JP2011223396A (ja) * 2010-04-12 2011-11-04 Toshiba Corp アドレス配布方法及び装置
DE102010026433A1 (de) * 2010-07-08 2012-01-12 Siemens Aktiengesellschaft Steuernetzwerk für ein Schienenfahrzeug
DE102010033230A1 (de) * 2010-08-03 2012-02-09 Siemens Aktiengesellschaft Verfahren und Vorrichtung zum Einbinden eines Gerätes in ein Netzwerk
JP5376066B2 (ja) * 2010-09-29 2013-12-25 富士通株式会社 リングネットワークを構築する方法
US9166952B2 (en) * 2012-10-15 2015-10-20 Thales Canada Inc Security device bank and a system including the and SD security device bank

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011076350A1 (de) * 2011-05-24 2012-11-29 Siemens Aktiengesellschaft Verfahren und Steuereinheit zur Erkennung von Manipulationen an einem Fahrzeugnetzwerk

Also Published As

Publication number Publication date
RU2017102519A3 (fr) 2018-08-02
US20170134342A1 (en) 2017-05-11
RU2017102519A (ru) 2018-08-02
DE102014212484A1 (de) 2015-12-31
RU2668722C2 (ru) 2018-10-02
CN106537870A (zh) 2017-03-22
WO2015197758A1 (fr) 2015-12-30

Similar Documents

Publication Publication Date Title
WO2015197758A1 (fr) Réseau de données d'un système, en particulier d'un véhicule
EP2954498B1 (fr) Procédé et dispositif de raccordement d'un appareil de diagnostic à une unité de commande montée dans un véhicule à moteur
EP2684154B1 (fr) Procédé et unité de commande pour la reconnaissance de manipulations frauduleuses sur un réseau de véhicule
EP3523930B1 (fr) Véhicule à moteur muni d'un réseau de données interne au véhicule ainsi que procédé de fonctionnement du véhicule à moteur
EP2721784B1 (fr) Procédé de fonctionnement d' un équipement de réseau et équipement de réseau
DE102010026433A1 (de) Steuernetzwerk für ein Schienenfahrzeug
DE102011077409A1 (de) Verbindungsknoten für ein Kommunikationsnetz
EP3262797A1 (fr) Réseau de communication de véhicule automobile muni d'un dispositif de commutation
EP3496975B1 (fr) Véhicule automobile ayant un réseau de données divisé en plusiers domaines séparés et procédé d'exploitation du réseau de données
WO2012143260A1 (fr) Procédé et dispositif permettant la communication à des fins de commande entre des éléments de train couplés
EP3266186B1 (fr) Appareil de réseau et procédé d'accès à un composant de réseau dans un réseau de données
EP2448182B1 (fr) Procédé de communication dans un système d'automatisation
EP4054143A1 (fr) Authentification d'un appareil dans un réseau de communication d'une installation d'automatisation
EP2704370B1 (fr) Procédé de transmission de nouvelles dans un réseau de communication industriel pouvant fonctionner de manière redondante et appareil de communication pour un réseau de communication industriel pouvant fonctionner de manière redondante
DE102014214225A1 (de) Schienenfahrzeug mit einer Datenkommunikationseinrichtung
EP2721803B1 (fr) Méthode et système pour configurer un dispositif de réseau d'une façon sécure
WO2005006705A1 (fr) Dispositif et appareil de couplage appele commutation de securite pour securiser l'acces a des donnees
EP4060947A1 (fr) Authentification d'un noeud dans un réseau de communication d'une installation d'automatisation
EP4060946A1 (fr) Authentification d'un appareil dans un réseau de communication d'une installation d'automatisation
DE102021210917A1 (de) Kommunikationssystem und Kommunikationsverfahren mit einer Statusnachricht
DE102020209043A1 (de) Verfahren zum Betreiben eines Netzwerks und Bypassverbindungseinheit
EP1509004A1 (fr) Procédé d'operation de deux sous-réseaux ayant des caracteristiques d'un bus et topologie du réseau correspondant

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20161129

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: SIEMENS AKTIENGESELLSCHAFT

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: SIEMENS MOBILITY GMBH

17Q First examination report despatched

Effective date: 20190524

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20191005