[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN113179152B - In-vehicle network data communication method based on ECU communication frequency attribute - Google Patents

In-vehicle network data communication method based on ECU communication frequency attribute Download PDF

Info

Publication number
CN113179152B
CN113179152B CN202110264454.XA CN202110264454A CN113179152B CN 113179152 B CN113179152 B CN 113179152B CN 202110264454 A CN202110264454 A CN 202110264454A CN 113179152 B CN113179152 B CN 113179152B
Authority
CN
China
Prior art keywords
ecu
data
vehicle
communication
frequency attribute
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110264454.XA
Other languages
Chinese (zh)
Other versions
CN113179152A (en
Inventor
韩牟
朱梦丽
马世典
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu University
Original Assignee
Jiangsu University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu University filed Critical Jiangsu University
Priority to CN202110264454.XA priority Critical patent/CN113179152B/en
Publication of CN113179152A publication Critical patent/CN113179152A/en
Application granted granted Critical
Publication of CN113179152B publication Critical patent/CN113179152B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention provides an in-vehicle network data communication method based on an ECU communication frequency attribute, which comprises the following steps: 1) Collecting and preprocessing communication data in the vehicle; 2) Carrying out maximum frequent item set mining on the ECU; 3) Classifying the ECUs according to the maximum frequent item set; 4) Matching corresponding frequency attributes for the ECU according to the classification result; 5) And building a communication architecture based on the frequency attribute in the vehicle. The invention provides an in-vehicle network data communication method based on the ECU communication frequency attribute by combining the communication frequency attribute of the in-vehicle ECU and the attribute-based encryption algorithm from the actual communication condition of the in-vehicle ECU, and achieves the effect of protecting in-vehicle data under the condition of not influencing the original communication requirement in the vehicle.

Description

In-vehicle network data communication method based on ECU communication frequency attribute
Technical Field
The invention relates to the field of intelligent networked automobiles, in-vehicle communication technology, cryptography and data mining, in particular to the field of in-vehicle communication technology.
Background
With the integration of modern communication and network technology with the automobile industry, automobiles are continuously developing towards networking and intellectualization, effectively improving traffic conditions and improving the comfort and safety of vehicle driving. It is clearly shown in "china make 2025" that the intelligent internet connected automobile is a key field for the development of national intelligent manufacture in the next 10 years. The conventional vehicle and domestic and foreign science and technology such as Jutou BAT, google and Amazon make the system strategy of ICV development. All-around layout and high attention to the intelligent networking automobile industry of each industry.
The intelligent networked automobile also faces a severe information security challenge while being continuously developed, and in 2017, tencent Coen laboratory publishes that a Tesla Model X in-vehicle network is invaded through WIFI, and malicious data frames are injected into the network to achieve the purpose of controlling the automobile to carry out remote control. In 2018, according to a certain media report in the uk, theft of local keyless vehicles frequently occurs due to a loophole of a keyless system. According to the 2019 intelligent networking automobile information safety annual report issued by 360, 22 attack events which are reported in the open mode of the intelligent networking automobile in 2016 are shown, 155 attack events are increased in 2019, and the attack events are increased by six times in three years. The data show that the problem of solving the information safety of the intelligent networked automobile is very slow.
The main reason that the attack events of the intelligent networked automobile frequently occur is that the network in the automobile is originally closed, but with the development of networking and intellectualization of the automobile, the automobile opens a plurality of interfaces through which external equipment can invade the vehicle-mounted network. And because the data interaction is carried out in a mode of broadcasting plaintext, an attacker can easily monitor the communication data in the vehicle after invading the vehicle-mounted network, and then share the data in the vehicle through means such as reverse engineering and the like, so as to release false information in the vehicle and finally achieve the purpose of controlling the vehicle.
Disclosure of Invention
The invention aims to provide an in-vehicle communication method based on ECU communication frequency attributes, which can simplify key management, isolate unauthorized ECUs and reduce bus load while protecting the safety, confidentiality and privacy of in-vehicle data.
In order to achieve the purpose, the invention provides the following technical scheme:
an in-vehicle communication method based on ECU communication frequency attributes comprises the following steps: (1) And preprocessing the data according to the acquired in-vehicle communication data and the ECU communication list. (2) And performing maximum frequent item set mining on the processed data, and matching corresponding frequency attributes for the ECU according to the data mining result. (3) The GECU initializes before the vehicle starts, generates the required public parameters and master keys, and broadcasts the public parameters in the vehicle. (4) And the ECU sends a registration application to the GECU, and the GECU verifies the identity of the ECU and sends a master key for the ECU with the legal identity. (5) And carrying out frequency attribute encryption communication in the vehicle, encrypting and transmitting data by the ECU according to the frequency attribute set of the ECU when sending the message, and decrypting the data only by a private key generated by the ECU with the same frequency attribute.
Further, the step (1) is to preprocess the data according to the collected in-vehicle communication data and the ECU communication list; the method comprises the following steps:
step 1.1: automobile CAN bus data are exported from the automobile through the USBCAN analyzer and then stored, and the data in the automobile are collected, so that the occurrence frequency of each data frame is obtained.
Step 1.2: information interaction conditions among the ECUs can be obtained through the ECU communication list, and data processing is carried out according to the occurrence frequency of the acquired data frames, so that a data set which can be used for the most frequent item set is obtained.
Further, the step (2) carries out maximum frequent item set mining on the processed data, and matches corresponding frequency attributes for the ECU according to the data mining result; the method comprises the following steps:
step 2.1: and sequencing the ECU according to the frequency of the ECU according to the processed data set, and constructing an enumeration tree according to the following steps: each node of the tree consists of 2 item sets, the 1 st item set is called head (head) and is marked as h (node), and the 1 st item set consists of an enumeration item set of the current node in the enumeration tree; the 2 nd item set is called tail (tail), denoted t (node), and is formed by sorting the items contained in all the items of the child nodes of the current node except the current node.
Step 2.2: continuously pruning the formed enumeration tree according to the following two principles: 1. any item set that contains infrequent sub-item sets is infrequent; 2. because the most frequent item set is mined, if a superset of a certain item set is a frequent item set, the item set is not necessarily the most frequent item set.
Further, the frequency attribute encryption communication is carried out in the vehicle in the step (5), when the message is sent, the ECU encrypts and transmits the data according to the frequency attribute set of the ECU, and only the private key generated by the ECU with the same frequency attribute can decrypt the data; the method comprises the following steps:
step 5.1: when the ECU transmits data, the plaintext is encrypted according to the frequency attribute set of the ECU, and the ciphertext is transmitted in the vehicle.
And step 5.2: when the ECU receives the ciphertext, the frequency attribute set of the ECU and the frequency attribute set in the ciphertext are used for threshold judgment, and if the threshold is more than or equal to 1, the ECU at the receiving side and the ECU at the sending side have the same frequency attribute.
Step 5.3: the receiving party ECU generates a decryption private key according to the own frequency attribute and the master key, and decrypts the ciphertext by using the private key, if the receiving party ECU and the sending party have the same frequency attribute, the private key generated by the receiving party can successfully decrypt the ciphertext to obtain the plaintext. Otherwise, decryption fails.
The in-vehicle communication method based on the ECU communication frequency attribute has the following beneficial effects:
1) According to the real communication flow and the communication list in the vehicle, the classification data set is used, and interference on normal communication needs in the vehicle can be avoided after isolated communication.
2) And (3) carrying out access strategy design on the ECU according to the frequency attribute set of the ECU, so that data interaction can be carried out only if the frequency attribute set has the same frequency attribute, and the aim of preventing unauthorized ECU from accessing data is fulfilled.
3) The data in the vehicle is encrypted and communicated, only the frequency attribute set of the data in the vehicle needs to be stored, and excessive keys do not need to be stored, so that the key management is simplified.
4) The requirement of the in-vehicle data on a one-to-many communication mode is met, and the huge expenditure brought to each ECU data encryption is reduced.
Drawings
FIG. 1 is a system model of the present invention;
FIG. 2 is a flow chart of the most frequent itemset of the present invention;
FIG. 3 is a diagram of the ECU grouping results of the present invention;
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention.
The invention provides an in-vehicle communication method based on ECU communication frequency attributes.
For ease of understanding, the system model of the present invention will be described. As shown in FIG. 1, the system model mainly comprises two parts, namely a GECU and an ECU. The GECU initializes the vehicle at startup to generate the public parameter PK and the master key MK. The ECU initiates a registration application to the GECU, and if the GECU authenticates the legal identity of the ECU, the PK and the MK are sent to the ECU. Encrypted communication is possible after the ECU is successfully registered. When the ECU1 needs to send a message, the data is encrypted according to the self-matched frequency attribute, and then a ciphertext is transmitted in the in-vehicle network. And the other ECUs receive the ciphertext, carry out threshold value judgment by using the frequency attribute of the ECUs and the frequency attribute of the ECU of the sender, if the threshold value is more than or equal to 1, the ECUs of the receiver and the ECU of the sender have the same frequency attribute, and the generated private key can successfully decrypt the ciphertext and obtain the plaintext. If the ECU2 has the same frequency attribute GL1 as the ECU1, the ECU2 can successfully decrypt and obtain plaintext, and if the ECU3 does not have the same frequency attribute as the ECU1, the decryption fails.
1. And preprocessing the data according to the acquired in-vehicle communication data and the ECU communication list.
The first step is as follows: automobile CAN bus data are exported from the automobile through the USBCAN analyzer and then stored, and the data in the automobile are collected, so that the occurrence frequency of each data frame is obtained. In order to establish a reasonable communication architecture, the in-vehicle communication flow and the communication list of the ECU are analyzed. Table 1 is partial data of the ECU communication list. It can be analyzed that although the in-vehicle network uses a broadcasting mechanism, the ECU receives all data on the in-vehicle network, but not all data are used. It was decided to establish a method that can isolate ECUs that do not need to communicate.
TABLE 1
Figure GDA0003772432910000041
The second step is that: information interaction conditions among the ECUs can be obtained through the ECU communication list, and data processing is carried out according to the occurrence frequency of the acquired data frames, so that a data set which can be used for the most frequent item set is obtained. The automobile CAN bus data are exported from the automobile through the USBCAN analyzer to obtain the real in-automobile data flow shown in the table 2, the occurrence frequency of each data frame is obtained, and then the communication frequency transaction set between the ECUs for data mining CAN be obtained by combining the communication list to carry out data preprocessing.
TABLE 2
Time stamp ID DIC 1byte 2byte 3byte 4byte ……
186.17 $FB 8 0C B0 7F 14 ……
186.18 $278 8 0C B0 7F 14 ……
186.19 $101 5 FF 7F 0 5 ……
186.20 $278 8 0C B0 7F 14 ……
186.21 $278 8 0C B0 7F 14 ……
2. And performing maximum frequent item set mining on the processed data, and matching corresponding frequency attributes for the ECU according to the data mining result.
The first step is as follows: and sequencing the ECU according to the frequency of the ECU according to the processed data set, and constructing an enumeration tree according to the following steps: each node of the tree consists of 2 item sets, the 1 st item set is called head (head) and is marked as h (node), and the 1 st item set consists of an enumeration item set of the current node in the enumeration tree; the 2 nd item set is called tail (tail), is denoted as t (node), and is formed by sorting the items contained in all the items of the child nodes of the current node except the current node.
The second step: continuously pruning the formed enumeration tree according to the following two principles: 1. any item set that contains infrequent sub-item sets is infrequent; 2. because the most frequent item set is mined, if a superset of a certain item set is a frequent item set, the item set is not necessarily the most frequent item set.
According to the invention, ECU groups with relatively close connection can be obtained after the transaction set is subjected to the most frequent item set mining. The algorithm flow chart is shown in fig. 2.
Through continuous parameter adjustment, the grouping effect is best when the support degree (the support degree is the ratio of the number of the item set to the number of the whole transaction set) is 0.15, the grouping result is shown in fig. 3, total 76 ECUs are divided into six sets, and the ECUs in the same set are regarded as having the same frequency attribute, namely, having communication requirements. And matching the corresponding frequency attribute for the ECU according to the grouping result. According to the in-vehicle communication method, the access strategy is designed based on the frequency attributes of the ECUs, data mining is carried out on in-vehicle data, the ECUs with communication requirements are divided into a group and are regarded as having the same frequency attributes, data communication can be carried out, and the ECUs without communication requirements, namely the ECUs without the same frequency attributes, are isolated. Therefore, the aims of protecting data and isolating the ECU which does not need normal communication are fulfilled. Because the invention is based on the data mining carried out by the normal communication data in the vehicle, the communication method of the invention can not generate interference to the normal running of the vehicle.
And constructing a domain isolation communication framework based on the grouping result and in combination with the principle of an attribute-based encryption algorithm.
Table 3 primary symbol definitions.
TABLE 3
(symbol) Description of the preferred embodiment
ECU Electronic control unit
GECU Gateway electronic control unit
PK Common parameter
MK Master key
q Order of group
g Generating element of group
S Set of frequency attributes
M Plaintext
CT Cipher text
C Ciphertext component
C i Ciphertext component
D i Private key composition
gl 1 ,gl 2 ,gl 3 ,gl 4 ,gl 5 ,gl 6 Random integer
y、t Random integer
And 3, initializing the GECU before starting the vehicle, generating the required public parameters and the master key, and broadcasting the public parameters in the vehicle.
Execution of an initialization algorithm to select gl for six frequency attributes prior to vehicle start 1 ,gl 2 ,gl 3 ,gl 4 ,gl 5 ,gl 6 ∈Z q And y ∈ Z q Generating common parameters
Figure GDA0003772432910000061
Figure GDA0003772432910000062
And the master key MK (y, gl) 1 ,gl 2 ,gl 3 ,gl 4 ,gl 5 ,gl 6 )。
And 4, the ECU sends a registration application to the GECU, and the GECU verifies the identity of the ECU and sends a master key for the ECU with the legal identity.
The ECU generates registration request information, signs the information, and transmits the request information, the signature and the certificate to the GECU.
The GECU verifies the validity of the ECU identity and sends the master key MK for key generation to the ECU if the identity is valid.
5. And carrying out frequency attribute encryption communication in the vehicle, encrypting and transmitting data by the ECU according to the frequency attribute set of the ECU when sending the message, and decrypting the data only by a private key generated by the ECU with the same frequency attribute.
After the ECU verifies the validity of the identity and MK is obtained, isolated communication is carried out in the vehicle. The method comprises the following specific steps:
the first step is as follows: when the ECU transmits data, the plaintext is encrypted according to the frequency attribute set of the ECU, and the ciphertext is transmitted in the vehicle. When the ECU1 needs to send data M, the data M is encrypted according to the frequency attribute set S and the public parameter PK of the data M, and the ciphertext is encrypted
Figure GDA0003772432910000071
The ECU1 broadcasts the ciphertext in the vehicle, and the other ECUs receive the ciphertext.
The second step is that: ECU receivesWhen the ciphertext is obtained, the frequency attribute set of the user and the frequency attribute set in the ciphertext are used for threshold judgment, and if the threshold is more than or equal to 1, the receiving side ECU and the sending side ECU have the same frequency attribute. After receiving the ciphertext, the ECU judges the threshold value of the frequency attribute set S' and the frequency attribute set S of the ECU1, and if the number of the frequency attributes with the same number is more than or equal to 1, the private key SK is generated according to the following formula.
Figure GDA0003772432910000072
The third step: if the receiving party ECU and the sending party have the same frequency attribute, the private key generated by the receiving party can successfully decrypt the ciphertext to obtain a plaintext. Otherwise, decryption fails. The ECU selects a frequency attribute i that is the same as the sender ECU1 and decrypts it according to the following formula:
Figure GDA0003772432910000073
if the frequency attributes are not the same, decryption cannot be carried out to obtain a ciphertext, so that the ECU without the communication requirement is prevented from obtaining the plaintext.
In summary, the method of the present invention comprises the following steps: (1) And preprocessing the data according to the acquired in-vehicle communication data and the ECU communication list. (2) And performing maximum frequent item set mining on the processed data, and matching corresponding frequency attributes for the ECU according to the data mining result. (3) The GECU initializes before the vehicle starts, generates the required public parameters and master keys, and broadcasts the public parameters in the vehicle. (4) And the ECU sends a registration application to the GECU, and the GECU verifies the identity of the ECU and sends a master key for the ECU with the legal identity. (5) And carrying out frequency attribute encryption communication in the vehicle, encrypting and transmitting data by the ECU according to the frequency attribute set of the ECU when sending the message, and decrypting the data only by a private key generated by the ECU with the same frequency attribute. The invention provides an in-vehicle communication method based on ECU communication frequency attributes, which is a communication method designed without influencing normal running in a vehicle by carrying out data mining on a data set of real communication in the vehicle. By combining the principle of an attribute-based encryption algorithm, the effects of simplifying key management and reducing bus load are achieved while data encryption communication in the vehicle is realized, and the problem of privacy protection in network communication in the vehicle is effectively solved.

Claims (1)

1. An in-vehicle communication method based on ECU communication frequency attributes is characterized by comprising the following steps:
(1) Preprocessing the data according to the acquired in-vehicle communication data and the ECU communication list;
(2) Performing maximum frequent item set mining on the processed data, and matching corresponding frequency attributes for the ECU according to the data mining result;
(3) The GECU initializes before starting the vehicle, generates required public parameters and a master key, and broadcasts the public parameters in the vehicle;
(4) The ECU sends a registration application to the GECU, and the GECU verifies the identity of the ECU and sends a master key for the ECU with the legal identity;
(5) Carrying out frequency attribute encryption communication in the vehicle, encrypting and transmitting data by the ECU according to the frequency attribute set of the ECU when sending a message, and decrypting the data only by a private key generated by the ECU with the same frequency attribute;
the specific steps of the step (1) are as follows:
step 1.1: the CAN bus data of the automobile is exported from the automobile through a USBCAN analyzer and then stored, so that the data in the automobile is acquired, and the occurrence frequency of each data frame is obtained;
step 1.2: information interaction conditions among the ECUs can be obtained through the ECU communication list, and data processing is carried out according to the occurrence frequency of the acquired data frames to obtain a data set which can be used for the most frequent item set;
the step (2) carries out maximum frequent item set mining on the processed data, and matches corresponding frequency attributes for the ECU according to the data mining result; the method comprises the following steps:
step 2.1: and sequencing the ECU according to the frequency of the ECU according to the processed data set, and constructing an enumeration tree according to the following rules: each node of the tree consists of 2 item sets, the 1 st item set is called head, is marked as h (node), and consists of an enumeration item set of the current node in the enumeration tree; the 2 nd item set is called tail, is marked as t (node), and is formed by sequencing all items contained in the child nodes of the current node except the current node;
step 2.2: continuously pruning the formed enumeration tree according to the following two principles:
any item set that contains infrequent sub-item sets is infrequent;
because the maximum frequent item set is mined, if a superset of a certain item set is a frequent item set, the item set is not necessarily the maximum frequent item set;
carrying out frequency attribute encryption communication in the vehicle in the step (5), encrypting and transmitting data by the ECU according to the frequency attribute set of the ECU when sending the message, and decrypting the data only by a private key generated by the ECU with the same frequency attribute; the method comprises the following steps:
step 5.1: when the ECU sends data, the plaintext is encrypted according to the frequency attribute set of the ECU, and a ciphertext is sent in the vehicle;
step 5.2: when the ECU receives the ciphertext, the frequency attribute set of the ECU and the frequency attribute set in the ciphertext are used for threshold judgment, if the threshold is more than or equal to 1, the ECU at the receiving party and the ECU at the sending party have the same frequency attribute;
step 5.3: the receiving party ECU generates a decryption private key according to the own frequency attribute and the master key, and decrypts the ciphertext by using the private key, if the receiving party ECU and the sending party have the same frequency attribute, the private key generated by the receiving party can successfully decrypt the ciphertext to obtain the plaintext, otherwise, the decryption fails.
CN202110264454.XA 2021-03-11 2021-03-11 In-vehicle network data communication method based on ECU communication frequency attribute Active CN113179152B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110264454.XA CN113179152B (en) 2021-03-11 2021-03-11 In-vehicle network data communication method based on ECU communication frequency attribute

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110264454.XA CN113179152B (en) 2021-03-11 2021-03-11 In-vehicle network data communication method based on ECU communication frequency attribute

Publications (2)

Publication Number Publication Date
CN113179152A CN113179152A (en) 2021-07-27
CN113179152B true CN113179152B (en) 2022-11-18

Family

ID=76922110

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110264454.XA Active CN113179152B (en) 2021-03-11 2021-03-11 In-vehicle network data communication method based on ECU communication frequency attribute

Country Status (1)

Country Link
CN (1) CN113179152B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107104791B (en) * 2017-03-29 2019-06-28 江苏大学 A kind of in-vehicle network one-time pad communication means hidden based on ECU identity
CN108965218B (en) * 2017-05-25 2020-09-29 华为技术有限公司 Controller area network bus secure communication method, device and system
CN107426187B (en) * 2017-06-27 2020-02-21 江苏大学 Vehicle interior network fine-grained authorization access method based on ECU identity attribute
CN110377002B (en) * 2019-06-06 2021-07-30 西安电子科技大学 Self-adaptive in-vehicle CAN bus safety control method and system

Also Published As

Publication number Publication date
CN113179152A (en) 2021-07-27

Similar Documents

Publication Publication Date Title
Ali et al. An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs
CN110225016B (en) Data hidden transmission method based on block chain network
Haas et al. Design and analysis of a lightweight certificate revocation mechanism for VANET
CN110377002B (en) Self-adaptive in-vehicle CAN bus safety control method and system
Wei et al. A privacy-preserving fog computing framework for vehicular crowdsensing networks
CN107426187B (en) Vehicle interior network fine-grained authorization access method based on ECU identity attribute
DE102018216915A1 (en) System and method for secure communications between controllers in a vehicle network
Wang et al. NOTSA: Novel OBU with three-level security architecture for internet of vehicles
US20190116048A1 (en) Method and system for secure connected vehicle communication
EP3750277A1 (en) Cryptographic methods and systems using blinded activation codes for digital certificate revocation
CN107749845B (en) The attack resistance method and system of CAN bus message based on block chain technology
Zhang et al. Dynamic authenticated asymmetric group key agreement with sender non-repudiation and privacy for group-oriented applications
Yang et al. Ultra reliable and low latency authentication scheme for internet of vehicles based on blockchain
CN113179152B (en) In-vehicle network data communication method based on ECU communication frequency attribute
Wang et al. An information security protocol for automotive ethernet
CN111245613B (en) Identity-based three-level key negotiation method for in-vehicle and out-vehicle networks
Xia et al. A novel quantum blind signature protocol based on five-particle entangled state
CN114584385B (en) In-vehicle network safety communication method, computer equipment, medium and terminal
Zeng et al. Fengyi: trusted data sharing in VANETs with blockchain
Piao et al. A Security Framework for In-Vehicle FlexRay Bus Network
Ahn et al. A countermeasure against spoofing and DoS attacks based on message sequence and temporary ID in CAN
CN118473663B (en) Intra-vehicle network communication method and system based on dynamic identity
Tan An Efficient Key Management Scheme For In-Vehicle Network
Lai et al. Traffic data security sharing scheme based on blockchain and traceable ring signature for VANETs
Shen et al. A Two-Layer Dynamic ECU Group Management Scheme for In-Vehicle CAN Bus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant