This application is based on Japanese Patent Application No. 2016-147327 filed on Jul. 27, 2016, the disclosure of which is incorporated herein by reference.
The present disclosure relates to an electronic control apparatus which performs data communication through a network.
In a data communication, a malicious third party may connect an unauthorized device to a network and exploit information when the unauthorized device is capable of being easily connected to the network and a protocol of the network is publicly known. Thus, a security technology is an important technology, and various kinds of security technologies are proposed to improve network security as disclosed in JP 2005-278007 A.
In view of the foregoing difficulties, it is desirable to provide a countermeasure even when an unauthorized device is connected to a closed network and readout of data from the closed network is impossible to be avoided.
It is an object of the present disclosure to provide an electronic control apparatus configuring a communication system which makes normal data transmitted or received in a transmission and reception process difficult to be analyzed even when an unauthorized device is connected to a network and reads out the normal data from the network.
According to an aspect of the present disclosure, an electronic control apparatus includes a dummy data setting section and a transmission section. The dummy data setting section sets a dummy data in a free area of a format area that is previously defined. The electronic control apparatus configures a communication system as a transmission node and stores normal data in the format area. The free area is a rest of the format area after the transmission node stores the normal data in the format area. The communication system further includes a reception node. The transmission section transmits the normal data together with the dummy data to the reception node via a network. The reception node receives the normal data together with the dummy data via the network.
When an unauthorized device is connected to a network for malicious data reading, the unauthorized device reads the normal data together with the dummy data. Thus, it is difficult for the unauthorized device to analyze which data is the normal data, and the unauthorized device may have difficulty in specifying and reading the normal data correctly. Thus, even when the unauthorized device is connected to the network for malicious reading of the normal data, it is difficult for the unauthorized device to analyze which data is the normal data.
In the above electronic control apparatus, when storing the dummy data, the free area previously given in the format area is utilized. So, an increase of communication information can be avoided, and accordingly, network communication traffic of the onboard network is prevented from being increased to the utmost extent.
The above and other objects, features and advantages of the present disclosure will become more apparent from the following detailed description made with reference to the accompanying drawings. In the drawings:
Hereinafter, respective embodiments will be described with reference to the drawings. In the respective embodiments below, same or equivalent portions are indicated by same reference symbols in the drawings and a same description applies to a portion indicated by the same reference symbol.
As shown in
The communication controller 11 communicates with the onboard network 2 via, for example, CAN. The microcomputer 10 of each ECU 3, 4, 5 is connected with the communication controller 11, and communicates with other ECUs connected to the onboard network 2. For example, the microcomputer 10 of the ECU 3 communicates with ECUs 4, 5 connected to the onboard network 2.
The arbitration field 16 is a field indicating a type of data and an order of priority, and usually stores 11-bit identification number (ID), which is known as CANID. The control field 17 may include a 4-bit data length code (DLC). The DLC indicates a predefined byte number of data to be stored in the data field, and a maximum of settable byte number is 8 bytes. The data field 18 stores data that is actually transmitted or received, and can store 8 bytes of data in maximum byte-by-byte. In the present disclosure, normal data indicates target data to be transmitted or received corresponding to each CANID, that is, each identification number. Usually, the target data includes meaningful information.
In CAN protocol, internal bit information of the data frame is determined for each CANID. Thus, as shown in
In the present embodiment, a dummy data is set in the free bit. That is, the dummy data is set in the free area. The following will describe a setting process of the dummy data. Hereinafter, suppose that the ECU 3 is disposed on a transmission side and is defined as a transmission node of the data frame, and the ECU 4 is disposed on a reception side and is defined as a reception node of the data frame.
As shown in
The microcomputer 10 of the ECU 3 updates the dummy data by executing a subroutine as shown in
When the microcomputer 10 of the ECU 3 determines that the normal data is not updated in S6 (S6: NO), the microcomputer 10 of the ECU 3 returns to the main process without updating the dummy data. As shown in
As shown in
For example, as shown in
The following will describe advantages provided by the present embodiment. The microcomputer 10 of the ECU 3 sets the dummy data in a previously defined free area of the format area, and transmits the normal data together with the dummy data. Thus, for example, when the unauthorized device 6 is connected to the onboard network 2 for malicious data reading, the unauthorized device 6 reads the normal data together with the dummy data. Thus, it is difficult for the unauthorized device 6 to analyze which data is the normal data, and the unauthorized device 6 may have difficulty in specifying and reading the normal data. In addition, the free area previously given in the format area is used without adding a data area. So, network communication traffic of the on board network 2 is prevented from being increased to the utmost extent.
Definition information about the free area of the free bit is shared between the ECU 3 and the ECU 4 by previously storing the management table 14 on both sides. Thus the definition information of the free area is preliminary defined for each CANID, that is, for each identification number defined in the management table 14. Thus, the microcomputer 10 of the ECU 4 on the reception side is capable of specifying the data stored in the free bit as the dummy data, and ignoring the data in the free bit since the data stored in the free bit is unnecessary data. Thus, the microcomputer 10 of the ECU 4 on the reception side only needs to read the data stored in the previously defined target read area, and additional new logic for determining the dummy data is not needed.
In the microcomputer 10 of the ECU 3 on the transmission side, the dummy data is updated each time the normal data is updated. With this configuration, a possibility that the unauthorized device 6 specifies the dummy data as part of the transmission data and incorrectly specifies the length of the normal data may be increased.
In short, in the microcomputer 10 of the ECU 3 on the transmission side, the dummy data may be updated in response to each arrival of the transmission time of normal data. In this case, even when the unauthorized device 6 succeeds in malicious data reading, the readout data is difficult to be correctly analyzed since the unauthorized device may incorrectly specify the dummy data as the data which has a correlation with the normal data.
In another embodiment of the present disclosure, the electronic control apparatus according to the above-described embodiments can be applied not only to CAN, but also to a communication system employing a different protocol under a condition that a format defined by the different protocol includes an area for setting the dummy data.
The foregoing embodiments show that each of the ECU 3 through ECU 5 has the management table 14, and shares the management table 14 with one another. In another embodiment of the present disclosure, the management table 14 may be previously stored in another ECU or the like connected to the onboard network 2, and each of the ECU 3 through ECU 5 may refer to the management table 14 stored in another ECU via the onboard network 2.
In another embodiment of the present disclosure, a partial or overall function executed by the microcomputer 10 of each ECU 3, 4, 5 may be achieved in a hardware manner using a single integrated circuit (IC) or using multiple ICs.
While the present disclosure has been described with reference to embodiments thereof, it is to be understood that the disclosure is not limited to the embodiments and constructions. The present disclosure is intended to cover various modification and equivalent arrangements. In addition, the various combinations and configurations, other combinations and configurations, including more, less or only a single element, are also within the spirit and scope of the present disclosure.
Number | Date | Country | Kind |
---|---|---|---|
2016-147327 | Jul 2016 | JP | national |