网络与信息安全学报 ›› 2022, Vol. 8 ›› Issue (6): 20-28.doi: 10.11959/j.issn.2096-109x.2022079

• 专题:密码学技术与应用 • 上一篇    下一篇

基于国密算法的车载以太网控制器身份认证方法

郭辉1,2, 罗勇3, 郭晓潞3   

  1. 1 清华大学车辆与运载学院,北京 100084
    2 智己汽车科技有限公司,上海 201804
    3 联合汽车电子有限公司,上海 201206
  • 修回日期:2022-09-05 出版日期:2022-12-15 发布日期:2023-01-16
  • 作者简介:郭辉(1981- ),男,重庆人,清华大学博士生,主要研究方向为车载网络信息安全、汽车功能安全
    罗勇(1990- ),男,江西新余人,联合汽车电子有限公司工程师,主要研究方向为车载网络信息安全
    郭晓潞(1970- ),男,上海人,联合汽车电子有限公司教授级高级工程师,主要研究方向为汽车电子控制器

Automotive ethernet controller authentication method based on national cryptographic algorithms

Hui GUO1,2, Yong LUO3, Xiaolu GUO3   

  1. 1 School of Vehicle and Mobility, Tsinghua University, Beijing 100084, China
    2 IM Motors Technology Co., Ltd, Shanghai 201804, China
    3 United Automotive Electronic Systems Co., Ltd., Shanghai 201206, China
  • Revised:2022-09-05 Online:2022-12-15 Published:2023-01-16

摘要:

随着智能网联汽车的发展,车载以太网的信息安全成为汽车行业关注的重点。安全认证是保证车载以太网信息安全的关键技术之一。现有的车载以太网认证技术难以兼顾安全性和车载控制器性能要求。国密算法在车载网络信息安全的应用逐渐成为趋势,但在车载以太网领域的应用研究还处于起步阶段。为了满足车载控制器相对较低的性能和车载以太网的安全要求,提出了基于国密算法的两阶段信任链车载以太网控制器身份认证方法。该身份认证方法可适用于车载以太网不同的网络拓扑架构,通过基于认证凭证的信任链将车载以太网控制器身份认证的初始化阶段和车辆使用阶段进行关联。初始化阶段认证在整车下线首次安装控制器或售后更换控制器时,由整车厂诊断仪触发。在初始化阶段,基于复杂的 SM2 国密算法和身份证书建立完整认证。车辆使用阶段认证在每次车辆重新上电或网络唤醒时,由以太网网关触发。在车辆使用阶段,基于 SM4 对称国密算法和认证凭证信任链建立快速认证。认证凭证通过认证凭证函数生成,并且每一次认证凭证都基于之前成功认证的随机会话编号动态产生,形成信任链。基于车载以太网控制器进行了测试验证,测试结果表明,该方法资源占用较低并具有较高的安全性,能够同时满足车载以太网控制器身份认证性能和安全两方面的需求。

关键词: 车载以太网, 身份认证, 两阶段信任链, 国密算法

Abstract:

With the development of intelligent and connected cars, cyber security of automotive ethernet becomes the focus of automotive industry.Authentication is one of the key technologies for automotive ethernet security.The existing authentication methods have shortcomings to meet the requirements of both safety and electronic controllers’ performance.Besides, national cryptographic algorithms are becoming a trend for automotive network security, while the related research in automotive ethernet area is still in starting phase.In order to balance the limited computing performance of electronic controllers and high security requirements of automotive ethernet, a two-stage trust chain authentication method based on national cryptographic algorithms was proposed.The method can be used in different automotive ethernet topologies.A trust chain was built up based on authentication credentials, which linked the two authentication stages, namely the initial stage and the vehicle using stage.The initial stage was triggered by diagnosis instrument at end of line or controller replacement.It deployed complete authentication based on SM2 algorithm and certificates in the initial stage.The vehicle using stage was triggered by ethernet gateway at vehicle power-on or network wakeup.In this stage, the method deployed fast authentication based on SM4 algorithm and authentication credential trust chain.The authentication credentials for trust chain were generated by credential functions.In order to ensure security, each credential was generated based on last successful authentication parameters dynamically.The test results on automotive ethernet controllers show that the method has lower computing cost and higher security level, and it can guarantee both performance and security.

Key words: automotive ethernet, authentication, two-stage trust chain, state cryptographic algorithms

中图分类号: 

No Suggested Reading articles found!