Font Size: a A A

Research And Test On FOTA Information Security Of Internet Connected Vehicles

Posted on:2023-11-03Degree:MasterType:Thesis
Country:ChinaCandidate:Z W YuFull Text:PDF
GTID:2532307031950559Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the development of automotive intelligence and networking,the new generation of intelligent networked vehicles need to undertake the functions of body control,electrical system control,cloud connection and so on,and provide entertainment services for users.Accordingly,the EE structure of vehicles is becoming more complex,and the number of ECU is also in rapid increase.The software update frequency of the car will also continue to increase.FOTA has become an important way of car remote upgrade.However,FOTA not only provides an important update path for intelligent networked vehicles,but also brings more risks and potential safety threats.This paper takes the current FOTA upgrade system architecture as an example,analyses its design ideas in architecture,function,business,and explains the processes of each link.According to the information security threat model of the research system,a security scheme based on state secret algorithm is proposed,which covers cloud data security,vehicle-cloud communication security and vehicle-side communication security.In the cloud,a micro-service architecture is used,and PKI based on the secret algorithm is designed.Multiplex APNs are set up on the pipeline to deploy services to different network domains.HSM chips are used in the car end,and the environment management encryption keys and algorithms are executed through Trustzone/TEE to prevent information leakage.Use Sec OC on CAN to verify the authenticity and integrity of bus message.Finally,a test bench is built.Based on the test results,the test results show that the scheme protects the vehicle from false upgrade tasks and tampered upgrade packages.The performance test results show that the national secret algorithm has similar performance and security than the international algorithms.The security scheme passes the test cases of all simulated attacks and achieves the preset information security goals.
Keywords/Search Tags:Networked Vehicle, FOTA, Architecture, Threat Model, Bench Test
PDF Full Text Request
Related items