浏览全部资源
扫码关注微信
1. 上海大学,上海 200444
2. 国家宽带网络技术及应用工程研究中心,上海 200436
3. 中国信息通信研究院,北京 100191
[ "李玉峰(1975- ),男,上海大学教授、博士生导师,主要研究方向为网络信息安全管控、智能系统网络安全、宽带网络等。发表论文50余篇,其中SCI/EI检索30余篇;申请发明专利39项(授权29项);公开出版专著3种。曾获得省部级科学技术进步奖一等奖、二等奖4次" ]
[ "陆肖元(1975- ),男,上海大学计算机学院教授级高级工程师,上海宽带技术及应用工程技术研究中心(国家宽带网络技术及应用工程研究中心)副主任,临港智慧城市发展中心主任,科学技术部“863”计划、科学技术支撑、国家重点专项专家,上海科学技术发展重点领域“十二五”“十四五”技术预见专家。长期从事通信、宽带网络、智慧城市和大数据研究开发工作,主要研究方向为智慧城市和5G接入" ]
[ "曹晨红(1991- ),女,博士,上海大学计算机学院讲师,主要研究方向为网络测量与安全、物联网系统与网络、智能感知技术" ]
[ "李江涛(1990- ),男,博士,上海大学计算机学院讲师,主要研究方向为公钥密码学、车载网安全与隐私保护" ]
[ "朱泓艺(1990- ),男,博士,上海宽带技术及应用工程研究中心(国家宽带网络技术及应用工程研究中心)助理研究员,主要研究方向为信息通信理论、无线通信、多接入边缘计算和信息安全技术" ]
[ "孟楠(1982- ),女,博士,中国信息通信研究院安全研究所网络安全研究部副主任、高级工程师,主要从事电信网和互联网安全防护以及云计算、区块链等新技术安全的技术和标准研究工作" ]
网络出版日期:2020-04,
纸质出版日期:2020-04-20
移动端阅览
李玉峰, 陆肖元, 曹晨红, 等. 智能网联汽车网络安全浅析[J]. 电信科学, 2020,36(4):36-45.
Yufeng LI, Xiaoyuan LU, Chenhong CAO, et al. A survey of cybersecurity for intelligent connected-automated vehicle[J]. Telecommunications science, 2020, 36(4): 36-45.
李玉峰, 陆肖元, 曹晨红, 等. 智能网联汽车网络安全浅析[J]. 电信科学, 2020,36(4):36-45. DOI: 10.11959/j.issn.1000-0801.2020127.
Yufeng LI, Xiaoyuan LU, Chenhong CAO, et al. A survey of cybersecurity for intelligent connected-automated vehicle[J]. Telecommunications science, 2020, 36(4): 36-45. DOI: 10.11959/j.issn.1000-0801.2020127.
汽车工业正经历着向智能化、网联化范式的转变,(半)自动驾驶汽车通过新一代信息通信技术实现车与云平台、车与车、车与路、车与人的全方位网络连接。当汽车开始变成车轮上的联网计算机时,网络安全成为一个重大挑战,其威胁的作用范围从虚拟空间延伸到了物理空间,危害的对象已经上升为人类生命。介绍了智能汽车的电子/电气结构和网络结构,阐述了智能汽车的网络安全需求,指出了智能网联车辆系统的若干网络攻击,并针对这些攻击对可用的防御措施进行了调查。最后,探讨了未来可能的技术方向。
The automotive industry is experiencing a shift to an intelligent and connected paradigm.(Semi-) Autonomous vehicles use a new generation of information and communication technologies to realize a full range of interactions between vehicles and cloud
vehicles and vehicles
vehicles and roads
and vehicles and pedestrian
etc.When cars started to become connected computers on wheels
network security became a major challenge
and because the scope of cyber threats extended from virtual space to physical space
the harm of cybersecurity had risen to human life.The electronic/electrical structure
in-vehicle network structure
and out-of-vehicle network structure of intelligent vehicles were introduced
the security requirements of vehicle networks were elaborated
several cyber-attacks against connected-automated vehicle (CAV) were pointed out
the available defense measures against these attacks were addressed.The advantages and disadvantages of these measures were summarized.Finally
possible defense measures and directions in the future were discussed to further ensure the security of CAV.
Autoliv innovation and research [Z ] . 2019 .
Waymo . On the road to fully self-driving [R ] . 2017 .
工业和信息化部 . 车联网(智能网联汽车)产业发展行动计划 [R ] . 2018 .
Ministry of Industry and Information Technology . Action plan for the development of the connected car (smart connected car) industry [R ] . 2018 .
MILLER C , VALASEK C . Remote exploitation of an unaltered passenger vehicle [R ] . 2015 .
NIE S , LIU L , DU Y . Free-fall:hacking tesla from wireless to CAN bus [R ] . 2017 .
CAI Z , WANG A , ZHANG W , et al . 0-days & mitigations:roadways to exploit and secure connected BMW cars [R ] . 2019 .
See “Hacking smart car alarm systems” [Z ] . 2019 .
PARKINSON S , WARD P , WILSON K , et al . Cyber threats facing autonomous and connected vehicles:future challenges [J ] . IEEE Transactions on Intelligent Transportation Systems , 2017 , 18 ( 11 ): 2898 - 2915 .
Techcrunch . Why a cybersecurity solution for driverless cars may be found under the hood [Z ] . 2017 .
Society of Automotive Engineers International . Taxonomy and definitions for terms related to on-road motor vehicle automated driving systems [Z ] . 2014 .
KATO S , TAKEUCHI E , ISHIGURO Y , et al . An open approach to autonomous vehicles [J ] . IEEE Micro , 2015 , 35 ( 6 ): 60 - 68 .
LYU X , DING Y , YANG S H . Safety and security risk assessment in cyber-physical systems [J ] . IET Cyber-Physical Systems:Theory & Applications , 2019 , 4 ( 3 ): 221 - 232 .
EL-REWINI Z , SADATSHARAN K , SELVARAJ D F , et al . Cybersecurity challenges in vehicular communications [J ] . Vehicular Communications , 2019 :100214.
LIBICKI M C , ABLON L , WEBB T . The defenders dilemma:charting a course toward cybersecurity [Z ] . 2015 .
Survey:securing the modern vehicle [Z ] . 2019 .
DE LA TORRE G,RAD P,CHOO K K R.Driverless vehicle security:challenges and future research opportunities [Z ] . 2018 .
RABIEH K , MAHMOUD M M , GUO T N , et al . Cross-layer scheme for detecting large-scale colluding Sybil attack in VANETs [C ] // Proceedings of 2015 IEEE International Conference on Communications . Piscataway:IEEE Press , 2015 : 7298 - 7303 .
BHAVESH N B , MAITY S , HANSDAH R C . A protocol for authentication with multiple levels of anonymity (AMLA) in VANETs [C ] // Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA) . Piscataway:IEEE Press , 2013 : 462 - 469 .
MOKHTAR B , AZAB M . Survey on security issues in vehicular ad hoc networks [J ] . Alexandria Engineering Journal , 2015 , 54 ( 4 ): 1115 - 1126 .
WASEF A , SHEN X . EMAP:expedite message authentication protocol for vehicular Ad Hoc networks [J ] . IEEE Transactions on Mobile Computing , 2013 , 12 ( 1 ): 78 - 89 .
DIMITRIOU T , ALRASHED E A , KARAATA M H , et al . Imposter detection for replication attacks in mobile sensor networks [J ] . Computer Networks , 2016 ( 108 ): 210 - 222 .
SEO S H , WON J , SULTANA S . Effective key management in dynamic wireless sensor networks [J ] . IEEE Transactions on Information Forensics & Security , 2015 , 10 ( 2 ): 371 - 383 .
PSIAKI M L , HUMPHREYS T E . GNSS spoofing and detection [J ] . Proceedings of the IEEE , 2016 , 104 ( 6 ): 1258 - 1270 .
CHEMINOD M , DURANTE L , VALENZANO A . Review of security issues in industrial networks [J ] . IEEE Transactions on Industrial Informatics , 2013 , 9 ( 1 ): 277 - 293 .
THILAK K D , AMUTHAN A . DOS attack on VANET routing and possible defending solutions-a survey [C ] // Proceedings of International Conference on Information Communication and Embedded Systems (ICICES) . Piscataway:IEEE Press , 2016 : 1 - 7 .
YAN C , XU W Y , LIU J H . Can you trust autonomous vehicles:contactless attacks against sensors of self-driving vehicle [J ] . 2016 .
SHUKLA D , VAIBHAV A , DAS S , et al . Security and attack analysis for vehicular ad hoc network:a survey [C ] // Proceedings of International Conference on Computing,Communication and Automation (ICCCA) . Piscataway:IEEE Press , 2016 : 625 - 630 .
PATHAN K . Security of self-organizing networks:MANET,WSN,WMN,VANET [M ] . Boca Raton : CRC PressPress , 2016 .
SAMARA G,AL-RABA’NAH Y . Security issues in vehicular ad hoc networks (VANET):a survey [Z ] . 2017 .
BHARGAVA B , JOHNSON A M , MUNYENGABE G I , et al . A systematic approach for attack analysis and mitigation in V2V networks [Z ] . 2016 .
LIU J , SUN W , SHI Y P . In-vehicle network attacks and countermeasures:challenges and future directions [J ] . IEEE Network , 2017 , 31 ( 5 ): 50 - 58 .
LI K , VOICU R C , KANHERE S S , et al . Energy efficient legitimate wireless surveillance of UAV communications [J ] . IEEE Transactions on Vehicular Technology , 2019 , 68 ( 3 ): 2283 - 2293 .
GARCIA F D , OSWALD D , KASPER T , et al . Lock it and still lose it—on the (in) security of automotive remote keyless entry systems [C ] // Proceedings of 25th USENIX Security Symposium.[S.l.:s.n] . 2016 .
中国通信学会 . 车联网安全技术与标准发展态势前沿报告 [R ] . 2019 .
China Institute of Communications . Frontier report on development trends of telematics security technology and standards [R ] . 2019 .
LIM H S M , TAEIHAGH A . Autonomous vehicles for smart and sustainable cities:an in-depth exploration of privacy and cybersecurity implications [J ] . Energies , 2018 , 11 ( 5 ):1062.
BURZIO G , CORDELLA G F , COLAJANNI M , et al . Cybersecurity of connected autonomous vehicles:a ranking based approach [C ] // Proceedings of the 2018 International Conference of Electrical and Electronic Technologies for Automotive . Piscataway:IEEE Press , 2018 .
Auto-ISAC.Automotive cybersecurity best practices–executive summary [Z ] . 2018 .
YAN Z , ROBERTSON T , YAN R , et al . Finding the weakes links in the weakest link:how well do undergraduate students make cybersecurity judgment? [J ] . Computers in Human Behavior , 2018 ( 84 ): 375 - 382 .
NOY I Y , SHINAR D , HORREY W J . Automated driving:safety blind spots [J ] . Safety Science , 2018 ( 102 ): 68 - 78 .
陈山枝 , 胡金玲 , 时岩 , 等 . LTE-V2X车联网技术、标准与应用 [J ] . 电信科学 , 2018 , 34 ( 4 ): 1 - 11 .
CHEN S Z , HU J L , SHI Y , et al . Technologies,standards and applications of LTE-V2X for vehicular networks [J ] . Telecommunications Science , 2018 , 34 ( 4 ): 1 - 11 .
YAN Z , ROBERTSON T , YAN R , et al . Finding the weakes links in the weakest link:how well do undergraduate students make cybersecurity judgment? [J ] . Computers in Human Behavior , 2018 ( 84 ): 375 - 382
0
浏览量
1682
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构