由于汽车智能化、网联化的进一步发展,车载以太网在汽车领域得到越来越广泛的应用。目前乘用车已经逐步采用UDS on DoIP技术方案,国内未见商用车采用UDS on DoIP技术的报道。文章主要介绍DoIP数据格式和诊断流程,并着重介绍在商用车领...由于汽车智能化、网联化的进一步发展,车载以太网在汽车领域得到越来越广泛的应用。目前乘用车已经逐步采用UDS on DoIP技术方案,国内未见商用车采用UDS on DoIP技术的报道。文章主要介绍DoIP数据格式和诊断流程,并着重介绍在商用车领域基于DoIP诊断路由应用及测试、刷写应用及测试和UDS诊断测试。展开更多
The paradigm shifts from a closed system to an always-on and fully connected vehicle leads to a largely increased risk to the automotive in-vehicle domain.Thereby,important automotive-specific protocols,which must be ...The paradigm shifts from a closed system to an always-on and fully connected vehicle leads to a largely increased risk to the automotive in-vehicle domain.Thereby,important automotive-specific protocols,which must be protected from a security point of view.This paper focuses on security aspects of Automotive Ethernet to address security challenges of the DoIP.First,it starts with an overview description of DoIP.Then,based on an exemplary in-vehicle network architecture,diagnostic via automotive ethernet by using DoIP are analyzed under security aspects with the help of Microsoft’s threat model.We identify the assets and attack surface of DoIP End Nodes and DoIP data flow,and risk assessment is carried out for DoIP data flow.Finally,the DoIP Cybersecurity goals and risk treatments are proposed to tackle the identified DoIP attacks.展开更多
文摘由于汽车智能化、网联化的进一步发展,车载以太网在汽车领域得到越来越广泛的应用。目前乘用车已经逐步采用UDS on DoIP技术方案,国内未见商用车采用UDS on DoIP技术的报道。文章主要介绍DoIP数据格式和诊断流程,并着重介绍在商用车领域基于DoIP诊断路由应用及测试、刷写应用及测试和UDS诊断测试。
文摘The paradigm shifts from a closed system to an always-on and fully connected vehicle leads to a largely increased risk to the automotive in-vehicle domain.Thereby,important automotive-specific protocols,which must be protected from a security point of view.This paper focuses on security aspects of Automotive Ethernet to address security challenges of the DoIP.First,it starts with an overview description of DoIP.Then,based on an exemplary in-vehicle network architecture,diagnostic via automotive ethernet by using DoIP are analyzed under security aspects with the help of Microsoft’s threat model.We identify the assets and attack surface of DoIP End Nodes and DoIP data flow,and risk assessment is carried out for DoIP data flow.Finally,the DoIP Cybersecurity goals and risk treatments are proposed to tackle the identified DoIP attacks.