本文已被:浏览 1669次 下载 1311次
投稿时间:2019-07-31
投稿时间:2019-07-31
中文摘要: 当前能源互联网中电动汽车与充电桩之间采用的通信协议是控制器局域网(CAN)协议,但该协议缺乏加密功能,存在着遭到黑客重放攻击的可能。为了验证CAN通信协议存在的安全问题,采用STM32F767单片机、USB-CAN转化器和PC机搭建有关CAN通信的硬件环境。为了增强CAN协议的安全性,提出了一种加随机数抵御重放攻击的算法。在Eclipse Neon(v4.6)及JDK1.8+版本的实验环境下模拟电动汽车正常充电、对其进行重放攻击以及加随机数防御重放攻击的3种模式过程。实验结果表明,所提方法可以有效增强CAN总线抵御重放攻击的能力。
Abstract:The CAN protocol is used to communicate data between electric vehicles and the charger adopts.However,the protocol lacks encryption function,which causing it possible for hackers to carry out replay attack.In order to verify the security problems of CAN communication protocol,this paper uses STM32F767,USB-CAN converter and PC to build the hardware environment of CAN communication.In order to enhance the security of CAN protocol,an algorithm of adding random numbers to resist replay attack is proposed.Under the experimental environment of Eclipse Neon(v4.6) and JDK1.8+,the normal charging,replay attack and defense by adding random Numbers of electric vehicles are simulated.Experimental results show that this method can effectively enhance the ability of CAN bus to resist replay attack.
文章编号:20214015 中图分类号:TN918 文献标志码:
基金项目:智能电网产学研开发中心项目(A-0009-17-002-05);上海自然科学基金(16ZR1436300);国家自然科学基金(61772327);浙江大学工业控制技术国家重点实验室开放式基金(ICT1800380)。
作者 | 单位 | |
王勇 | 上海电力大学 | |
李亚菲 | 上海电力大学 | 1156668369@qq.com |
陈雪鸿 | 国家工业信息安全发展研究中心 | |
刘丽丽 | 华电电力科学研究院有限公司国家能源分布式能源技术研发(实验)中心 | |
吴旻 | 上海电力大学 |
引用文本:
王勇,李亚菲,陈雪鸿,等.电动汽车CAN协议的重放攻击与防御方法[J].上海电力大学学报,2021,37(4):395-401,406.
WANG Yong,LI Yafei,CHEN Xuehong,et al.Replay Attack and Defense Method of CAN Protocol for Electric Vehicle Charging[J].Journal of Shanghai University of Electric Power,2021,37(4):395-401,406.
王勇,李亚菲,陈雪鸿,等.电动汽车CAN协议的重放攻击与防御方法[J].上海电力大学学报,2021,37(4):395-401,406.
WANG Yong,LI Yafei,CHEN Xuehong,et al.Replay Attack and Defense Method of CAN Protocol for Electric Vehicle Charging[J].Journal of Shanghai University of Electric Power,2021,37(4):395-401,406.