Search

CN-122001606-A - System and method for data integrity verification of a vehicle consist message

CN122001606ACN 122001606 ACN122001606 ACN 122001606ACN-122001606-A

Abstract

The present invention provides a system and method for data integrity verification of a vehicle consist message. A method includes calculating a first checksum value, transmitting one or more infrastructure consist messages including a second checksum value based on the first checksum value, receiving one or more vehicle consist messages, and validating the one or more vehicle consist messages.

Inventors

  • K. Bandy
  • V. D. Shenoi
  • M A Santee

Assignees

  • 福特全球技术公司

Dates

Publication Date
20260508
Application Date
20251030
Priority Date
20241104

Claims (13)

  1. 1. A method for initiating autonomous control of an automated vehicle, the method comprising: calculating, by one or more processors of an infrastructure system, a first checksum value based on an infrastructure-side secret key and encoded data associated with the automated vehicle that is within a distance-related threshold from the infrastructure system; Transmitting to the automated vehicle one or more infrastructure consist messages including a second checksum value based on the first checksum value; Receiving one or more vehicle consist messages from the automated vehicle including a third checksum value based on a vehicle-side secret key in response to the automated vehicle validating the one or more infrastructure consist messages, and Validating the one or more vehicle consist messages, wherein the validating of the one or more vehicle consist messages comprises: Decoding the one or more vehicle consist messages, Calculating a fourth checksum value based on the vehicle-side secret key in response to decoding the one or more vehicle consist messages, and Determining whether the fourth checksum value corresponds to the third checksum value.
  2. 2. The method of claim 1, wherein the calculating of the first checksum value further comprises: transforming the infrastructure-side secret key by transforming a constant, and A transformed infrastructure-side secret key is appended to the encoded data associated with the automated vehicle.
  3. 3. The method of claim 1, further comprising: the second checksum value is calculated based on a transformation constant.
  4. 4. The method of claim 1, wherein the one or more infrastructure consist messages further comprise the encoded data associated with the automated vehicle, a data length associated with the one or more infrastructure consist messages, or a combination thereof.
  5. 5. The method of claim 1, wherein the one or more vehicle consist messages further comprise the encoded data associated with the automated vehicle, a data length associated with the one or more vehicle consist messages, or a combination thereof.
  6. 6. The method of claim 1, wherein decoding the one or more vehicle consist messages further comprises: decoding the third checksum value; Decoding a data length associated with the one or more vehicle consist messages, and The encoded data associated with the automated vehicle is decoded.
  7. 7. The method of claim 6, wherein the validating of the one or more vehicle consist messages further comprises: Transforming the decoded third checksum value by a transform constant; recalculating the vehicle side secret key based on the vehicle side public key; Recoding the one or more vehicle consist messages, and The transformed third checksum value is reconverted by the transformation constant.
  8. 8. The method of claim 7, wherein the calculating of the fourth checksum value further comprises: appending the recalculated vehicle-side secret key to the recoded one or more vehicle consist messages, and The transformed third checksum value is transformed by the transformation constant.
  9. 9. The method of claim 7, wherein the validating of the one or more vehicle consist messages further comprises: A determination is made as to whether a data length associated with the recoded one or more vehicle consist messages corresponds to the data length associated with the decoded data length.
  10. 10. The method of claim 1, further comprising: a communication link between the automated vehicle and the infrastructure system is established based on successfully determining that the fourth checksum value corresponds to the third checksum value.
  11. 11. A system for initiating autonomous control of an automated vehicle, the system comprising: one or more processors of an infrastructure system, the one or more processors configured to: a first checksum value is calculated based on an infrastructure-side secret key and encoded data associated with the automated vehicle that is within a distance-related threshold from the infrastructure system, Transmitting one or more infrastructure consist messages comprising a second checksum value based on the first checksum value, In response to the vehicle verifying the second checksum value, receive one or more vehicle consist messages including a third checksum value based on a vehicle-side secret key, Validating the one or more vehicle consist messages, and A vehicle handling system of the automated vehicle, the vehicle handling system configured to: The one or more infrastructure consist messages are received, Validating the one or more infrastructure consist messages, Calculating the third checksum value based on a vehicle-side secret key and encoded data associated with the infrastructure system in response to the verification of the one or more infrastructure consist messages, and Transmitting the one or more vehicle consist messages.
  12. 12. The system of claim 11, wherein the one or more infrastructure consist messages further comprise the encoded data associated with the automated vehicle, a data length associated with the one or more infrastructure consist messages, or a combination thereof.
  13. 13. The system of claim 11, wherein the one or more vehicle consist messages further comprise the encoded data associated with the automated vehicle, a data length associated with the one or more vehicle consist messages, or a combination thereof.

Description

System and method for data integrity verification of a vehicle consist message Technical Field The present disclosure relates to the calculation and verification of data integrity associated with the exchange of one or more messages. Background The statements in this section merely provide background information related to the present disclosure and may not constitute prior art. Before autonomous control of an automated vehicle, one or more messages are typically exchanged between the automated vehicle and a central server. If the exchange of messages is not properly protected, it may be compromised. For example, the data integrity of the message may be compromised. Additional threats may include a lack of synchronization procedures for checking whether the intended recipient has received each data bit, and a lack of functional methods for computing and/or verifying the payload associated with the message. The present disclosure addresses these and other problems associated with protecting the data integrity of exchanged messages in a vehicle consist system. Disclosure of Invention This section provides a general summary of the disclosure and is not a comprehensive disclosure of its full scope or all of its features. The present disclosure provides a method for initiating autonomous control of an automated vehicle, the method comprising calculating, by one or more processors of an infrastructure system, a first checksum value based on an infrastructure-side secret key and encoded data associated with the automated vehicle that is within a distance-related threshold from the infrastructure system, transmitting, to the automated vehicle, one or more infrastructure-marshalling messages comprising a second checksum value based on the first checksum value, receiving, from the automated vehicle, one or more vehicle marshalling messages comprising a third checksum value based on a vehicle-side secret key in response to the automated vehicle verifying the one or more infrastructure marshalling messages, and verifying one or more vehicle marshalling messages, wherein verifying the one or more vehicle marshalling messages comprises decoding the one or more vehicle marshalling messages, calculating, in response to the one or more vehicle marshalling messages, a fourth checksum value based on the vehicle-side secret key, and determining whether the fourth checksum value corresponds to the third checksum value, wherein calculating, in response to the automated vehicle, calculating, one or more vehicle marshalling messages further comprises calculating, by the one or more vehicle marshalling messages, associating, with the one or more vehicle marshalling messages, a third checksum value based on the vehicle-side secret key, and a constant associated with the one or more vehicle marshalling messages, wherein verifying one or more vehicle marshalling messages comprises decoding one or more vehicle marshalling messages, calculating, and associating one or more vehicle marshalling messages with the one or more data by a transform-side secret value and a constant associated with the one or more of the one or more vehicle marshalling messages, the method further includes determining a length of data associated with the one or more vehicle consist messages, wherein decoding the one or more vehicle consist messages further includes decoding a third checksum value, decoding the length of data associated with the one or more vehicle consist messages, and decoding the encoded data associated with the automated vehicle, wherein validating the one or more vehicle consist messages further includes transforming the decoded third checksum value by a transformation constant, recalculating a vehicle side secret key based on a vehicle side public key, recoding the one or more vehicle consist messages, and reconverting the transformed third checksum value by a transformation constant, wherein calculating a fourth checksum further includes appending the recalculated vehicle side secret key to the recoded one or more vehicle consist messages, and transforming the reconverted third checksum value by a transformation constant, wherein validating the one or more vehicle consist messages further includes determining whether the one or more vehicle consist messages associated with the recoded third checksum value corresponds to the length of data associated with the recoded vehicle consist message and further includes establishing a communication link between the third checksum value and the data associated with the automated method based on the length of the third checksum value. The present disclosure provides another method for initiating autonomous control of an automated vehicle, the method comprising receiving, at a vehicle processing system of the automated vehicle, one or more infrastructure consist messages comprising a first checksum value in response to the automated vehicle being within a distance-related threshold from the infrastruct