Advanced driver assistance system and safe connection car introduction

The advanced driver assistance system (ADAS) allows the driver to better understand the situation and control, making driving easier and safer. ADAS technology can be based on in-vehicle systems, ie vehicle resident systems, such as vision camera systems and sensor technology, or based on intelligent interconnection networks such as vehicle-to-vehicle (V2V) or vehicles. A vehicle-to-infrastructure (V2I) system, which is collectively referred to as V2X.

V2X communication utilizes an in-vehicle system for short-range wireless communication devices to transmit safety-related information such as vehicle speed, direction, braking state, and vehicle size with other vehicles. The V2X network can transmit information over long distances by using multiple hops to transmit information through other nodes. This farther detection distance, the ability to look beyond the corners or through other vehicles, assists vehicles equipped with V2X to detect certain threats faster than sensors, cameras or radars and alert the driver accordingly.

Advanced driver assistance system and safe connection car introduction

Figure 1 Typical V2X network implementation

In addition to developing basic security information for security applications, the network can also be used by other connected vehicle applications, such as mobility or weather. Additional information from vehicles or infrastructure can be developed in the future.

In terms of safety impact, according to a study conducted in 2004-2008, the NaTIonal High-way Traffic Safety AdministraTIon (NHTSA) estimated that 22 possible vehicle collision scenarios could be avoided with V2C networks. This means that nearly 81% of undamaged light vehicles can be avoided. According to the vehicle collision data from 2004 to 2008, the death, injury and property losses caused by the collision of these 22 target light vehicles each year averaged about 27,000, 1,800,000 and 7,300,000 respectively. Dollar.

Large-scale adoption of V2I offers potentially huge security advantages. Below is a list of V2I potential security applications:

Red light warning; cornering speed warning; parking sign clearance assistance; deceleration zone warning; on-site weather information warning; violation of parking sign warning; illegal crossing of railway warning; excessive vehicle warning. The warning not only informs the vehicle and the driver that the safety is violated, but also alerts the nearby vehicle via a wireless link to help prevent collisions, such as when the vehicle is at a red corner of the intersection or when the parking sign is violated.

V2X security

In order to fully realize the potential of V2X, the system must ensure two points: the information comes from a trusted source; and the information has not been tampered with from the sender to the receiver.

Among the two points mentioned above, if any one is not done well, it will cause problems, causing serious consequences and fatality. False information can provide vehicle driving data such as the wrong speed and direction, which can lead to accidents. The manipulation of data by lawless elements can lead to urban traffic disruption and confusion.

In addition to the concerns mentioned above, users are also concerned about privacy and ensure that information does not reveal the identity and location of the driver. Anonymous vehicle safety information is only provided to pre-authorized entities, such as other vehicles. To ensure large-scale adoption of V2X, users must rely on V2X systems to not provide their personal data, which is especially important. In order to prove reliability, the sender of the message must provide a unique identifier that the recipient can verify, proving that the information comes from a reliable source. In general, this is achieved by using symmetric or asymmetric encryption techniques.

Advanced driver assistance system and safe connection car introduction

Figure 2: The Sram startup value is used to calculate the private key, which is ensured by the "activation code" saved during the registration phase. B) According to the private key, the component manufacturer calculates and authenticates a public key, giving each component a certificateable and globally unique unclonable identity.

Symmetric encryption is typically suitable for small networks with a limited number of nodes, where the sender and receiver share a common key that is usually known to both parties before any packet is transmitted. By dynamically generating a code (called a message authentication code, or macs) based on the payload and key calculations to verify the integrity and source of the packet, the recipient verifies the authenticity of the data with the key.

Although this method is simple, since all nodes must use the same key, there is an unacceptable security risk. However, if each pair of nodes that communicate with each other must use different keys, it is difficult to handle. This method is not possible for large networks such as large V2X.

Asymmetric encryption provides an extensible way to connect as many nodes as possible in the network. To achieve this, each node digitally signs each delivered message using a private key. The digital signature can be verified by the recipient using the associated public key transmitted to all receiving nodes. In addition to having better scalability than symmetric encryption, asymmetric encryption enables simpler fault node replacement.

However, this raises another question: How to ensure that the private and public keys used by each node are real and not tampered with?

Advanced driver assistance system and safe connection car introduction

With V2V technology, four-fifths of crashes can be avoided

The best solution to the first part of the problem is to use the biometric signature of the silicon IC, which is built on tiny physical changes in the manufacturing process of each device. These process changes can never be exactly the same, providing a unique signature for each device, so no one can clone two ICs. This signature is called a physical unclonable function or PUF. In addition to being non-clonal, PUF-based keys are usually implemented at the atomic level and are therefore difficult to extract by hackers. The IC can implement PUF based on several physical factors such as memory components, logic delays, and resistance. Sram-based ICs use the unique random start state of the sram unit to generate a private key, which is safer because the state of the unit is erased when the power is turned off.

The second part of the problem can be solved with a public key infrastructure (PKI). A PKI is a system for creating, storing, and distributing digital certificates that are used to verify a particular public key belonging to an entity. The PKI creates a digital certificate, maps the public key to the entity, and securely stores the certificate in a central repository and abolishes it when needed.

In a PKI system, a Certificate Authority (CA) digitally signs its public key through the CA's own private key to authenticate all nodes. The most commonly used public key authentication format is X.509. When a device transmits a message digitally signed with its private key, the information can be verified using the device's public key. The device can also send its X.509 certificate to all nodes that receive its information, so that these nodes have their public key. The receiving party can use the public key of the CA to verify the X.509 certificate including the public key of the device, and the CA public key is pre-placed in all nodes, which is an intrinsically trusted public key. Since the receiver can verify the signature used by the sender, this scheme can establish a proven hierarchical certificate trust chain. This solution also ensures that counterfeit machines are easily detected.

Advanced driver assistance system and safe connection car introduction

Figure 3: Establishing a unclonable device identity based on a PUF that includes a component manufacturer's authentication key to establish a chain of trust so that each system integrator or operator can authenticate its own independent PKI.

NHTSA believes that the public key infrastructure selection (asymmetric key) using the signature method is the most effective way to implement communication security and trusted information transfer for a large number of users. In addition, in order to provide a secure network, PKI-based systems also provide an infrastructure that can be easily scaled with PKI solutions. Importantly, the effectiveness of this approach is highly dependent on the technical design decisions to implement this approach in a given environment. The V2X Certificate Authority issues a number of anonymous certificates per vehicle per year, blocking attempts to track owner actions.

Some devices can implement PKI using PUF technology. These devices offer a wide range of product roadmaps with a variety of IO and fiber density options that allow users to choose the device that meets their needs. The Sram PUFs in these devices utilize device-level certificate authority to establish pre-configured authentication identities for each node in the network. These devices also have built-in encryption capabilities, such as hardware accelerators for AES, SHA, HMAC, and Elliptic Curve Cryptography (ECC), as well as encryption level true random number generators. These features are also used in conjunction with the user's own certificate authority to create user PKIs or to register systems for use in V2X PKI in the US or Europe.

Since malicious people can enter on-site systems, such as vehicles, it is important that the hardware can protect the key from various physical or side channel attacks such as differential power analysis (DPA). In addition to advanced key storage and key generation technologies, such as PUF and ECC, some devices also have a DPA-licensed license to provide SOC and FPGA with security, remote control, and DPA-renewable capabilities. DPA's patent license also allows users to accelerate PKI transactions in a DPA-safe manner using DPA countermeasures through a large amount of computing power in mainstream FPGAs. V2X networks protected by these solutions will ensure communication security.
This article is selected from the "Automotive Electronics Special", more quality content, download now
Automotive Electronics Special Issue

Electric Pole

Electric pole, also known as a telephone pole or telegraph pole, is a tall structure used to support overhead power lines and other utilities, such as telephone and cable lines. These poles, typically made of wood, metal or concrete, are installed along roadsides, in residential and rural areas to deliver electricity and other services to homes and businesses. The height and design of poles can vary depending on the specific requirements of the utility company and the location of the poles.

Electric Pole,Distribution Steel Pole,Utility Pole,Electricity Pole

JIANGSU HONGGUANG STEEL POLE CO., LTD. , https://www.hgsteelpoles.com

Posted on