This application is the U.S. national phase of International Application No. PCT/RU2020/050051 filed Mar. 19, 2020 which designated the U.S. and claims priority to RU Patent Application No. 2019107755 filed Mar. 19, 2019, the entire contents of each of which are hereby incorporated by reference.
The present invention relates to the field of ensuring the safety of vehicles, namely, to the system and method of protecting electronic control systems of vehicles. The invention allows to identify and eliminate threats if necessary and inform the owner about them. The vehicle control protection system is a complex of software and hardware solutions.
In modern vehicles, the number of autonomous control systems is increasing every year. This circumstance is due to the emergence of new security systems, increase in comfort, improvement and digitalization of existing systems. Thus, today almost all the equipment of the vehicle is controlled by electronics: engine control system, brake control system, vehicle safety system, climate control system, etc.
Such a rapid development of automotive electronics is a broad foundation for the constant improvement of operating algorithms, the emergence of additional features, simplification/reduction of the cost of individual elements of the vehicle, etc. The analysis of the dynamics of digitalization of vehicle control systems shows a positive trend, and, consequently, progressive growth is expected in this area in the future.
However, there is also a serious drawback in the widespread use of such electronic control systems. Like any digital system, they have vulnerabilities, thereby they can be compromised. In case a control system is compromised, a hacker can gain partial or complete control over it. This can cause both material and physical damage to its owner and others.
Several variants of threats that allow a hacker to gain access to the vehicle's control systems:
Thus, the present invention is aimed at ensuring the protection of electronic systems of vehicles from unauthorized intrusion.
The topological architecture of all control systems has a similar principle. Namely: there is usually a certain number of modules (devices) that are connected, and also exchange data over interface communication lines. The main goal of the hacker (in any case of threats) is an attack on the interface communication lines of control systems. The attack consists of spoofing, blocking, displaying hacker's data on the communication interface lines.
Today, control system protection measures are not implemented by vehicle manufacturers at the proper level or are being partially implemented. Therefore, the proposed method and system are in demand.
The existing complexes on the market that provide protection of vehicle control systems can be divided into two types:
A security system is known from the state of the art, which is an addition to the Firmware of the electronic control unit (ECU) of the vehicle, designed to monitor network activity, analyze and eliminate attacks (see Argus development https://argus-sec.com/argus-ecu-protection/). Protection is provided at the software level by detecting attacks, suspicious activity and changes in the standard behavior of the car's network. The installed system in the vehicle is designed to monitor network activity, analyze and eliminate attacks.
The disadvantage of this solution is that the fact of a threat can be established only at the time of execution of the command. Also, this solution cannot be universal for any type and brand of vehicle, since adaptation is necessary.
The closest technical solution chosen as a prototype is a system and a method for ensuring the protection of electronic systems of vehicles described in U.S. Pat. No. 9,881,165B2, published on 30 Jan. 2018. The main component in such systems is the Firewall device. It is installed between the interface communication line of the control system and the ECU. The Firewall consists of the following functional blocks:
However, this type of system has similar disadvantages to the one described above. In such systems, the fact of unauthorized influence can be determined only at the time of issuing a malicious command. It is also necessary to adapt the system to each type of vehicle. In addition, one Firewall protects only one ECU.
The described types of existing options for the protection of vehicle control systems are not intended to determine the facts of the presence of unauthorized devices on the interface lines, replacement of standard ECUs, installation of new ones. Also, they do not provide protection in terms of detecting radio-receiving/transmitting devices in the security zone of the complex, as well as jamming in the selected radio band.
The essence of the present invention is to provide the most accurate result in determining and fixing unauthorized devices on the interface communication lines of vehicle control systems. The present invention, and, consequently, the system eliminates all the above disadvantages of existing systems:
The technical result of the present invention is to increase the safety and degree of protection of the vehicle from intrusions, by performing a comprehensive check and monitoring of the parameters of the vehicle control systems, as well as detecting unauthorized connected modules.
The proposed invention is explained by figures:
Unit 502 (see
Unit 503 (see
The method is based on the fact that any additional device connected to the interface communication line 101 leads to a decrease in resistance and an increase in capacitance. Each transceiver connected to the interface communication line has a resistance R=50 kOhm, and a capacitive component of about 10 pF. This allows to detect an unauthorized device by increasing the total capacitance (the capacitance increases if an additional device is connected) and lowering the resistance (decreases if an additional device is connected).
Unit 504 (see
The unit digitizes the instantaneous values displayed on the interface communication line, and processes and calculates the spectrum. At the initial moment, a “reference” model of the spectrum is displayed, with respect to which the subsequent ones are compared. When replacing one of the units, adding a new one, etc., the new spectrum has differences from the “reference” one. This is a sign of an unauthorized intrusion into the control system.
For example, an increase in the reactance of the interface communication line or any other parameter of the vehicle leads to a distortion of the rectangular signal shape. This is due to the increasing influence of transition processes. The nature of the transition processes of any chain (in this case the interface line) depends on the integral differential properties of the reactive resistance component. The differential properties of the interface line lead to a distortion of the rectangular signal, adding peaks to it at the edges (positive—at the front, negative—at the back). The main influence on the differential properties of the electric bus is exerted by the capacitive component of the reactance.
Thus, the higher the capacitive component, the higher the amplitude of the peaks at the pulse fronts. Consequently, there is a direct relationship between the number of connected devices to the interface line of the vehicle control system and the form of the electrical signal during data transmission. Namely, the more connected devices there are, the higher the peak amplitude at the fronts. When replacing or replacing the electronic devices of the vehicle, the above parameters also change due to the heterogeneity of the characteristics of the driver chips.
Unit 505 (see
When the complex increases the logical level on the interface communication line, a completely different command is issued. This method protects the vehicle, and does not allow the modules to enter the service mode. In other words, by forcibly changing the state of the interface line from active to passive, the overall command changes and does not work as intended by the attacker.
The mechanism of operation of this unit is defined by the following actions:
Additionally, this module is used to block any commands issued to the interface lines according to specified algorithms that are pre-determined, for example, disabling the brake system at the time of the car's movement, blocking the operation of the security system module during the car's movement, etc. These commands are initialized at the time of system configuration and adaptation, and are also stored in the memory of unit 502.
Unit 506 (see
Modern digital communication protocols such as GSM, 3G, 4G, CDMA, etc. can be used for unauthorized tracking and transmission of information (“bugs”, “wiretaps”). The main features of such protocols are:
Thus, the use of cellular communications for the organization of wiretapping is a very simple and tempting solution. In addition to listening to sound, the GSM/3G/4G mobile network can be used to monitor the location of the car using the built-in GPS tracker or by signals from base stations.
These factors make us very carefully study the presence of such signals on the object during a bug check (wiretapping).
The unit detects signals from radio sources, evaluates the power and frequency of the signal and forms signal-like interference at the frequencies of radio sources in automatic mode.
Thus, the block 506 provides protection against the following attacks
Unlike conventional field detectors, this unit is designed not only for detecting sources by the electromagnetic field, but also for detecting various types of digital protocols, automated interference of various kinds. Unit's operation excludes triggering by various “interference” sources and it allows to perceive the “desired” signals at a greater distance.
The main advantages of the unit over existing field detectors searching for digital signals:
The unit is able to search for and suppress the signals of receivers and transmitters in the area of its radiation, not only for the most common communication systems (GSM/3G/4G, BT, WiFi), but also for any unauthorized device that exchanges information at frequencies from 70 MHz to 6000 MHz.
Main technical characteristics:
The main mode of operation for detecting unauthorized devices by the radiated field is monitoring, which provides detection at a given threshold of the signal with the preservation of information about it (time of occurrence, duration, level) for further processing.
The principle of operation is based on the following:
This mode of the unit's operation has the following advantages:
To protect the Bluetooth Low Energy communication channel, a secure crypto processor (Secure Crypto Chip) is used. The encryption of the communication channel is performed on the basis of ECC/AES256 algorithms.
Unit 507 (see
The main function of the block 507 is to display information and enter configuration data:
It is also possible to receive information about events that occurred during the disconnection of the unit from the device 501.
The following is an example of a method for protecting the electronic systems of a vehicle from unauthorized intrusion.
Each interface communication line of a vehicle is characterized by a number of electrical parameters, such as reactance, active resistance, dominant and recessive bus voltage, average and maximum current consumption, bus speed, pulse duty cycle, etc. Each module of the vehicle, when connected to the interface communication line of the vehicle, makes changes to the electrical parameters.
The method for detecting connected unauthorized devices includes measuring the parameters of the electrical signal of the interface communication line in the first and second time intervals. The first time interval is considered to be the moment of buying a car, passing a technical inspection, or another set time point. The second time interval is any moment of time that is set by the user of the vehicle or after a certain time interval (one day, week, month) from the first time interval. Measurement of the parameters of the electrical signal of the interface line and monitoring of the transmitted communication commands is carried out by units 503-505. Next, the processed parameters are transferred to the unit 502 for their processing. After that, these parameters become available for other execution units 506-507. The parameters measured in the first time interval are “reference”. Further, the parameters measured in the second time interval are subject to comparison with the “reference” ones.
The operation of the block 503 is based on the fact that each module connected to the interface communication line leads to a decrease in the active and an increase in the reactive component of the resistance. Using this property allows you to detect unauthorized connected devices. After measuring the parameters in the second time interval, a comparison is made with the parameters obtained in the first time interval. In this way, an unauthorized connected module is detected, since the parameters are changed.
The spectral analysis unit 504 measures the parameters of the electrical signals of the interface communication line 101 in the first and second time intervals, followed by the construction of the spectra of these signals. Then, to register the fact of unauthorized devices installed on the interface communication line, the obtained spectra are compared. When replacing one of the modules, adding a new one, etc., the new spectrum differs from the spectrum built in the first time period, which is a sign of an unauthorized intrusion into the vehicle control system.
The malicious command detection and suppression unit 505 is connected to the unit 502 and provides blocking of transmitted commands that put at least one of the vehicle modules into service mode by determining whether the data transmission is malicious or not. The list of malicious commands is initialized at the time of configuration and adaptation of the system, and is also stored in the memory of unit 502. If the block 505 detects a malicious unauthorized sequence consisting of three suspicious commands, the third command is blocked, which prevents the unit from switching to service mode.
The unit 506 for detecting and jamming in a given frequency range to an unauthorized receiver/transmitter is configured to operate in the frequency range from 70 to 6000 MHz before starting work. Thus, the subject of unit 506 is the majority of communication standards and various communication protocols, for example, GSM, 3G, 4G, CDMA, etc., which can be used for unauthorized tracking and transmission of information (“bugs”, “wiretaps”). The unit 506 allows to detect signals from radio sources, with subsequent evaluation of the signal power and frequency, as well as detecting various types of communication protocols, followed by the formation of signal-like interference at the frequencies of radio sources in automatic mode, if necessary. During operation, the unit 506 can receive information from the unit 502 about previously detected receivers/transmitters, as well as about the frequency ranges and digital protocols through which they were connected.
All information about the operation of the units that are part of the vehicle control system protection device 501 can be shown in the information display unit 507 and the input of configuration data. Through this unit, it is also possible to configure or calibrate the operation of the device 501.
Number | Date | Country | Kind |
---|---|---|---|
RU2019107755 | Mar 2019 | RU | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/RU2020/050051 | 3/19/2020 | WO |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2020/190178 | 9/24/2020 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
7778606 | Ammon | Aug 2010 | B2 |
8490191 | Kuegler | Jul 2013 | B2 |
8577034 | Lehner | Nov 2013 | B2 |
9286485 | Kotani | Mar 2016 | B2 |
9881165 | Litichever | Jan 2018 | B2 |
10757113 | Bathurst | Aug 2020 | B2 |
11190533 | Tsurumi | Nov 2021 | B2 |
20070118752 | Kiessling | May 2007 | A1 |
20080092227 | Eibach | Apr 2008 | A1 |
20090172102 | Chesnutt | Jul 2009 | A1 |
20090288175 | Sun | Nov 2009 | A1 |
20100165878 | Soni | Jul 2010 | A1 |
20110047630 | Cheng | Feb 2011 | A1 |
20110093639 | Richards | Apr 2011 | A1 |
20130104231 | Niner | Apr 2013 | A1 |
20130219170 | Naitou | Aug 2013 | A1 |
20130227650 | Miyake | Aug 2013 | A1 |
20130316638 | Jang | Nov 2013 | A1 |
20140040992 | Koide | Feb 2014 | A1 |
20140107875 | Beyer | Apr 2014 | A1 |
20140195808 | Lortz | Jul 2014 | A1 |
20150020152 | Litichever | Jan 2015 | A1 |
Number | Date | Country |
---|---|---|
2 249 514 | Apr 2005 | RU |
2249514 | Apr 2005 | RU |
2250844 | Apr 2005 | RU |
2 580 790 | Apr 2016 | RU |
2580790 | Apr 2016 | RU |
WO-2020076197 | Apr 2020 | WO |
Entry |
---|
International Search Report for PCT/RU2020/050051 dated Sep. 10, 2020, 4 pages. |
Written Opinion of the ISA for PCT/RU2020/050051 dated Sep. 10, 2020, 4 pages. |
Number | Date | Country | |
---|---|---|---|
20220161828 A1 | May 2022 | US |