Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (6): 20-28.doi: 10.11959/j.issn.2096-109x.2022079

• Topic: Techniques and applications of cryptography • Previous Articles     Next Articles

Automotive ethernet controller authentication method based on national cryptographic algorithms

Hui GUO1,2, Yong LUO3, Xiaolu GUO3   

  1. 1 School of Vehicle and Mobility, Tsinghua University, Beijing 100084, China
    2 IM Motors Technology Co., Ltd, Shanghai 201804, China
    3 United Automotive Electronic Systems Co., Ltd., Shanghai 201206, China
  • Revised:2022-09-05 Online:2022-12-15 Published:2023-01-16

Abstract:

With the development of intelligent and connected cars, cyber security of automotive ethernet becomes the focus of automotive industry.Authentication is one of the key technologies for automotive ethernet security.The existing authentication methods have shortcomings to meet the requirements of both safety and electronic controllers’ performance.Besides, national cryptographic algorithms are becoming a trend for automotive network security, while the related research in automotive ethernet area is still in starting phase.In order to balance the limited computing performance of electronic controllers and high security requirements of automotive ethernet, a two-stage trust chain authentication method based on national cryptographic algorithms was proposed.The method can be used in different automotive ethernet topologies.A trust chain was built up based on authentication credentials, which linked the two authentication stages, namely the initial stage and the vehicle using stage.The initial stage was triggered by diagnosis instrument at end of line or controller replacement.It deployed complete authentication based on SM2 algorithm and certificates in the initial stage.The vehicle using stage was triggered by ethernet gateway at vehicle power-on or network wakeup.In this stage, the method deployed fast authentication based on SM4 algorithm and authentication credential trust chain.The authentication credentials for trust chain were generated by credential functions.In order to ensure security, each credential was generated based on last successful authentication parameters dynamically.The test results on automotive ethernet controllers show that the method has lower computing cost and higher security level, and it can guarantee both performance and security.

Key words: automotive ethernet, authentication, two-stage trust chain, state cryptographic algorithms

CLC Number: 

No Suggested Reading articles found!