Font Size: a A A

Research And Implement On Security Communication Of Flexray

Posted on:2016-10-12Degree:MasterType:Thesis
Country:ChinaCandidate:T LanFull Text:PDF
GTID:2308330473965226Subject:Intelligent control and embedded system
Abstract/Summary:PDF Full Text Request
Compared with conventional vehicles, the modern automobile introducted electronic control units to control many modules on vehicles. These modules must be interconnected together to achieve some purposes. With the popularity of the Internet, to connect all together, Internet of thing raises. As a pioneer of Internet of things, telematics has become the focus of the major manufacturers. The traditional automobile manufacturers use OBD interface of automotive network standard diagnostic instrument to achieve the purpose of diagnosis, which is the only interface to vehicle network. But the car networking and Internet connection, it will generate a lot of Internet liked threats, car information security is facing a challege.The traditional automobile network has to face the problem, which is caused by wrong operation or non malicious network problems. As long as the network itself is not broken, it can resume to work through a variety of fault tolerance mechanism. However, an internal network exposed to the external network, problems must be focusedby software designers.Vehicle systems requries the accuracy and fault tolerance more and more. CAN network offers up to IMbps, which is not capable for morden vehicles. FlexRay emerge as the times require. FlexRay performs better than CAN, LIN and MOST.The characteristics of FlexRay are high speed, reliable and flexible. In view of the future, research and implementation of secure communication method of FlexRay is the core of this paper.The application of FlexRay are summarized, by the author, that the FlexRay network along with the traditional CAN network has potential security threats. In this paper, using the CANoe to steal and spoofing attack the FlexRay network has been done successfully.For attacks to steal, the authors discuss a software level FlexRay security communication method, and the simulation in CANoe network implementation. Using CANoe to record the data in the node and the data on the bus, comparing the network line data, author verified the correctness and feasibility of this method.After the conclusions drawn in this. The author discribe a beautiful future of this method.At last the author to give people who gave him the selfless help his sincere gratitude and respect.
Keywords/Search Tags:FlexRay, CANoe, Communication
PDF Full Text Request
Related items