期刊文献+

车联网环境下车载电控系统信息安全综述 被引量:17

Survey of information security research for vehicle electronic control system in vehicle Internet environment
下载PDF
导出
摘要 针对未来智能汽车与外界互联通信中所面临的信息安全问题,对车联网环境下车载电控系统信息安全进行了研究,以提高车载电控系统防范攻击能力,实现安全可靠运行.分析了车载电控系统的特点及可能面临的信息安全威胁,对国内外已有的相关研究成果进行归纳和梳理,重点总结和评述了国内外对车联网和车载电控系统信息安全研究两大方向的最新进展,进而归纳出目前研究存在的问题及未来继续研究的趋势.根据未来车联网环境对车载电控系统的安全要求及车载电控系统的特点,指出未来应重点研究的方向:信息安全模型构建方法、轻量化密码体制设计及车载信息系统主动防御策略. With the consideration of information security issues for future smart vehicles in Internet communications with outside network,the vehicle electronic control system information security in vehicle Internet environments was investigated to improve the ability of vehicle electronic control system for preventing attacks and realizing reliable work.The system architecture of vehicle electronic control was analyzed to find the security hole.The latest literatures and the related apocalypse were summarized.According to the requirements of vehicle electronic control system in vehicle Internet,the further hot research interests of new information security model,lightweighting cryptography system and active defense strategy for information system on-board were pointed out.
出处 《江苏大学学报(自然科学版)》 EI CAS CSCD 北大核心 2014年第6期635-643,共9页 Journal of Jiangsu University:Natural Science Edition
基金 中国博士后基金资助项目(2013M531283) 江苏省博士后基金资助项目(1201037C) 江苏省高校自然科学基金资助项目(12KJD580002) 交通部信息化重点项目(2013-364-863-900) 江苏大学高级人才基金资助项目(1281170019)
关键词 车载电控系统 车联网 信息安全 主动防御 vehicle electronic control system vehicle Internet information security active defense
  • 相关文献

参考文献34

二级参考文献330

共引文献317

同被引文献114

  • 1殷华,虎晓龙.煤矿无人综采模式及关键技术分析[J].工矿自动化,2021,47(S02):23-25. 被引量:3
  • 2朱利娜.基于单片机的超声测距倒车雷达的研究[J].微计算机信息,2007,23(23):110-111. 被引量:25
  • 3王爽,程俊来.面向Telematics应用的位置服务平台研究与实现[J].测绘与空间地理信息,2013,36(S1):40-45. 被引量:1
  • 4朱建新,郑荣良,卓斌,杨林.电动汽车高压电安全诊断与控制策略的研究[J].汽车工程,2007,29(4):308-312. 被引量:33
  • 5ETSI/SAGE TS 35. 223 - 2011. Specification of the 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3 ;document 3 :implementors' test data[ S]. 被引量:1
  • 6Wu Hongjun, Huang Tao, Nguyen Phuong Ha, et al. Differential attacks against stream cipher ZUC [ C ] // Proceeding of 18th International Conference on the Theo- ry and Application of Cryptology and Information Securi- ty, Beijing: Springer Verlag,2012:262 - 277. 被引量:1
  • 7Zhou Chunfang, Feng Xiutao, Lin Dongdai. The initia- lization stage analysis of ZUC vl. 5 [ C]//Proceeding of the lOth International Conference on Cryptography and Network Security. Sanya:Springer Verlag,2011:40 -53. 被引量:1
  • 8Orhanou G, El Hajji S, Lakbabi A, et al. Analytical evaluation of the stream cipher ZUC [ C ]//Proceedings of 2012 International Conference on Multimedia Compu- ting and Systems. Tangiers: IEEE Computer Society, 2012:927 - 930. 被引量:1
  • 9Feng Xiutao, Liu Jun, Zhou Zhaocun, et al. A byte- based guess and determine attack on SOSEMANUK[ C] //Proceeding of the 16th International Conference on the Theory and Application of Cryptology and Information Se-curity. Singapore : Springer Verlag, 2010 : 146 - 157. 被引量:1
  • 10Nia M S N, Eghlidos T. Improved Heuristic guess and determine attack on SNOW 3G stream cipher[ C ]//Pro- ceeding of the 7th International Symposium on Telecom- munications. Tehran: IEEE Computer Society, 2014: 972 - 976. 被引量:1

引证文献17

二级引证文献69

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部