摘要:
A method includes receiving first information that is information on a control program from a control unit which executes the control program for controlling equipment loaded onto an automobile, the control unit being loaded onto the automobile, calculating second information that is a state of the control program when applying a correction program on the control program to the control unit on the basis of the received first information, transmitting the correction program to the control unit, receiving from the control unit third information that is information on a state of the control program after applying the transmitted correction program to the control unit, comparing the received third information with the calculated second information, and judging whether or not processing of applying the correction program to the control unit has succeeded on the basis of a result of the comparison.
摘要:
A vehicle system includes a master ECU and a general ECU. The general ECU attaches a digital signature to transmission data including data (for example, a digest value of a program) and transmits the transmission data to the master ECU. The master ECU verifies the digital signature and the data and, when both the digital signature and the data are valid, determines that the general ECU is valid. The master ECU attaches a digital signature to transmission data including data of the master ECU and a session key and transmits the transmission data to the general ECU. The general ECU verifies the digital signature and the data and, when both the digital signature and the data are valid, the general ECU uses the session key included in the transmission data as a common key when performing subsequent communications.
摘要:
Disclosed is a system for detecting an attack, which includes a server and a plurality of vehicles capable of wirelessly communicating with each other. Each of the vehicles has a sensor, a sensor information acquisition unit, a traffic information reception unit, and a transmission unit that transmits the sensor information and the traffic information to the server. The server has a reception unit that receives the sensor information and the traffic information from the vehicles, a verification unit that verifies whether the sensor information and the traffic information are inconsistent with each other, and a notification unit that notifies, when the sensor information and the traffic information are inconsistent with each other, the vehicles of the inconsistency.
摘要:
Each of ECUs counts the number of messages transmitted for each of CAN IDs. A transmission node that has transmitted a main message produces an MAC from a data field and the CAN ID in the main message and a counter value corresponding to the CAN ID, and transmits the MAC as an MAC message. A reception node that has received the main message produces an MAC from the data field and the CAN ID contained in the main message and the counter value corresponding to the CAN ID, and determines whether the MAC matches the MAC contained in the MAC message. By so doing, verification whether the main message is valid or not can be made. According to this configuration, message authentication by the MAC can be made without changing a CAN protocol.
摘要:
A program stored in a computer-readable medium causes a computer to execute a process includes receiving, from an automobile in which a control program for controlling devices mounted on the automobile operates, an update request concerning the control program, classifying a plurality of correction programs corresponding to the update request into a plurality of groups on the basis of usable electric energy of a battery corresponding to a vehicle type to which the automobile belongs, an amount of the usable electric energy being stored in a memory, and transmitting the classified correction programs to the automobile for each of the groups.
摘要:
Each of ECUs counts the number of messages transmitted for each of CAN IDs. A transmission node that has transmitted a main message produces an MAC from a data field and the CAN ID in the main message and a counter value corresponding to the CAN ID, and transmits the MAC as an MAC message. A reception node that has received the main message produces an MAC from the data field and the CAN ID contained in the main message and the counter value corresponding to the CAN ID, and determines whether the MAC matches the MAC contained in the MAC message. By so doing, verification whether the main message is valid or not can be made. According to this configuration, message authentication by the MAC can be made without changing a CAN protocol.