US 12,294,536 B2
Obfuscation method for controller area network message
Huy Kang Kim, Seoul (KR); Hwejae Lee, Seoul (KR); Sangho Lee, Seoul (KR); Yeon Jae Kang, Namyangju-si (KR); Daekwon Pi, Goyang-si (KR); Jae Woong Choi, Seoul (KR); and Huiju Lee, Seoul (KR)
Assigned to Korea University Research and Business Foundation, Seoul (KR)
Filed by KOREA UNIVERSITY RESEARCH AND BUSINESS FOUNDATION, Seoul (KR)
Filed on Sep. 15, 2023, as Appl. No. 18/467,815.
Claims priority of application No. 10-2022-0116348 (KR), filed on Sep. 15, 2022.
Prior Publication US 2024/0097841 A1, Mar. 21, 2024
Int. Cl. H04L 5/00 (2006.01); H04L 12/40 (2006.01)
CPC H04L 5/0044 (2013.01) [H04L 12/40 (2013.01); H04L 2012/40215 (2013.01)] 11 Claims
OG exemplary drawing
 
1. A method of obfuscating a Controller Area Network (CAN) message performed by a first computing device including a processor, the method comprising:
obtaining a first index from a first input value corresponding to a first time point by using an index output algorithm;
determining a first CAN ID of the first computing device corresponding to the first index based on a predetermined CAN ID table;
generating a first normal CAN message including the first CAN ID and first normal data; and
generating a first dummy CAN message including the first CAN ID and first dummy data that is different from the first normal data,
wherein the generating of the first dummy CAN message comprises:
obtaining a hash value from a third seed value by using a second hash algorithm;
generating the first dummy data that is input in a payload field of the first dummy CAN message based on the hash value; and
generating the first dummy CAN message including the first CAN ID and the first dummy data,
wherein the second hash algorithm and the third seed value are shared in advance by a plurality of computing devices connected to each other through a bus of the CAN and including the first computing device.