Refine Your Search

Search Results

Viewing 1 to 2 of 2
Technical Paper

Routing and Security Mechanisms Design for Automotive TSN/CAN FD Security Gateway

2022-03-29
2022-01-0113
With the explosion of in-vehicle data, Time Sensitive Network (TSN) is increasingly becoming the backbone of the in-vehicle network to ensure deterministic real-time communication and Quality of Service (QoS). However, legacy buses such as CAN FD and LIN will not disappear for a long time in the future. Many protocols are deployed in the gateway and it is an important component in the security and functional safety of the communication process. In this paper, the recommended Electrical/Electronic Architecture is first given and the use cases for the TSN/CAN FD gateway are illustrated. Then, a TSN/CAN FD routing mechanism is designed and security mechanisms are deployed. The routing mechanism includes the protocol conversion module, queue cache module, and forwarding scheduling module. The protocol conversion module unpacks or packs the TSN or CAN FD frames according to the routing table.
Technical Paper

Vulnerability analysis of DoIP implementation based on model learning

2024-04-09
2024-01-2807
The software installed in Electronic Control Units (ECUs) has witnessed a significant scale expansion as the functionality of Intelligent Connected Vehicles (ICVs) has become more sophisticated. To seek convenient long-term functional maintenance, stakeholders want to access ECUs data or update software from anywhere via diagnostic. Accordingly, as one of the external interfaces, Diagnostics over Internet Protocol (DoIP) is inevitably prone to malicious attacks. It is essential to note that cybersecurity threats not only arise from inherent protocol defects but also consider software implementation vulnerabilities. When implementing a specification, developers have considerable freedom to decide how to proceed. Differences between protocol specifications and implementations are often unavoidable, which can result in security vulnerabilities and potential attacks exploiting them.
X