吉林大学学报(信息科学版) ›› 2022, Vol. 40 ›› Issue (5): 805-811.

• • 上一篇    下一篇

基于国密 SM2 的智能网联汽车安全认证方法研究

李 敏1,2 , 陈付龙1 , 庞 辉3    

  1. 1. 安徽师范大学 计算机与信息学院, 安徽 芜湖 241002; 2. 芜湖职业技术学院 信息与人工智能学院, 安徽 芜湖 241006; 3. 埃泰克汽车电子(芜湖)有限公司 软件部, 安徽 芜湖 241006
  • 收稿日期:2022-03-02 出版日期:2022-10-10 发布日期:2022-10-10
  • 作者简介:李敏(1977— ), 男, 安徽芜湖人, 安徽师范大学副教授, 主要从事汽车智能技术和信息安全研究, (Tel)86-553-5775760 (E-mail)qingchang2014@ 126. com; 陈付龙(1978— ), 男, 安徽霍邱人, 安徽师范大学教授, 博士, 博士生导师, 主要 从事嵌入式与普适计算、 物联网安全研究, (Tel)86-553-5910351(E-mail)long005@ ahnu. edu. cn。
  • 基金资助:
    国家自然科学基金资助项目(61972438); 安徽省高校优秀青年骨干人才国内访学研修基金资助项目(gxgnfx2020142)

Research on Safety Certification Method of Intelligent Connected Vehicle Based on Algorithm SM2

LI Min 1,2 , CHEN Fulong 1 , PANG Hui 3   

  1. 1. School of Computer and Information, Anhui Normal University, Wuhu 241002, China; 2. Institute of Information and Artificial Intelligence, Wuhu Institute of Technology, Wuhu 241006, China; 3. Software Department, Atech Automotive (Wuhu) Company Limited, Wuhu 241006, China
  • Received:2022-03-02 Online:2022-10-10 Published:2022-10-10

摘要: 由于车载 CAN(Controller Area Network)总线是网络攻击源头, 车载数据以明文形式传输易被监听、 篡改, 无认证域的消息和总线仲裁机制易遭受网络攻击, 为解决汽车信息安全问题, 提出基于 SM2 非对称加密算法。 运用多倍点运算策略, 采用公钥加密, 私钥解密, 开展车载节点身份认证和数据加解密, 根据车载 CAN 总线 特性, 采用报文分组协议传输 SM2 算法密文。 将国密 SM2 算法移植到国产 GD32F103 为核心的嵌入式设备, 模拟 智能网联汽车重要部件 TBOX(Telematics-BOX) PEPS(Passive Entry Passive Start) CAN 通信, 通过 Kavaser CANKING Sealaselogic8 平台分析验证 SM2 算法应用于嵌入式设备是有效可行的, 并保证节点数据合法性和机 密性, 且适合车载设备的单次身份认证场合。 国密 SM2 算法对智能网联汽车安全认证方法研究提供了新的路径。

关键词: 国密 SM2, 智能网联汽车, 安全认证

Abstract: Since the onboard CAN( Controller Area Network) bus is the source of network attacks, onboard data transmitted in plaintext form is easy to be monitored and tampered, and messages without authentication domain and bus arbitration mechanism are vulnerable to network attacks. In order to solve the problem of automobile information security, an asymmetric encryption algorithm based on SM2 is proposed, using multiple point operation strategy, the paper uses public key encryption, private key decryption, carrying out vehicle node identity authentication and data encryption and decryption, according to the characteristics of vehicle CAN bus, the paper uses message of packet protocol to transmits the ciphertext of the SM2 algorithm. The paper transplants the SM2 algorithm to the embedded device with the domestic GD32F103 as the core, simulates the CAN communication between the TBOX( Telematics-BOX) and PEPS( Passive Entry Passive Start) , an important part of the intelligent connected car, and analyze and verify that the SM2 algorithm is effective and feasible in the embedded device through the Kavaser CANKING and Sealaselogic8 platform analysis. It ensures the legitimacy and confidentiality of node data, and it is suitable for single-time identity authentication occasions for in-vehicle devices. The SM2 algorithm provides a new research path for the research on the security authentication method of intelligent networked vehicles.

Key words: algorithm SM2, intelligent connected vehicle(ICV), safety certification

中图分类号: 

  • TP274