System and method for detecting attack when sensor and traffic information are inconsistent
First Claim
1. A system for detecting an attack, comprising a server and a plurality of vehicles capable of wirelessly communicating with each other,each of the plurality of vehicles including:
- a sensor; and
a vehicle processor configured to act as;
a sensor information acquisition interface adapted to acquire sensor information from the sensor; and
a traffic information reception interface adapted to receive traffic information through wireless communication, wherein the traffic information is information that describes a road condition around the vehicle and is sent from an outside of the vehicle,wherein a cryptographic processor is configured to verify electronic signature data of the received traffic information and detect invalid traffic information using signature information notified from the server; and
a transmitter adapted to transmit the sensor information and the traffic information to the server, andthe server including;
a server processor configured to act as;
a specification controller to specify to at least any of the plurality of vehicles signature information indicating the characteristics of the invalid traffic informationa reception controller adapted to receive the sensor information and the traffic information from at least any of the plurality of vehicles;
a verification controller adapted to verify whether the sensor information and the traffic information are inconsistent with each other, the sensor information and the traffic information determined to be inconsistent with each other when the road condition indicated by the traffic information and a road condition derived from the sensor information do not match; and
a notification controller adapted to notify, when the sensor information and the traffic information are inconsistent with each other, at least any of the plurality of vehicles of the inconsistency between the sensor information and the traffic information.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is a system for detecting an attack, which includes a server and a plurality of vehicles capable of wirelessly communicating with each other. Each of the vehicles has a sensor, a sensor information acquisition unit, a traffic information reception unit, and a transmission unit that transmits the sensor information and the traffic information to the server. The server has a reception unit that receives the sensor information and the traffic information from the vehicles, a verification unit that verifies whether the sensor information and the traffic information are inconsistent with each other, and a notification unit that notifies, when the sensor information and the traffic information are inconsistent with each other, the vehicles of the inconsistency.
9 Citations
10 Claims
-
1. A system for detecting an attack, comprising a server and a plurality of vehicles capable of wirelessly communicating with each other,
each of the plurality of vehicles including: -
a sensor; and a vehicle processor configured to act as; a sensor information acquisition interface adapted to acquire sensor information from the sensor; and a traffic information reception interface adapted to receive traffic information through wireless communication, wherein the traffic information is information that describes a road condition around the vehicle and is sent from an outside of the vehicle, wherein a cryptographic processor is configured to verify electronic signature data of the received traffic information and detect invalid traffic information using signature information notified from the server; and a transmitter adapted to transmit the sensor information and the traffic information to the server, and the server including; a server processor configured to act as; a specification controller to specify to at least any of the plurality of vehicles signature information indicating the characteristics of the invalid traffic information a reception controller adapted to receive the sensor information and the traffic information from at least any of the plurality of vehicles; a verification controller adapted to verify whether the sensor information and the traffic information are inconsistent with each other, the sensor information and the traffic information determined to be inconsistent with each other when the road condition indicated by the traffic information and a road condition derived from the sensor information do not match; and a notification controller adapted to notify, when the sensor information and the traffic information are inconsistent with each other, at least any of the plurality of vehicles of the inconsistency between the sensor information and the traffic information. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An system for detecting an attack, comprising:
a processor configured to act as;
a first acquisition controller adapted to acquire sensor information acquired from a sensor of a vehicle;a second acquisition controller adapted to acquire traffic information received by the vehicle through wireless communication, wherein the traffic information is information that describes a road condition around the vehicle and is sent from an outside of the vehicle wherein a cryptographic processor is configured to verify electronic signature data of the received traffic information and detect invalid traffic information using signature information notified from the server; and a verification controller adapted to verify whether the sensor information and the traffic information are inconsistent with each other, the sensor information and the traffic information determined to be inconsistent with each other when the road condition indicated by the traffic information and a road condition derived from the sensor information do not match and wherein the server specifies the vehicle signature information indicating the characteristics of the invalid traffic information.
-
7. A method for detecting an attack, executed by a system comprising a server and a plurality of vehicles capable of wirelessly communicating with each other, at least one of the plurality of vehicles being a target vehicle and performing:
-
a sensor information acquisition step of acquiring sensor information from a sensor wherein a cryptographic processor is configured to verify electronic signature data of the received traffic information and detect invalid traffic information using signature information notified from a server; a traffic information reception step of receiving traffic information through wireless communication, wherein the traffic information is information that describes a road condition around the vehicle and is sent from an outside of the target vehicle; and a transmission step of transmitting the sensor information and the traffic information to the server, and the server performing;
a reception step of receiving the sensor information and the traffic information from the target vehicle;a verification step of verifying whether the sensor information and the traffic information are inconsistent with each other, the sensor information and the traffic information determined to be inconsistent with each other when the road condition indicated by the traffic information and a road condition derived from the sensor information do not match; and
wherein the server specifies the vehicle signature information indicating the characteristics of the invalid traffic information;and a notification step of notifying, when the sensor information and the traffic information are inconsistent with each other, at least one of the plurality of vehicles of the inconsistency between the sensor information and the traffic information.
-
-
8. A method for detecting an attack performed by a computer, the method comprising:
-
a first acquisition step of acquiring sensor information acquired from a sensor of a vehicle wherein a cryptographic processor is configured to verify electronic signature data of the received traffic information and detect invalid traffic information using signature information notified from a server, a second acquisition step of acquiring traffic information received by the vehicle through wireless communication, wherein the traffic information is information that describes a current road condition around the vehicle and is sent from an outside of the vehicle; and a verification step of verifying whether the sensor information and the traffic information are inconsistent with each other, the sensor information and the traffic information determined to be inconsistent with each other when the road condition indicated by the traffic information and a road condition derived from the sensor information do not match and wherein the server specifies the vehicle signature information indicating the characteristics of the invalid traffic information.
-
-
9. A non-transitory computer-readable medium having recorded thereon a computer program for causing a computer to perform:
-
a sensor information acquisition step of acquiring sensor information from a sensor; a traffic information reception step of receiving traffic information through wireless communication, wherein the traffic information is information that describes a current road condition around the vehicle and is sent from an outside of a target vehicle of a plurality of vehicles wherein a cryptographic processor verifies electronic signature data of the received traffic information and detect invalid traffic information using signature information notified from a server; a transmission step of transmitting the sensor information and the traffic information to the server; a reception step of receiving the sensor information and the traffic information from the target vehicle; a verification step of verifying whether the sensor information and the traffic information are inconsistent with each other, the sensor information and the traffic information determined to be inconsistent with each other when the road condition indicated by the traffic information and a road condition derived from the sensor information do not match and wherein the server specifies the vehicle signature information indicating the characteristics of the invalid traffic information; and a notification step of notifying, when the sensor information and the traffic information are inconsistent with each other, at least one of the plurality of vehicles of the inconsistency between the sensor information and the traffic information.
-
-
10. A non-transitory computer-readable medium having recorded thereon a computer program for causing a computer to perform:
-
a first acquisition step of acquiring sensor information acquired from a sensor of a vehicle;
wherein a cryptographic processor verifies electronic signature data of the received traffic information and detect invalid traffic information using signature information notified from a server;a second acquisition step of acquiring traffic information received by the vehicle through wireless communication; and a verification step of verifying whether the sensor information and the traffic information are inconsistent with each other, the sensor information and the traffic information determined to be inconsistent with each other when the road condition indicated by the traffic information and a road condition derived from the sensor information do not match and wherein the server specifies the vehicle signature information indicating the characteristics of the invalid traffic information.
-
Specification