A survey of cybersecurity for intelligent connected-automated vehicle
The automotive industry is experiencing a shift to an intelligent and connected paradigm.(Semi-) Autonomous vehicles use a new generation of information and communication technologies to realize a full range of interactions between vehicles and cloud,vehicles and vehicles,vehicles and roads,and vehi...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2020-04-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020127/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530710453649408 |
---|---|
author | Yufeng LI Xiaoyuan LU Chenhong CAO Jiangtao LI Hongyi ZHU Nan MENG |
author_facet | Yufeng LI Xiaoyuan LU Chenhong CAO Jiangtao LI Hongyi ZHU Nan MENG |
author_sort | Yufeng LI |
collection | DOAJ |
description | The automotive industry is experiencing a shift to an intelligent and connected paradigm.(Semi-) Autonomous vehicles use a new generation of information and communication technologies to realize a full range of interactions between vehicles and cloud,vehicles and vehicles,vehicles and roads,and vehicles and pedestrian,etc.When cars started to become connected computers on wheels,network security became a major challenge,and because the scope of cyber threats extended from virtual space to physical space,the harm of cybersecurity had risen to human life.The electronic/electrical structure,in-vehicle network structure,and out-of-vehicle network structure of intelligent vehicles were introduced,the security requirements of vehicle networks were elaborated,several cyber-attacks against connected-automated vehicle (CAV) were pointed out,the available defense measures against these attacks were addressed.The advantages and disadvantages of these measures were summarized.Finally,possible defense measures and directions in the future were discussed to further ensure the security of CAV. |
format | Article |
id | doaj-art-ebf7e9b4b808445fa4789d94dba78392 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2020-04-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-ebf7e9b4b808445fa4789d94dba783922025-01-15T03:00:48ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012020-04-0136364559583465A survey of cybersecurity for intelligent connected-automated vehicleYufeng LIXiaoyuan LUChenhong CAOJiangtao LIHongyi ZHUNan MENGThe automotive industry is experiencing a shift to an intelligent and connected paradigm.(Semi-) Autonomous vehicles use a new generation of information and communication technologies to realize a full range of interactions between vehicles and cloud,vehicles and vehicles,vehicles and roads,and vehicles and pedestrian,etc.When cars started to become connected computers on wheels,network security became a major challenge,and because the scope of cyber threats extended from virtual space to physical space,the harm of cybersecurity had risen to human life.The electronic/electrical structure,in-vehicle network structure,and out-of-vehicle network structure of intelligent vehicles were introduced,the security requirements of vehicle networks were elaborated,several cyber-attacks against connected-automated vehicle (CAV) were pointed out,the available defense measures against these attacks were addressed.The advantages and disadvantages of these measures were summarized.Finally,possible defense measures and directions in the future were discussed to further ensure the security of CAV.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020127/automated drivingInternet of vehiclesintelligent connected-automated vehiclecybersecurity |
spellingShingle | Yufeng LI Xiaoyuan LU Chenhong CAO Jiangtao LI Hongyi ZHU Nan MENG A survey of cybersecurity for intelligent connected-automated vehicle Dianxin kexue automated driving Internet of vehicles intelligent connected-automated vehicle cybersecurity |
title | A survey of cybersecurity for intelligent connected-automated vehicle |
title_full | A survey of cybersecurity for intelligent connected-automated vehicle |
title_fullStr | A survey of cybersecurity for intelligent connected-automated vehicle |
title_full_unstemmed | A survey of cybersecurity for intelligent connected-automated vehicle |
title_short | A survey of cybersecurity for intelligent connected-automated vehicle |
title_sort | survey of cybersecurity for intelligent connected automated vehicle |
topic | automated driving Internet of vehicles intelligent connected-automated vehicle cybersecurity |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020127/ |
work_keys_str_mv | AT yufengli asurveyofcybersecurityforintelligentconnectedautomatedvehicle AT xiaoyuanlu asurveyofcybersecurityforintelligentconnectedautomatedvehicle AT chenhongcao asurveyofcybersecurityforintelligentconnectedautomatedvehicle AT jiangtaoli asurveyofcybersecurityforintelligentconnectedautomatedvehicle AT hongyizhu asurveyofcybersecurityforintelligentconnectedautomatedvehicle AT nanmeng asurveyofcybersecurityforintelligentconnectedautomatedvehicle AT yufengli surveyofcybersecurityforintelligentconnectedautomatedvehicle AT xiaoyuanlu surveyofcybersecurityforintelligentconnectedautomatedvehicle AT chenhongcao surveyofcybersecurityforintelligentconnectedautomatedvehicle AT jiangtaoli surveyofcybersecurityforintelligentconnectedautomatedvehicle AT hongyizhu surveyofcybersecurityforintelligentconnectedautomatedvehicle AT nanmeng surveyofcybersecurityforintelligentconnectedautomatedvehicle |