Research on Information Security Protection Strategy Optimization for Intelligent Connected Vehicles

被引:0
作者
Ren, Yilong [1 ,2 ]
Zhao, Fuxia [3 ]
Xu, Chi [3 ]
Yu, Haiyang [1 ,2 ]
机构
[1] Beihang Univ, Beijing Adv Innovat Ctr Big Data & Brain Comp, Sch Transportat Sci & Engn, Beijing, Peoples R China
[2] Beijing Key Lab Vehicle Rd Coordinat & Safety Con, Beijing, Peoples R China
[3] Beihang Univ, Sch Transportat Sci & Engn, Beijing, Peoples R China
来源
CICTP 2021: ADVANCED TRANSPORTATION, ENHANCED CONNECTION | 2021年
关键词
Intelligent Connected Vehicles; Information Security; Protection Strategy; Model Optimization; CYBER SECURITY;
D O I
暂无
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
In recent years, the functions of intelligent connected vehicles are becoming more and more powerful, which increases the number of electronic control units (ECUs) and the number of external connections, etc. However, these technologies made the intelligent connected vehicles more vulnerable to attack. Intelligent connected vehicles have been attacked frequently, causing serious threats to life and property. Therefore, intelligent connected vehicles need to carry out information security protection. In this paper, cost, delay and information security factors are considered, and according to the characteristics of the attack path of intelligent connected vehicles, an information security protection strategy for intelligent connected vehicles is proposed. The protection strategy improves the efficiency of information security measures allocation and reduces the cost.
引用
收藏
页码:1587 / 1596
页数:10
相关论文
共 17 条
[11]  
Miller C., 2014, BLACK HAT US, P94
[12]   Cyber security attacks to modern vehicular systems [J].
Pan, L. ;
Zheng, X. ;
Chen, H. X. ;
Luan, T. ;
Bootwala, H. ;
Batten, L. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 36 :90-100
[13]  
Pham M., 2020, ARXIV PREPRINT ARXIV, P1
[14]   In-vehicle network intrusion detection using deep convolutional neural network [J].
Song, Hyun Min ;
Woo, Jiyoung ;
Kim, Huy Kang .
VEHICULAR COMMUNICATIONS, 2020, 21
[15]   An Overview of Cyber Security for Connected Vehicles [J].
Takahashi, Junko .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (11) :2561-2575
[16]  
Zeng KX, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1527
[17]  
Zou B., 2017, P 2017 INT C CRYPT S, P91, DOI 10.1145/3058060.3058064