透過您的圖書館登入
IP:18.118.120.204
  • 學位論文

設計及實作車用網路媒體接入控制安全驗證平台

Design and Implementation of a Verification Platform for Automotive Network with Improved MACsec

指導教授 : 郭斯彥
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


近年來,物聯網(IoT)技術發展迅速,進而帶動汽車產業。如今的汽車為了提升功能的多樣性和精確性,每輛汽車所具備的電子控制單元(ECU)數量已經成長到了數百個以上。隨著電子控制單元的數量增加,車內網路的負擔,像是頻寬需求,也隨著增加的流量和資料一起有了爆炸性的成長。面對這些增加的負擔,一些常見的車用網路協議,像是控制器區域網路(CAN)、FlexRay、車用電子之多媒體傳控網路(MOST),都有著共同的問題:傳輸速率、頻寬已經無法跟上新世代車用應用中傳送數據與日俱增的需求。因此,汽車產業界正逐漸將車載總現遷移到乙太網路,以取得更高的帶寬和更快的響應。隨著在汽車網路中信息量的成長,各種形式的個人資訊也隨之增加。其中更包含了使用者所在位置、通聯記錄,甚至是使用者社群網路帳號資訊等等。為了確保汽車中的隱私資料得到該有的保障,車用的網路安全也顯得越來越重要。然而,為區域網路(LAN)所設計的乙太網路標準、元件和系統,包含乙太網路第二層的安全協議(MACsec),並非自然適合與車用網路一起使用。為此,乙太網路必須進行最佳化。舉例來說,MACSsec 協議尚未為嵌入式、IoT 裝置去進行最佳化。MACsec 協議預設的密碼套件可以使用特有的指令集,像是AES-NI 以及CLMUL... 等等,進行硬體加速。然而這些指令集能只用的範圍僅限於特定的處理器,並非市面上所有的處理器都可以使用硬體加速,讓密碼套件以最佳的表現運作。並且,大多數車用網路中的處理器不支援前文提及的硬體加速指令集。故在本文中,我們以相對輕量的演算法來取代MACsec 協議中的預設密碼套件,並進行運作表現的比較。要將乙太網路運用在車用網路中,就勢必會伴隨著晶片設計的改動,所以另一個重要的議題就是晶片驗證。在本文中,因為涉及將標準中的預設密碼套件更換為更加輕量的演算法,所以驗證功能及運作的正確性顯得更加重要。我們針對IEEE802.1ae 和IEEE802.1x,設計並實現了乙太網路媒體接入控制安全(MACsec)的驗證平台,用以驗證在本文中針對車用網路最佳化的功能及正確性。為了這個議題,我們利用硬體描述語言SystemVerilog 基於基本功能斷言的驗證來實現我們設計和測試的方法。最後,我們將展示媒體接入控制安全(MACsec)效能的提升和驗證平台高斷言的覆蓋率。

並列摘要


The IoT market is burgeoning in the recent years, and the automotive industry has been forced to follow up the trend and progress their product, for instance, smart vehicles. To make vehicles smarter, the automakers must improve both the variety and accuracy of the functions in their products. In order to achieve that intent, the amount of electronic control units (ECU) per vehicle has grown to hundreds or even more. The burden, for instance: bandwidth, data transfer rate, has therefore grown to a level that traditional in-vehicle network protocols, such as CAN, FlexRay and MOST, can barely handle. Thus, the automotive industry decided to make Ethernet the backbone of their in-vehicle network for higher bandwidth and faster data transfer speed. Furthermore, as all types of sensors and even devices with private information are installed within the vehicle, the security of the in-vehicle network became inevitably important. Information such as the location of the vehicle or even communication records must be securely protected. In other words, network security for in-vehicle network became more important than ever before. However, the Ethernet specification is designed for local access network (LAN), including MAC security protocol (MACsec) within the second layer of Ethernet, and is not quite optimized for IoT devices. There are even algorithms in MACsec that can only perform hardware acceleration on Intelbased CPUs, which in case the protocol cannot be operated with its ideal performance on IoT devices/ECUs. Thus, in our thesis, we tried supplanting the original algorithms of the cipher suite with some more light-weightones for the improvement on performance for IoT devices and ECUs. If the idea is adopted by the companies that designs the ECU chips with MACsec functionality, the performance may have great improvements. Mentioning of designing chips, it has became much more complicated than ever, even to the point that designers is not able to debug efficiently without the proper tools. Thus, another important issue is verification. Since our experiment involves rearrangement of the algorithms in the specifications, we must perform verification to be certain of our MACsec module’s functionality and correctness. Therefore, in order to test out the results of our experiment and verify the correctness, we designed and implemented a verification platform for the in-vehicle network. In our thesis, we focus on two specifications, IEEE802.1AE and IEEE802.1X. Based on those two specifications, we build the verification platform that can not only be used for verifying the MACsec protocol with the ordinary cipher suite, but our MACsec with alternative cipher suite. Moreover, we use hardware describe language, SystemVerilog, to implement our design and generate test cases with functional assertion-based verification methodology. Lastly, we demonstrate the result of performance increasing in MACsec and the high ratio of assertion coverage on MACsec features with our test cases.

參考文獻


[1] IEEE, “IEEE Std. 802.1AE-2018, Media Access Control (MAC) Security,” IEEE Computer Society, 2018.
[2] IEEE, “IEEE Std. 802.1X-2010, Port-Based Network Access Control,” IEEE Computer Society, 2010.
[3] IEEE, “IEEE Std. 802.1AC-2012, Media Access Control (MAC) Services Definition,” IEEE Instrumentation and Measurement Society, 2008.
[4] M. Dworkin, “Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC,” National Institute of Standards and Technology, 2007.
[5] D. Harkins, et al, “Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES),” RFC, https://tools.ietf.org/html/rfc5297, 2008.

延伸閱讀