Strategy for ensuring in-vehicle infotainment security

被引:2
作者
Yue, Huang [1 ]
He, Qin Gui [1 ]
Tong, Liu [2 ]
Dan, Wang Xiao [3 ]
机构
[1] Jilin Univ, Ctr Comp Fundamental Educ, Coll Comp Sci & Technol, Changchun 130023, Peoples R China
[2] Jilin Univ, Ctr Comp Fundamental Educ, Changchun 130122, Peoples R China
[3] Jilin Univ, Coll Agr & Biol Engn, Changchun 130122, Peoples R China
来源
MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY | 2014年 / 556-562卷
关键词
information; security; vehicular; defense;
D O I
10.4028/www.scientific.net/AMM.556-562.5460
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In-vehicle networks were initially developed to operate in a closed environment and thus their security has not been concerned. However, growing attention has been paid to the convenience and entertainment value of vehicles, and thus automakers are integrating general entertainment devices into vehicles, which brings about the problem of information security. In this paper, the structure of secondary defense system was used to obstruct the Internet and autobody inner in-vehicle networks such as CAN and LIN. We built a strategy ensuring in-vehicle gateway security and an in-vehicle information software system.
引用
收藏
页码:5460 / +
页数:2
相关论文
共 5 条
  • [1] Kleberger P, 2011, IEEE INT VEH SYM, P528, DOI 10.1109/IVS.2011.5940525
  • [2] Experimental Security Analysis of a Modern Automobile
    Koscher, Karl
    Czeskis, Alexei
    Roesner, Franziska
    Patel, Shwetak
    Kohno, Tadayoshi
    Checkoway, Stephen
    Mccoy, Damon
    Kantor, Brian
    Anderson, Danny
    Shacham, Hovav
    Savage, Stefan
    [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 447 - 462
  • [3] Rouf I., 2010, 19 USENIX SEC
  • [4] Tao Yang, 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, P2232, DOI 10.1109/FSKD.2012.6234155
  • [5] YaMeng Wang, 2010, DESIGN IMPLEMENTATIO