[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

KR20230097374A - Method for providing security on in-vehicle network - Google Patents

Method for providing security on in-vehicle network Download PDF

Info

Publication number
KR20230097374A
KR20230097374A KR1020210186815A KR20210186815A KR20230097374A KR 20230097374 A KR20230097374 A KR 20230097374A KR 1020210186815 A KR1020210186815 A KR 1020210186815A KR 20210186815 A KR20210186815 A KR 20210186815A KR 20230097374 A KR20230097374 A KR 20230097374A
Authority
KR
South Korea
Prior art keywords
firmware
electronic control
security
electronic
control unit
Prior art date
Application number
KR1020210186815A
Other languages
Korean (ko)
Inventor
이훈
이원재
백은기
선진
Original Assignee
케이지모빌리티 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 케이지모빌리티 주식회사 filed Critical 케이지모빌리티 주식회사
Priority to KR1020210186815A priority Critical patent/KR20230097374A/en
Publication of KR20230097374A publication Critical patent/KR20230097374A/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L12/40052High-speed IEEE 1394 serial bus
    • H04L12/40104Security; Encryption; Content protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L2012/40267Bus for use in transportation systems
    • H04L2012/40273Bus for use in transportation systems the transportation system being a vehicle
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention relates to an in-vehicle communication network security method capable of improving the security of an in-vehicle communication network against cyber hacking through a mechanism in which a security key management system generates a public key and a private key in pairs, and then an electronic control unit (ECU) downloads the public key, and, when an electronic signature encrypted with the private key is inserted into firmware and transmitted to the electronic control unit, the electronic signature is verified with the public key downloaded by the electronic control unit. The method includes: a step in which a security key management system updating software (firmware) through an OBD port and wireless communication (OTA) of a vehicle generates a public key and a private key, which are encrypted, in pairs; a step in which an electronic control unit (ECU) downloads the generated public key; a step in which firmware to be updated to the electronic control unit is registered into the security key management system; and a step in which an electronic signature is generated with the encrypted private key and inserted into the firmware to be updated, and then, when the firmware with the electronic signature inserted therein is transmitted to the electronic control unit through the OBD port or wireless communication, the electronic control unit verifies the electronic signature inserted in the firmware with the downloaded public key, thereby processing the firmware based on the electronic signature verification result. Therefore, the method can secure the integrity of the firmware.

Description

차량 내 통신 네트워크 보안방법{Method for providing security on in-vehicle network}In-vehicle communication network security method {Method for providing security on in-vehicle network}

본 발명은 차량 내 통신 네트워크 보안방법에 관한 것으로, 특히 보안 키 관리 시스템에서 공개키/개인키를 쌍으로 생성한 후, 공개키는 전자제어장치(ECU)에 다운로드 하고, 업데이트할 펌웨어를 보안 키 관리시스템에 등록한 후 개인키로 암호화된 전자서명을 펌웨어에 삽입하여 전자제어장치로 전송하면 전자제어장치에서 다운로드 한 공개키로 전자서명을 검증하는 방식을 통해 사이버 해킹에 대해 차량 통신 네트워크의 보안성을 향상하도록 한 차량 내 통신 네트워크 보안방법에 관한 것이다.The present invention relates to a method for securing an in-vehicle communication network, and in particular, after generating a public key/private key pair in a security key management system, downloading the public key to an electronic control unit (ECU), and updating firmware to the security key After registering in the management system, the electronic signature encrypted with the private key is inserted into the firmware and transmitted to the electronic control unit, and the electronic signature is verified with the public key downloaded from the electronic control unit to improve the security of the vehicle communication network against cyber hacking. It relates to an in-vehicle communication network security method.

IT 기술이 지속적으로 발전하면서 가전기기는 물론 차량 역시 다양한 IT 기기들이 탑재되고 있다. 차량에 IT 기기들이 탑재되기 시작하면서 차량 내의 전자제어장치인 ECU(Electronic Control Unit)도 다양한 기능을 지원하기에 이르렀고 탑재되는 수량 또한 증가하고 있으며, 필요에 따라 차량의 적재적소에 분산 배치되어 있다.As IT technology continues to develop, home appliances as well as vehicles are equipped with various IT devices. As IT devices began to be installed in vehicles, ECUs (Electronic Control Units), which are electronic control devices in vehicles, have come to support various functions, and the number of installed devices is also increasing, and are distributed and arranged in the right places of vehicles as needed.

차량 내에 분산 배치된 ECU들은 상호 유기적으로 작용하여 동작해야 하기 때문에 이들은 기본적으로 통신을 통해 상호 상태를 인지해야 한다. 이를 위해서 차량 내 수십 개의 ECU들은 차량용 네트워크로 연결되어 있다. 주지한 바와 같이 차량용 네트워크는 CAN(Controller Area Network)이 사실상 표준 역할을 하면서 다양한 통신방식(LIN, MOST, Flexray, CAN-FD, Ethernet, bluetooth 등)으로 확대되고 있다.Since ECUs distributed in a vehicle must interact and operate with each other, they must basically recognize each other's status through communication. To this end, dozens of ECUs in a vehicle are connected through an in-vehicle network. As is well known, vehicle networks are expanding into various communication methods (LIN, MOST, Flexray, CAN-FD, Ethernet, bluetooth, etc.) with CAN (Controller Area Network) serving as a de facto standard.

차량에 탑재되는 통신 노드들의 수가 증대되고 있다는 점, 자율주행 적용으로 기존에 비해 상대적으로 더 많은 통신 부하를 처리해야 한다는 점, 유무선 외부 네트워크와의 연결됨에 따라 차량의 내부 네트워크의 보안 위험이 증가하고 있으며, 사이버 해킹에 대한 차량 보호의 중요성이 대두하고 있다.The number of communication nodes installed in vehicles is increasing, the application of autonomous driving requires relatively more communication load than before, and the connection with wired and wireless external networks increases the security risk of the vehicle's internal network. In addition, the importance of vehicle protection against cyber hacking is emerging.

따라서 이러한 보안 위험 및 차량 보안성의 중요성에 대응할 수 있는 차량 내 통신 네트워크의 보안성을 향상할 수 있는 기술이 필요하다.Therefore, a technology capable of improving the security of an in-vehicle communication network capable of coping with such security risks and the importance of vehicle security is required.

대한민국 등록특허 10-2234210(2021.03.25. 등록)(이더넷 기반의 네트워크를 위한 보안 방법)Republic of Korea Registered Patent No. 10-2234210 (registered on March 25, 2021) (Security method for Ethernet-based networks) 대한민국 등록특허 10-1967144(2019.04.03. 등록)(차량의 통신 보안 장치)Korean Registered Patent No. 10-1967144 (registered on April 3, 2019) (vehicle communication security device) 대한민국 등록특허 10-2075514(2020.02.04. 등록)(차량용 네트워크 보안장치)Korean Registered Patent No. 10-2075514 (2020.02.04. Registration) (Vehicle Network Security Device) 대한민국 등록특허 10-2241775(2021.04.13. 등록)(차량용 이중 보안 제어방법 및 이를 이용하는 장치 및 시스템)Korean Registered Patent No. 10-2241775 (registered on April 13, 2021) (double security control method for vehicle and device and system using the same) 대한민국 등록특허 10-2202902(2021.01.08. 등록)(차량용 통신 제어장치의 보안 방법 및 그 장치)Republic of Korea Registered Patent No. 10-2202902 (2021.01.08. Registration) (Security method and device for vehicle communication control device)

따라서 본 발명은 상기와 같은 일반적인 차량의 내부 통신 네트워크의 보안 문제를 해결하기 위해서 제안된 것으로서, 보안 키 관리 시스템에서 공개키/개인키를 쌍으로 생성한 후, 공개키는 전자제어장치(ECU)에 다운로드 하고, 업데이트할 펌웨어를 보안 키 관리시스템에 등록한 후 개인키로 암호화된 전자서명을 펌웨어 삽입하여 전자제어장치로 전송하면 전자제어장치에서 다운로드 한 공개키로 전자서명을 검증하는 방식을 통해 사이버 해킹에 대해 차량 통신 네트워크의 보안성을 향상하도록 한 차량 내 통신 네트워크 보안방법을 제공하는 데 그 목적이 있다.Therefore, the present invention is proposed to solve the security problem of the internal communication network of a general vehicle as described above, and after generating a public key / private key pair in a security key management system, the public key is an electronic control unit (ECU) After downloading, registering the firmware to be updated in the security key management system, inserting the electronic signature encrypted with the private key into the firmware and sending it to the electronic control device, it verifies the electronic signature with the public key downloaded from the electronic control device, preventing cyber hacking. Its purpose is to provide an in-vehicle communication network security method to improve the security of the vehicle communication network.

상기한 바와 같은 목적을 달성하기 위하여, 본 발명에 따른 "차량 내 통신 네트워크 보안방법"은,In order to achieve the above object, the "in-vehicle communication network security method" according to the present invention,

(a) 차량의 OBD 포트 및 무선 통신(OTA)을 통해 소프트웨어(펌웨어)를 업데이트하는 보안 키 관리시스템에서 암호화된 공개키/개인키를 쌍으로 생성하는 단계;(a) generating an encrypted public/private key pair in a security key management system that updates software (firmware) through an OBD port of a vehicle and wireless communication (OTA);

(b) 상기 생성한 공개키를 전자제어장치(ECU)에 다운로드하는 단계;(b) downloading the generated public key to an electronic control unit (ECU);

(c) 상기 전자제어장치에 업데이트할 펌웨어를 상기 보안 키 관리시스템에 등록하는 단계;(c) registering firmware to be updated in the electronic control device with the security key management system;

(d) 상기 암호화된 개인키로 전자서명을 생성하여 상기 업데이트할 펌웨어에 삽입하는 단계;(d) generating a digital signature with the encrypted private key and inserting it into the firmware to be updated;

(e) 상기 전자서명이 삽입된 펌웨어를 OBD 포트 또는 무선 통신으로 상기 전자제어장치에 전송하는 단계;(e) transmitting the firmware into which the electronic signature is inserted to the electronic control device through an OBD port or wireless communication;

(f) 상기 전자제어장치에서 다운로드 한 공개키로 상기 펌웨어에 삽입된 전자서명을 검증하는 단계; 및(f) verifying the electronic signature inserted into the firmware with the public key downloaded from the electronic control device; and

(g) 상기 (f)단계의 전자서명 검증 결과를 기반으로 펌웨어를 처리하여 펌웨어의 무결성을 확보하는 단계를 포함하는 것을 특징으로 한다.(g) processing the firmware based on the digital signature verification result of step (f) to secure integrity of the firmware.

상기에서 (a)단계는,In the above step (a),

신규 소프트웨어 패키지별 또는 전자제어장치별로 암호화된 공개키/개인키를 쌍으로 생성하는 것을 특징으로 한다.It is characterized by generating an encrypted public/private key pair for each new software package or each electronic control device.

상기에서 (d)단계의 전자서명은,The electronic signature in step (d) above,

전자서명 식별자(전자서명 태그), 전자서명 길이, 전자서명 값을 포함하는 것을 특징으로 한다.It is characterized in that it includes a digital signature identifier (electronic signature tag), a digital signature length, and a digital signature value.

상기에서 (g)단계는,In the above step (g),

전자서명 검증 결과 적합하면 펌웨어를 업데이트하고, 부적합하면 다운로드 한 펌웨어를 삭제하는 것을 특징으로 한다.If the electronic signature verification result is suitable, the firmware is updated, and if it is not suitable, the downloaded firmware is deleted.

본 발명에 따르면 보안 키 관리 시스템에서 암호화된 공개키/개인키를 쌍으로 생성하고, 개인키로 암호화된 전자서명을 생성하여 펌웨어에 삽입하여 전자제어장치로 전송하면 전자제어장치에서 다운로드 한 공개키로 전자서명을 검증하는 방식을 통해 펌웨어의 무결성을 확보하여, 사이버 해킹에 대해 차량 통신 네트워크의 보안성을 향상할 수 있는 효과가 있다.According to the present invention, when an encrypted public/private key pair is generated in a security key management system, an electronic signature encrypted with the private key is generated, inserted into firmware, and transmitted to an electronic control device, the public key downloaded from the electronic control device is converted into an electronic signature. There is an effect of improving the security of the vehicle communication network against cyber hacking by securing the integrity of the firmware through the method of verifying the signature.

도 1은 본 발명에 따른 차량 내 통신 네트워크 보안방법이 적용된 차량 내 통신 네트워크장치의 개략 구성도,
도 2는 본 발명에 따른 차량 내 통신 네트워크 보안방법을 보인 흐름도,
도 3은 본 발명에 적용된 암호화된 전자서명의 예시도이다.
1 is a schematic configuration diagram of an in-vehicle communication network device to which an in-vehicle communication network security method according to the present invention is applied;
2 is a flowchart showing a method for securing an in-vehicle communication network according to the present invention;
3 is an exemplary diagram of an encrypted electronic signature applied to the present invention.

이하 본 발명의 바람직한 실시 예에 따른 차량 내 통신 네트워크 보안방법을 첨부된 도면을 참조하여 상세하게 설명한다.Hereinafter, a method for securing an in-vehicle communication network according to a preferred embodiment of the present invention will be described in detail with reference to the accompanying drawings.

이하에서 설명되는 본 발명에 사용된 용어나 단어는 통상적이거나 사전적인 의미로 한정해서 해석되어서는 안 되며, 발명자는 그 자신의 발명을 가장 최선의 방법으로 설명하기 위해 용어의 개념으로 적절하게 정의할 수 있다는 원칙에 입각하여 본 발명의 기술적 사상에 부합하는 의미와 개념으로 해석되어야만 한다.The terms or words used in the present invention described below should not be construed as being limited to a conventional or dictionary meaning, and the inventor may appropriately define the concept of the term in order to explain his/her invention in the best way. It should be interpreted as a meaning and concept consistent with the technical spirit of the present invention based on the principle that it can be.

따라서 본 명세서에 기재된 실시 예와 도면에 도시된 구성은 본 발명의 바람직한 실시 예에 불과할 뿐이고, 본 발명의 기술적 사상을 모두 대변하는 것은 아니므로, 본 출원 시점에서 이들을 대체할 수 있는 다양한 균등물과 변형 예들이 있을 수 있음을 이해하여야 한다.Therefore, the embodiments described in this specification and the configurations shown in the drawings are only preferred embodiments of the present invention, and do not represent all of the technical spirit of the present invention, so various equivalents and equivalents that can replace them at the time of the present application It should be understood that variations may exist.

도 1은 본 발명의 바람직한 실시 예에 따른 차량 내 통신 네트워크 보안방법이 적용된 차량 내 통신 네트워크의 개략 구성도이다.1 is a schematic configuration diagram of an in-vehicle communication network to which an in-vehicle communication network security method according to a preferred embodiment of the present invention is applied.

암호화된 보안 키(공개키/개인키) 관리를 통해 차량 내 통신 네트워크의 보안성을 향상시키는 보안키 관리 시스템(10), 리프로그램 대상인 전자제어장치(ECU; Electronic Control Unit)(60), 게이트웨이(50), OBD포트(40), 진단장비(30)로 구성된다.A security key management system (10) that improves the security of an in-vehicle communication network through encrypted security key (public key/private key) management, an electronic control unit (ECU) 60 subject to reprogramming, and a gateway (50), OBD port (40), and diagnostic equipment (30).

도 1은 유선을 이용한 펌웨어 다운로드에 대하여 도시한 것이나, 본 발명은 이것에 한정되는 것은 아니며, OBD 포트(40) 대신에 무선 통신(OTA)을 이용하여 차량 내 통신 네트워크의 보안성을 향상시킬 수 있음을 당해 분야의 통상의 지식을 가진 사람이라면 자명하다 할 것이다.1 is a diagram showing firmware download using a wire, but the present invention is not limited thereto, and the security of the in-vehicle communication network can be improved by using wireless communication (OTA) instead of the OBD port 40. It will be obvious to those of ordinary skill in the art that there is.

도 2는 본 발명에 따른 "차량 내 통신 네트워크 보안방법"을 보인 흐름도로서, (a) 차량의 OBD 포트 및 무선 통신(OTA)을 통해 소프트웨어(펌웨어)를 업데이트하는 보안 키 관리시스템(10)에서 암호화된 공개키/개인키를 쌍으로 생성하는 단계(S11), (b) 상기 생성한 공개키를 전자제어장치(ECU)(60)에 다운로드하는 단계(S12), (c) 상기 전자제어장치(60)에 업데이트할 펌웨어를 상기 보안 키 관리시스템(10)에 등록하는 단계(S13), (d) 상기 암호화된 개인키로 전자서명을 생성하여 상기 업데이트할 펌웨어에 삽입하는 단계(S14), (e) 상기 전자서명이 삽입된 펌웨어를 OBD 포트 또는 무선 통신으로 상기 전자제어장치(60)에 전송하는 단계(S15), (f) 상기 전자제어장치(60)에서 다운로드 한 공개키로 상기 펌웨어에 삽입된 전자서명을 검증하는 단계(S16), 및 (g) 상기 (f)단계의 전자서명 검증 결과를 기반으로 펌웨어를 처리하여 펌웨어의 무결성을 확보하는 단계(S17 - S19)를 포함한다.Figure 2 is a flow chart showing the "in-vehicle communication network security method" according to the present invention, (a) in the security key management system 10 for updating software (firmware) through the OBD port of the vehicle and wireless communication (OTA) Generating an encrypted public/private key pair (S11), (b) downloading the generated public key to the electronic control unit (ECU) 60 (S12), (c) the electronic control unit Registering the firmware to be updated in the security key management system 10 (60) (S13), (d) generating a digital signature with the encrypted private key and inserting it into the firmware to be updated (S14), ( e) transmitting the firmware into which the electronic signature is inserted to the electronic control device 60 through an OBD port or wireless communication (S15), (f) inserting the public key downloaded from the electronic control device 60 into the firmware and verifying the digital signature (S16), and (g) processing the firmware based on the digital signature verification result of the step (f) to ensure integrity of the firmware (S17 to S19).

이와 같이 구성된 본 발명에 따른 "차량 내 통신 네트워크 보안방법"을 구체적으로 설명하면 다음과 같다.The detailed description of the "in-vehicle communication network security method" according to the present invention configured as described above is as follows.

먼저, 차량의 OBD 포트 및 무선 통신(OTA)을 통해 소프트웨어(펌웨어)를 업데이트하는 보안 키 관리시스템(10)에서 암호화된 보안 키(공개키/개인키)를 쌍으로 생성한다(S11). 여기서 보안 키인 공개키/개인키는 신규 소프트웨어 패키지별로 생성하거나 또는 전자제어장치별로 암호화된 공개키/개인키를 쌍으로 생성할 수 있다.First, an encrypted security key (public key/private key) is generated in pairs in the security key management system 10 that updates software (firmware) through the vehicle's OBD port and wireless communication (OTA) (S11). Here, the security key public key/private key may be generated for each new software package or an encrypted public/private key pair for each electronic control device.

다음으로, 보안 키 관리시스템(10)에서 상기 생성한 공개키를 전자제어장치(ECU)(60)에 다운로드 한다(S12). 이렇게 다운로드 한 공개키는 추후 펌웨어 업데이트시 전자서명을 검증하는 용도로 활용된다.Next, the public key generated in the security key management system 10 is downloaded to the electronic control unit (ECU) 60 (S12). The downloaded public key is used to verify the digital signature when updating the firmware in the future.

이어, 상기 전자제어장치(60)에 업데이트할 펌웨어를 상기 보안 키 관리시스템(10)에 등록한다(S13).Subsequently, the firmware to be updated in the electronic control device 60 is registered in the security key management system 10 (S13).

전자제어장치(60)에 업데이트할 펌웨어가 등록되면, 상기 보안 키 관리시스템(10)은 상기 암호화된 개인 키로 전자서명을 생성하여 상기 업데이트할 펌웨어에 삽입한다(S14). 도 3은 상기 생성되는 전자서명의 예시도로서, 전자서명 식별자(전자서명 태그), 전자서명 길이, 전자서명 값을 포함할 수 있다.When the firmware to be updated is registered in the electronic control device 60, the security key management system 10 generates an electronic signature with the encrypted private key and inserts it into the firmware to be updated (S14). 3 is an example diagram of the generated electronic signature, which may include an electronic signature identifier (electronic signature tag), a digital signature length, and a digital signature value.

다음으로, 보안 키 관리시스템(10)은 상기 전자서명이 삽입된 펌웨어를 OBD 포트(40) 또는 무선 통신(OTA)으로 상기 전자제어장치(60)에 전송한다(S15).Next, the security key management system 10 transmits the firmware into which the electronic signature is inserted to the electronic control device 60 through the OBD port 40 or wireless communication (OTA) (S15).

상기 전자서명이 삽입된 펌웨어를 다운로드 한 전자제어장치(60)는 이전에 다운로드 한 공개키로 상기 펌웨어에 삽입된 전자서명을 검증한다(S16).The electronic control device 60 that downloads the firmware with the electronic signature inserted therein verifies the electronic signature inserted in the firmware with the previously downloaded public key (S16).

이어, 상기 전자서명 검증 결과를 기반으로 펌웨어를 처리하여 펌웨어의 무결성을 확보한다(S17 - S19).Subsequently, the integrity of the firmware is secured by processing the firmware based on the digital signature verification result (S17 to S19).

즉, 전자서명 검증 결과 적합하면 펌웨어를 업데이트하고(S18), 부적합하면 다운로드 한 펌웨어를 삭제한다(S19).That is, if the digital signature verification result is suitable, the firmware is updated (S18), and if it is not suitable, the downloaded firmware is deleted (S19).

이러한 과정을 통해 차량 내 통신 네트워크의 보안성을 향상할 수 있으며, 이를 통해 사이버 해킹에 대한 차량 보호도 가능해지는 것이다.Through this process, the security of the in-vehicle communication network can be improved, and through this, the vehicle can be protected against cyber hacking.

이상 본 발명자에 의해서 이루어진 발명을 상기 실시 예에 따라 구체적으로 설명하였지만, 본 발명은 상기 실시 예에 한정되는 것은 아니고 그 요지를 이탈하지 않는 범위에서 여러 가지로 변경 가능한 것은 이 기술분야에서 통상의 지식을 가진 자에게 자명하다.Although the invention made by the present inventors has been specifically described according to the above embodiments, the present invention is not limited to the above embodiments, and it is common knowledge in the art that various changes can be made without departing from the gist of the present invention. It is self-evident to those who have

10: 보안 키 관리시스템 20: 신규 소프트웨어(SW) 패키지
30: 진단장비 40: OBD 포트
50: 게이트웨이(GW) 60: 전자제어장치(ECU)
10: Security key management system 20: New software (SW) package
30: diagnostic equipment 40: OBD port
50: gateway (GW) 60: electronic control unit (ECU)

Claims (4)

(a) 차량의 OBD 포트 및 무선 통신(OTA)을 통해 소프트웨어(펌웨어)를 업데이트하는 보안 키 관리시스템에서 암호화된 공개키/개인키를 쌍으로 생성하는 단계;
(b) 상기 생성한 공개키를 전자제어장치(ECU)에 다운로드하는 단계;
(c) 상기 전자제어장치에 업데이트할 펌웨어를 상기 보안 키 관리시스템에 등록하는 단계;
(d) 상기 암호화된 개인키로 전자서명을 생성하여 상기 업데이트할 펌웨어에 삽입하는 단계;
(e) 상기 전자서명이 삽입된 펌웨어를 OBD 포트 또는 무선 통신으로 상기 전자제어장치에 전송하는 단계;
(f) 상기 전자제어장치에서 다운로드 한 공개키로 상기 펌웨어에 삽입된 전자서명을 검증하는 단계; 및
(g) 상기 (f)단계의 전자서명 검증 결과를 기반으로 펌웨어를 처리하여 펌웨어의 무결성을 확보하는 단계를 포함하는 것을 특징으로 하는 차량 내 통신 네트워크 보안방법.
(a) generating an encrypted public/private key pair in a security key management system that updates software (firmware) through an OBD port of a vehicle and wireless communication (OTA);
(b) downloading the generated public key to an electronic control unit (ECU);
(c) registering firmware to be updated in the electronic control device with the security key management system;
(d) generating a digital signature with the encrypted private key and inserting it into the firmware to be updated;
(e) transmitting the firmware into which the electronic signature is inserted to the electronic control device through an OBD port or wireless communication;
(f) verifying the electronic signature inserted into the firmware with the public key downloaded from the electronic control device; and
(g) processing the firmware based on the digital signature verification result of the step (f) to secure integrity of the in-vehicle communication network security method.
청구항 1에서, 상기 (a)단계는,
신규 소프트웨어 패키지별 또는 전자제어장치별로 암호화된 공개키/개인키를 쌍으로 생성하는 것을 특징으로 하는 차량 내 통신 네트워크 보안방법.
In claim 1, the step (a),
An in-vehicle communication network security method characterized by generating a pair of encrypted public/private keys for each new software package or each electronic control device.
청구항 1에서, 상기 (d)단계의 전자서명은,
전자서명 식별자(전자서명 태그), 전자서명 길이, 전자서명 값을 포함하는 것을 특징으로 하는 차량 내 통신 네트워크 보안방법.
In claim 1, the electronic signature of step (d) is,
An in-vehicle communication network security method comprising a digital signature identifier (electronic signature tag), a digital signature length, and a digital signature value.
청구항 1에서, 상기 (g)단계는,
전자서명 검증 결과 적합하면 펌웨어를 업데이트하고, 부적합하면 다운로드 한 펌웨어를 삭제하는 것을 특징으로 하는 차량 내 통신 네트워크 보안방법.




In claim 1, the (g) step,
A method for securing an in-vehicle communication network, characterized in that if the digital signature verification result is suitable, the firmware is updated, and if the electronic signature is not suitable, the downloaded firmware is deleted.




KR1020210186815A 2021-12-24 2021-12-24 Method for providing security on in-vehicle network KR20230097374A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020210186815A KR20230097374A (en) 2021-12-24 2021-12-24 Method for providing security on in-vehicle network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020210186815A KR20230097374A (en) 2021-12-24 2021-12-24 Method for providing security on in-vehicle network

Publications (1)

Publication Number Publication Date
KR20230097374A true KR20230097374A (en) 2023-07-03

Family

ID=87157190

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020210186815A KR20230097374A (en) 2021-12-24 2021-12-24 Method for providing security on in-vehicle network

Country Status (1)

Country Link
KR (1) KR20230097374A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117909987A (en) * 2023-12-29 2024-04-19 零束科技有限公司 Security refreshing method and system for application software of electronic control unit and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101967144B1 (en) 2018-09-13 2019-04-09 자동차부품연구원 Apparatus for communication security for vehicle
KR102075514B1 (en) 2018-11-23 2020-02-10 (주)티에이치엔 Network security unit for a vehicle
KR102202902B1 (en) 2020-09-02 2021-01-15 (주)티에이치엔 Method and apparatus of securing message in communication controller for a vehicle
KR102234210B1 (en) 2015-07-24 2021-03-30 현대자동차주식회사 Security method for ethernet based network
KR102241775B1 (en) 2019-11-20 2021-04-19 삼보모터스주식회사 Dual security control method for vehicle, and device and system using the same

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102234210B1 (en) 2015-07-24 2021-03-30 현대자동차주식회사 Security method for ethernet based network
KR101967144B1 (en) 2018-09-13 2019-04-09 자동차부품연구원 Apparatus for communication security for vehicle
KR102075514B1 (en) 2018-11-23 2020-02-10 (주)티에이치엔 Network security unit for a vehicle
KR102241775B1 (en) 2019-11-20 2021-04-19 삼보모터스주식회사 Dual security control method for vehicle, and device and system using the same
KR102202902B1 (en) 2020-09-02 2021-01-15 (주)티에이치엔 Method and apparatus of securing message in communication controller for a vehicle

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117909987A (en) * 2023-12-29 2024-04-19 零束科技有限公司 Security refreshing method and system for application software of electronic control unit and readable storage medium

Similar Documents

Publication Publication Date Title
US10965450B2 (en) In-vehicle networking
US11245535B2 (en) Hash-chain based sender identification scheme
US10104094B2 (en) On-vehicle communication system
CN106576096B (en) Apparatus, method, and medium for authentication of devices with unequal capability
CN107251106B (en) Method for secure transmission of virtual keys and method for authentication of mobile terminals
US20220276855A1 (en) Method and apparatus for processing upgrade package of vehicle
US10735206B2 (en) Securing information exchanged between internal and external entities of connected vehicles
EP3893108A1 (en) Vehicle-mounted device upgrading method, and related apparatus
CN103166759A (en) Method and apparatus for secure firmware download using diagnostic link connector (dlc) and onstar system
US9706372B2 (en) Secure SMS messaging
US10263980B2 (en) Network node, device and methods for providing an authentication module
JP6981755B2 (en) In-vehicle network system
KR20230097374A (en) Method for providing security on in-vehicle network
US20160323266A1 (en) Method, management apparatus and device for certificate-based authentication of communication partners in a device
CN107040508B (en) Device and method for adapting authorization information of terminal device
JP6375962B2 (en) In-vehicle gateway device and electronic control device
CN109802929B (en) Client program upgrading method based on dual systems and computer readable storage medium
US20230205887A1 (en) Secure automotive system
CN111464554A (en) Vehicle information safety control method and system
KR102462736B1 (en) Method, device, and computer-readable storage medium comprising instructions for signing measurement values of a sensor
KR102472413B1 (en) Method for providing security on in vehicle network
EP3863216A1 (en) Authentication without pre-known credentials
KR101868227B1 (en) Method for certifying authenticity of module for vehicle and apparatus thereof
JP2006113877A (en) Connection device authentication system
US20240291687A1 (en) Apparatus for secured communication between control devices in a vehicle, electronic processing unit, and vehicle

Legal Events

Date Code Title Description
E902 Notification of reason for refusal
E601 Decision to refuse application