The disclosure relates to detecting a suppression of a security-related data transmission from a vehicle to a vehicle-external server.
The prior art describes vehicles that are able to transmit security-related data via a communication channel to a backend server. The security-related data can be transmitted here via a separate communication channel from the vehicle to the backend server. If an attacker performs a manipulation at the vehicle that suppresses a transmission of security-related data to the backend server, this manipulation often cannot be detected.
There is a need, therefore, to efficiently detect a suppression of a transmission of security-related data from the vehicle to a vehicle-external server. In particular, there is a need is to efficiently detect a suppression of a transmission of security-related data from the vehicle to a vehicle-external server via the vehicle-external server.
The above-described needs, as well as others, are addressed by at least some advantageous embodiments and developments described herein.
A first aspect is a method for detecting a suppression of a security-related data transmission from a vehicle to a vehicle-external server via the vehicle-external server. The method can be a computer-implemented method. The vehicle can be a motor vehicle or a motorbike. The security-related data transmission can be a data transmission of an intrusion-detection system (IDS for short) of the vehicle. The security-related data transmission can comprise diagnosis data, log data and/or alarm messages from one or more control units and/or one or more bus systems of a vehicle. The vehicle-external server can be a backend server and/or a cloud server of a vehicle manufacturer and/or of a third party.
The method comprises receiving a current data transmission of the vehicle via a first function of the vehicle-external server. The current data transmission may comprise no security-related data transmission or may indeed comprise a security-related data transmission. Furthermore, the current data transmission can comprise one or more data transmissions to one or more functions and/or services of the vehicle-external server. The method determines a last, security-related data transmission of the vehicle to a security-related function of the vehicle-external server via the vehicle-external server. The method then checks the plausibility of the current data transmission to the first function of the vehicle-external server with the last, security-related data transmission to the security-related function of the vehicle-external server. Depending on the plausibility check of the current data transmission, in particular, depending on a result of the plausibility check of the current data transmission, the method detects the suppression of a current, security-related data transmission to the security-related function of the vehicle-external server via the vehicle-external server.
The method can advantageously efficiently detect a suppression of a security-related data transmission to a vehicle-external server. If a vehicle remains unconnected to the vehicle-external server temporarily, for example for a few seconds, a few minutes, or a few hours, and/or over a longer period of time, for example several days, several weeks, or several months, the vehicle-external server can detect a suppression of the security-related data transmission. Furthermore, the method can distinguish a failure of a communications link, for example due to a defect of a mobile radio module of the vehicle, from the suppression of the security-related communication and thus can detect the suppression of the security-related communication.
According to a first embodiment, the plausibility check of the current data transmission to the first function of the vehicle-external server with the last, security-related data transmission the security-related function of the vehicle-external server can comprise determining a relative, temporal dependency between the current data transmission and the last, security-related data transmission and a detection of the suppression of the current, security-related data transmission from the vehicle to the vehicle-external server via the vehicle-external server, if the relative, temporal dependency between the first data transmission and the last, security-related data transmission lies outside a specified time interval. The plausibility of the current data transmission can hereby be checked efficiently.
According to at least some embodiments, the current data transmission can comprise one or more data packets from one or more control units of the vehicle, wherein the current data transmission comprises collected data packets of all control units of the vehicle.
According to some embodiments, the method can further comprise receiving the current data transmission via a second function of the vehicle-external server, and checking the of plausibility the current data transmission to the first function and/or to the second function of the vehicle-external server with the last, security-related data transmission to the security-related function of the vehicle-external server. The plausibility of the current data transmission can hereby be checked more precisely and/or more reliably.
In some embodiments, the method can further comprise receiving the current data transmission via a security-related function of the vehicle-external server and storing the current data transmission as the last, security-related data transmission via the vehicle-external server if the current data transmission comprises one or more data packets to the security-related function of the vehicle-external server. The last, security-related data transmission can hereby be updated efficiently.
According to one or more embodiments, each data packet of the current data transmission can be a signed data packet, and the first function, the second function and/or the security-related function of the vehicle-external server can check a signature of a signed data packet of the current data transmission relevant for the respective function. If the first function, the second function and/or the security-related function determines an error when checking the signature of the signed data packet relevant for the respective function, the method can provide an alarm message to a vehicle manufacturer and/or a user of the vehicle. An integrity of the data packets of the current data transmission can hereby be checked efficiently.
According to some embodiments, the detection of the suppression of a current, security-related data transmission to the security-related function of the vehicle-external server via the vehicle-external server according to the plausibility check of the current data transmission can comprise providing an alarm message to a vehicle manufacturer and/or a user of the vehicle. The vehicle manufacturer and/or the user of the vehicle can hereby be informed of a possible manipulation of the vehicle and in particular of a suppression of the current, security-related data transmission.
A further aspect, is a non-transitory computer-readable medium for detecting a suppression of a security-related data transmission from a vehicle to a vehicle-external server via the vehicle-external server, wherein the non-transitory computer-readable medium comprises instructions that, when executed on a computer, execute the above-described method.
A further aspect is a system for detecting a suppression of a security-related data transmission from a vehicle to a vehicle-external server via the vehicle-external server, wherein the system is designed to carry out the above-described method.
A further aspect is a vehicle comprising the above-described system for detecting a suppression of a security-related data transmission from a vehicle to a vehicle-external server via the vehicle-external server.
Further features can be found in the claims, the figures and the figure description. All of the features and feature combinations stated in the description as well as the features and feature combinations described hereinafter in the figure description and/or shown alone in the figures are usable not only in the combination stated in each case, but also in other combinations or in isolation.
Hereinafter, an advantageous exemplary embodiment will be described on the basis of the appended drawings. Further details and embodiments and developments are thus provided.
In detail,
Furthermore, the method 100 includes determining 104 a last, security-related data transmission of the vehicle to a security-related function of the vehicle-external server via the vehicle-external server. The vehicle-external server stores the last, correctly received, security-related data transmission. In particular, the vehicle-external server stores a timestamp of the last, correctly received, security-related data transmission. By way of a querying of the last, stored security-related data transmission, the vehicle-external server can determine 104 the last, security-related data transmission.
The method 100 includes checking the plausibility 106 of the current data transmission to the first function of the vehicle-external server with the last, security-related data transmission to the security-related function of the vehicle-external server. The last, security-related data transmission can be part of the current data transmission. Alternatively, the last, security-related data transmission can be a part of a past data transmission from the vehicle to the vehicle-external server. The plausibility check can comprise a comparison of a timestamp of the current data transmission to the first function and of a timestamp of the last, security-related data transmission. For example, the vehicle-external server can use a maximum, specified time interval for the plausibility check, which defines a maximum time period between the timestamp of the current data transmission and the timestamp of the last, security-related data transmission. If the result of the plausibility check is that both timestamps, the timestamp of the current data transmission the timestamp of the last, security-related data transmission, lie within the maximum specified interval, there is no suppression of the security-related data transmission from the vehicle to the vehicle-external server. Otherwise, a suppression of the security-related data transmission from the vehicle to the security-related server is present. Additionally or alternatively, the vehicle-external server, during the plausibility check, can check a frequency of security-related data transmissions within a specified time interval. The frequency of security-related data transmissions is preferably checked only if, in the specified time intervals, current data transmissions via the vehicle-external server are received from the vehicle. If a specified minimal frequency of safety-relevant data transmissions is exceeded there is no suppression of the security-related data transmission from the vehicle to the vehicle-external server. If the specified, minimal frequency of security-related data transmissions is not exceeded, there is a suppression of the security-related data transmission from the vehicle to the vehicle-external server.
Furthermore, the vehicle-external server can determine a frequency of security-related data transmissions in relation to a frequency of current data transmissions. If the frequency of security-related data transmissions in relation to the frequency of current data transmissions drops below a specified threshold value, the vehicle-external server can assert a suppression of the security-related data transmission.
The above-mentioned possibilities for checking the plausibility of the current data transmission can be determined in relation to an individual control unit of the vehicle, a subset of control units of the vehicle and/or all control units of the vehicle. The vehicle-external server can thus determine a suppression of a security-related data transmission flexibly for control units of the vehicle and can identify one or more control units more precisely, the security-related data transmission of which is suppressed.
Furthermore, the method 100 includes detecting 108 the suppression of a current, security-related data transmission the security-related function of the vehicle-external server via the vehicle-external server according to the plausibility check of the current data transmission. As described above, the method 100 includes, in the event that various parameters are exceeded or undershot during the plausibility check of the current data transmission, detecting a suppression of the current, security-related data transmission. If the result of the plausibility check is that the current data transmission is plausible in relation to the last, security-related data transmission, there is no suppression of the current, security-related data transmission. If the result of the plausibility check is that the current data transmission is not plausible in relation to the last, security-related data transmission, the method 100 can detect that the current, security-related data transmission is suppressed.
In detail,
The method 100 and/or the system 200 can advantageously efficiently detect a manipulation in a vehicle that leads to a suppression of a security-related data transmission to a vehicle-external server. The security-related data transmission can be, for example, a data transmission of an IDS of the vehicle to a backend server. In particular, the vehicle-external server can efficiently detect a suppression of the security-related data transmission in the event of a functioning data transmission from the vehicle to the vehicle-external server. Erroneous alarms by the vehicle-external server, for example in the event of a failure of the communication module, can hereby be avoided.
Number | Date | Country | Kind |
---|---|---|---|
10 2021 123 785.8 | Sep 2021 | DE | national |
The present application is the U.S. national phase of PCT Application PCT/EP2022/069245 filed on Jul. 11, 2022, which claims priority of German patent application No. 102021123785.8 filed on Sep. 14, 2021, which is incorporated herein by reference in its entirety.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2022/069245 | 7/11/2022 | WO |