WO2013175633A1 - Dispositif de communication, système de communication, et procédé de communication - Google Patents

Dispositif de communication, système de communication, et procédé de communication Download PDF

Info

Publication number
WO2013175633A1
WO2013175633A1 PCT/JP2012/063532 JP2012063532W WO2013175633A1 WO 2013175633 A1 WO2013175633 A1 WO 2013175633A1 JP 2012063532 W JP2012063532 W JP 2012063532W WO 2013175633 A1 WO2013175633 A1 WO 2013175633A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication
code
message
inspection
update
Prior art date
Application number
PCT/JP2012/063532
Other languages
English (en)
Japanese (ja)
Inventor
充啓 馬渕
Original Assignee
トヨタ自動車 株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by トヨタ自動車 株式会社 filed Critical トヨタ自動車 株式会社
Priority to PCT/JP2012/063532 priority Critical patent/WO2013175633A1/fr
Publication of WO2013175633A1 publication Critical patent/WO2013175633A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Definitions

  • the present invention relates to a communication device that is network-connected in a vehicle or the like, a communication system in which a plurality of communication devices are network-connected, and a communication method.
  • a plurality of electronic control units (ECUs) mounted on a vehicle are connected to each other via a network so that information (vehicle information) of the electronic control units can be communicated with each other.
  • a communication system is configured as a vehicle network system using an ECU as a communication device.
  • vehicle network system is a controller area network (CAN).
  • each ECU that shares a bus which is a communication line, can send a message on the bus according to each judgment. Therefore, transmission of a message from each ECU to the bus is easy. Therefore, for example, it is possible to connect an unauthorized ECU to a CAN bus and transmit an unauthorized message to the bus. When such an unauthorized message is transmitted, the ECU receiving the unauthorized message There is a risk of processing the message in the same way as a regular message.
  • Non-Patent Document 1 a technique for preventing communication by an unauthorized message has been proposed, and an example thereof is described in Non-Patent Document 1.
  • the communication system described in Non-Patent Document 1 is an in-vehicle CAN network including a plurality of ECUs connected to a CAN bus.
  • the ECU that transmits the communication message among the plurality of ECUs generates a test code (MAC) that is a 64-bit message authentication code based on the four communication messages communicated first.
  • the generated MAC is divided into four to generate four 16-bit codes, and these four codes are sequentially added to four communication messages communicated thereafter.
  • the ECU that receives the communication message generates a 64-bit MAC based on the previously received four communication messages, and combines the four codes obtained from the four communication messages received thereafter to combine the 64-bit MAC. Reconfigure.
  • the receiving ECU compares the generated MAC with the reconfigured MAC, and determines that the communication message is correct if the two MACs are the same, while the communication message is determined if the two MACs are different. It is determined to be illegal. Thereby, in this communication system, the correctness / incorrectness of the communication message is verified based on the highly confidential 64-bit MAC.
  • the correctness / incorrectness of the four communication messages communicated first is reconstructed from the codes added by dividing the four communication messages communicated thereafter. It is verified based on the MAC. That is, based on the verification result, communication using an unauthorized communication message in the communication system is prevented.
  • the correct / incorrect determination of the communication message is performed based on the four communication messages communicated first and the four communication messages transmitted thereafter, at least the communication message It will take more than 8 minutes. For this reason, in this communication system, the delay required for correct / incorrect determination cannot be ignored, and it is difficult to adopt it for applications that require highly reliable processing in real time.
  • the present invention has been made in view of such circumstances, and its purpose is to prevent unauthorized communication through real-time processing, that is, to improve the reliability of a message to be communicated, and communication A method and a communication apparatus used in the communication system are provided.
  • a communication system provided by the present invention is a communication system in which a plurality of communication devices are connected to a communication line so that communication messages can be communicated.
  • An inspection code used for message authentication is set, and an inspection code update unit that executes the update of the inspection code in accordance with the inspection code update condition is provided.
  • the inspection code update condition is synchronized based on one communication message including the content for instructing the update of the inspection code, and the communication device that transmits the communication message uses the assigned code generated from the set inspection code as described above.
  • the communication device that is included in the communication message to be transmitted and receives the communication message is included in the received communication message. Determining positive / bad of the communication the received message based on a comparison of the test code check code that the set reproduced from the grant codes that.
  • a communication method provided by the present invention is a communication method in which a plurality of communication devices communicate communication messages via a communication line, and is used for authentication of communication messages to the plurality of communication devices.
  • a communication method provided by the present invention is a communication method in which a plurality of communication devices communicate communication messages via a communication line, and is used for authentication of communication messages to the plurality of communication devices.
  • a step in which the inspection code update unit executes the update of the set inspection code according to the inspection code update condition, and instructs the update of the inspection code between the plurality of communication devices with the inspection code update condition A step of synchronizing based on one communication message including the content, a step of receiving a communication message including a grant code generated from the set inspection code, and a grant code included in the received communication message And the received communication based on the step of reproducing the inspection code from a comparison between the reproduced inspection code and the set inspection code. And a step of determining positive / incorrect message.
  • a communication apparatus is a communication apparatus that is connected to a communication line and performs communication using a communication message with another communication apparatus connected to the communication line.
  • an inspection code used for authentication of a communication message is set, and an inspection code update unit that executes update of the inspection code according to an inspection code update condition is provided.
  • the inspection code update condition is synchronized with another communication device based on one communication message including contents instructing to update the inspection code, and is generated from the set inspection code. Send the grant code in the communication message.
  • a communication apparatus is a communication apparatus that is connected to a communication line and performs communication using a communication message with another communication apparatus connected to the communication line.
  • an inspection code used for authentication of a communication message is set, and an inspection code update unit that executes update of the inspection code according to an inspection code update condition is provided.
  • the inspection code update condition is synchronized with another communication device based on one communication message including contents instructing the update of the inspection code, and is generated from the set inspection code.
  • Receiving a communication message transmitted from the other communication device including the assigned code and obtaining an inspection code from the assigned code included in the communication message. No, it determines a positive / incorrect communication the received message based on a comparison of the test code is the set inspection code this play.
  • the inspection code used to determine whether the communication message is correct / incorrect is updated in real time between a plurality of communication devices connected to the communication system according to the synchronized inspection code update conditions.
  • the execution of the inspection code and the update condition are synchronized among a plurality of communication devices that communicate (transmit or receive) one communication message.
  • the inspection codes of a plurality of communication devices are synchronized with a simple mechanism.
  • the communication device is set with a conversion code used when generating a provision code from the inspection code and reproducing the inspection code from the provision code.
  • a conversion code update unit that executes an update according to the conversion code update condition, and the conversion code update condition includes a content that instructs updating of the conversion code between the plurality of communication devices. Synchronized based on the communication message.
  • a communication system provided by the present invention is a communication system in which a plurality of communication devices are connected to a communication line so that communication messages can be communicated.
  • An inspection code used for authentication of a message, a conversion code used when generating an assignment code from the inspection code and reproducing the inspection code from the assignment code are set, and the conversion code
  • a conversion code update unit is provided for executing the update according to the conversion code update condition.
  • the conversion code update condition includes a content for instructing the update of the conversion code 1
  • the communication device that receives the communication message is reproduced by using the conversion code with respect to the grant code included in the received communication message. Whether the received communication message is correct / incorrect is determined based on a comparison between the inspection code and the set inspection code.
  • a conversion code used for conversion / reconversion (encryption / decryption) to the inspection code is exchanged between a plurality of communication devices connected to the communication system in real time according to the synchronized conversion code update conditions. Updated.
  • the grant code generated from the inspection code is changed by changing the conversion code.
  • the inspection code and the conversion code are updated in accordance with the change of the assigned code, so that communication by an unauthorized communication message is prevented and the reliability of the communication message is further improved.
  • the transmitting communication device generates the assignment code by encrypting the inspection code based on the conversion code, and the receiving communication device uses the conversion code based on the conversion code.
  • the inspection code is reproduced by decoding.
  • the inspection code to be updated becomes a grant code that is further converted by the conversion code and encrypted, the confidentiality of the generated grant code can be improved. This makes it difficult to reproduce the inspection code from the assigned code, thereby preventing communication using an unauthorized communication message and improving the reliability of the communication message.
  • the inspection code is a value set in the communication device
  • the conversion code is an encryption key set in the communication device.
  • the grant code included in the communication message is encrypted with the encryption key, the secrecy of the grant code is ensured. As a result, it becomes more difficult to reproduce the inspection code from the assigned code, so communication by an unauthorized communication message is prevented, and the reliability of the communication message is improved.
  • the inspection code update condition is a condition determined based on the content of the assigned code.
  • the inspection code update condition is determined based on the content of the assigned code. That is, since the inspection code update condition is determined according to the assigned code, it is difficult to guess the inspection code update condition, and it becomes difficult for an unauthorized communication device to assign an appropriate assigned code to the communication message. Thereby, the reliability of the communication message in the communication system is improved.
  • the conversion code update condition is a condition determined based on the content of the assigned code.
  • the conversion code update condition is determined based on the content of the assigned code. That is, since the conversion code update condition is determined according to the assignment code, it is difficult to guess the conversion code update condition, and it becomes difficult for an unauthorized communication device to assign an appropriate assignment code to the communication message. Thereby, the reliability of the communication message in the communication system is improved.
  • the communication message is a message according to a CAN protocol
  • the grant code is stored in an extended ID area secured in the communication message.
  • the communication message is a message according to a CAN protocol
  • the grant code is stored in a data area secured in the communication message.
  • the grant code is stored in the data storage area defined by the CAN protocol, it is easy to give the grant code to the CAN protocol. Further, even if the number of bits of the assigned code is reduced, confidentiality is ensured even by the high update frequency. For this reason, it is possible to reduce the number of assigned codes occupied in the data area for storing the communication data to be transferred, and to suppress the reduction in the transfer amount of the communication data.
  • FIG. 2 is a schematic diagram schematically illustrating a message inspection code (MAC) included in a communication message transmitted and received by the communication system illustrated in FIG. 1, and (a) is a schematic diagram illustrating a case where the lower first bit is “1”.
  • FIG. 4B is a schematic diagram illustrating a case where the lower first bit is “0” and the lower second bit is “1”.
  • FIG. 6 is a flowchart showing a procedure related to parameter update processing shown in FIG. 5.
  • the flowchart which shows the procedure which concerns on the reception process of the communication message in ECU shown in FIG.
  • the schematic diagram which shows typically the other example which actualized the communication message communicated in the communication system which concerns on this invention.
  • the schematic diagram which shows typically the other example which actualized the communication message communicated in the communication system which concerns on this invention.
  • FIGS. 1-10 A first embodiment embodying a communication system according to the present invention will be described with reference to FIGS.
  • the vehicle 10 includes an in-vehicle network system as a communication system.
  • the in-vehicle network system includes first to third electronic control units (ECUs) 11 to 13 as communication devices and a communication bus 15 to which the first to third ECUs 11 to 13 are connected. Accordingly, the first to third ECUs 11 to 13 can exchange (transmit / receive) various information used for control and the like via the communication bus 15.
  • the in-vehicle network system is configured as a CAN network to which a CAN (Controller Area Network) protocol is applied as a communication protocol.
  • the communication bus 15 is, for example, a twisted pair cable.
  • the first to third ECUs 11 to 13 transmit various communication messages MS1 to MS3 to the communication bus 15, respectively, so that various types of information are communicated with other ECUs connected to the communication bus 15. Can give and receive.
  • the first and second ECUs 11 and 12 are regular ECUs, while the third ECU 13 is an illegally connected ECU.
  • the communication messages MS1 and MS2 transmitted from the first and second ECUs 11 and 12 include “ID region”, “extended ID region”, and “data region” in the data frame constituting the communication message. Is defined.
  • the “ID area” stores “message ID”
  • the “extended ID area” stores “embedded” “message check code” (MAC)
  • the “data area” stores “embedded”.
  • Communication data "is stored.
  • an “extended ID area” is provided for a communication message set as an extended frame, but only an “ID area” is provided for a communication message set as a standard frame. That is, each communication message MS1, MS2 is set as an extended frame.
  • the MAC When the MAC is stored (embedded) in the “extended ID area”, the MAC is also used for arbitration, but a communication message can be communicated. That is, if the first and second ECUs 11 and 12 do not use the MAC in the “extended ID area” for filtering that restricts reception, the “extended ID area” of the communication message set in the extended frame is used. MAC can be transmitted and received.
  • the communication message MS3 transmitted from the third ECU 13 is set to, for example, a normal frame, an “ID region” and a “data region” are included in the data frame constituting the communication message. Is stipulated.
  • the “ID area” stores “message ID”, and the “data area” stores “communication data”. That is, the “extended ID area” is not provided and “MAC” is not stored anywhere. That is, the third ECU 13 does not support “MAC”.
  • the communication bus 15 is provided with a data link connector (DLC) 16 which is a connection terminal capable of connecting an external device so as to be communicable.
  • the DLC 16 connects a diagnostic device or the like as a regular communication device prepared by a manufacturer or a card dealer to the communication bus 15 so as to be communicable.
  • the DLC 16 can be connected to a user tool 17 that is an unauthorized communication device prepared by the user.
  • Each of the first and second ECUs 11 and 12 is a control device that is used for various controls of the vehicle 10.
  • an ECU that controls a drive system is an ECU for an engine
  • an ECU for a travel system is an ECU for a steering or a brake ECU
  • an ECU for controlling a vehicle body system An ECU for a light and an ECU for a window can be mentioned, and an ECU for controlling an information device system includes an ECU for car navigation.
  • the number of ECUs connected to the communication bus 15 is not limited to two, and may be one or three or more.
  • first and second ECUs 11 and 12 have the same structure, the structure of the first ECU 11 will be described below, and for the sake of convenience of explanation, the same numbers are assigned to the same components. Thus, the detailed description of the structure of the second ECU 12 is omitted.
  • the first ECU 11 includes a CAN between an information processing unit 20 that performs processing required for various controls using various information, and another ECU via a communication bus 15.
  • a CAN controller 21 for performing communication using a communication message based on the protocol and for exchanging data related to the communication message with the information processing unit 20.
  • the CAN controller 21 analyzes a communication message received from the communication bus 15 and acquires a message ID included in the communication message, communication data that is a data body to be transferred, and the acquired message ID and communication. Data and the like are provided to the information processing unit 20.
  • the CAN controller 21 generates a communication message including the message ID and communication data based on the message ID and communication data input from the information processing unit 20, and sends the generated communication message to the communication bus 15. Send.
  • a communication message (such as MS2) transmitted (flowed) to the communication bus 15 is received by the CAN controller 21, and the communication data included in the received communication message.
  • the communication data or the like to be transmitted is given from the information processing unit 20 to the CAN controller 21, and a communication message MS 1 including the given communication data or the like is sent from the CAN controller 21 to the communication bus 15. (Flowed).
  • the information processing unit 20 of the first ECU 11 can acquire various data necessary for the control function transmitted from the second ECU 12 or the like from the communication message (MS2 or the like) flowing through the communication bus 15. Further, the information processing unit 20 of the first ECU 11 can transmit a communication message MS1 including various data to be transmitted to the second ECU 12 or the like to the communication bus 15.
  • the third ECU 13 is provided with an information processing unit 20A and a CAN controller 21.
  • the information processing unit 20A has the same configuration as the information processing unit 20 of the first ECU 11 except that it does not support MAC, and the CAN controller 21 has the same configuration as the CAN controller 21 of the first ECU 11. Therefore, the detailed explanation is omitted.
  • the information processing unit 20 is configured to include a microcomputer, and includes a computing device that performs various processes, and a storage device that holds computation results and programs that provide various control functions.
  • the information processing unit 20 provides the predetermined control function by executing a program that provides the predetermined control function on the arithmetic device.
  • the information processing unit 20 performs a generation process for generating a MAC from authentication data and a reproduction process for reproducing the authentication data from the MAC.
  • the information processing unit 20 is provided with a function of executing a program corresponding to the generation process and the reproduction process held in the storage device by executing each program on the arithmetic device.
  • the information processing unit 20 is provided with a storage unit 30 for storing parameters used for generation processing and reproduction processing.
  • the storage unit 30 uses the storage device of the information processing unit 20 as a storage medium.
  • the storage device used for the storage unit 30 may be another storage device.
  • the storage unit 30 stores, as parameters, a key 301 as a conversion code used for data encryption / decryption and a check value 302 as an inspection code that is authentication data used for ECU authentication.
  • the initial value of the key 301 and the initial value of the check value 302 are set in the storage unit 30 at the time of factory shipment.
  • the key 301 is used when generating the MAC (311) from the check value 302 and when reproducing the check value 302 from the MAC (311).
  • the key 301 is a so-called common key (common encryption key), and the same key 301 is held in each of the first and second ECUs 11 and 12.
  • the check value 302 is a value used to authenticate a normal ECU, and the same check value 302 is held in each of the first and second ECUs 11 and 12.
  • the information processing unit 20 includes a MAC generation unit 31 that generates a MAC 311 from a check value, a CV generation unit 32 as a check code update unit that generates a new check value (CV), and a new And a key generation unit 33 as a conversion code update unit for generating a simple key. Further, the information processing unit 20 determines whether or not the reproduction unit 34 that reproduces CV from the MAC, the check value 302 stored in the storage unit 30, and the reproduction value 341 reproduced by the reproduction unit 34 are the same. A determination unit 35 for determination is provided.
  • the MAC generation unit 31 receives the check value 302 and the key 301 and outputs the MAC 311, and generates the MAC 311 based on the input check value 302 and the key 301. More specifically, the MAC generation unit 31 generates the MAC 311 by encrypting (encoding, encoding) the input check value 302 with the key 301.
  • This encryption may be a conversion that can convert the check value 302 into a specific value using the key 301.
  • the conversion may be a conversion in which a logical operation such as logical sum (AND) or exclusive logical sum (XOR) is applied between the check value 302 and the key 301, or various functions such as a hash function are applied. Conversion is also possible.
  • the MAC 311 generated by converting the check value 302 with the key 301 is output from the MAC generation unit 31.
  • the MAC generation unit 31 generates an 18-bit MAC 311. Since the calculation for generating the 18-bit MAC 311 is simpler than the calculation for generating the 64-bit MAC used in the communication system of Non-Patent Document 1, the load that the MAC generation processing gives to the information processing unit 20 Can be kept small. Then, the generated MAC 311 is stored in an 18-bit “extended ID area” defined in the data frame of the CAN protocol, and transmitted in a communication message. By storing the check value 302 in one communication message in this way, it is possible to perform verification of the correctness / incorrectness of the communication message every time the communication message is communicated, that is, in real time.
  • the CV generation unit 32 causes the check value 302 stored in the storage unit 30 to be input to the CV generation unit 32 and outputs a new check value to update the check value 302 stored in the storage unit 30. . More specifically, the CV generation unit 32 acquires the value of the check value 302 stored in the storage unit 30 when the check value update condition as the inspection code update condition, which is a condition for updating the check value, is established. A predetermined calculation is performed on the acquired check value 302 to calculate a new check value. This predetermined operation is not limited as long as a new check value can be calculated from the check value 302, and may be an operation using a logical operation such as logical sum (AND) or exclusive logical sum (XOR).
  • the CV generation unit 32 stores the new check value in the storage unit 30 as the check value 302. That is, the check value 302 stored in the storage unit 30 is updated to a new check value.
  • the key generation unit 33 inputs the key 301 stored in the storage unit 30 to the key generation unit 33 and outputs a new key to update the key 301 stored in the storage unit 30. More specifically, when a key update condition as a conversion code update condition that is a condition for updating a key is satisfied, the key generation unit 33 performs a predetermined operation on the value of the key 301 stored in the storage unit 30 to newly Key is calculated.
  • This predetermined operation is not limited as long as a new key can be calculated from the key 301, and may be an operation using a logical operation such as logical sum (AND) or exclusive logical sum (XOR), or pseudo-operation.
  • the key generation unit 33 stores the new key as the key 301 in the storage unit 30. That is, the key 301 stored in the storage unit 30 is updated with a new key.
  • the 18-bit MAC 311 generated by the MAC generation unit 31 has a smaller number of bits than the 64-bit MAC generated by the communication system described in Non-Patent Document 1, so that the analysis is easy and the security is low.
  • the check value 302 and the key 301 used by the MAC generation unit 31 for generating the MAC 311 are changed as described above, even the MAC 311 with a small number of bits is difficult to analyze, and security is improved. Highly maintained.
  • the playback unit 34 receives the MAC 311 and the key 301 and outputs the playback value 341.
  • the playback unit 34 generates the playback value 341 based on the input MAC 311 and the key 301. More specifically, the reproduction unit 34 obtains a reproduction value 341 reproduced from the MAC by decoding (decoding and reconverting) the 18-bit MAC generated by the MAC generation unit 31 using the key 301.
  • the reproduction value 341 is a check value, and if it is normal, it is the same value as the check value 302.
  • the determination unit 35 receives the value of the check value 302 stored in the storage unit 30 and the reproduction value 341 reproduced from the MAC by the reproduction unit 34, and outputs a comparison result between the check value 302 and the reproduction value 341. . More specifically, the determination unit 35 compares the value of the check value 302 with the reproduction value 341 to determine whether or not the check value 302 and the reproduction value 341 are the same. When the check value 302 and the reproduction value 341 are the same, since the MAC is confirmed to be a code generated from the check value 302, the ECU or the like that generated the MAC holds the correct check value 302. Is confirmed. That is, it is determined that the communication message is a message transmitted from a correct ECU or the like.
  • the check value 302 and the reproduction value 341 are different, it is determined that the MAC is not a code generated based on the check value 302 and the key 301. It is confirmed that the value 302 and the key 301 are not held. That is, it is determined that the communication message is a message transmitted from an unauthorized ECU or the like.
  • the success or failure of the check value update condition or key update condition is determined based on the MAC 311. Since the MAC 311 is included in the communication message, each ECU connected to the communication bus 15 determines success or failure of the check value update condition and the key update condition based on the MAC 311 obtained from the same communication message. That is, each ECU connected to the communication bus 15 obtains the same result as success or failure of the check value update condition or success or failure of the key update condition based on the same communication message.
  • the CV generation unit 32 determines that the check value update condition is satisfied. For example, when the lower 1st bit of the MAC 311 is 0 and the lower 2nd bit of the MAC 311 is 0, it is determined that the check value update condition is satisfied. On the other hand, for example, in other cases, that is, when the lower first bit of the MAC 311 is 0 and the lower second bit of the MAC 311 is 1, it is determined that the check value update condition is not satisfied.
  • the key generation unit 33 determines that the key value update condition is satisfied.
  • the lower first bit is 1, it is determined that the key update condition is not satisfied.
  • the check value update condition is satisfied when the combination of the lower 1st bit and the lower 2nd bit of the MAC 311 is “1, 1” and “1, 0”, the check value update condition is satisfied, and when the same combination is “0, 1”, When the key update condition is satisfied and the combination is “0, 0”, the check value update condition and the key update condition are satisfied.
  • the check value update condition is satisfied when the combination of the lower first bit and the lower second bit of the MAC 311 is “1, 1”, “1, 0”, and “0, 0”, and the key update condition is This is true when the combination of the lower 1st bit and the lower 2nd bit of the MAC 311 is “0, 1” and “0, 0”.
  • the operation of the communication system of the present embodiment will be described with reference to FIGS.
  • a case where the communication message MS1 transmitted from the first ECU 11 is received by the second ECU 12 will be described.
  • the combination of the ECU that transmits the communication message and the ECU that receives the communication message is not limited thereto. I can't.
  • the first ECU 11 when the communication message transmission process is started, the first ECU 11 generates a MAC (step S10 in FIG. 5).
  • the information processing unit 20 converts the check value 302 in the storage unit 30 based on the key 301 to generate an 18-bit MAC 311.
  • the first ECU 11 creates a communication message (step S11 in FIG. 5).
  • communication data, message ID, and MAC 311 are transmitted from the information processing unit 20 to the CAN controller 21, where the message ID is stored in the “ID area” of the data frame, and the “data area”
  • the communication data is stored in, and the MAC 311 is stored in the “extended ID area”.
  • the communication data and the message ID may be transmitted from a device other than the information processing unit 20 provided in the first ECU 11 as long as it is transmitted to the CAN controller 21.
  • the first ECU 11 transmits the communication message (step S12 in FIG. 5).
  • the communication message created by the CAN controller 21 is transmitted to the communication bus 15. If a communication error occurs when transmission is performed, a communication message retransmission process is performed based on the CAN protocol. Furthermore, if the retransmission process cannot be performed, the transmission of the communication message is stopped, and the information processing unit 20 is notified that there is a transmission error. On the other hand, when the transmission of the communication message is normally completed, the information processing unit 20 is notified that there is no transmission error.
  • the first ECU 11 executes a parameter update process (step S13 in FIG. 5).
  • the first ECU 11 determines whether or not the lower first bit of the MAC 311 is “1” (step S20 in FIG. 6). When it is determined that the lower 1st bit of the MAC 311 is “1” (YES in step S20 in FIG. 6), the first ECU 11 generates a new check value (step S21 in FIG. 6). The check value is stored in the storage unit 30 (step S22 in FIG. 6). Then, returning to FIG. 5, the communication message transmission process is terminated. That is, in this case, only the check value 302 is updated.
  • the first ECU 11 When it is determined that the lower 1st bit of the MAC 311 is not “1” (NO in step S20 in FIG. 6), the first ECU 11 generates a new key (step S23 in FIG. 6), and the generated key Is stored in the storage unit 30 (step S24 in FIG. 6). Then, the first ECU 11 determines whether or not the lower 2nd bit of the MAC 311 is “1” (step S25 in FIG. 6). When it is determined that the lower 2nd bit of the MAC 311 is not “1” (NO in step S25 of FIG. 6), the first ECU 11 generates a new check value and stores it in the storage unit 30 (FIG. 6). Steps S21 and S22), the process returns to FIG. 5 and the communication message transmission process is terminated. That is, in this case, the key 301 and the check value 302 are updated.
  • the first ECU 11 returns to FIG. 5 and ends the communication message transmission process. That is, in this case, only the key 301 is updated.
  • the first ECU 11 When there is a communication error, that is, when transmission of the communication message is not normally terminated, the first ECU 11 temporarily terminates the communication message transmission process without performing the parameter update process. When the transmission of the communication message is not normally terminated, other ECUs including the second ECU 12 have not been able to receive this communication message, or have not been normally received. For this reason, the first ECU 11 does not perform parameter update processing based on this communication message. If the first ECU 11 performs a parameter update process based on this communication message, a device that executes the parameter update process, such as the first ECU 11, and the second ECU 12 in the communication system. Thus, there is a mixture of apparatuses that do not execute parameter update processing, and the update of each parameter is not synchronized. That is, if the communication of the communication message is normal, the regular ECU (first ECU 11) that transmits the communication message updates at least one of the key 301 and the check value 302 each time the communication message is communicated.
  • the second ECU 12 receives a communication message
  • the second ECU 12 starts a communication message reception process.
  • the CAN controller 21 analyzes the communication message, acquires the message ID from the “ID area” of the data frame, acquires the communication data from the “data area”, The MAC 311 is acquired from the “extended ID area” (step S30 in FIG. 7).
  • the second ECU 12 decodes the MAC 311 in the information processing unit 20 (step S31 in FIG. 7).
  • the reproduction value 341 is obtained by decrypting the MAC 311 with the key 301.
  • the determination unit 35 of the second ECU 12 determines whether or not the check value is correct (step S ⁇ b> 32 in FIG. 7). That is, the determination unit 35 determines that the check value is correct when the reproduction value 341 and the check value 302 stored in the storage unit 30 match, and when the reproduction value 341 and the check value 302 are different, the check value Is determined to be incorrect.
  • the second ECU 12 does not process the communication message, that is, does not use the communication data included in the communication message. Then, the communication message reception process is terminated.
  • the communication message is processed (step S33 in FIG. 7).
  • the type of communication data is specified based on the message ID, and the value of the specified type of variable is rewritten to the value obtained from the communication data. For example, when it is specified from the message ID that the type of communication data is vehicle speed, the value of the variable assigned to the vehicle speed in the second ECU 12 is rewritten based on the value stored in the communication data, Various controls on the vehicle are performed based on the rewritten speed value.
  • the second ECU 12 executes a parameter update process (step S34 in FIG. 7).
  • this parameter update process is the same as the parameter update process (step S13 in FIG. 5) of the communication message transmission process described above. That is, since it is the same as the processing of step S20 to step S25 shown in FIG. 6, its detailed description is omitted. Therefore, in the parameter update process, the parameter update process is performed based on the MAC 311 having the same value as the MAC 311 used by the first ECU 11 for the parameter update process.
  • the update of the key 301 of the first ECU 11 and the update of the key 301 of the second ECU 12 are executed in synchronization.
  • the update of the check value 302 of the first ECU 11 and the update of the check value 302 of the second ECU 12 are executed in synchronization.
  • the first ECU 11 and the second ECU 12 are initially set with the same content key 301 and the same content check value 302.
  • the updated keys become the same key, so that the identity of each key is maintained.
  • the first ECU 11 and the second ECU 12 update the check value 302 by the CV generation unit 32 having the same configuration, the updated check values become the same check value, so that the check values are identical. Is maintained.
  • the key in the ECU (first ECU 11) that transmits the communication message each time the communication message is communicated The key 301 and the check value 302 are updated in synchronization with the update of the check value.
  • the communication system according to the present embodiment has the effects listed below.
  • the check value 302 used for determining whether the communication message is correct / incorrect is updated in real time between the first and second ECUs 11 and 12 connected to the communication system in accordance with the synchronized check value update conditions.
  • the check value 302 is updated to determine whether the check value 302 is correct / incorrect in real time. Is done. That is, the reliability of communication messages communicated in the network is naturally improved.
  • the execution of the update of the check value 302 and the update condition are communicated (transmitted or transmitted). It is synchronized between the first and second ECUs 11 and 12 that are received. That is, the check values 302 of the first and second ECUs 11 and 12 are synchronized with a simple mechanism.
  • the key 301 used for conversion / reconversion (encryption / decryption) with respect to the check value 302 is real-time in accordance with the synchronized key update conditions between the first and second ECUs 11 and 12 connected to the communication system. Updated to This makes it difficult to obtain the correct check value 302 from a communication message that is illegally acquired from the network, and it is also difficult to estimate the correct key 301, so that obtaining the check value 302 from the MAC 311 is also prevented. That is, since an illegally connected ECU cannot use the correct key 301 and the correct check value 302, communication using an unauthorized communication message is prevented.
  • the MAC 311 generated from the check value 302 is also changed.
  • the check value 302 and the key 301 are updated in accordance with the change of the MAC 311, thereby preventing communication by an unauthorized communication message and further improving the reliability of the communication message.
  • the MAC 311 included in the communication message is encrypted by the key 301, the confidentiality of the MAC 311 is ensured. As a result, it becomes more difficult to reproduce the check value 302 from the MAC 311. Therefore, communication by an unauthorized communication message is prevented, and the reliability of the communication message is improved.
  • Check value update conditions are determined based on the contents of the MAC 311. That is, since the check value update condition is determined according to the MAC 311, it is difficult to guess the check value update condition, and it becomes difficult for an unauthorized communication device to assign an appropriate MAC 311 to a communication message. Thereby, the reliability of the communication message in the communication system is improved.
  • the key update condition is determined based on the contents of the MAC 311. That is, since the key update condition is determined according to the MAC 311, it is difficult to guess the key update condition, and it becomes difficult for an unauthorized communication device to assign an appropriate MAC 311 to a communication message. Thereby, the reliability of the communication message in the communication system is improved.
  • the MAC 311 Since the MAC 311 is stored in the “extended ID area” defined by the CAN protocol, there is no influence on the data area in which the communication data to be transferred is stored. Can do. In the CAN protocol, it is not assumed that data other than the extended ID is stored in the “extended ID area”. However, if the extended ID is not used for determining whether or not a communication message can be received (filtering), reception is possible. The side can take out the MAC 311 stored in the “extended ID area”.
  • the key strength is not particularly limited, and thus a key generated by an advanced encryption algorithm or a key consisting of a random numerical value is appropriate. It may be a key consisting of a value defined in As a result, the degree of freedom in designing the communication system can be improved.
  • the present invention is not limited thereto, and only one of the CV generation unit and the key generation unit may be provided in the information processing unit. This also updates the check value or key, thereby improving the MAC security and simplifying the communication system.
  • the MAC is stored in the “extended ID area” in the “extended ID area”.
  • the present invention is not limited to this, and the MAC may be stored in another area such as a “data area”.
  • the MAC may be stored in the “data area”.
  • FIG. 8 shows a case where the MAC is arranged on the ID area side (front side) of the “data area” with respect to the communication data
  • FIG. The case where it is arranged on the ID area side (front side) of the “data area” is shown. According to this, since the MAC is stored in a data area defined by the CAN protocol, it is easy to assign the MAC to the CAN protocol.
  • the MAC 311 is 18 bits.
  • the present invention is not limited to this, and the MAC may be smaller than 18 bits or larger than 18 bits. As a result, it is possible to adjust the MAC security strength and the load on the arithmetic processing.
  • the check value update condition and the key update condition are determined by the lower first bit and second bit values of the MAC.
  • the present invention is not limited to this, and if the check value update condition and the key update condition are data included in one communication message, the data other than the MAC that changes irregularly, such as the contents of communication data or the contents of CRC data, can be used. Success or failure may be determined based on the result.
  • the present invention is not limited to this, and if the required security is ensured, both the check value and the key may not be updated even if the communication message is communicated. At this time, it is preferable to use data other than the MAC as the update condition. Thereby, the improvement of the design freedom of a communication system comes to be aimed at.
  • the check value and key may be updated according to the number of communication messages. Thereby, the improvement of the design freedom of a communication system comes to be aimed at.
  • each initial value can be used if security can be ensured. May be set by communication with a card dealer or an external center. Each initial value may be set only with the initial value or may be set with reprogramming of the ECU. Thereby, the improvement of the design freedom of such a communication system comes to be aimed at.
  • the present invention is not limited to this, and the CV generation unit and the key generation unit may be combined into one generation unit by applying the same arithmetic processing to the generation of the key and the generation of the check value. Thereby, the structure of the communication system can be simplified.
  • an external device is wired to the DLC 16
  • the present invention is not limited to this, and an external device may be connected to the DLC via wireless communication.
  • a wireless communication terminal may be connected to the DLC, and another wireless communication device may be provided in the external device so that the DLC and the external device communicate wirelessly. This makes it possible to prevent unauthorized communication regardless of the connection mode of the external device to the DLC.
  • the communication system is mounted on the vehicle 10 .
  • the present invention is not limited to this, and a part or all of the communication system may be provided other than the vehicle. As a result, it is possible to determine whether the communication message is correct / incorrect even for a communication system including a CAN that is used outside the vehicle, so that the applicability of the communication system can be improved.
  • the communication system is a system based on the CAN protocol
  • the communication protocol applied to the communication system is, for example, Ethernet (registered trademark) or FlexRay (registered trademark), as long as the communication message is verified for correctness / incorrectness using a check value, a key, or the like.
  • the communication protocol may be other than the CAN protocol. Thereby, the applicability of such a communication system can be improved.
  • the communication system is mounted on the vehicle 10 .
  • the present invention is not limited to this, and the communication system may be provided in a moving body other than a vehicle, such as a ship, a railway, an industrial machine, or a robot.
  • DESCRIPTION OF SYMBOLS 10 ... Vehicle, 11 ... 1st ECU, 12 ... 2nd ECU, 13 ... 3rd ECU, 15 ... Communication bus, 16 ... Data link connector (DLC), 17 ... User tool, 20, 20A ... Information Processing unit, 21 ... CAN controller, 30 ... storage unit, 31 ... MAC generation unit, 32 ... CV generation unit, 33 ... key generation unit, 34 ... reproduction unit, 35 ... determination unit, 301 ... key, 302 ... check value, 311 ... MAC, 341 ... reproduction value.
  • DLC Data link connector

Landscapes

  • Engineering & Computer Science (AREA)
  • Small-Scale Networks (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)

Abstract

La présente invention se rapporte à un dispositif de communication adapté pour améliorer la fiabilité de messages devant être transmis. Dans le dispositif de communication selon l'invention, une pluralité de modules de commande électronique (ECU) est connectée à un bus de communication qui permet à des messages de communication d'être transmis. Dans chaque ECU, des valeurs de contrôle (302), qui sont utilisées pour authentifier des messages de communication, sont définies. Chaque ECU comprend un module de génération de valeurs de contrôle (CV) (32), qui est utilisé pour mettre à jour les valeurs de contrôle (302) sur la base de conditions de mise à jour des valeurs de contrôle. Les conditions de mise à jour des valeurs de contrôle sont synchronisées entre la pluralité d'ECU, sur la base d'un seul message de communication dont le contenu indique que les valeurs de contrôle (302) doivent être mises à jour. Un ECU qui doit transmettre un message comprend, dans le message de communication qui doit être transmis, un code d'authentification de message (MAC) (311) qui est généré à partir d'une valeur de contrôle (302) qui a été définie. Un ECU qui doit recevoir le message détermine si le message de communication reçu est authentique, ou non, en comparant une valeur régénérée (341), qui est régénérée à partir du code MAC (311) qui est contenu dans le message de communication reçu, à la valeur de contrôle (302) qui a été définie.
PCT/JP2012/063532 2012-05-25 2012-05-25 Dispositif de communication, système de communication, et procédé de communication WO2013175633A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP2012/063532 WO2013175633A1 (fr) 2012-05-25 2012-05-25 Dispositif de communication, système de communication, et procédé de communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2012/063532 WO2013175633A1 (fr) 2012-05-25 2012-05-25 Dispositif de communication, système de communication, et procédé de communication

Publications (1)

Publication Number Publication Date
WO2013175633A1 true WO2013175633A1 (fr) 2013-11-28

Family

ID=49623359

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2012/063532 WO2013175633A1 (fr) 2012-05-25 2012-05-25 Dispositif de communication, système de communication, et procédé de communication

Country Status (1)

Country Link
WO (1) WO2013175633A1 (fr)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015170452A1 (fr) * 2014-05-08 2015-11-12 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Système de réseau dans une voiture, unité de commande électronique et procédé de traitement de mise à jour
WO2016006150A1 (fr) * 2014-07-10 2016-01-14 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Système de réseau monté sur véhicule, unité de commande électronique, procédé de réception, et procédé de transmission
WO2016009812A1 (fr) * 2014-07-14 2016-01-21 国立大学法人名古屋大学 Système de communication, dispositif de commande de communication et procédé pour empêcher la transmission d'informations non valides
JP2016158028A (ja) * 2015-02-23 2016-09-01 株式会社デンソー 通信装置及びネットワークシステム
EP3096504A1 (fr) * 2015-05-19 2016-11-23 Nxp B.V. Procédé du transceiver pour le codage inline d'authentification des messages dans le champ des données des can-frames
JP2016208536A (ja) * 2016-07-26 2016-12-08 国立大学法人名古屋大学 通信システム、通信制御装置及び不正情報送信防止方法
WO2017037982A1 (fr) * 2015-08-31 2017-03-09 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Dispositif passerelle, système de réseau embarqué sur voiture, et procédé de transfert
JP2017050848A (ja) * 2015-08-31 2017-03-09 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America ゲートウェイ装置、車載ネットワークシステム及び転送方法
JP2019097218A (ja) * 2014-05-29 2019-06-20 パナソニックIpマネジメント株式会社 電子制御装置、通信方法およびプログラム
DE112017004752T5 (de) 2016-09-21 2019-06-27 Autonetworks Technologies, Ltd. Kommunikationssystem, Relaisvorrichtung, Kommunikationsvorrichtung und Kommunkationsverfahren
CN112099818A (zh) * 2020-07-31 2020-12-18 奇瑞汽车股份有限公司 一种保证汽车远程升级安全的方法
EP3834377A4 (fr) * 2018-08-07 2022-04-06 Kvaser AB Bus de réseau can adaptable et sécurisé

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008259077A (ja) * 2007-04-06 2008-10-23 N-Crypt Lab Inc 送受信システム、送信装置、受信装置、それらで実行される方法、並びにプログラム
JP2010004420A (ja) * 2008-06-23 2010-01-07 Mitsubishi Electric Corp 鍵管理サーバ、端末、通信システム、鍵配信方法、鍵配信プログラム、鍵受信方法及び鍵受信プログラム

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008259077A (ja) * 2007-04-06 2008-10-23 N-Crypt Lab Inc 送受信システム、送信装置、受信装置、それらで実行される方法、並びにプログラム
JP2010004420A (ja) * 2008-06-23 2010-01-07 Mitsubishi Electric Corp 鍵管理サーバ、端末、通信システム、鍵配信方法、鍵配信プログラム、鍵受信方法及び鍵受信プログラム

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HIROSATO TSUJI ET AL.: "Fukusu Mobile Tanmatsu- kan ni Okeru Jizen Kyoyu Kagi no Koshin Hoshiki", 2009 NEN SYMPOSIUM ON CRYPTOGRAPHY AND INFORMATION SECURITY SCIS2009 YOKOSHU, 20 January 2009 (2009-01-20), pages 1 - 4 *

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPWO2015170452A1 (ja) * 2014-05-08 2017-04-20 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America 車載ネットワークシステム、電子制御ユニット及び更新処理方法
WO2015170452A1 (fr) * 2014-05-08 2015-11-12 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Système de réseau dans une voiture, unité de commande électronique et procédé de traitement de mise à jour
JP2019097218A (ja) * 2014-05-29 2019-06-20 パナソニックIpマネジメント株式会社 電子制御装置、通信方法およびプログラム
EP3876481A1 (fr) * 2014-07-10 2021-09-08 Panasonic Intellectual Property Corporation of America Système de réseau de véhicule, unité de commande électronique, procédé de réception et procédé de transmission
JPWO2016006150A1 (ja) * 2014-07-10 2017-04-27 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America 車載ネットワークシステム、電子制御ユニット、受信方法及び送信方法
CN111464414A (zh) * 2014-07-10 2020-07-28 松下电器(美国)知识产权公司 车载网络系统、电子控制单元、接收方法以及发送方法
US11971978B2 (en) 2014-07-10 2024-04-30 Panasonic Intellectual Property Corporation Of America Vehicle network system whose security is improved using message authentication code
CN111478836B (zh) * 2014-07-10 2024-02-20 松下电器(美国)知识产权公司 车载网络系统、电子控制单元、接收方法以及发送方法
CN111478836A (zh) * 2014-07-10 2020-07-31 松下电器(美国)知识产权公司 车载网络系统、电子控制单元、接收方法以及发送方法
CN106464557B (zh) * 2014-07-10 2020-04-24 松下电器(美国)知识产权公司 车载网络系统、电子控制单元、接收方法以及发送方法
WO2016006150A1 (fr) * 2014-07-10 2016-01-14 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Système de réseau monté sur véhicule, unité de commande électronique, procédé de réception, et procédé de transmission
US11113382B2 (en) 2014-07-10 2021-09-07 Panasonic Intellectual Property Corporation Of America Vehicle network system whose security is improved using message authentication code
WO2016009812A1 (fr) * 2014-07-14 2016-01-21 国立大学法人名古屋大学 Système de communication, dispositif de commande de communication et procédé pour empêcher la transmission d'informations non valides
JP2016021623A (ja) * 2014-07-14 2016-02-04 国立大学法人名古屋大学 通信システム、通信制御装置及び不正情報送信防止方法
JP2016158028A (ja) * 2015-02-23 2016-09-01 株式会社デンソー 通信装置及びネットワークシステム
US9729329B2 (en) 2015-05-19 2017-08-08 Nxp B.V. Communications security
EP3096504A1 (fr) * 2015-05-19 2016-11-23 Nxp B.V. Procédé du transceiver pour le codage inline d'authentification des messages dans le champ des données des can-frames
US10525911B2 (en) 2015-08-31 2020-01-07 Panasonic Intellectual Property Corporation Of America Gateway device, vehicle network system, and transfer method
US10974669B2 (en) 2015-08-31 2021-04-13 Panasonic Intellectual Property Corporation Of America Gateway device, vehicle network system, and transfer method
CN113300927A (zh) * 2015-08-31 2021-08-24 松下电器(美国)知识产权公司 网关装置、车载网络系统以及转送方法
CN113300947A (zh) * 2015-08-31 2021-08-24 松下电器(美国)知识产权公司 网关装置、车载网络系统以及转送方法
JP2017050848A (ja) * 2015-08-31 2017-03-09 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America ゲートウェイ装置、車載ネットワークシステム及び転送方法
US11529914B2 (en) 2015-08-31 2022-12-20 Panasonic Intellectual Property Corporation Of America Gateway device, vehicle network system, and transfer method
WO2017037982A1 (fr) * 2015-08-31 2017-03-09 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Dispositif passerelle, système de réseau embarqué sur voiture, et procédé de transfert
CN113300927B (zh) * 2015-08-31 2024-03-22 松下电器(美国)知识产权公司 网关装置、车载网络系统以及转送方法
JP2016208536A (ja) * 2016-07-26 2016-12-08 国立大学法人名古屋大学 通信システム、通信制御装置及び不正情報送信防止方法
DE112017004752T5 (de) 2016-09-21 2019-06-27 Autonetworks Technologies, Ltd. Kommunikationssystem, Relaisvorrichtung, Kommunikationsvorrichtung und Kommunkationsverfahren
EP3834377A4 (fr) * 2018-08-07 2022-04-06 Kvaser AB Bus de réseau can adaptable et sécurisé
CN112099818A (zh) * 2020-07-31 2020-12-18 奇瑞汽车股份有限公司 一种保证汽车远程升级安全的方法

Similar Documents

Publication Publication Date Title
WO2013175633A1 (fr) Dispositif de communication, système de communication, et procédé de communication
Woo et al. A practical wireless attack on the connected car and security protocol for in-vehicle CAN
US11212087B2 (en) Management system, key generation device, in-vehicle computer, management method, and computer program
CN104412537B (zh) 用于配对的方法、配对装置以及遥控钥匙
KR101356476B1 (ko) 차량용 데이터의 인증 및 획득 방법
JP2014204444A (ja) センサへの操作及び/又はセンサのセンサデータへの操作を検出するための方法及び装置
KR20200135775A (ko) 차량 내 전자 제어 유닛들 간의 보안 통신
JP6288219B1 (ja) 通信システム
CN111629002B (zh) 车辆ecu的ota安全升级方法及其系统
CN107968781A (zh) 车辆共享业务的安全处理方法
US11245535B2 (en) Hash-chain based sender identification scheme
US20150095997A1 (en) Authentication system and authentication method
US9602487B2 (en) Method for the protected transmission of data
US11212109B2 (en) Data provision system, data security device, data provision method, and computer program
US10970398B2 (en) Data provision system, data security device, data provision method, and computer program
CN107784223A (zh) 用于将证书传输到设备中的仪器的计算机装置
KR101269086B1 (ko) 차량용 데이터의 인증 및 획득 방법 및 시스템
WO2017159671A1 (fr) Système de réseau de communication, véhicule, nœud de notification de valeurs de compteur, procédé de partage de contre-valeur, et programme d'ordinateur
CN113439425A (zh) 报文传输方法及装置
JP2018121220A (ja) 車載ネットワークシステム
JP6375962B2 (ja) 車載ゲートウェイ装置及び電子制御装置
JP6547180B2 (ja) 通信システム
CN110312232B (zh) 车辆通信系统和车辆通信方法
Mokhadder et al. Evaluation of vehicle system performance of an SAE J1939-91C network security implementation
KR102236282B1 (ko) 차량용 통신 데이터 인증 방법 및 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12877514

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12877514

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: JP