METHOD AND DEVICE FOR EVALUATING A SIGNAL
20220329456 · 2022-10-13
Inventors
Cpc classification
International classification
Abstract
A method for evaluating a signal that is, for example, transferred and/or receivable via a bus system. The method includes: ascertaining a first variable that characterizes a length of a bit sequence associated with the signal, for example, the bit sequence including n bits, where n is greater than or equal to one, and optionally ascertaining a second variable that characterizes a deviation of the length of the bit sequence from a reference bit sequence that includes n bits.
Claims
1. A computer-implemented method for evaluating a signal that is transferred and/or receivable via a bus system, the method comprising: ascertaining a first variable that characterizes a length of a bit sequence associated with the signal, the bit sequence including n bits, where n is greater than or equal to one; and optionally ascertaining a second variable that characterizes a deviation of the length of the bit sequence from a reference bit sequence that includes n bits.
2. The method as recited in claim 1, wherein the reference bit sequence is a rectangular-pulse signal.
3. The method as recited in claim 1, further comprising: ascertaining a first piece of information that characterizes a sender of the bit sequence.
4. The method as recited in claim 3, wherein the first piece of information is a fingerprint characterizing the sender.
5. The method as recited in claim 3, wherein the ascertaining of the first piece of information is based on the first variable and/or based on the second variable and/or based on the first variable and based on the second variable.
6. The method as recited in claim 1, further comprising at least one of the following: a) ascertaining a first time period between a rising edge and a falling edge of the bit sequence, b) ascertaining a second time period between a first rising edge and a second rising edge of the bit sequence, c) ascertaining a third time period between a falling edge and a rising edge of the bit sequence, d) ascertaining a fourth time period between a first falling edge and a second falling edge of the bit sequence.
7. The method as recited in claim 6, wherein the bit sequence includes one or multiple identical or different symbols within each of the first, second, third, and fourth time periods.
8. The method as recited in claim 6, further comprising: ascertaining a first piece of information that characterizes a sender of the bit sequence; wherein the first piece of information characterizing the sender of the bit sequence is based on at least one of the following: a) the first time period, b) the second time period, c) the third time period, d) the fourth time period.
9. The method as recited in claim 1, wherein a) the bit sequence contains data that have been ascertained or received outside an arbitration phase of the signal, and/or b) the bit sequence contains data of a transfer in which only one sender sends.
10. The method as recited in claim 6, further comprising: using a measuring device for ascertaining the first variable and/or at least one of the following: a) the first time period, b) the second time period, c) the third time period, d) the fourth time period; wherein the measuring device includes at least one of the following elements: A) a time-to-digital converter, B) a hardware circuit, C) an application-specific integrated circuit (ASIC), D) an analog-to-digital converter.
11. The method as recited in claim 1, further comprising at least one of the following: a) providing at least one operating variable of the bus system, a measuring device ascertaining the first variable, the at least one operating variable of the bus system including: an electrical potential or an electrical voltage of at least one bus line, b) providing at least one signal that is derived from at least one operating variable of the bus system from the measuring device, c) providing at least one start signal and/or at least one stop signal, for the measuring device.
12. The method as recited in claim 1, further comprising: providing at least one first threshold value for the ascertaining, and optionally changing the at least one first threshold value, the changing taking place dynamically while carrying out the method during operation of a device that is provided for carrying out the method.
13. The method as recited in claim 1, further comprising: using multiple, different, bit sequences for at least one of the following elements, for each bit sequence of the bit sequences: a) the ascertaining of the first variable that characterizes the length of the bit sequence, b) ascertaining a second variable that characterizes the deviation of the length of the bit sequence from the reference bit sequence, c) ascertaining at least one first piece of information that characterizes a sender of the bit sequence, the at least one first piece of information being a fingerprint characterizing the sender.
14. The method as recited in claim 1, further comprising: ascertaining one or multiple time range features and/or frequency range features that characterize the sender of the bit sequence.
15. The method as recited in claim 1, further comprising: associating the first variable and/or the second variable and/or the first piece of information with a sender, using a statistical model, and optionally adapting the model.
16. A device configured to evaluate a signal that is transferred and/or receivable via a bus system, the device configured to: ascertain a first variable that characterizes a length of a bit sequence associated with the signal, the bit sequence including n bits, where n is greater than or equal to one; and optionally ascertain a second variable that characterizes a deviation of the length of the bit sequence from a reference bit sequence that includes n bits.
17. A non-transitory computer-readable memory medium on which are stored commands for evaluating a signal that is transferred and/or receivable via a bus system, the commands, when executed by a computer, causing the computer to perform the following: ascertaining a first variable that characterizes a length of a bit sequence associated with the signal, the bit sequence including n bits, where n is greater than or equal to one; and optionally ascertaining a second variable that characterizes a deviation of the length of the bit sequence from a reference bit sequence that includes n bits.
18. The method as recited in claim 1, wherein the method is used for at least one of the following: a) evaluating the signal that is transferred and/or receivable via the bus system, b) identifying a sender of the signal, c) checking authenticity of the sender, d) detecting an intrusion on the bus system.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042]
[0043]
[0044]
[0045]
[0046]
[0047]
[0048]
[0049]
[0050]
[0051]
[0052]
[0053]
[0054]
DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS
[0055] Exemplary specific embodiments (cf.
[0056] In further exemplary specific embodiments, bit sequence BS is part of signal Sig or corresponds to signal Sig. For example, the bit sequence may correspond to n bits, for example signal Sig or bit sequence BS having a length that is characterizable, for example, by a time (duration) that is longer (or optionally shorter) than an n-multiple of the bit duration of bus system 10.
[0057] Bus system 10 may be a CAN bus system, for example. In further exemplary specific embodiments, bus system 10 may also be of a type other than the CAN type stated by way of example.
[0058] In further exemplary specific embodiments, the method according to exemplary specific embodiments and/or the bus system may be used in a vehicle or a robot or the like.
[0059] The method according to exemplary specific embodiments may be carried out by device 200 (
[0060] In further exemplary specific embodiments, it is provided that the reference bit sequence is a rectangular-pulse signal.
[0061] In further exemplary specific embodiments, it is provided that the method includes: ascertaining 104 a first piece of information I1 that characterizes a sender of bit sequence BS, for example a fingerprint characterizing the sender, it being possible, for example, to carry out ascertaining 104 of first piece of information I1 characterizing the sender of bit sequence BS, based on first variable G1 and/or based on second variable G2 and/or based on first variable G1 and second variable G2.
[0062] In further exemplary specific embodiments,
[0063] In further exemplary specific embodiments,
[0064] In further exemplary specific embodiments, first time period ZD1 and/or second time period ZD2 and/or third time period ZD3 and/or fourth time period ZD4 may be regarded as an example of first variable G1 (
[0065] In further exemplary specific embodiments,
[0066] In further exemplary specific embodiments, it is provided that bit sequence BS contains data that have been ascertainable or ascertained or received outside an arbitration phase of signal Sig. In further exemplary specific embodiments, bit sequence BS is accordingly ascertained while no arbitration is taking place, for example on bus system 10 (
[0067] In further exemplary specific embodiments,
[0068] In further exemplary specific embodiments,
[0069] In further exemplary specific embodiments,
[0070] In further exemplary specific embodiments,
[0071] For example, in further exemplary specific embodiments, multiple bit sequences BS, BS-1, BS-2, . . . may be obtained or ascertained at different times, for example by receiving appropriate signal Sig. In further exemplary specific embodiments, multiple bit sequences BS, BS-1, BS-2, . . . may, for example, be part of the same message or communication which, for example, is sent by a sender 1 via bus system 10.
[0072] In further exemplary specific embodiments,
[0073] In further exemplary specific embodiments, time range features M-ZB include at least one of the following elements: average value, variance, asymmetry (for example, characterizable by the difference between the rise time and the fall time of the signal).
[0074] In further exemplary specific embodiments, frequency range features M-FB include at least one of the following elements: irregularity or flatness.
[0075] In further exemplary specific embodiments,
[0076]
[0077] In further exemplary specific embodiments, the shape or asymmetry of edge areas B2, B3, for example specifically for a certain sender 1, may be a function, for example, of rise times and/or fall times of the signal, it being possible, for example, for different asymmetries to result in each case for different senders 1, 2, as depicted in
[0078]
[0079]
[0080]
[0081]
[0082] In further exemplary specific embodiments, one or multiple of components TMC, PU, VVE may each be designed as a discrete component or integrated into a device, for example device 200 (
[0083]
[0084]
[0085] In further exemplary specific embodiments, ascertaining E5 the asymmetry may take place, for example, by difference formation of the length of the bit sequence and a product of a bit time and the number of bits of the bit sequence, for example according to the following: (length of the bit sequence)−(bit time*number of bits).
[0086] Block E6 symbolizes by way of example a design of blocks E7 and/or E8 and/or E9, block E7 symbolizing by way of example collection of multiple bit sequences in multiple messages, for example, block E8 indicating, for example, that a bit sequence is adequate, and block E9 symbolizing collection of multiple bit sequences in a (present, for example) message.
[0087] Block E10 symbolizes an optional design of block E11, and block E11 symbolizes ascertaining, for example, one or multiple features that characterize the fingerprint, for example.
[0088]
[0089] In further exemplary specific embodiments, at least one of branches (E1-1, E2-1), (E1-2, E2-2), (E1-3, E2-3), (E1-4, E2-4) may be designed, for example, to ascertain a fingerprint FP of the sender.
[0090] In further exemplary specific embodiments, block E2-1 according to
[0091] Further exemplary specific embodiments,
[0092] In further exemplary specific embodiments, it is provided that device 200 includes: a computer 202 including at least one processor core 202a, 202b, 202c, for example, a memory device 204, associated with computer 202, for at least temporarily storing at least one of the following elements: a) data DAT (for example, the bit sequence or a digital representation of signal Sig and/or at least one other value or other piece of data, for example ZD1, ZD2, ZD3, ZD4, G1, G2, II), b) a computer program PRG, in particular for carrying out the method according to the specific embodiments.
[0093] In further exemplary specific embodiments, data DAT may include, at least temporarily, signal Sig or bit sequence BS or a representation (in particular also time- and/or value-discrete) of signal Sig or bit sequence BS and/or data derivable therefrom, for example first variable G1 and/or second variable G2.
[0094] In further exemplary specific embodiments, memory device 204 includes a volatile memory 204a (working memory (RAM), for example) and/or a nonvolatile memory 204b (flash EEPROM, for example) or a combination thereof or with other types of memory not explicitly stated.
[0095] Further exemplary specific embodiments relate to a computer-readable memory medium SM, including commands PRG which, when executed by a computer 202, prompt the computer to carry out the method according to the specific embodiments.
[0096] Further exemplary specific embodiments relate to a computer program PRG that includes commands which, when program PRG is executed by a computer 202, prompt the computer to carry out the method according to the specific embodiments.
[0097] Further exemplary specific embodiments relate to a data carrier signal DCS that transfers and/or characterizes computer program PRG according to the specific embodiments. For example, data carrier signal DCS is transferable via an optional data interface 206, for example the same as with further data D for device 200, which are usable for creating a fingerprint FP, for example.
[0098] In further exemplary specific embodiments, optional data interface 206 may also be designed for data exchange (sending and/or receiving) via bus system 10.
[0099]
[0100] In further exemplary specific embodiments, an intrusion detection may optionally be carried out, for example on sender identification E23, and/or a response to a detected intrusion may be made.
[0101] In further exemplary specific embodiments, model MOD may optionally be updated (cf. block E25), for example based on data of intrusion detection E24.
[0102] Further exemplary specific embodiments,
[0103] Further aspects and exemplary specific embodiments, each of which may be combined, individually or in combination with one another, with at least one of the specific embodiments described above by way of example are described below.
[0104] In further exemplary specific embodiments, a variable that characterizes asymmetry based on a received or receivable signal Sig may be cost-efficiently determined with the aid of a time measurement or measurement of a signal duration. In further exemplary specific embodiments, for example at least one time-to-digital converter may be used.
[0105] In further exemplary specific embodiments, it may be ascertained dynamically, for example during operation, when measurements, for example for the signal duration, are started and/or stopped, resulting, for example, in increased robustness of the detection and/or speed of the detection (also of possible intrusions, for example), the execution also being possible on embedded systems, for example.
[0106] In further exemplary specific embodiments, a signal shape of an analog signal, as used during a message transfer via bus system 10, is influenced or determined, for example, by a topology of bus system 10 and for example comparatively small manufacturing-related variations or differences, for example, in the electronic components of a sender 1, for example, which may influence a signal rise time and/or a signal fall time, it being possible, for example, for a rise time to be influenced differently than a fall time.
[0107] In further exemplary specific embodiments, a deviation of the actual signal shape of the signal from an ideal rectangular-pulse signal, for example, is used to characterize an asymmetry of the signal. Since in further exemplary specific embodiments the asymmetry is different for each sender 1, 2, for example an intrusion detection system and/or a system for identifying a sender may be implemented based on the asymmetry or on a variable G1, G2 that characterizes the asymmetry.
[0108] In further exemplary specific embodiments, the asymmetry is quantified, for example with the aid of first and/or second variable G1, G2, for example based on a measurement of a time period between two state transitions of signal Sig. In further exemplary specific embodiments, multiple time periods between, for example, different state transitions of signal Sig are ascertained (cf.
[0109] In further exemplary specific embodiments, for example a fingerprint of a sender 1 is ascertained based on one or multiple of time periods ZD1, ZD2, ZD3, ZD4.
[0110] In further exemplary specific embodiments, the number of measurements, for example for each message of signal Sig, may be predefined or dynamically selected, for example based on the capability of device 200.
[0111] In further exemplary specific embodiments, a received signal may be evaluated for ascertaining the first and/or second variable. For example, for a differential bus system 10, for example at least one of the two differential bus signals (for example, CAN high and/or CAN low in the case of a CAN bus system 10) may be used.
[0112] In further exemplary specific embodiments, a signal between a CAN receiver and a CAN controller may also be evaluated for ascertaining the first and/or second variable.
[0113] In further exemplary specific embodiments, start signals and/or stop signals for measurements, for example with the aid of measuring device TMC, may be formed, for example based on a voltage level of signal Sig (cf.
[0114] In further exemplary specific embodiments, a comparator, for example a voltage comparator, may be used, for example in preprocessing unit VVE, for example to select or set an optimal, for example, voltage threshold for the start signal and/or the stop signal, thus making it possible to improve a differentiation between different senders in further exemplary specific embodiments.
[0115] In further exemplary specific embodiments, a threshold value for the voltage or the stated voltage threshold may also be changed, for example dynamically, for example during runtime of device 200, for example using a digital-to-analog converter (DAC).
[0116] In further exemplary specific embodiments, the fingerprint of sender 1 sending the bit or the bit sequence may be ascertained, for example as soon as the first variable for a bit (corresponding to a bit sequence having length 1) or a bit sequence including multiple bits has been ascertained. In further exemplary specific embodiments, the fingerprint allows, for example, the sender to be identified, for example by comparison to a reference fingerprint.
[0117] In further exemplary specific embodiments, it may be selected which types of state transitions (rising edge/falling edge) are considered (cf. the time periods according to
[0118] In further exemplary specific embodiments, the ascertained lengths of the bit sequence(s), for example in each case characterizable or representable by first variable G1, may, for example, be divided into groups, for example based on the number of bits associated with the bit sequence under consideration. In further exemplary specific embodiments, alternatively or additionally an asymmetry may be ascertained, which for example is characterizable or representable by a difference between the ascertained length of the bit sequence(s) and an n-multiple of the bit duration, where n represents the number of bits of the particular sequence under consideration, for example according to the following: (length of the bit sequence)−(bit time*number of bits). A graphical illustration of the asymmetry has been explained above by way of example with reference to
[0119] In further exemplary specific embodiments, the ascertained lengths of the bit sequence(s) may be used directly as a fingerprint or fingerprints.
[0120] In further exemplary specific embodiments, the fingerprints may be ascertained based on one or multiple, for example received, messages, for example one or multiple features from the messages, for example one or multiple time range features M-ZB (
[0121] Exemplary specific embodiments for ascertaining a fingerprint have also been described, for example with reference to
[0122] In further exemplary specific embodiments, an association between possible senders 1, 2, 3 and a particular fingerprint may be ascertained. In further exemplary specific embodiments, for example statistical models MOD (
[0123] In further exemplary specific embodiments, at least one model is adapted, for example during operation of device 200, for example to obtain or improve an achievable classification rate or identification rate.
[0124] In further exemplary specific embodiments, a method for reducing a temperature dependency of the ascertainment of the symbol durations or of the first or second variable may also be used, for example based on a temperature-dependent dynamic influence of threshold values for a start of the measurement and/or a stop of the measurement (cf. also start signal S-start and/or stop signal S-stop (
[0125] In further exemplary specific embodiments, the at least one model MOD is created, for example in a secure environment, for example of a manufacturing unit of device 200. Alternatively or additionally, cryptographic methods may be used, for example cryptographically safeguarded messages from possible senders 1, 2, the model also being modifiable in the field, for example prior to starting a trip of a vehicle that includes device 200.
[0126] In further exemplary specific embodiments, symbol durations or first variable G1 and/or second variable G2 may be ascertained using the at least one model MOD, on the basis of which a fingerprint, for example, is ascertainable. In further exemplary specific embodiments, for example the sender of a signal or of the symbols is identifiable by use of the fingerprint.
[0127] In further exemplary specific embodiments, the authenticity of a transferred message may be checked, for example based on knowledge of which sender is allowed to send which message. In further exemplary specific embodiments, for example when the authenticity of a message has been falsified, a countermeasure or error response may be initiated. An example of a procedure in this regard has been described above with reference to