skip to main content
10.1145/3058060.3058064acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccspConference Proceedingsconference-collections
research-article

Research on Information Security Framework of Intelligent Connected Vehicle

Published: 17 March 2017 Publication History

Abstract

This paper describes the definition and main technical characteristics of intelligent networked vehicles and reviews the current research situation of information security of intelligent networked vehicles at home and abroad. Furthermore, it summarizes the relevant significant research achievements abroad and analyses the information security cases of intelligent network in recent years. The characteristics and attack path of information security vulnerabilities is analyzed. According to the security threat of onboard information system and the function requirement of vehicle system, the network security information model of intelligent vehicle network is proposed according to the future vehicle networking environment, and the future research direction is pointed out.

References

[1]
Wang, Z., Deng, X., Liu, D. Research on Standard System of Intelligent & Connected Vehicle (ICV) in China {J}. Standard Criterion, 2016 (10): 15--18.
[2]
Leng, Y., Zhao, L. Novel design of intelligent internet-of-vehicles management system based on cloud-computing and internet-of-things {C}//2011 International Conference on Electronic & Mechanical Engineering and Information Technology. Piscataway, USA: IEEE Computer Society, 2011: 3190--3193.
[3]
Cheng, G., Guo, D. Research and development of networked vehicle {J}. Mobile Communication, 2011 (17): 23-26. (in Chinese)
[4]
Ren, F., Wu, K., Zeng, B. Multilevel security vehicle based on network platform {J}. Information Security and Communications Privacy, 2014 (2): 73--77. (in Chinese)
[5]
Luo, F., Su, J., Yuan, D. Vehicle electronic networks and bus standards {J}. Automobile Engineering, 2003, 2594):372--376. (in Chinese)
[6]
National Institute of Standards and Technology's (NIST) Framework for Improving Critical Infrastructure Cybersecurity
[7]
Vehicle Electrical System Security Committee. SAE J3061 Cybersecurity Guidebook for Cyber-Physical Automotive Systems
[8]
Yin, X., Dong, W., Huang, W. The Present Situation and Countermeasure of Information Security Development of Japanese Car Network {J}. China Information Security, 2015 (9): 68--72.
[9]
Ma, S., Jiang, H., Han, M. Survey of Information Security Research for Vehicle Electronic Control System in Vehicle Internet Environment {J}. Journal of Jiangsu University, 2014, 35(6): 635--643

Cited By

View all
  • (2024)Formation Mechanism and Analysis of Intelligent Connected Vehicles Fleet under Meta-Cellular Automata Simulation ConditionsApplied Mathematics and Nonlinear Sciences10.2478/amns-2024-05869:1Online publication date: 26-Feb-2024
  • (2023)Generic Vulnerability Analysis Based on Large-Scale Automotive SoftwareProceedings of the 3rd International Conference on Internet, Education and Information Technology (IEIT 2023)10.2991/978-94-6463-230-9_7(43-56)Online publication date: 31-Aug-2023
  • (2021)Automotive Security and Theft Prevention Systems: State of The Art2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00134(806-812)Online publication date: Oct-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCSP '17: Proceedings of the 2017 International Conference on Cryptography, Security and Privacy
March 2017
153 pages
ISBN:9781450348676
DOI:10.1145/3058060
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Wuhan Univ.: Wuhan University, China

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 March 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Intelligent Vehicle
  2. cyber security
  3. information attack
  4. information framework

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICCSP '17

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Formation Mechanism and Analysis of Intelligent Connected Vehicles Fleet under Meta-Cellular Automata Simulation ConditionsApplied Mathematics and Nonlinear Sciences10.2478/amns-2024-05869:1Online publication date: 26-Feb-2024
  • (2023)Generic Vulnerability Analysis Based on Large-Scale Automotive SoftwareProceedings of the 3rd International Conference on Internet, Education and Information Technology (IEIT 2023)10.2991/978-94-6463-230-9_7(43-56)Online publication date: 31-Aug-2023
  • (2021)Automotive Security and Theft Prevention Systems: State of The Art2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00134(806-812)Online publication date: Oct-2021
  • (2021)Cybersecurity in Automotive TechnologyInformation Security of Intelligent Vehicles Communication10.1007/978-981-16-2217-5_3(29-50)Online publication date: 19-May-2021
  • (2019)Detecting Vehicle Anomaly in the Edge via Sensor Consistency and Frequency CharacteristicIEEE Transactions on Vehicular Technology10.1109/TVT.2019.290769268:6(5618-5628)Online publication date: Jun-2019
  • (2019)Analysis on current situation of China’s intelligent connected vehicle road test regulationsMATEC Web of Conferences10.1051/matecconf/201925902003259(02003)Online publication date: 25-Jan-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media