The present application claims the benefit under 35 U.S.C. § 119 of German Patent Application No. DE 10 2021 201 444.5 filed on Feb. 16, 2021, which is expressly incorporated herein in its entirety.
The present invention relates to a method for checking an incoming message. The present invention further relates to a corresponding device, a corresponding computer program, and a corresponding memory medium.
With the ever-increasing complexity of electronic components in vehicles, the possibility of malfunctions also increases. If a safety-relevant component is affected by such a malfunction, in the worst case this may result in injury to humans. The aim of International Standard ISO 26262 (Road vehicles—Functional safety) is to ensure the functional safety of systems having electrical or electronic components in road vehicles.
The standard procedure model provides that within the scope of a hazard analysis and risk assessment, potential hazards due to malfunctions of the examined system in specific driving situations are identified. Based on various criteria, an automotive safety integrity level (ASIL) is then associated with each safety-relevant hazard. To reduce hazards that are classified as not relevant to safety, no requirements are to be imposed on the system in question that go beyond customary quality management (QM).
Controls for gasoline engines and diesel engines according to the related art are based on a safety concept, developed by Robert Bosch GmbH and adapted and refined by the EGAS work group of the Verband der Automobilindustrie (VDA) (German Association of the Automotive Industry), known in professional circles as the “EGAS monitoring concept” or “three-level concept.” According to this concept, the three referenced levels are as follows:
German Patent Application No. DE 10 2013 206 185 A1 relates to a method for data transmission between a sensor and an electronic control unit (ECU), using a hardware security module (HSM), the transmitted sensor data being secured against manipulation by transmitting them from the sensor to the ECU via a first logical data transmission channel at a first data transmission rate, and by transmitting a cipher-based message authentication code (CMAC) via a second logical data transmission channel at a second data transmission rate. At least once at the beginning of a data transmission session, a session key is transmitted from the ECU to the sensor via a third logical data transmission channel and received by same, and used, at least for the current session, for generating the MAC or CMAC.
German Patent Application No. DE 10 2017 209 557 A1 describes a method for protecting a vehicle network of a vehicle from transmission of manipulated data. The vehicle network includes multiple network nodes. At least one first network node in the vehicle network compares received messages to the messages associated with the first network node, and recognizes the transmission of manipulated data when one of the received messages matches a message associated with the first network node, but which the first network node has not sent. The first network node compares only selected messages of the received messages to the messages associated with the first network node, or compares the received messages only to selected messages associated with the first network node.
The present invention provides a method for checking an incoming message, a corresponding device, a corresponding computer program, and a corresponding memory medium.
According to the present invention, the MAC is used to check the authenticity (authentication) as well as the soundness (integrity) of the incoming message. A cyclic redundancy check (CRC) or evaluation of conventional check sums may thus be dispensed with. Instead, evaluation is similarly carried out on the functional level and monitoring level by use of an HSM of the MAC.
A special feature of the approach provided here is that it avoids a double MAC check by the HSM for all received safety-relevant messages. The burden on the HSM with regard to a redundant MAC computation is thus reduced. For a periodic function check at intervals of 10 ms, for example, according to the present invention sufficient functional security would be ensured without placing an excessive burden on the HSM. In addition, in this regard a so-called lockstep computer architecture or other types of hardware enhancements for error recognition are thus superfluous.
Advantageous refinements and improvements of the basic features of the present invention are possible as a result of the measures disclosed herein. Thus there may be a provision that while the authentication takes place on the functional level, the mentioned function check, however, takes place on the monitoring level via continuous monitoring of the hardware security module. In this way, the correctness of the hardware (HW) and software (SW) of the HSM is ensured based on the monitoring SW, without the need for the HSM to return the MAC. In addition, the use of the keys, necessary for the comparison of the MAC, thus remains limited to the HSM.
Exemplary embodiments of the present invention are illustrated in the figures and explained in greater detail in the following description.
On the one hand, an initial conventional evaluation of the message and verification thereof, using return values of the MAC check, take place on QM functional level (L1). For this purpose, for each received safety-relevant message (11, 12) the consistency is verified by HSM (13) within the scope of MAC check (15), without useful data (11) having to be provided with further check sums. The result of this comparison (15) is transferred (1) from the HSM SW to the monitoring SW (L2).
The corresponding useful data of the MAC check are compared to redundant received message (11, 12) via the L2 SW and subsequently linked to the result of the consistency check. The transmission path of the useful data via the L1 SW and HSM SW may thus be checked for possible bit errors. Due to accepting the result of the consistency check for message (11, 12), a new check of the consistency from the L2 SW by HSM (13) may be dispensed with.
On the other hand, continuous monitoring (14) of HSM (13) and the corresponding driver take place. Since HSM (13) has no lockstep architecture or other types of hardware operational safety features within the meaning of ISO 26262, and the HSM SW has not been developed using an ASIL classification, this portion of the software and of the hardware is continuously checked for proper functionality.
Continuous monitoring (14) of the correct functioning of HSM (13) is achieved by a challenge-response communication with the aid of MAC check (15). Only inputs (17) or data sets (useful data, MAC, etc.) that have already been verified as correct during the driving cycle are stored in a lookup table (16).
Continuous monitoring (14) should take into account the risk of a false-positive comparison (15). For this purpose, the data from lookup table (16) for MAC check (15) are falsified byte-by-byte. These correct and incorrect inputs (17) are provided to the HSM SW within the scope of an additional MAC check (15) according to a predefined pattern. Evaluation (21) of result (20) is then intended to recognize the pattern (1-0-2-0-1-0, for example), using an error counter.
If an error is determined and the pattern fails (21) comparison (15), HSM HW and HSM SW are classified as faulty, useful data (11) of the entire CAN communication are discarded (24), and instead a change is made to reliable substitute values in order to put the vehicle into an operationally safe state.
This method (10) may be implemented, for example, in software or hardware or in a mixed form of software and hardware, for example in a control unit (30), as depicted in the schematic illustration in
Example embodiments of the present invention are set forth in the following numbered paragraphs.
Paragraph 1. A method (10) for checking an incoming message (11, 12) that includes useful data (11) and a message authentication code (12),
characterized by the following features:
Paragraph 2. The method (10) as recited in Paragraph 1,
characterized by the following features:
Paragraph 3. The method (10) as recited in Paragraph 2,
characterized by at least one of the following features:
Paragraph 4. The method (10) as recited in one of Paragraphs 1 through 3,
characterized by the following features:
Paragraph 5. The method (10) as recited in Paragraph 4,
characterized by the following features:
Paragraph 6. The method (10) as recited in Paragraph 5,
characterized by the following features:
Paragraph 7. The method (10) as recited in one of Paragraphs 1 through 6,
characterized by the following feature:
Paragraph 8. A computer program that is configured to carry out the method (10) as recited in one of Paragraphs 1 through 7.
Paragraph 9. A machine-readable memory medium on which the computer program as recited in Paragraph 8 is stored.
Paragraph 10. A device (30) that is configured to carry out the method (10) as recited in one of Paragraph 1 through 7.
Number | Date | Country | Kind |
---|---|---|---|
10 2021 201 444.5 | Feb 2021 | DE | national |
Number | Name | Date | Kind |
---|---|---|---|
10095634 | Sharma | Oct 2018 | B2 |
11951917 | Iwata | Apr 2024 | B2 |
20160255154 | Kim | Sep 2016 | A1 |
20200244442 | Zeh | Jul 2020 | A1 |
Number | Date | Country |
---|---|---|
102013206185 | Oct 2014 | DE |
102017209557 | Dec 2018 | DE |
Entry |
---|
SEDAN: Security-Aware Design of Time-Critical Automotive Networks, Kukkala et al, Aug. 2020 (Year: 2020). |
Number | Date | Country | |
---|---|---|---|
20220271941 A1 | Aug 2022 | US |