1 Background of National VI OBD Remote Monitoring
In fact, before the introduction of this regulation, environmental protection departments in various cities have already started to demonstrate environmental monitoring of vehicles in advance, and conduct preliminary pilot projects for the formal implementation of National VIb: Beijing began to bid for the construction of Beijing Municipal Environmental Protection Bureau's National IV and above emission standards heavy-duty diesel vehicles OBD remote monitoring equipment application in 2016; Hangzhou issued the local standard "Technical Specifications for the Application of On-board Emission Diagnostic Systems for Heavy-Duty Diesel Vehicles" in 2018; Suzhou began bidding for the construction of Suzhou diesel vehicle emission monitoring platform in July 2019, and Zhengzhou issued the "Implementation Plan for the Installation of Remote Online Monitoring for Heavy-Duty Diesel Vehicles in Zhengzhou City at or above National IV" in September of the same year. Guangdong, Guizhou, Hebei and other provinces and cities have also allocated special funds to support the special funds heavy-duty diesel vehicle OBD remote online monitoring demonstration project.
The new regulations put forward the latest requirements for ECU, T-BOX and testing platform. The specific changes are as follows:
Requirements for ECU: Support at least one of the diagnostic protocols ISO15765, ISO27145, and J1939; need to have an anti-disassembly handshake protocol with TBOX; support a complete set of 19 data stream information such as environment, engine information, and post-processing sensor information (which can be provided through diagnosis or CAN outbound messages); can obtain diagnostic information in 10 dimensions such as vehicle identification number (VIN), software calibration identification number, and calibration verification code (CVN) through the diagnostic protocol.
Requirements for T-BOX: equipped with an authentication encryption chip, only accepting one-way command operations; data must be packaged and uploaded at least with data signature encryption to prevent data from being tampered with during network transmission; data must be collected within 60 seconds of engine start, with a collection cycle of 1 second; positioning accuracy of 1m (before the implementation of National VI b); OBD data must be uploaded once every 24 hours (low power consumption, timed wake-up); 7 days of data can be stored, and local access is supported.
Requirements for the monitoring platform: Vehicle manufacturers need to have a National VI monitoring data platform; accept information from their own National VI vehicles and forward the corresponding plain text information with signature to the national platform; the transmission cycle is 10s; the enterprise platform data is retained for at least 3 years.
02 National VI OBD Remote Monitoring Technical Requirements
Encryption mechanism is also used in information security. Plain text encryption transmission: digital signature
After TBOX arranges the original data collected from the vehicle according to the communication protocol, it uses a specific encryption algorithm and secret key to calculate the data content and generate an anti-counterfeiting label - a digital signature. When sending data, the original data and the digital signature are sent at the same time. After receiving the data, the receiver will perform a certain reverse operation on the data and the digital signature to determine whether the information has been modified. If it has been modified, it is considered invalid information.
During the communication process, the content of the data body can be viewed, but due to the digital signature, the data cannot be forged or modified.
Ciphertext encrypted transmission: data encryption
TBOX uses encryption algorithms to convert the raw data collected from vehicles into ciphertext. When data is sent, the ciphertext is sent directly instead of the raw data. When the receiver receives the ciphertext, it needs the corresponding secret key to reverse the ciphertext and derive the original data.
Data information in the communication process cannot be identified or modified. On the other hand, the asymmetric encryption process is more complicated for the communication process and consumes more resources for the server.
The upload method is as follows: after the terminal is powered on, data tamper-proof information must be filed with the national platform; the on-board terminal collects vehicle data in accordance with the requirements of GB17691-2018; the on-board terminal hard-encrypts the collected data through an encryption chip (on demand); the on-board terminal sends data with a digital signature (tamper-proof) to the enterprise platform; the enterprise platform forwards the vehicle plaintext data with the data signature to the national platform.
03 Construction of remote monitoring system based on cloud platform
The enterprise platform must meet the following requirements when building:
• Data receiving function. The enterprise platform receives data from the vehicle terminal. The communication protocol between the vehicle terminal and the data platform can be found in Appendix Q of GB19691-2018.
• Data forwarding function. The enterprise platform forwards the received data to the national platform. When forwarding data, the data signature must be forwarded together.
• The transmission cycle is 10s, and the communication protocol complies with the requirements of Appendix Q of the National VI Standard.
• Data storage requirements: Data within 3 years is stored as hot data, and data throughout its life cycle can be stored as cold backup data.
• Data integrity requirement: The platform forwarding data packet loss rate is less than 1%.
• Data accuracy requirement: The error rate of platform forwarding data is less than 1%.
At the same time, private protocols are not available, and data is public and cannot be tampered with. The database is hot stored for 3 years, and a file system is required for cold backup during the life cycle.
When building a monitoring system, the vehicle terminal needs to be provided by a qualified manufacturer, and the terminal product needs to obtain the corresponding qualification certification. The specific requirements are:
• Data collection function requirements. Collect data of the whole vehicle and each component from the vehicle bus , the parameter range must at least include the requirements of Appendix Q of GB17691-2018, and then send the data to the enterprise platform.
• For vehicle terminal performance requirements and test methods, see Appendix Q.7 of GB17691-2018
• Vehicle terminal positioning security requirements. Vehicle terminals have the ability to prevent positioning forgery and tampering. Manufacturers must register (details to be determined)
• The abnormality rate of data reported by the vehicle terminal is less than 1%;
• The packet loss rate of data reported by the vehicle terminal is less than 1%;
• For vehicle terminal security strategy, please refer to Appendix Q.4 of GB17691-2018;
In terms of security strategy, security information is managed by the state. Equipment must be legally licensed before it can be put online.
• The security chip manufacturer must have SAS security certification and commercial cryptographic model certification, and the security assurance level must be no less than EAL4+.
• Security chips are required to be equipped with a unique identification ID. The identification ID is managed by the national platform and is used to bind the public and private key pairs of the security chip.
• Qualified enterprise platforms submit chip identification ID applications through the national platform. At the same time, the next issuance threshold is controlled according to the activation ratio.
• Data is signed before transmission, and the signature is stored in the private key of the security chip.
• Bind and register the chip identification ID, chip public key, and vehicle VIN in a trinity, and submit the information to the national center platform.
04 Suggestions for building a remote monitoring system
GB17691-2018 defines that enterprises must have their own enterprise emission monitoring data platform. To build their own platform, enterprises must have: enterprise domain name, company logo, business permissions and data permissions. The responsibilities of the enterprise are: the ownership of the platform website belongs to the enterprise, daily vehicle data monitoring, data retention and statistical use, etc.
From the perspective of social resource integration, it does not mean that enterprises must build platforms independently, but only stipulates that enterprises must have corresponding management methods and be responsible for vehicle emissions issues.
Previous article:By 2035, China's new energy vehicle ownership may exceed 160 million
Next article:Analysis of domestic new energy vehicle production data in September
- Popular Resources
- Popular amplifiers
- Huawei's Strategic Department Director Gai Gang: The cumulative installed base of open source Euler operating system exceeds 10 million sets
- Analysis of the application of several common contact parts in high-voltage connectors of new energy vehicles
- Wiring harness durability test and contact voltage drop test method
- Sn-doped CuO nanostructure-based ethanol gas sensor for real-time drunk driving detection in vehicles
- Design considerations for automotive battery wiring harness
- Do you know all the various motors commonly used in automotive electronics?
- What are the functions of the Internet of Vehicles? What are the uses and benefits of the Internet of Vehicles?
- Power Inverter - A critical safety system for electric vehicles
- Analysis of the information security mechanism of AUTOSAR, the automotive embedded software framework
Professor at Beihang University, dedicated to promoting microcontrollers and embedded systems for over 20 years.
- LED chemical incompatibility test to see which chemicals LEDs can be used with
- Application of ARM9 hardware coprocessor on WinCE embedded motherboard
- What are the key points for selecting rotor flowmeter?
- LM317 high power charger circuit
- A brief analysis of Embest's application and development of embedded medical devices
- Single-phase RC protection circuit
- stm32 PVD programmable voltage monitor
- Introduction and measurement of edge trigger and level trigger of 51 single chip microcomputer
- Improved design of Linux system software shell protection technology
- What to do if the ABB robot protection device stops
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions at Electronica 2024
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- New real-time microcontroller system from Texas Instruments enables smarter processing in automotive and industrial applications
- Is the performance so severely compressed when not plugged in?
- Talk about Wi-Fi Alliance and the future of Wi-Fi
- 10. "Ten Thousand Miles" Raspberry Pi Car - Socket Learning (UDP Two-Machine Communication)
- EEWORLD University Hall ---- Introduction to Microelectronics Technology
- EEWORLD University ---- Balance Car Tutorial Qianfeng Internet of Things
- Help
- I have to learn how
- Will Wi-Fi 6 occupy most of the market in the future?
- Can you please help me analyze the specific working mode of TL431?
- [Serial] [Starlight Lightning STM32F407 Development Board] Chapter 14 Low Power Consumption Experiment