US 12,381,911 B2
Counterattack method against hacked node in CAN bus physical layer, physical layer security method with can bus node ID auto-setting, and recording medium and system for performing the method
Seong Soo Lee, Seoul (KR); and Tae Wook Kang, Yangju-si (KR)
Assigned to AY Innovative Co. Ltd., Seoul (KR)
Appl. No. 18/032,473
Filed by AY Innovative Co. Ltd., Seoul (KR)
PCT Filed Dec. 28, 2020, PCT No. PCT/KR2020/019184
§ 371(c)(1), (2) Date Apr. 18, 2023,
PCT Pub. No. WO2022/085863, PCT Pub. Date Apr. 28, 2022.
Claims priority of application No. 10-2020-0136471 (KR), filed on Oct. 21, 2020; and application No. 10-2020-0136473 (KR), filed on Oct. 21, 2020.
Prior Publication US 2024/0031404 A1, Jan. 25, 2024
Int. Cl. H04L 9/40 (2022.01); H04L 12/40 (2006.01)
CPC H04L 63/1466 (2013.01) [H04L 12/40104 (2013.01); H04L 63/1425 (2013.01); H04L 2012/40215 (2013.01)] 22 Claims
OG exemplary drawing
 
1. A counterattack method against a hacked node in a controller area network (CAN) bus physical layer, comprising:
setting node IDs (NIDs), which are different unique IDs, for each of a plurality of nodes connected to a CAN bus line;
determining that an error frame is generated when at least one of a node using a forged NID, a node using a different NID, and a node using a non-existent NID is found;
increasing counts of a transmit error counter (TEC) and a receive error counter (REC) of a transmitting node and a receiving node whenever the error frame is generated; and
allowing a node of which the count of the TEC or REC is greater than a set threshold value to enter a bus-off state to block the node.