期刊文献+

电动汽车CAN协议的重放攻击与防御方法 被引量:5

Replay Attack and Defense Method of CAN Protocol for Electric Vehicle Charging
下载PDF
导出
摘要 当前能源互联网中电动汽车与充电桩之间采用的通信协议是控制器局域网(CAN)协议,但该协议缺乏加密功能,存在着遭到黑客重放攻击的可能。为了验证CAN通信协议存在的安全问题,采用STM32F767单片机、USB CAN转化器和PC机搭建有关CAN通信的硬件环境。为了增强CAN协议的安全性,提出了一种加随机数抵御重放攻击的算法。在Eclipse Neon(v4.6)及JDK1.8+版本的实验环境下模拟电动汽车正常充电、对其进行重放攻击以及加随机数防御重放攻击的3种模式过程。实验结果表明,所提方法可以有效增强CAN总线抵御重放攻击的能力。 The CAN protocol is used to communicate data between electric vehicles and the charger adopts.However,the protocol lacks encryption function,which causing it possible for hackers to carry out replay attack.In order to verify the security problems of CAN communication protocol,this paper uses STM32F767,USB-CAN converter and PC to build the hardware environment of CAN communication.In order to enhance the security of CAN protocol,an algorithm of adding random numbers to resist replay attack is proposed.Under the experimental environment of Eclipse Neon(v4.6)and JDK1.8+,the normal charging,replay attack and defense by adding random Numbers of electric vehicles are simulated.Experimental results show that this method can effectively enhance the ability of CAN bus to resist replay attack.
作者 王勇 李亚菲 陈雪鸿 刘丽丽 吴旻 WANG Yong;LI Yafei;CHEN Xuehong;LIU Lili;WU Min(Shanghai University of Electric Power,Shanghai 200090,China;China Industrial Control Systems Cyber Emergency Response Team,Beijing 100040,China;National Energy Distributed Energy Technology Research and Development(Experimental)Center,Huadian Electric Power Research Institute Co.,Ltd.,Hangzhou,Zhejiang 310030,China)
出处 《上海电力大学学报》 CAS 2021年第4期395-401,406,共8页 Journal of Shanghai University of Electric Power
基金 智能电网产学研开发中心项目(A-0009-17-002-05) 上海自然科学基金(16ZR1436300) 国家自然科学基金(61772327) 浙江大学工业控制技术国家重点实验室开放式基金(ICT1800380)。
关键词 电动汽车 CAN协议 重放攻击 加随机数 electric vehicles CAN protocol replay attack add a random number
  • 相关文献

参考文献13

二级参考文献82

共引文献82

同被引文献47

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部