With the increasingly prominent problem of information security in the network era, the establishment of an effective secure communication system has become the primary problem for enterprises. How to ensure the secure communication of data will be a long-term issue in the information and data age. Therefore, based on the relevant standards of CCSA technical requirements for security certificate management system of Internet of vehicles wireless communication technology based on LTE and the personalized requirements of the vehicle manufacturer, this paper studies the security certificate management and key management of intelligent Internet connected vehicles. The certificate management content covers the whole life cycle management process of certificates, including the overall business processes of application, distribution, cancellation, and update, and direct communication security design. The main goal of key security is to ensure the security of the key used in the identity authentication system in its generation, storage, use, update, abolition, archiving, destruction, backup, and recovery.
With the increasing application of vehicle Ethernet in the intelligent networked vehicle network architecture, how to ensure the safety of Ethernet communication data between vehicle controllers has become an important research direction in the field of vehicle information security. Based on the Strongswan open source project, this paper has carried out the national security transformation of IPSec protocol, and implemented and verified it on the embedded development board with NXP I.MX8 as the core, proving that it can be applied to the Ethernet communication scenario between vehicle embedded controllers.
With the development of intelligent connected vehicles, especially L3 level automatic driving technology, it is very important to identify and avoid the impact of malicious jamming signals on the communication of intelligent connected vehicles. In this paper, we classify and identify the five kinds of common intelligent connected vehicle communication jamming signals: single-tone jamming signal, multi-tone jamming signal, linear swept-frequency jamming signal, partial band jamming signal and noise frequency modulation jamming signal. Firstly, six kinds of features of communication jamming signals are extracted: frequency domain moment kurtosis coefficient, frequency domain moment skewness coefficient, single frequency encircled energy, average spectral flatness coefficient, frequency domain parameter and time domain moment kurtosis coefficient, and then classified and identified based on convolution neural network (CNN). The simulation results show that when the jamming-to-noise ratio (JNR) is higher than -7dB, the recognition rate is over 92%, which indicates that CNN has good classification and recognition performance for communication jamming signals.
Today automobile industry, many studies on autonomous driving are being conducted, and the distribution of vehicles with autonomous driving functions is increasing. For the era of fully autonomous vehicles, connectivity of vehicles such as intelligent transportation systems, V2V, and V2X is required based on communication technologies such as LTE, 5G, and WiFi. However, this increase in the connectivity of automobiles has become an opportunity to raise the need for vehicle cyber security, and recently, ISO 21434 international standard has been established and announced in relation to cyber security. In this paper, we propose a threat analysis and risk assessment guide for cybersecurity so that we can derive cybersecurity requirements and develop a controller that can be safe against cybersecurity attacks. It also shows that the proposed method conforms to the requirements of the ISO 21434 standard. Through the result of the case study, cybersecurity requirements were derived to a level applicable to controller development, and it was confirmed whether the risk assessment requirements suggested in the ISO 21434 cybersecurity engineering standard were satisfied.
KEYWORDS: Telecommunications, Data communications, Technology, Security technologies, Network security, Information security, Principal component analysis
In order to solve the identity authentication and security communication problems of people, vehicles, roads and clouds in C-V2X communication, it is necessary to carry out the research on security authentication technology of C-V2X shortrange communication in intelligent connected vehicles. Based on the V2X scenario of Hongqi brand automobile, this study introduces the C-V2X short-range communication security authentication technical scheme, analyzes the requirements of the V2X PKI authentication system, combines the domestic commercial cryptography algorithm, adopts, and realizes the flexible addition or reduction of each module through hierarchical design and component-based development technology, which can quickly adapt to the different needs of users for network communication security, and provides comprehensive security services such as identity authentication, access control, and data integrity protection for network applications.
With the continuous development of intelligent connected vehicles, the information security risks are also increasing. In addition to the information security protection of vehicle external communication, the information security protection of vehicle internal network is also getting more and more attention. Based on the domestic commercial cipher algorithm, this paper formulates an overall information security protection strategy suitable for the scene inside the vehicle from the two aspects of vehicle external access security protection and vehicle communication network security protection.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.