Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD AND SYSTEM FOR DATA EXCHANGE ON A NETWORK TO ENHANCE SECURITY MEASURES OF THE NETWORK, VEHICLE COMPRISING SUCH SYSTEM
Document Type and Number:
WIPO Patent Application WO/2021/116975
Kind Code:
A1
Abstract:
A method for data exchange on a communication network (2), operating according to a protocol, and including a transmission bus (4), a first node (E1) and a second node (EN). The first node carries out the steps of: constructing a first and a second data frame (10) which transport first and second information data (Data1, Data2); calculating a first message authentication code (MAC1) as a function of the first and the second information data; constructing a third data frame (20) which transports the first message authentication code (MAC1); transmitting all of the data frames thus constructed. The second node carries out the steps of: receiving the first, the second and the third data frames; extracting the first and the second information data and the first message authentication code; calculating a second message authentication code (MACEXP) as a function of the first and the second information data extracted; comparing the message authentication code extracted with the message authentication code calculated in order to verify the identity thereof.

Inventors:
COLUCCI FRANCESCO ALESSANDRO (IT)
MAZZURCO ALESSANDRO (IT)
Application Number:
PCT/IB2020/061763
Publication Date:
June 17, 2021
Filing Date:
December 10, 2020
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
FPT IND SPA (IT)
International Classes:
G06F21/64; H04L9/32; H04L12/40; H04L29/06; H04L29/08; H04W4/48
Foreign References:
US20170109521A12017-04-20
EP3462670A12019-04-03
US20150089236A12015-03-26
Attorney, Agent or Firm:
BERTOLOTTO, Simone et al. (IT)
Download PDF:
Claims:
CLAIMS

1. A method for data exchange on a communication network (2) operating according to a transmission/reception protocol, the communication network including a transmission bus (4), and a first node (Ei) and a second node (EN) connected to the transmission bus (4), the method comprising the steps, carried out by the first node (Ei), of:

- constructing a first and a second data frame (10) each having a frame format that is defined by said protocol and including a respective payload field (10b), said payload fields (10b) containing respective first and second information data (Datal, Data2) to be transmitted to the second node (EN); - calculating a first message authentication code

(MACi) as a function of the first and the second information data (Datal, Data2) to be transmitted;

- constructing a third data frame (20), having a frame format that is defined by said protocol and includes a payload field (20a), and containing, in the payload field (20a), said first message authentication code (MACi);

- transmitting to the transmission bus (4) the first, the second and the third data frames; the method further comprising the steps, carried out by the second node (EN) , of:

- receiving from the transmission bus (4) the first, the second and the third data frames (10, 20);

- extracting the first information data (Datal) from the first data frame (10) received, the second information data (Data2) from the second data frame (10) received and the first message authentication code (MACi; MACi') from the third data frame (20) received;

- calculating a second message authentication code (MACEXP) as a function of the first and the second information data (Datal, Data2) extracted;

- comparing the first message authentication code (MACi; MACi') extracted with the second message authentication code (MACEXP) calculated; and - accepting the first and the second data frames

(10) only if the first message authentication code (MACi; MACi') extracted is identical to the second message authentication code (MACEXP) calculated.

2. The method according to claim 1, wherein the step of calculating the first message authentication code (MACi) further comprises calculating the first message authentication code (MACi) as a function of an encryption key (K), and the step of calculating the second message authentication code (MACEXP) further comprises calculating the second message authentication code (MACEXP) as a function of a decryption key (K), wherein said encryption key corresponds to the decryption key, thus implementing a symmetric encryption algorithm, alternatively, the encryption key is a private key and the decryption key is a public key different from the encryption key, thus implementing an asymmetric encryption algorithm. 3. The method according to claim 1 or 2, wherein the step of calculating the first message authentication code (MACi) further comprises calculating the first message authentication code (MACi) as a function of a first count value (MC) supplied to the first node (Ei) from a first incremental monotonic counter (42), and the step of calculating the second message authentication code (MACEXP) further comprises calculating the second message authentication code (MACEXP) as a function of a second count value (MC ) supplied to the second node (EN) from a second incremental monotonic counter (62), said first message authentication code (MACi; MACi') being identical to the second message authentication code (MACEXP) only if the first and the second information data to be transmitted are identical to the first and the second information data extracted, and if the first count value (MC) is identical to the second count value (MC ).

4. The method according to claim 3, wherein the step of calculating the second message authentication code (MACEXP) is further carried out for one or more further count values (MC ) supplied to the second node (EN) from the second incremental monotonic counter (62) during a time frame prior to the instant of receiving said second value (MC'), the method further comprising the steps of:

- calculating, at the second node (EN), respective one or more further message authentication codes as a function of said one or more further count values (MC );

- comparing, at the second node (EN), the first message authentication code (MAC; MAC ') extracted with each of said one or more further message authentication codes; and

- accepting, by the second node (EN), the first and the second data frames (10) only if the first message authentication code (MACl; MAC ') extracted is identical to at least one from among said one or more further message authentication codes.

5. The method according to claim 3 or 4, further comprising the step of synchronising the first and the second incremental monotonic counters (42, 62) with one another.

6. The method according to claim 5, wherein said step of synchronising the first and the second incremental monotonic counters (42, 62) with one another comprises the steps of: setting one from among the first and the second nodes as a master node and the other from among the first and the second nodes as a slave node; sending, to the transmission bus (4), a synchronism signal by said master node; receiving, from the transmission bus (4), the synchronism signal by said slave node; updating the value of the relative first or second incremental monotonic counter (42, 62) of the slave node as a function of the synchronism signal received.

7. The method according to claim 5, wherein said step of synchronising the first and the second incremental monotonic counters (42, 62) with one another comprises the steps of: sending to the transmission bus (4), by any one from among the first and the second nodes, a synchronism signal; receiving from the transmission bus (4), by the other from among the first and the second nodes, the synchronism signal and updating the value of the relative first or second incremental monotonic counter (42, 62) as a function of the synchronism signal received.

8. The method according to any one of the preceding claims, wherein the step of calculating the first message authentication code (MACi) comprises carrying out an AES- CMAC cryptographic algorithm.

9. The method according to any one of the preceding claims, wherein said protocol is a CAN protocol that defines a data type frame format, wherein the first, the second and the third data frames all have the same frame format of the type defined by said protocol.

10. The method according to any one of the preceding claims, wherein said transmission bus (4) is a CAN bus of a vehicle (1), said first node (Ei) is a first ECU of the vehicle (1) and said second node (EN) is a second ECU of the vehicle (1).

11. The method according to any one of the preceding claims, wherein said payload fields (10b, 20a) of the first, the second and the third data frames (10, 20) are configured to transport a number of bytes defined by said protocol, said first and second message authentication codes (MACi, MACEXP) being represented on a number of bytes equal to said number of bytes defined by said protocol.

12. The method according to claim 3, or according to any one of the claims from 4 to 11 when dependent on claim 3, wherein the first and the second count values (MC, MC') are represented on a number of bytes equal to said number of bytes defined by said protocol.

13. A data exchange system operating according to a transmission/reception protocol, including a communication network (2) including a transmission bus (4), a first node (Ei) connected to the transmission bus

(4) and a second node (EN) connected to the transmission bus (4), said first node (Ei) being configured to:

• - construct a first and a second data frame (10) each having a frame format that is defined by said protocol and includes a respective payload field (10b), said payload fields (10b) containing respective first and second information data (Datal, Data2) to be transmitted to the second node (EN);

• - calculate a first message authentication code (MACi) as a function of the first and the second information data (Datal, Data2) to be transmitted; · - construct a third data frame (20), having a frame format that is defined by said protocol and includes a payload field (20a), and containing, in the payload field (20a), said first message authentication code (MACi); and

• transmit, to the transmission bus (4), the first, the second and the third data frames; said second node (EN) being configured to:

• - receive, from the transmission bus (4), the first, the second and the third data frames (10, 20);

• - extract the first information data (Datal) from the first data frame (10) received, the second information data (Data2) from the second data frame (10) received and the first message authentication code (MACi; MACi') from the third data frame (20) received;

• calculate a second message authentication code (MACEXP) as a function of the first and the second information data (Datal, Data2) extracted;

• compare the first message authentication code (MACi; MACi') extracted with the second message authentication code (MACEXP); and

• - accept the first and the second data frames (10) only if the first message authentication code (MACi; MACi') extracted is identical to the second message authentication code (MACEXP).

14. The system according to claim 13, wherein: the first node (Ei) is further configured to calculate the first message authentication code (MACi) as a function of an encryption key (K), and the second node (EN) is further configured to calculate the second message authentication code (MACEXP) as a function of said encryption key (K).

15. The system according to claim 13 or 14, further comprising a first incremental monotonic counter (42) associated with the first node (Ei) and a second incremental monotonic counter (62), associated with the second node (EN), said first node (Ei) further being configured to calculate the first message authentication code (MACi) as a function of a first count value (MC) supplied from said first incremental monotonic counter (42), said second node (EN) being further configured to calculate the second message authentication code (MACEXP) as a function of a second count value (MC ) supplied from the second incremental monotonic counter (62), said second node (EN) being further configured to validate an identity between the first message authentication code (MACi; MACi') extracted and the second message authentication code (MACEXP) only if the first and the second information data to be transmitted are identical to the first and the second information data extracted, and if the first count value (MC) is identical to the second count value (MC ).

16. The system according to claim 15, wherein said second node (EN) is further configured to: repeat the operation of calculating the second message authentication code (MACEXP) for one or more further count values (MC ) supplied from the second incremental monotonic counter (62) during a time frame prior and/or subsequent to the instant of receiving said second value (MC ); calculate respective one or more further message authentication codes as a function of said one or more further count values (MC ); compare the first message authentication code (MAC; MAC ') extracted with each of said one or more further message authentication codes; and accept the first and the second data frames (10) only if the first message authentication code (MAC; MAC ') extracted is identical to at least one from among said one or more further message authentication codes.

17. The system according to claim 15 or 16, wherein the first and the second incremental monotonic counters (42, 62) are synchronised with one another.

18. The system according to claim 16, wherein, in order to synchronise the first and the second incremental monotonic counters (42, 62) with one another, one from among the first and the second nodes is configured to be a master node and the other from among the first and the second nodes is configured to be a slave node, said master node being further configured to send, to the transmission bus (4), a synchronism signal; said slave node being further configured to receive, from the transmission bus (4), said synchronism signal, and update the value of the first or the second incremental monotonic counter (42, 62) thereof, as a function of the synchronism signal received.

19. The system according to claim 17, wherein the first and the second nodes operate in a peer-to-peer type system, and wherein, in order to synchronise the first and the second incremental monotonic counters (42, 62) with one another, the first and the second nodes are configured to: send to the transmission bus (4) a respective first and second synchronism signal including the first and the second count values, respectively, receive from the transmission bus (4) the other from among the first and the second synchronism signals, and update, by the first node, the first incremental counter thereof with the second count value only if the second count value is greater than the first count value thereof; and update, by the second node, the second incremental counter thereof with the first count value only if the first count value is greater than the second count value thereof.

20. The system according to any one of the claims from 13 to 19, wherein the first node (Ei) is further configured to calculate the first message authentication code (MACi) by carrying out an AES-CMAC cryptographic algorithm.

21. The system according to any one of the claims from 13 to 20, wherein said protocol is a CAN protocol that defines a data type frame format, wherein the first, the second and the third data frames all have the same frame format of the type defined by said protocol.

22. The system according to any one of the claims from 13 to 21, wherein said transmission bus (4) is a CAN bus of a vehicle (1), said first node (Ei) is a first engine control unit, ECU, of the vehicle (1) and said second node (EN) is a second engine control unit, ECU, of the vehicle (1).

23. The system according to any one of the claims from 13 to 22, wherein said payload fields (10b, 20a) of the first, the second and the third data frames (10, 20) are configured to transport a number of bytes defined by said protocol, said first and second message authentication codes (MACi, MACEXP) being represented on a number of bytes equal to said number of bytes defined by said protocol.

24. The system according to claim 15, or according to any one of the claims from 16 to 23 when dependent on claim 15, wherein the first and the second count values (MC, MC') are represented on a number of bytes equal to said number of bytes defined by said protocol.

25. A vehicle (1), including a system for data exchange according to any one of the claims from 13 to 24.

Description:
METHOD AND SYSTEM FOR DATA EXCHANGE ON A NETWORK TO ENHANCE SECURITY MEASURES OF THE NETWORK, VEHICLE COMPRISING SUCH SYSTEM CROSS-REFERENCE TO RELATED APPLICATIONS

This patent application claims priority from Italian patent application no. 102019000023544 filed on 10/12/2019, the entire disclosure of which is incorporated herein by reference. TECHNICAL FIELD

The present invention relates to a method and to a system for data exchange on a communication network, and to a vehicle which comprises such system, in particular to enhance security measures of the data transmitted on the network.

STATE OF THE ART

Modern electronic systems for motor vehicles provide for the use of software operating on electronic control units (ECUs) which communicate with one another in a network, via serial buses and gateways. The majority of the current systems were not designed thinking about the security of the on-board data against internal or external attacks, for example generated with the intent of altering the exchanged data and causing a malfunction, an alteration or a crashing of the motor control applications and/or vehicle applications.

Processes, methods and instruments used for the design of the current automotive electronic systems concentrate on reliability and cost optimization. Methods and instruments for testing the reliability of automotive electronic systems vis-a-vis random faults are commercially available.

However, the aspects relating to security are rarely taken into account during the development of the hardware and of the software architecture; at the same time, the standard communication protocols do not provide shared methodologies for preventing or mitigating attacks.

The on-board vehicle communication networks are consequently vulnerable, as they allow the non-authorized access in a relatively simple manner, since all communications between the ECUs in the vehicle are carried out in the absence of authentication mechanisms sufficient to guarantee that the identities of the sender and of the receiver are not compromised. Unfortunately, the current communication network protocols such as, for example, CAN (Controller Area Network), FlexRay, MOST and LIN to name a few, do not require authentication or at best have error control mechanisms (CRC) in order to guarantee the integrity of the data and send their messages in plain text. Therefore, there is the possibility of fraudulent communications between control units.

With particular reference to the CAN protocol, in order to overcome the aforementioned drawbacks, various solutions have been proposed aimed at improving the security, in particular in terms of authenticity of the message and freshness of the information.

For example, Hiroshi UEDA et al ., "Security Authentication System for In-Vehicle Network", SEI TECHNICAL REVIEW, No. 81, October 2015, proposes a review of the structure, or format, of the CAN messages in order to include a field relating to a control code. However, such solution would render necessary a general adaptation of the implemented protocol, which must be able to interpret the new message structure.

Other technical solutions provide for the introduction of a new message having a control function, adapted to transport control information calculated in relation to the application data included in specific messages to be protected. In this regard, see Chung-Wei Lin et al., "Cyber-Security for the Controller Area Network (CAN) Communication Protocol", ASE Conference on Automated Software Engineering, 2012. See also Pal-Stefan

Murvay et al., "Security Shortcomings and Countermeasures for the SAE J1939 Commercial Vehicle Bus Protocol", IEEE Transactions on Vehicular Technology, Volume 67, Issue 5, May 2018. However, these solutions are not optimal, as the traffic on the network and the computational load are considerably increased. Further solutions provide for the use of a CAN protocol introduced more recently, called CAN-FD, with increased data rate (>1 Mbit/s) and increased payload (>8 Bytes), optimizing the data transport and thus increasing the possibility of implementing solutions aimed at improving security. However, this solution has the drawback of requiring a readaptation of the on-board vehicle data exchange systems, which must be converted to the new protocol, with consequent costs.

The object of the present invention is to provide a solution to the drawbacks described above, which allows increasing the security of the information transferred between ECUs belonging to a same vehicle network, in an efficient and cost-effective manner, and without increasing the computational load and/or requiring modifications of the hardware resources.

SUMMARY OF THE INVENTION

According to the present invention, a method and a system for data exchange on a communication network, and a vehicle comprising such system are thus provided, as defined in the appended claims. BRIEF DESCRIPTION OF THE DRAWINGS

For a better understanding of the present invention, a preferred embodiment will now be described, by way of non-limiting example, with reference to the accompanying drawings, wherein:

Figure 1 schematically illustrates a data transmission/reception network between nodes belonging to such network, implemented in a vehicle;

Figure 2 illustrates a data frame exchanged between the nodes of the network of Figure 1;

Figure 3 illustrates, by means of a flowchart, a method implemented by the nodes of the network of Figure 1 in transmission;

Figure 4 illustrates an authentication frame exchanged between the nodes of the network of Figure 1;

Figure 5 illustrates, by means of a flowchart, a method implemented by the nodes of the network of Figure 1 in reception;

Figures 6A and 6B illustrate, by means of function blocks, operations carried out by the nodes of the network of Figure 1 during the transmission and reception steps, respectively;

Figures 7A and 7B illustrate, by means of function blocks, operations carried out by the nodes of the network of Figure 1 during the synchronization steps of a local monotonic counter; and

Figure 8 schematically illustrates a vehicle comprising the network of Figure 1.

BEST MODE FOR CARRYING OUT THE INVENTION Figure 1 schematically shows a communication network

2, operating according to a transmission/reception protocol. The network 2 includes a bus 4 to which a plurality of nodes Ei, E2, ..., E N are connected (where E represents the N th node, with N chosen according to need as a function of the specific application).

In one embodiment of the present invention, the transmission protocol is of the CAN ("Controller Area Network") type. In this case, the bus 4 is a CAN bus. In the context of the present invention, explicit reference is made to a CAN protocol according to the version 2.0 (in particular 2.0A or 2.OB) adapted to be used in the automotive sector and installed on board a vehicle 1 (schematically illustrated in Figure 1). However, what described is not limited to the automotive sector, and is generally applicable in all the sectors in which the use of a CAN protocol is provided. As will become more evident in the following, the present invention can also be implemented in types of networks, and related protocols, different from the CAN protocol.

Each node E I -E N , in the context of Figure 1, is an electronic control unit, or ECU, belonging to the vehicle

1.

The CAN bus 4 can transmit different types of messages (or "frames"), among which: data frame, i.e. the frame containing the data that the node transmits; remote frame, i.e. the frame which requires the transmission of a specific identifier; error frame, i.e. the frame transmitted by any node that has detected an error; overload frame, i.e. the frame that introduces a delay between data frame and/or remote frame.

In the context of the present disclosure, the remote, error and overload frames are not relevant and thus will not be discussed in the following.

Figure 2 illustrates a data frame 10, which contains data to be transferred between a sending node E I -E N and one or more receiving nodes E I -E N . In the following, the data frame 10 will also be referred to by the term "message". Different messages are, typically, but not necessarily, characterized by an information content (i.e., the transported data) of different type from one another.

The data frame 10 includes, by way of example, five fields lOa-lOe, specifically:

- a header field 10a including, in turn, one or more subfields used for defining the start of the data frame 10 and managing potential collisions, in a manner per se known;

- a data or payload field 10b, which contains the bytes (from 0 to 8 bytes) which must be transferred to the receiving node and represents the information load of the data frame 10 containing the useful data transmitted by a node;

- a cyclic redundancy check (CRC) field 10c, which contains a check sequence in order to check for errors contained in the message;

- an acknowledgement (ACK) field lOd, which acts as the field for the confirmation of reception by the receiving node;

- an end field (EOF) lOe.

The example illustrated in Figure 2 is illustrative of a possible data frame, and different versions of the CAN protocol can define data frames having different types of fields. This is, however, irrelevant for the present invention, which is applicable to any type of data frame 10 defined according to the CAN protocol in any one of its versions.

Figure 3 illustrates, by means of a flowchart, a procedure for data transmission on the network 2 by a sending node, according to an aspect of the present invention. The transmission by the sending node can have a specific node as its receiver, or it can occur in broadcast mode.

In the following, by way of non-limiting example, one of the nodes of the network 2 (for example, the node Ei) transmits a plurality of messages Msgl-Msg6 to the CAN bus 4, towards a specific receiving node (for example, the node E N ). The following description is also applicable, by analogy and in a manner per se evident to a person skilled in the art, to a transmission broadcast. Typically, the transmission of the data from the node Ei to the node E does not end with the transmission of a single message, and a plurality of messages Msgl- Msg6 are linked together, i.e. transmitted in sequence, from the node Ei to the node E N . The messages Msgl-Msg6 have, by way of example, the form illustrated in Figure 2 and transport respective information data Datal-Data6 in their own payload field 10b.

The messages Msgl-Msg6 are placed in a queue (transmission buffer) at the sending node Ei, in order to be transmitted in the suitable sequence.

Therefore, with reference to step 101 of Figure 3, the sending node Ei transmits a subset of the messages Msgl-Msg6, here the subgroup formed by the messages Msgl, Msg2 and Msg3. In this step 101, the sending node Ei can transmit any number of messages equal to, or greater than, two messages. It is evident that, in the case where the communication between the nodes Ei and E N is completed with a single message, only such single message would be transmitted .

Then, step 102, the sending node Ei transmits to the receiving node E a control message called "Message Authentication Code" (MAC). In this step 102, the transmitted MAC (identified as MACi) is calculated as a function of the data Datal-Data3 contained in the payload field 10b of each of the messages Msgl-Msg3 transmitted at step 101.

According to a further embodiment, the transmitted MAC code can be calculated on the basis of the content, in terms of bits, of the entire message, or of a predefined subset of fields or sub-fields of the message. In the following, to keep the description simple and with no loss of generality, the case where only the payload contributes to calculating the MAC code will be considered .

The frame that transports the MAC code (called "authentication frame" in the following) is analogous to a data frame, for example to the data frame 10 of Figure 2, from the point of view of the structure, or format, of the fields composing it and of the number of transported bytes. See, for example, Figure 4 in which an authentication frame 20 is illustrated (for example, the frame that transports the MACi calculated in step 102). In at least one embodiment of the present invention, the authentication frame 20 is completely indistinguishable from a data frame defined by the CAN protocol.

Specifically, in this example, the authentication frame 20 comprises the header field 10a, the cyclical redundancy check field 10c, the acknowledgement field lOd and the end field lOe described above with reference to Figure 2 and thus identified by the same reference numerals; the authentication frame 20 further comprises a field 20a entirely analogous to the payload field 10b; however, unlike the data frame 10, the authentication frame 20 contains, inside the field 20a, the bytes (here, 8 bytes) identifying the MAC code (MACi) calculated in step 102. It is noted that, from the point of view of the CAN protocol, the authentication frame 20 is indistinguishable from the data frame 10, from the point of view of the format.

Reverting to Figure 3, step 102 is followed by step 103, in which the sending node Ei sends to the CAN bus 4 three further messages Msg4, Msg5, Msg6, in an analogous manner to what carried out during step 1.

Then, step 104, the sending node Ei transmits to the receiving node E a new authentication message 20, including, in the field 20a, a MAC code (MAC2 different from MACi) calculated as a function of the data Data4- Data6 contained in the payload field 10b of each of the messages Msg4-Msg6 transmitted at step 103.

It is noted that steps 103-104 are a replication of steps 101-102, carried out on respective messages. The procedure illustrated in Figure 3 can continue indefinitely, until the sending node Ei completes the queue of messages to be sent (thus carrying out steps analogous to steps 101-102, for all of the messages to be sent).

Figure 5 illustrates, by means of a flowchart, a procedure for receiving data on the CAN bus 4 by a receiving node, here illustratively the node E N .

In reception, the receiving node E acquires the messages Msgl-Msg3 (step 201) and the authentication frame 20 containing the code MACi (step 202). It is noted that, in the reception step, the code MACi transported by the authentication frame 20 could be different from the code MACi transmitted by the node Ei (due to transmission errors or due to fraudulent activities). Therefore, the received code is referred to here by the reference MACi'.

It is further noted that, in the reception step, the messages Msgl-Msg3 and the code MACi could be not perfectly sequential (for example, because the receiving node E is receiving a plurality of messages, and related authentication frames, from different sending nodes Ei, E2, ...)· In the event of messages received from a plurality of sending nodes Ei, E2, ..., the reception buffer of the receiving node E will contain various messages and related authentication frames 20 with a random sequence or in any case a sequence that is not predeterminable a priori. However, as each message and each authentication frame transport a generic identifier or the identifier of the sending node Ei, E2, ... that generated it (in particular, the source address of the sending node), the receiving node E is able to carry out the correct sequencing for the calculation of each respective code MACi' received. Then, the receiving node E N checks (step 203) the authenticity of the received code MAC/ contained in the field 20a of the authentication frame 20; in other words, the node E N checks if the code MAC ] / corresponds to the expected code (MACi'=MACEXP, ideally MACi'=MAC EXP =MACI), i.e. the code MAC ] / is a function of the data Datal-Data3 of the messages Msgl-Msg3 (as discussed with reference to the transmission step 102). It is evident that, for this purpose, all nodes E I -E N of the network 2 share a common encryption mechanism (e.g., algorithm), such that the receiving node is always able to reconstruct, on the basis of the data of the payload field of the received messages, the MAC code calculated by the sending node on the basis of the data of the payload field of the messages to be transmitted . The receiving node, after calculating the expected

MAC code, can carry out a comparison with the MAC code received and detect whether they are identical or not. In the case where they are identical, the related messages are accepted and processed. In cases where they are not identical, countermeasures can be taken, for example, the messages Msgi-Msg3 on the basis of which the incorrect code MACi' was calculated are rejected and a related error message is transmitted by the node that detected the error. In the case where the receiving node notices that a same node transmits messages which are repeatedly rejected because there is discordance between the received and the expected MAC codes, the receiving node could decide to consider the transmitting node as "potentially compromised" (for example, when the number of messages exceeds a predetermined value), and ignore it for a predefined period of time. After the predefined period of time has passed, the receiving node could decide to resume processing the messages coming from the transmitting node.

Still with reference to Figure 5, at step 204, the node E acquires in sequence the further messages Msg4- Msg6 and (step 205) the authentication frame 20 containing the MAC2 code calculated by the node Ei as a function of the data Data4-Data6 of the messages Msg4-Msg6. Then, step 206, the node E checks the authenticity of the code MAC2 in a manner analogous to the foregoing description.

The procedure continues until all the messages sent by the sending node Ei have been received and processed.

In the event that a hacker, or a person with malicious intent, or another person, enters undesired data frames on the CAN bus 4, such person also has to know the methodology for generating the MAC code in order for the entered data frames to be accepted by the nodes E I -E N . In fact, as discussed in the foregoing, the acceptance by each receiving node of the messages addressed thereto is always subject to the verification of the correctness of the MAC code, calculated on the basis of a (confidential) algorithm residing in each node E I -E N . In the absence of such verification and acknowledgement, the receiving node enters a state of alarm, in which suitable countermeasures are taken, as discussed above.

In a preferred non-limiting embodiment of the present invention, the MAC code is calculated using an AES-CMAC encryption algorithm (where AES stands for "Advanced Encryption Standard" and CMAC stands for "Cipher-based Message Authentication Code").

The AES-CMAC algorithm is known per se and calculates a MAC code exploiting, typically, the cryptographic algorithm AES128. The AES-CMAC encryption algorithm requires the use of an encryption key K. According to an aspect of the present invention, the encryption key K is saved in a local memory of each node E I -E N (i.e., the same key K is shared by each node E I -E N ) SO that every node Ei- E N , on the basis of the received data and of the encryption key K, is able to calculate the related MAC code, in order to perform, at reception, the comparison between the MAC code received and the MAC code expected (steps 203 and 206) of Figure 5. According to a different aspect of the present invention, a respective key K I -K N associated with each sending node E I -E N is provided; consequently, the same key K I -K N can be saved only in the receiving node (or receiving nodes) which is interested in checking the authenticity of the messages sent by a specific sending node, or which must receive messages specifically designed for such receiving node.

It is noted that the fact that the AES-CMAC algorithm generates a MAC code having the same length (in bytes) as the data contained in the payload field 10b of the data frames, or a code of greater length, is irrelevant. In fact, in the case where the code generated by the encryption algorithm is represented on a number of bytes that is too large to be entered in the payload of the data frame, operations for the truncation of such MAC code can be carried out in order to respect the requirements regarding the maximum length of data transportable by the authentication frame 20, having a format equal to the format of the data frame 10. This means that if, for example, the data Datal-

Data3 transported in the payload field 10b of the messages Msgl-Msg3 are represented on 8 bytes, also the code MACi calculated by the AES-CMAC algorithm on the basis of Datal-Data3 can be represented on 8 bytes. The requirement of having a MAC authentication code that can be transported in an authentication frame 20 completely analogous, from the point of view of the format, to the data frame 10 defined by the CAN standard is thus respected . In this regard, it is noted that the AES-CMAC standard requires 8 bytes (or a multiple of 8 bytes) for security reasons. If the payload of the sent messages has a size less than 8 bytes, a "padding" operation (i.e. zeros are added) is provided so as to guarantee the completion of the minimum 8 bytes required. In general, for a generic network, the MAC code can have any number of bytes.

According to a further aspect of the present invention, in order to improve the robustness of the proposed method and thus increase the security of the network 2, it is also possible to calculate the MAC code as a function of a further parameter, in addition to the data of the payload field 10b of the considered messages.

Specifically, according to an embodiment, an incremental monotonic counter is implemented, represented on a number of bytes equal to the number of bytes transportable by the payload field 10b, so that it can constitute as well a valid input for the AES-CMAC encryption algorithm. For example, if the payload field 10b is able to transport 8 bytes, the monotonic counter is implemented on 8 bytes. It is noted that 8 bytes are sufficient for covering the entire operational lifetime of the vehicle 1 on which the monotonic counter is implemented. For example, by increasing the monotonic counter by 1 unit every second, the maximum value representable on 8 bytes is reached after 2 64 seconds, corresponding to more than 584 -10 9 years.

As mentioned in the foregoing, for a generic network, the monotonic counter can be represented on any number of bytes (not necessarily 8 bytes). Figure 6A graphically illustrates the foregoing description, by means of function blocks, in relation to the operations performed by the sending node Ei.

Figure 6B graphically illustrates the foregoing description, by means of function blocks, in relation to the operations performed by the receiving node E N .

With reference to Figure 6A, the illustrated operations are carried out by the sending node Ei, which has its own controller, or processor, and a local memory, suitably configured to implement the CAN protocol and the described encryption operations. The block 40 in Figure 6A represents the input of the AES-CMAC encryption algorithm, and includes a data content Datal-Data3 (payload field 10b) of three messages Msgl-Msg3 transmitted consecutively by the node Ei, plus a current value MC of the monotonic counter (block 42 in Figure 6A) residing in the node Ei.

The data Datal-Data3 and the value MC (as mentioned, all represented on 8 bytes in this example) are input into an encryption block 44, which implements the AES- CMAC encryption algorithm discussed above, together with the encryption key K saved in a local memory (block 46).

The encryption block 44 generates the MAC code (in this example, MACi, also on 8 bytes - if necessary, a truncation operation is carried out), and sends it to a block 48 for the generation of the corresponding authentication frame 20. As mentioned, the authentication frame 20 is indistinguishable from a data frame 10, from the point of view of the format, and thus the block 48 that generates the authentication frame 20 is the same that generates the data frames (hence of a type known per se and not further described). The block 48 also receives the data Datal-Data3 to be sent to the receiving node E and generates the related messages Msgl-Msg3. The messages Msgl-Msg3, together with the authentication frame 20 generated on the basis of the data Datal-Data3, are thus entered into a transmission queue (or transmission buffer) 50, to be sent in sequence to the CAN bus 4, with the node E as recipient. The messages Msgl-Msg3 are sent first and the related authentication frame 20 containing the code MACi is sent afterwards .

Reference is now made to Figure 6B, which illustrates by means of function blocks the operations carried out by the receiving node E N . The latter receives the messages Msgl-Msg3 and the authentication frame 20 containing the code MACi (or, rather, the received code MACi' according to the foregoing discussion), and enters them into a receiving buffer 59.

The node E N then calculates locally an expected MAC code (MAC EXP ) by replicating the same operations carried out at the sending node Ei, described above with reference to blocks 40-44 of Figure 6A. Specifically, the receiving node E acquires (block 60) the data Datal-Data3 contained in the payload field 10b of the messages Msgl-Msg3 and the current value MC' of a local monotonic counter 62, and sends them to an encryption block 64, which implements the same encryption algorithm (here, AES-CMAC) as the encryption block 44. The encryption block 64 further receives as an input the encryption key K (saved locally, block 65), and generates as an output a number on 8 bytes (with possible truncation, analogously to what carried out by the block 44) which is compared (block 66) with the code MACi' received. The comparison is intended to evaluate the identicalness between the MAC code expected (MAC EXP ) and the MAC code received (MACi'). The result of the comparison (OK=valid / NOT OK=invalid) determines the subsequent actions to be taken. The above description also applies, analogously, to the subsequent transmissions/receptions, for example for the transmission/reception of the three further messages Msg4-Msg6, with the related authentication frame 20 which transports the related MAC2 code.

The use of a monotonic counter has the function of guaranteeing the "freshness" of the data received and not only the integrity of the encryption. In fact, it could happen that a hacker, or a person with malicious intent, acquires a plurality of data frames, with related authentication frames 20, and re-enters on the CAN bus 4 such data frames and related authentication frames 20 (formally correct) at a later moment in the life of the vehicle 1, causing unpredictable errors. However, the presence of the monotonic counter would hinder such possibility as the MAC code would always depend on the current value of the counter which, as mentioned, is incremental and varies during the operational lifetime of the vehicle 1.

The procedure described above applies to the transmission and reception operations by any node of the network 2 and, in general, it is noted that each node Ei- E of the network 2 is equipped with its own controller, or processor, and a local memory, suitably configured to implement the CAN protocol and the encryption/decryption operations described with reference to the transmission and reception (Figures 6A, 6B).

Moreover, each node E I -E N is equipped with its own incremental monotonic counter of the type described in the foregoing.

In order to guarantee that each receiving node recognizes the authentication frame 20 (and does not confuse it with a generic data frame 10), it is possible to preliminarily define some recognition strategies.

For example, it is possible to enter into the header field 10a of the authentication frame 20 an indication in such sense, relating both to the identification of such frame and to the number of preceding messages on the basis of which the corresponding MAC code was calculated.

A different embodiment provides that all of the nodes E I -E N share the same strategy to be adopted for the recognition of the authentication frame 20, i.e. the fact that such authentication frame 20 is always generated (and thus always received) after a predefined number of messages (data frames). In the examples discussed in the foregoing, such number was equal to three (the groups

Msgl-Msg3 and Msg4-Msg6). However, it is evident that it is possible to define any number (equal to or greater than two) of data frames after which an authentication frame 20, in which the transported MAC code is calculated on the basis of the data of the predefined number of preceding data frames, is sent (and consequently received) . It is evident that, in this context and in the case where the communication between the nodes Ei and E is completed with a single message, it would be possible to provide the sending of further data frames (until the predefined number of frames necessary for the generation of the authentication frame 20 is reached) having zero information content or predefined information, suitably managed by the receiving node. The above description is valid in the case where the transmission by the sending node Ei and the processing of the information received by the receiving node E starts and ends in a time interval that is less than the variation of the value MC/MC' of the local counters 42, 62. In fact, if the value MC/MC' of the local counter resulted to be different in transmission and reception, the comparison of the block 66 of Figure 6B would not give a reliable response.

Although the transmission to the CAN bus 4 is generally very rapid (in the order of thousandths of a second), such drawback can be remedied by adopting one or more strategies.

For example, in a possible embodiment, it is possible to configure each local counter of the nodes E I -E N such that it is increased by a counting unit after a predetermined time interval (e.g. 2-5 seconds), so as to always guarantee the transmission, the reception and the processing of the frames of interest (containing data and related MAC code) within such time interval.

In a further embodiment, the receiving node E can acquire and save a plurality of values MC' of the counter 62 during a time interval Tc (e.g. 2-5 seconds) preceding the instant of reception of the authentication frame. The block 64 then calculates a plurality of MAC codes, each as a function of the data received (Datal-Data3) and of a different value MC' supplied by the counter 62 (i.e. both the value that the counter 62 assumes at the instant of reception of the authentication frame and all the values that the counter 62 assumed in the time interval Tc).

In a further embodiment, the receiving node E can acquire and save a plurality of values MC' of the counter 62 during a time interval which is centred with respect to the instant of reception of the authentication frame 20, or centred with respect to the instant of calculation of the MAC code by the block 64. Such centred time interval includes a time interval Tc (e.g., 2-5 seconds) preceding the instant of reception and/or calculation of the authentication frame and a time interval Tp (e.g., 1- 2 seconds) subsequent to the instant of reception/calculation of the authentication frame; such centred time interval also includes the instant of reception and/or calculation of the authentication frame 20. The block 64 then calculates a plurality of MAC codes, each as a function of the data received (Datal-Data3) and of a respective plurality of values MC' supplied by the counter 62 (i.e., both the value that the counter 62 assumes at the instant of reception/calculation of the authentication frame and all the values that the counter 62 assumed in the time interval Tcand in the time interval

TP).

Such MAC codes are then supplied to the comparison block 66, which acquires them. The comparison has a positive outcome (OK) in the event that the MAC code received with the authentication frame 20 (MACi' in Figure 6B) is equal to at least one of the plurality of MAC codes calculated by the encryption block 64.

In order to obviate a possible drift of the local monotonic counters of the nodes E I -E N , which could become desynchronized with respect to one another, the present invention provides two possible variants, which are discussed in the following.

In a first variant, one of the nodes E I -E N assumes the role of master node, and the remaining nodes assume the role of slave nodes.

In this case, the master node sends to the CAN bus 4, at random or predetermined instants of time, an updated value MC new of its own monotonic counter. Such updated value MC new can be the current value of the counter, or a value calculated as a function of the value of its own local clock MC INT-CLOCK (e.g., the clock of the controller or processor of the master node) to which a positive offset "OFFSET", of a predetermined or random value, e.g., equal to a few seconds, in particular between 10s and 20s, is added: MC n ew = MCiNT C LOCK +OFFSET.

The slave nodes receive the value MC new and update the value of their own local counters to the new value MC new For greater security, in a non-limiting embodiment, the updating is carried out by each slave node if and only if the value received MC new is greater than the current value of its own local counter. Should the value MC new not be received correctly by the slave nodes, there is a desynchronization between the various nodes of the network (the MAC codes generated by all the nodes are erroneous); the master node is able to detect this undesired situation by performing a cross-check with the preceding MC values (i.e. the master node can be configured to recognize that a node of the network is using an old MC value, different from the updated value).

In order to restore the correct values of the counters, the master node re-sends, in this situation, the updated value MC new . It is further noted that, in the event that a slave node is disconnected from the CAN network during the updating of the value of the counter, or for whatever reason loses the synchronism, the master node is able to detect such situation, and restores the correct functioning by re-sending the new value MC new .

In a second variant, there is a "peer-to-peer" configuration between the nodes E I -E N . In this case, all the nodes E I -E N send (periodically or at random instants) a new value MC new of the monotonic counter that is greater than the current value, analogously to the foregoing: MC new =MCi NT _c L oc K +OFFSET. The other nodes E I -E N receive the new value MC new and update their respective counter if and only if the received new value MC new is greater than the current value of their own internal counter. In the case of a peer-to-peer configuration, if the value MC new results not correctly received by all the nodes of the network (e.g. some nodes are using an old MC value), then the node using a not updated MC value re-sends a new value MC new . Moreover, in the event that a node is disconnected from the CAN network during the updating of the value of the counter, or for whatever reason loses the synchronism, the value MC new is sent immediately by the node that is not able to correctly calculate the MAC code.

It is noted that, in both the aforementioned variants, the OFFSET value is generated in such a manner that it is greater than the maximum propagation delay that there can be on the CAN bus 4, also taking into account potential processing delays in the transmission and reception step. It is also advantageous to take into account the time drift of the clocks.

It is further noted that, the value MC new of the counter being represented on 8 bytes, such value can be transmitted using the predefined data frames according to the CAN protocol. Analogously, this also applies to the case where a different protocol is used, representing the value MC of the counter on a suitable number of bytes according to the specifications of the protocol used.

The sending of the value MC new can take place by using a dedicated message (for example, having the same structure as the data frame, in a manner similar to the foregoing description regarding the MAC code); in the MAC calculation in the reception step, the value MC new is directly used.

In one embodiment, the frame containing the code MC new is configured with a higher priority compared to the normal data frames. Figure 7A (in which common elements with those of

Figure 6A are identified by the same reference numerals) graphically illustrates the generation and sending steps of the value MC new by means of a dedicated message 70 analogous to a data frame.

The counter 42 is updated with an OFFSET value (as described in the foregoing), in order to generate the updated value MCnew . The block 40 in Figure 7A represents the input of the AES-CMAC encryption algorithm, and includes a data content Datal and Data3 (payload field 10b) of two messages Msgl and Msg3 transmitted by the node El, plus the updated value MCnew of the monotonic counter (block 42), in analogy to the foregoing description with reference to Figure 6A. In the case of Figure 7A, the sharing of the updated value MC new of the monotonic counter 42 occurs by replacing the data message Msg2 (which was present in the example of Figure 6A) with an equivalent message which transports the updated value MCnew of the monotonic counter 42 that one wishes to share with the other nodes of the network (according to the Master-Slave or Peer-to-Peer strategies described in the foregoing) . In other words, the value MCnew is treated and transmitted as if it were an information datum, just like the datum Data2 of Figure 6A.

In the reception step, Figure 7B (in which common elements with Figure 6B are identified by the same reference numerals), the updated value MCnew is supplied to the local counter 62, which in turn supplies it to the block 60, which uses it for the calculation of the MAC code. It is evident that, in an alternative embodiment, the updated value MCnew can be supplied directly to the block 60, bypassing the local counter 62.

The blocks 60-66 operate analogously to the foregoing description with reference to Figure 6B, using the value MC new instead of the Data2, and the same value MCnew instead of the value MC' .

If the comparison performed by the block 66 gives a positive response ("OK"), then the updating of the local counter 62 to the new value MC new is confirmed; otherwise, strategies for re-synchronizing the receiving node E are implemented .

Based on what described and illustrated above, the advantages that the described system allows obtaining are evident .

With reference to Figure 8, a vehicle 1 is shown which includes an on-board electronics system 72 used for controlling on-board systems 74 of the vehicle 1. The vehicle 1 is represented only schematically and can be a car, a motorcycle, a truck, a sports car, an SUV, a recreational vehicle, a boat, an aircraft, etc. The on board electronics system 72 and the on-board systems 74 include an illustrative arrangement of electronic control units (ECUi, ECU2, ..., ECUN - corresponding to the nodes Ei, E2, ..., E discussed in the foregoing) connected in a manner to be in mutual communication by means of a communication bus 76, for example the CAN bus 4 described in the foregoing.

The on-board electronics system 72 can include a plurality of ECUs in the form of electronic hardware components distributed throughout the vehicle 1, for example configured to receive inputs from one or more sensors in order to carry out diagnostic, monitoring, control and reporting operations and/or other functions. At least two, or all, ECUs are connected to one another by means of the bus 76; each ECU can be programmed to control the on-board systems 72 of the vehicle 1. Each ECU, shown as part of the on-board electronics system 72 or of the on-board systems 74, generally comprises a microprocessor, a non-volatile memory device which saves instructions that are readable by the microprocessor, input/output ports (I/O) for transmitting and receiving data and other control information on the bus 76. These components can be varied based on the particular systems of the vehicle 1 that the respective ECU controls, and on the type of bus 76 used. The processing sophistication and power of the microprocessor, the number of I/Os and the complexity of the instructions or of the software readable by the microprocessor can be increased or decreased based on the type and function of the vehicle 1. The microprocessor can be any type of device capable of processing electronic instructions, including microcontrollers, host processors , controllers, communication processors for vehicles and application- specific integrated circuits (ASIC). The microprocessor carries out different types of instructions saved digitally, such as software or firmware programmes saved in the memory device. For example, the microprocessor can run programmes or process data in order to carry out at least a part of the method discussed in the foregoing with reference to Figures 3, 5, 6A, 6B. The memory device can be implemented using known types of random-access memory (RAM) or EEPROM memory, while the I/O can be implemented using a controller, such as a CAN controller, or some other means depending on the type of bus 76 used. In such sense, the ECUs can include hardware compatible with a particular type of bus 76 used on the vehicle 1. For example, the ECUs that communicate using a CAN bus can include a microprocessor, a CAN controller and an I/O unit in the form of a transceiver which sends and receives messages on the CAN bus.

In particular, the present invention proposes a communication method and system between nodes of a network (in particular between ECUs of a vehicle) which are secure and implementable without altering the current architectural configuration of the network and of the vehicle, and without requiring the use of new communication technologies not forming part of the protocol standard based on which the network operates. Consequently, also the implementation costs are particularly reasonable. Finally, it is clear that modifications and variations can be carried out to what described and illustrated herein without thereby departing from the protection scope of the present invention, as defined in the appended claims. In particular, the present invention can be applied to transmission networks of a type different from the CAN bus, for example to networks based on the CAN-FD protocol, networks based on the TCP/IP protocol, Local Interconnect Network (LIN), Media Oriented Serial Transport (MOST), Ethernet, Local Area Network (LAN), and even others.

In particular, the present invention can be applied to wired or wireless transmission networks.

Moreover, although the AES-CMAC encryption method has been mentioned explicitly, it is possible to use different encryption methods and algorithms such as, for example, the algorithms HMAC ("Keyed-Hash Message Authentication Code") , KMAC ("KECCAK Message

Authentication Code") , GMAC ("Galois Message

Authentication Code"), or even others such as, for example, DAA, CBC-MAC, NMAC, OMAC/CMAC, PMAC, VMAC, UMAC, Polyl305, SipHash, and even others.

Furthermore, it is evident that the encryption algorithms that can be used for the generation of the MAC code can be of various types; for example, it is possible to use symmetrical encryption algorithms (in which the encryption key K is saved in all of the nodes E I -E N ) or asymmetrical encryption algorithms (public keys are saved in all of the nodes E I -E N , while a private key is available in a single node). Alternatively, it is possible to provide a private key Ki, K2, ..., K different in each node, and related public keys Pi, P2, ..., PN in all of the nodes, as illustrated below:

Node Ei: (Ki, P2,..., PN),

Node E2: (K2, Pi, P3, ..., PN),

Node EN: (KN, PI, P2, ..., PN-I)·