Essential Technics of Cybersecurity for Intelligent Connected Vehicles: Comprehensive Review and Perspective

被引:11
|
作者
Yang, Shichun [1 ,2 ]
Zuo, Zheng [1 ]
Ma, Bin [3 ]
Zheng, Yifan [1 ]
Zhou, Sida [1 ]
Liu, Mingyan [1 ]
Lu, Yu [1 ]
Li, Qiangwei [1 ]
Zhou, Xinan [1 ]
Zhang, Mengyue [1 ,4 ]
Hua, Yang [5 ]
Chen, Fei [1 ]
Cao, Yaoguang [6 ]
机构
[1] Beihang Univ, Sch Transportat Sci Engn, Beijing 100191, Peoples R China
[2] Technol Innovat Ctr New Energy Vehicle Digital Sup, Beijing 100120, Peoples R China
[3] Jilin Univ, Coll Commun Engn, Changchun 130012, Peoples R China
[4] Minist Sci & Technol China, High Technol Res & Dev Ctr, Beijing 100862, Peoples R China
[5] Beijing SWORD Elect Ind Co Ltd, Core & Basic Technol Inst, Beijing 100176, Peoples R China
[6] Beihang Univ, Res Inst Frontier Sci, Beijing 100191, Peoples R China
关键词
Cybersecurity; encryption; intelligent connected vehicles (ICVs); intrusion detection; standard system; INTRUSION DETECTION SYSTEM; COMPARATIVE PERFORMANCE EVALUATION; PRIVACY-PRESERVING AUTHENTICATION; KEYLESS-ENTRY SYSTEMS; IN-VEHICLE; ANOMALY DETECTION; LIGHTWEIGHT AUTHENTICATION; DETECTION SCHEME; ATTACK DETECTION; CYBER-ATTACKS;
D O I
10.1109/JIOT.2023.3299554
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Along with the promotion of intelligent connected vehicles (ICVs), the problems of network attacks have rapidly increased, and thus the cybersecurity has drawn much attention. Unfortunately, although remarkable progress has been achieved both in technics and standard, it still remains vague for designing vehicular cybersecurity. In this article, the general technical profile of cybersecurity for ICVs has been comprehensively reviewed, including threat analysis and risk assessment, static defense, and intrusion detection. The potential attacking vulnerabilities for ICVs are summarized, within in-vehicle network and mobile networks. Then, the identity authentication and secure communication methods are introduced from static defense, where the conventional and novel intelligent approach are included. And the intrusion detection is introduced as the active methods, including conventional and novel ones. Moreover, the general procedure and management for designing the vehicular cybersecurity are also summarized according to the current standard system. It hopes that the review of research progress on technical method may help researchers and manufactures, and delivers the potential direction for future cybersecurity development.
引用
收藏
页码:21787 / 21810
页数:24
相关论文
共 50 条
  • [1] An Overview of Vehicular Cybersecurity for Intelligent Connected Vehicles
    Guan, Tian
    Han, Yi
    Kang, Nan
    Tang, Ningye
    Chen, Xu
    Wang, Shu
    SUSTAINABILITY, 2022, 14 (09)
  • [2] Cybersecurity framework for connected and automated vehicles: A modelling perspective
    Khan, Shah Khalid
    Shiwakoti, Nirajan
    Stasinopoulos, Peter
    Chen, Yilun
    Warren, Matthew
    TRANSPORT POLICY, 2025, 162 : 47 - 64
  • [3] A review of factors impacting Cybersecurity in Connected and Autonomous Vehicles (CAVs)
    Pandey, Mohinder
    Seetharaman
    2022 8TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT'22), 2022, : 1218 - 1224
  • [4] Cybersecurity Simulator for Connected and Autonomous Vehicles
    Folan, Sean
    Wang, Yunsheng
    PROCEEDINGS OF THE 2023 INTERNATIONAL SYMPOSIUM ON THEORY, ALGORITHMIC FOUNDATIONS, AND PROTOCOL DESIGN FOR MOBILE NETWORKS AND MOBILE COMPUTING, MOBIHOC 2023, 2023, : 430 - 435
  • [5] Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-of-the-Art
    Sharma, Prinkle
    Gillanders, James
    IEEE ACCESS, 2022, 10 : 108979 - 108996
  • [6] Survey of the intelligent and connected vehicle cybersecurity
    Wu W.
    Li R.
    Zeng G.
    Xie Y.
    Xie G.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (06): : 161 - 174
  • [7] Review of Motion Planning Methods of Intelligent Connected Vehicles
    Li L.
    Xu Z.-G.
    Zhao X.-M.
    Wang G.-P.
    Zhongguo Gonglu Xuebao/China Journal of Highway and Transport, 2019, 32 (06): : 20 - 33
  • [8] Cybersecurity Digital Labels for Connected and Autonomous Vehicles
    Khan, Wazir Zada
    Khan, Muhammad Khurram
    Arshad, Qurat-ul-Ain
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2023, 12 (01) : 87 - 93
  • [9] THE liability for cybersecurity breaches of connected and autonomous vehicles
    Channon M.
    Marson J.
    Computer Law and Security Review, 2021, 43
  • [10] INTELLIGENT TRAFFIC WITH CONNECTED VEHICLES Intelligent and Connected Traffic Systems
    Balabhadruni, Sai Kumar
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,