检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:范晶晶 刘壮 陈超[1,2] 黄晨 FAN Jingjing;LIU Zhuang;CHEN Chao;HUANG Chen(School of Electrical and Control Engineering,North China University of Technology,Beijing 100144,China;Jiangsu Industrial Innovation Center of Intelligent Equipment Co.,Ltd.,Changzhou,Jiangsu 213300,China;School of Automotive and Traffic Engineering,Jiangsu University,Zhenjiang,Jiangsu 212013,China)
机构地区:[1]北方工业大学电气与控制工程学院,北京100144 [2]江苏智能无人装备产业创新中心有限公司,江苏常州213300 [3]江苏大学汽车与交通工程学院,江苏镇江212013
出 处:《江苏大学学报(自然科学版)》2024年第3期302-308,共7页Journal of Jiangsu University:Natural Science Edition
基 金:北京市长城学者培养计划项目(CIT&TCD20190304)。
摘 要:针对车载以太网通信数据安全和密钥安全问题,创新设计了基于动态密钥的车载以太网安全通信方法.建立车载以太网安全威胁攻击树模型,分析其面临的安全威胁.构建应对安全威胁的车载以太网安全通信方法总体架构.设计动态密钥算法模型,生成隐式动态密钥.设计基于动态密钥的安全通信方法,将原始数据通过动态密钥加密传输,生成摘要并在接收端进行摘要对比处理.通过Linux上位机、I.MX6ULL单片机和Windows设备模拟域间通信及网络攻击过程,将密钥、密文、明文进行差异度对比,同时对通信过程进行攻击,借助Wireshark软件分析通信过程中的数据交互.结果表明:该方法能有效保证密钥安全及车载以太网数据的机密性、新鲜性、真实性和完整性,且能有效应对篡改攻击与重放攻击.For the security concerns of communication data and key in automotive ethernet,an automotive ethernet security communication method based on dynamic keys was innovatively designed.The attack tree model for automotive ethernet security threats was established to analyze the faced security threats.The comprehensive architecture for automotive ethernet security communication methods was constructed to address the threats,and the dynamic key algorithm model was designed to generate implicit dynamic keys.The secure communication method based on dynamic keys was designed to encrypt original data through dynamic keys,and the digests were generated and compared at the receiving end.Communication and network attack processes between domains were simulated using Linux-based systems,I.MX6ULL microcontrollers and Windows devices,and the difference degrees of keys,ciphertexts and plaintexts were compared.The communication process was attacked to analyze the data interactions by Wireshark software.The results show that the proposed method can effectively ensure the key security and the confidentiality,freshness,authenticity and integrity of automotive ethernet data,and it can effectively counter tampering attacks and replaying attacks.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.110