Security Risk Assessment for Connected Vehicles Based on Back Propagation Neural Network

被引:0
作者
Wang, Yinghui [1 ]
Wang, Yunpeng [1 ]
Qin, Hongmao [1 ]
Ji, Haojie [1 ]
机构
[1] Beihang Univ, Sch Transportat Sci & Engn, Beijing Key Lab Cooperat Vehicle Infrastruct Syst, Xue Yuan Rd 37, Beijing 100191, Peoples R China
来源
CICTP 2019: TRANSPORTATION IN CHINA-CONNECTING THE WORLD | 2019年
关键词
Connected vehicles; Security risk assessment; Fuzzy theory; Back propagation neural network; GENETIC ALGORITHM;
D O I
暂无
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The wide application of information communication technology makes connected vehicles (CV) more vulnerable to be attacked. The communication systems and key nodes of CVs, e.g., electronic control units, controller area network (CAN), in-vehicle infotainment system, will face various threats such as eavesdropping, tampering, and counterfeiting. Cyber security of vehicles should be paid more attention because it involves drivers' safety and public traffic security. It is impossible to deal with all kinds of security threats for the effect of performance, compatibility, cost, and efficiency of vehicles. Therefore, it is necessary to assess the security risk of CVs. This paper proposes a security risk assessment method based on the conventional security risk analysis model and utilized back propagation (BP) neural network. The simulation results show that the risk level of CVs can be evaluated quantitatively by trained neural networks, and the method is convenience and applicability for security risk assessment of vehicles.
引用
收藏
页码:5733 / 5745
页数:13
相关论文
共 17 条
[1]  
[Anonymous], 2012, AUTOMOTIVE SAFETY SE
[2]  
Checkoway S., 2011, P 20 USENIX C SEC SE, P6
[3]  
Chen F, 2015, 2015 IEEE 6TH INTERNATIONAL SYMPOSIUM ON MICROWAVE, ANTENNA, PROPAGATION, AND EMC TECHNOLOGIES (MAPE), P1, DOI 10.1109/MAPE.2015.7510253
[4]   Numerical investigation of the compressible flow past an aerofoil [J].
Chen, Li-Wei ;
Xu, Chang-Yue ;
Lu, Xi-Yun .
JOURNAL OF FLUID MECHANICS, 2010, 643 :97-126
[5]  
Chen S., 2012, COMMUNICATION TECHNO, V1
[6]   A fast and elitist multiobjective genetic algorithm: NSGA-II [J].
Deb, K ;
Pratap, A ;
Agarwal, S ;
Meyarivan, T .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (02) :182-197
[7]   A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis [J].
Feng, Nan ;
Wang, Harry Jiannan ;
Li, Minqiang .
INFORMATION SCIENCES, 2014, 256 :57-73
[8]  
Fu S., 2013, J MODERN INFORM, V7
[9]  
강동주, 2013, [Journal of The Korea Institute of Information Security and Cryptology, 정보보호학회논문지], V23, P445, DOI 10.13089/JKIISC.2013.23.3.445
[10]  
Kong H-K., 2017, J AMB INTEL HUM COMP, P1