Data Network Of A Device, In Particular A Vehicle
20170134342 ยท 2017-05-11
Inventors
Cpc classification
H04L63/0236
ELECTRICITY
H04L12/4679
ELECTRICITY
H04L12/4641
ELECTRICITY
International classification
Abstract
A data network of a device, in particular a vehicle, has a set of device-internal nodes, at least one ring in which ring-internal nodes of the set are networked in a ring topology, and at least one interface unit for establishing a connection between at least one ring-external node and the ring. A generic data network has at least one ring and enables secure operation and simple management that can be used flexibly. The data network has a filtering device with at least one filter function, for filtering data traffic of the ring with respect to at least one node identifier, and an identification device for implementing at least one measure for a ring-external node, the measure relating to a node identifier of the node, such that the node identifier is permitted by the filter function for a data traffic in the ring.
Claims
1-18. (canceled)
19. A data network of a device, the network comprising: a set of a plurality of intra-device nodes; at least one ring in which intra-ring nodes of said set are networked to one another in a ring topology; at least one interface unit configured for establishing a connection of at least one extra-ring node to said ring; a filtering device having at least one filter function and being configured for filtering data traffic in said ring for at least one node identifier; and an identification device configured for taking, for an extra-ring node, at least one measure relating to a node identifier of the extra-ring node such that the node identifier is permitted in respect of the filter function for data traffic in said ring.
20. The data network according to claim 19, wherein said filtering device comprises a set of a plurality of filter modules, wherein at least one different said filter module is assigned to each of said intra-ring nodes.
21. The data network according to claim 20, wherein at least one different filter module is connected to each of said intra-ring nodes.
22. The data network according to claim 19, wherein said filtering device includes at least one filter module that is equipped with a switch functionality.
23. The data network according to claim 19, wherein each of said intra-ring nodes is a controller.
24. The data network according to claim 19, which further comprises: a network access control unit programmed for managing data traffic access according to a defined authentication protocol; and wherein said identification device is configured, in at least one operating mode, for taking the measure for an extra-ring node as a function of whether the extra-ring node is permitted by said network access control unit.
25. The data network according to claim 19, wherein the node identifier is an identifier of an OSI (open systems interconnection) data link layer.
26. The data network according to claim 19, wherein said interface unit is configured to connect at least one extra-ring node of said set of intra-device nodes to said ring.
27. The data network according to claim 19, wherein said interface unit serves, as an extra-ring node, to connect an extra-device node that is not linked to the device or is occasionally linked to the device.
28. The data network according to claim 19, wherein said filtering device has a plurality of filter rules that are each assigned to a different operating mode of the device.
29. The data network according to claim 28, wherein said filtering device has at least one filter rule for normal operation of the device and at least one filter rule, different from the at least one filter rule for normal operation, for an initialization mode of the device.
30. The data network according to claim 24, wherein, in at least one operating mode of the device, said interface unit is configured to enable an interface for connecting to the ring an extra-ring node that is not checked by said network access control unit.
31. The data network according to claim 19, wherein said identification device includes a unit for setting the identifier, which is provided in the case of an extra-ring node for assigning thereto a node identifier that is authorized by said filtering device.
32. The data network according to claim 19, wherein said identification device is configured, for an extra-ring node, to alert said filtering device that a node identifier that is assigned thereto is an authorized identifier.
33. The data network according to claim 32, wherein said identification device is configured for sending a message containing the node identifier to the filtering device.
34. The data network according to claim 32, wherein one of said intra-ring nodes is configured to fulfill a function of a ring manager and said identification device is configured for sending a message containing the node identifier to said ring manager.
35. A vehicle, comprising a data network according to claim 19.
36. The vehicle according to claim 35 being a rail vehicle equipped with the data network.
37. A method of managing a data network of a device, the data network having a set of intra-device nodes, at least one ring in which intra-ring nodes of the set are networked to one another in a ring topology, and at least one interface unit configured for connecting at least one extra-ring node to the ring, the method comprising: filtering data traffic in the ring for at least one node identifier; and for an extra-ring node, taking at least one measure in relation to a node identifier of the extra-ring node to render the node identifier permissible in relation to the filter function for data traffic in the ring.
Description
[0042] Exemplary embodiments of the invention will be explained in more detail with reference to the drawings, in which:
[0043]
[0044]
[0045]
[0046]
[0047]
[0048]
[0049]
[0050]
[0051]
[0052]
[0053] As is known, the vehicle 10 has a number of functional components that make operation of the vehicle 10 possible. Typical functional components, such as in particular components of the drive unit 14, a braking device 11 (illustrated schematically and by way of example in the car 12.2), a train protection unit 13, a door unit 15 (illustrated schematically and by way of example in the car 12.3), an air conditioning unit 17, a passenger information system 19, an onboard supply system, etc. are generally known and are not explained here in more detail. Functional components of the vehicle 10 may in general take the form of a control unit, sensor unit and/or actuator unit, wherein a set of functionally cohesive functional components that are assigned to a particular functionality, such as one of the functionalities listed above, may also be called a subsystem. The functional components that are installed in the vehicle 10 and hence permanently linked to the vehicle structure are networked to one another and thus constituent parts of a data network 18 (see
[0054]
[0055] The data network 18 has interface units 30, 32 that can be used to connect extra-ring nodes to the ring 28. The interface unit 30 serves to connect the internal nodes 22 to the ring 28. These are themselves networked to one another by means of a bus structure 34 that is different from the bus structure 26. The interface unit 30 in this case serves to connect the bus structure 34 and the nodes 22 connected thereto to the ring 28. In an exemplary embodiment, the bus structure 34 may take the form of an MVB bus of the TCN protocol.
[0056] The interface unit 32 serves to connect an external node 36 to the ring 28. In this context, an external node is a functional component that is provided for being occasionally linked to the data network 18. For example, the external node 36 may be a portable maintenance device which, when required, is to be connected to the data network 18 for data transfer, and otherwise, in normal operation of the vehicle 10, is not connected to the data network 18. The interface unit 32 may be provided for the purpose of making a wired and/or wireless connection between the ring 28 and the external node 36.
[0057] In addition to the possibility of a physical (or hardware) connection 31 or 33, the interface units 30, 32 are each equipped at least with a switch functionality. Moreover, they are each coupled directly mechanically to an intra-ring node 20. In particular, the respective intra-ring node 20 and the coupled interface unit 30 or 32 are arranged in the same, cohesive assembly. The intra-ring nodes 20 in the embodiment under consideration in particular each take the form of a controller having a switch functionality.
[0058] The data network 18 moreover has a filtering device 38 having a filter function that is provided for filtering data traffic in the ring 28 in respect of at least one node identifier. In the embodiment under consideration, the node identifier that is taken into account for the filtering is an identifier of the OSI data link layer. In particular, for filtering purposes at least one MAC address of a node is checked using at least one filter rule. This is a node-internal or externalthat takes part in data transmission that occurs or is to occur over at least part of the ring 28. The filtering device 38 has a set of filter modules 40. Data traffic over the ring 28 may occur in two directions, clockwise or counterclockwise.
[0059] A pair of filter modules 40 is assigned to each of the intra-ring nodes 20. A first filter module 40 of the pair monitors the data flow that is directed toward the node 20 for a given direction of the data traffic in the ring 28, while the second filter module 40 of the pair monitors the data flow that is directed toward the node 20 in the opposite direction of data traffic. In an alternative embodiment, data traffic may be possible in only one direction.
[0060] The filtering device 38 moreover has filter modules 39, 41 that are each assigned to an interface unit 30, 32 and are in particular coupled thereto. These filter modules 39, 41 allow data traffic directed toward the ring 28 to be filtered before data arrives in the ring 28. Moreover, the filter modules 39, 41 can filter data traffic that comes from the ring 28 and is directed toward an extra-ring node. In a particular embodiment, these additional filter modules 39, 41 may be dispensed with. The description below relates to the filter modules 40 and is also accordingly applicable to the filter modules 39, 41.
[0061] The filtering device 38 is programmed with a first filter rule that performs monitoring of data packets that are or are to be transmitted over at least part of the ring 28. As described above, monitoring is carried out on the basis of a node identifier that corresponds to the MAC address of a node that takes part in transmission of a data packet. This may be the node that takes the form of a transmitter and/or the node that takes the form of a receiver of the packet. The filter modules 40 which are assigned to the intra-ring nodes 20 perform filtering of the data traffic that occurs over at least part of the ring 28, in that a data packet directed toward the respective node 20 is only forwarded by this node 20 if the node identifier or identifiers that are to be monitored in this data packet by the filter rule appears or appear in a list of permitted node identifiers. This list is illustrated in
[0062] The filter modules 40 are each formed by a device having a switch functionality. Here, they may be formed by a separate switch that is constructed separately from the assigned intra-ring node 20. In the embodiment under consideration, however, they are each coupled directly mechanically to the assigned intra-ring node 20. In particular, the respective intra-ring node 20 and the assigned filter module 40 are arranged in the same, cohesive assembly. The intra-ring nodes 20 in the embodiment under consideration in particular each take the form of a controller having a switch functionality.
[0063] The data network 18 further has network access control units 42, 44 that are respectively assigned to a different interface unit 30 or 32. They each serve to manage, in particular to permit or deny, data traffic access to the ring 28 for extra-ring nodes 22 and 36 respectively, in accordance with a defined authentication protocol. If data traffic access is permitted to the extra-ring node, it may take part in data transmission over at least part of the ring 28. Once authentication of an extra-ring node 22, 36 by the network access control unit 42 or 44 has come to a successful conclusion with permission, an interface (also called a port) of the assigned interface unit 30 or 32 is enabled for access by the extra-ring node to the ring 28.
[0064] The authentication protocol may be for example a protocol according to IEEE 802.1x, such as in particular in the form of an EAP TLS authentication using a device certificate.
[0065] The functions of the network access control units 42, 44 and the filtering device 38 will first be explained by way of the example of connecting an external node 36.
[0066] Data traffic access for the external node 36, which is occasionally linked to the data network 18 as a maintenance device, is managed by means of the network access control unit 44. Once a wired or wireless data connection has been made between the external node 36 and the interface unit 32, authentication of the node 36 by means of the assigned network access control unit 44 takes place in accordance with a protocol of the above-mentioned type. For this purpose, for example an authentication module 45 (or authenticator) is provided, and this is implemented in each of the extra-ring nodes 22, 36 and cooperates with the corresponding network access control unit 42 or 44. If the external node 36 is successfully authenticated in relation to the network access control unit 44, then data traffic that takes place over an enabled port of the assigned interface unit 32 and at least part of the ring 28 and in which the external node 36 takes part is considered permitted. The network access control units 42, 44 are each equipped with a switch functionality and may each take the form of a so-called access switch.
[0067] So that this data traffic is also permitted in relation to the above-described filter function of the filtering device 38, corresponding measures should be taken. For this purpose, an identification device 46 is assigned to the interface unit 32. The identification device 46 serves to take a measure in relation to a node identifier of the external node 36, with the result that the node identifier that is used in the ring 28 in the event of data transmission from the external node 36 is permitted according to the applicable filter rule. A number of variants are possible for this.
[0068] According to a first variant that is shown in
[0069]
[0070] Correspondingly, in the case of a data communication that is directed toward the external node 36, the node identifier that is used in the ring 28 as the permitted node identifier TK of the destination is translated back into the actual node identifier MA of the external node 36 by the unit 48 for identification setting, according to the translation table shown in
[0071] Variant embodiments are shown in
[0072] In the variant according to
[0073]
[0074] In the variant according to
[0075] The message N in both variant embodiments may be called a FilterUpdate message in the art. It is preferably sent in encrypted form. In particular, it may have a cryptographic checksum, for example according to AES-CBC-MAC, HMAC-SHA1, HMAC-SHA256, RSA signature, DSA signature or ECDSA signature.
[0076] In the embodiments described above, the filtering device 38 has a filter rule that filters the data traffic in respect of at least one node identifier. Data traffic over at least part of the ring 28 is only permitted if the corresponding data packets contain node identifiers that appear in the list according to
[0077] The functions of the network access control units 42, 44 and the identification device 46, 46 and 46 were explained above with reference to the example of the network access control unit 44, which is used for connecting external nodes such as the external node 36.
[0078] The network access control unit 42 is used for connecting extra-ring nodes that take the form of internal nodes 22 or are newly installed in the vehicle 10, or after start-up are installed therein again. It is assigned to the interface unit 30. As was explained in relation to the network access control unit 44, a node identifier 50 is assigned to the interface unit 30. For a description of the functioning of the network access control unit 42 and the identification device 50, the reader is referred to the text above on the corresponding network access control unit 44 and the identification device 46. Similarly to the identification device 46, this latter device has in the first variant embodiment, which is shown in
[0079] The interface unit 30 and, assigned thereto, the network access control unit 42 and the identification device 50 may be formed as mutually separate assemblies. However, as in the embodiment under consideration, it is advantageous if they are constituent parts of a common, cohesive assembly. In particular, this assembly corresponds to one of the intra-ring nodes 20, as can be seen in the figures. Here, the intra-ring node 20 includes the interface unit 30 and the assigned network access control unit 42 and identification device 50. In this context, it may be programmed with the functions of these devices. The statements above also apply to the interface unit 32 and the assigned network access control unit 44 and identification device 46.
[0080] In the embodiment under consideration, the filtering device 38 has a plurality of filter rules that are each assigned to a different operating mode of the vehicle 10.
[0081] For example, it may be necessary for data communication that takes place over at least part of the ring 28 to be managed such that the functional components connected to the data network 18, or the internal nodes 22, can be booted up within a short period. For this purpose, during this boot phase of the vehicle 10 there applies a filter rule that has been modified, by comparison with the above-described filter rule in normal operation. Moreover, during the boot phase at least the network access control unit 42 is operated in an operating mode that differs from the above-described operating mode that is applied in normal operation of the vehicle 10.
[0082] This is illustrated in
[0083] During the boot phase HFP (see
[0084] In the first phases P1 and P2, the network access control unit 42 and the filtering device 38 are operated such that the internal nodes 20, 22 are permitted to take part in data traffic over the ring 28 despite not having yet been subject to authentication by the network access control unit 42. During this, in particular it is possible to connect all the extra-ring nodes 22 to the ring 28 by way of at least one interface (or port) of the interface unit 30, wherein this interface of the interface unit 30 is enabled despite the fact that the extra-ring nodes 22 have not yet all been checked by the assigned network access control unit 42, or checking thereof has not yet been concluded.
[0085] Once phase P2 has ended, the above-described authentication procedures of the internal nodes, that is to say the intra-ring nodes 20 and the extra-ring nodes 22, are performed by the network access control unit 42 during a phase P3 according to one of the above-described authentication protocols, in particular by means of a certificate-based authentication. Once the authentication procedures have been successfully concluded, the boot phase HFP ends, and with it the grace period of the filtering device 38. In the subsequent normal operation NB that is released, in particular the regular driving mode, the filter rule that was explained above applies on the basis of the node identifiers. The boot phase HFP is also called the initialization mode of the vehicle 10. In the embodiment of the vehicle 10 that is under consideration, as a rail vehicle, the so-called train set-up is in particular performed during the initialization mode.
[0086] The operating mode of the network access control unit 42 and the filtering device 38 that is used in initialization mode may moreover be activated if operation of the vehicle 10 has malfunctioned. Operation of this kind may for example be activated by triggering an emergency brake signal or by a fire alert.
[0087] Further operating modes are conceivable for which a different filter and/or authentication rule is provided from that in normal operation of the vehicle 10. For example, in particular in a maintenance mode or a manufacturer's workshop mode, a filter rule may be provided that corresponds to the second filter rule. In these modes, data traffic over at least part of the ring 28 is accordingly possible without restriction.
[0088] It is moreover also conceivable for a filter rule of the filtering device 38 and/or the authentication procedure of the network access control units 42, 44 to be reconfigurable in normal operation, that is to say in the example under consideration in regular driving mode, or to put it another way to be blocked for the purpose of reconfiguration. This block may be lifted for example when a further operating mode is activated, for example maintenance mode.
[0089] Data traffic over at least part of the ring 28 may be blocked explicitly in normal operation for a particular external node that has already successfully undergone authentication in the data network 18 at least once, by a filter rule of the filtering device 38 and/or operating mode of the network access control unit 44. For example, in regular driving mode of the vehicle 10, data traffic with the external node 36 which has nonetheless successfully undergone authentication in a previous maintenance mode may be blocked by the filtering device 38 and/or the network access control unit 44.
[0090] In the embodiments shown in the figures, data traffic may take place in the ring 28 in different directions, that is to say clockwise or counterclockwise. This makes potential transmission paths of different lengths possible, it being preferable for the transmission path having the shortest length to be selected for data traffic. It is moreover also possible for one of the intra-ring nodes 20 to implement the function of a master (or media redundancy master switch) that logically interrupts the ring 28 at a particular location.
[0091] In a preferred variant, the filter rules of the filtering device 38 are independent of the direction of transmission of a data packet. This has the advantage that, if the ring is reconfigured, in particular because of a fault, there is no need for reconfiguration of the filter rules. However, filter rules of the filtering device 38 may also be provided for filtering data packets that are dependent on the direction of transmission of a data packet over the ring 28. According to a filter rule, it may be provided for a filter module 40 for a data packet to be forwarded only in a particular direction and to be blocked in the opposite direction. In this case, an automatic reconfiguration of the filter rules for the intra-ring nodes 20 may be performed in order to take into account the different transmission direction. In another variant, no automatic reconfiguration of the filter rules is performed. In this case, the internal nodes 20, 22 have to be authenticated again so that suitable filter inputs can then be set up.
[0092] In a further variant, automatic reconfiguration of the filter rules is performed for the intra-ring nodes 20, whereas the extra-ring nodes 22 have to be authenticated again.