For a long time, hackers have never had the opportunity to enter the car's control network. But since the Bluetooth technology and the wireless LAN bus system have been used, this situation will change. The new technology, called "trustworthy computing," will bring new security to the car and enable protected data communications.
This article refers to the address: http://
Since the first electronic injection system without software control in 1967, today's engine controllers have collected more than 10,000 parameters. For example, in the high-end 7 series sedan produced by BMW, 70 different controllers are installed, and there are more than 10,000 car control parameters. The program code of the control software reaches 100MB, and there are 10 million control adjustments. Program statement.
With such powerful adjustment and control capabilities, the adjustment parameters of the car are obviously improved. When the user buys a new car, he gets more than just a new car in the traditional sense, and may also be equipped with the latest software provided by the seller. This software can adjust the engine's power performance or fuel economy according to the price and driving status of the gasoline. However, when the software is upgraded, the engine may "crash". This phenomenon may be the result of a virus called "n" that prevents the entire car from working properly. And this is indeed the problem that needs to be solved now.
In a car, many situations require the driver to control the vehicle. After using the electronic control system, the Golf engine power can be increased by 22kW by car software for only 700€.
software upgrade
The software upgrade currently uses a physical interface to connect with the controller. In the future, wireless communication can be used to communicate with the controller, but this also opens the door for hackers. Many experts believe that the possibility of car control software being controlled by hackers after using wireless communication technology in mobile communication networks is greatly increased. In the computer world, a standardized car network like WLAN is a target that hackers like very much, and it is easy to implant a virus like Wardriving.
In order to avoid such dangers, the communication network between vehicles in the future should not consider the use of a wireless local area network that is logged in to a fixed location. The response is to adopt a dynamic Peer-to-Peer (connection between computer and computer) structure to make each user Both explicitly log in and log out. Therefore, the implementation of this program also requires the development of a wireless communication technology protocol for vehicles.
BMW's invention is based on the "IBM Global Business Security Index Report" protocol, which is a new product with anti-virus capabilities developed under the circumstance of computer viruses and worms in mobile communication devices.
Bluetooth technology
Audi and Samsung recently introduced an interface for inputting music using Bluetooth technology. With the help of this interface, drivers can directly input their favorite music from the phone to the car radio. More and more wireless transmissions provide more powerful communication capabilities for existing automotive bus systems, but they also pose greater risks, especially wireless communication based on standard Bluetooth technology with security holes. The risk is even greater.
Each Bluetooth connection requires a communication switch that is stored in the terminal device, or a communication switch that is updated each time. The received PIN (Person Identification Number) enters this communication switch as determined by the communication security standard. For most users, the comfort of communication tools seems to be more important than the data security and operational security of communication, because most Bluetooth communication interface numbers are weak and the number of interfaces is very small.
PDAs are also very insecure because this small computer uses the Windows CE system, which is a paradise for hackers and viruses, and they can do whatever they want. In the long run, cars need a safe and reliable control system. At present, experts have developed a car electronic control system with a firewall. The EMSCB (European Multinational Security Computing Base) project, which the federal government can invest 800,000 € for three years, requires extensive security protection for automotive mobile communication technology.
"trustworthy operation"
A "virtual interface" generated by hardware separates the traditional working system from the hardware and generates so-called "trustworthy operations." The protective layer of this automotive electronic communication system was developed by the Gelsenkirchen Technical College and the Dresden Technical University and Sirrix and Escrypt. The product name is "Turata".
"trusted computing" requires user and computer systems to verify. Here, "Trust" refers to waiting for an instrument or software, waiting for a specific purpose, in accordance with the prescribed methods and methods. Such a "Trusted Platform" can clearly identify changes in the computer system, thereby not only identifying the entry of external software, but also identifying problems caused by configuration, functional errors or security vulnerabilities.
Important data and switch control passwords are outside the unsafe working system and can be used when necessary.
In general, any data exchange cannot bypass the "trustworthy computing" system. Microsoft is also working hard to study this system. Because Microsoft is busy with the development and design of the new operating system Vista, EMSCB's "trustworthy computing" has gone further. When Microsoft's password control expert built a hard disk password and secure boot method based on "trustworthy computing" in Windows Vista system, EMSCB has already completed hard disk password setting and network connection. According to Escrypt's computer experts, such chips can be placed on the market within two years of the company's computers. At the same time as the development of each of the above projects, Escrypt also worked with DaimlerChrysler and Bosch-Sapphire to develop automotive embedded systems supported by Kryptochip.
Greater risk when data is not protected
Thieves' preference
Most of the stolen cars in Germany, such as the BMW X5, are stolen by high-tech thieves: using a laptop or a specially developed bus controller, these devices are used to open all the doors of the car. In this type of car theft, the data stored on the controller-specific chip is "modified" by the thief in a way that is rewritten, rewritten, or deleted. Using the vehicle password installed by the stolen original software, the thief can disable the car's anti-theft device and steal the car.
Virus spread
More than 10 years ago, a German car manufacturer copied the company's news reports to disk and sent it to about 2,000 journalists, spreading the virus. Soon after, the car factory had to issue a large number of anti-virus programs to reporters who received the disk. The same situation has occurred in a car manufacturing plant in the United States. The very dangerous "Monkey" virus is spread out and will erase all data on the hard drive.
Universal car key
There was also disturbing news at the Johns-Hopkins University in Baltimore: the “researchers†invented the universal car key, which unlocked the electronic key code of 150 million cars worldwide, which can read the car alarm. Key password in .
Professional thief arrested
Not so long ago, there was a case in which a thief was sentenced for "carrying an instrument that invalidated the immobilizer" and the court of Konstanz declared 150 days of criminal detention. When examining the two Eastern Europeans, the Swiss border authorities found that they carried the "cable interface for electronic components connection" and five frequency converters, as well as the original software and program reading instruments used by BMW.
A Battery Management System (BMS) is any electronic system that manages a rechargeable battery (cell or battery pack), such as by protecting the battery from operating outside its Safe Operating Area, monitoring its state, calculating secondary data, reporting that data, controlling its environment, authenticating it and / or balancing it.
A battery pack built together with a battery management system with an external communication data bus is a smart battery pack. A smart battery pack must be charged by a Smart Battery Charger.
Battery Management System
Battery Management System,Bms Battery Management System,12V Battery Management System,Lipo Battery Management System
Xinxiang Taihang Jiaxin Electric Tech Co., Ltd , https://www.agvchargers.com