[1] |
XUN Y J , LIU J J , NING J ,et al. An experimental study towards the in-vehicle network of intelligent and connected vehicles[C]// 2018 IEEE Global Communications Conference. IEEE, 2018.
|
[2] |
XUN Y J , SUN Y Y , LIU J J . An experimental study towards driver identification for intelligent and connected vehicles[C]// 2019 IEEE International Conference on Communications. IEEE, 2019.
|
[3] |
LIU J J , ZHANG S B , SUN W ,et al. In-vehicle network attacks and countermeasures:challenges and future directions[J]. IEEE Network, 2017,31(5): 50-58.
|
[4] |
ENEV M , TAKAKUWA A , KOSCHER K ,et al. Automobile driver fingerprinting[J]. Proceedings on Privacy Enhancing Technologies, 2016(1): 34-50.
|
[5] |
NIE S , LIU L , DU Y . How we remotely compromised the gateway,BCM,and autopilot ECUS of tesla cars[C]// 2017 Black Hat. 2017.
|
[6] |
ZENG K C , LIU S , SHU Y ,et al. All your GPS are belong to us:towards stealthy manipulation of road navigation systems[C]// 27th USENIX Security Symposium. 2018: 1527-1544.
|
[7] |
MILLER C , VALASEK C . Remote exploitation of an unaltered passenger vehicle[C]// Defcon, 2015: 1-91.
|
[8] |
BOSCH R . CAN Specification Version 20[S] 1991.
|
[9] |
程军, 崔继波, 苟凯英 . 车辆控制系统CAN总线通信的实施方法[J]. 汽车工程, 2003(5): 300-305.
|
|
CHENG J , CUI J B , GOU K Y . Implementation method of CAN bus communication in vehicle control system[J]. Automobile Engineering, 2003,(5): 300-305.
|
[10] |
LI Y S , LUO Q , LIU J J ,et al. TSP security in intelligent and connected vehicles:challenges and solutions[J]. IEEE Wireless Communications, 2019,26(3).
|
[11] |
CHECKOWAT S , MCCOY D , KANTOR B ,et al. Comprehensive experimental analyses of automotive attack surfaces[C]// USENIX Security Symposium. 20114: 447-462.
|
[12] |
NIE S , LIU L , DU Y . Free-fall:hacking Tesla from wireless to can bus[C]// 2017 Black Hat. 2017: 1-16.
|
[13] |
CHENG Q A , YIN Y , FENG Y ,et al. Exposing congestion attack on emerging connected vehicle based traffic signal control[C]// 2018 Network and Distributed Systems Security (NDSS) Symposium. 2018.
|
[14] |
LUO Q , CAO Y , LIU J ,et al. Localization and navigation in autonomous driving:threats and countermeasures[J]. IEEE Wireless Communications, 2019,26(4): 38-45.
|
[15] |
BENADJILA R , RENARD M , LOPES-ESTEVES J ,et al. One car,two frames:attacks on Hitag-2 remote keyless entry systems revisited[C]// 11th USENIX Workshop on Offensive Technologies (WOOT 17). 2017.
|
[16] |
GARCIA F D , OSWALD D , KASPER T ,et al. Lock it and still lose iton the (in)security of automotive remote keyless entry systems[C]// 25th USENIX Security Symposium (USENIX Security 16). 2016.
|
[17] |
ISHTIAQ ROUFA R M , MUSTAFAA H , TRAVIS TAVLORA S O ,et al. Security and privacy vulnerabilities of in-car wireless networks:a tire pressure monitoring system case study[C]// 19th USENIX Security Symposium. 2010: 11-13.
|
[18] |
SOMANI G , GAUR M S , SANGHI D ,et al. DDoS attacks in cloud computing:issues,taxonomy,and future directions[J]. Computer Communications, 2017,107: 30-48.
|
[19] |
RISTENPART T , TROMER E , SHACHAM H ,et al. Hey,you,get off of my cloud:exploring information leakage in third-party compute clouds[C]// Proceedings of the 16th ACM conference on Computer and Communications Security. ACM, 2009: 199-212.
|
[20] |
GEORGIEV M , IYENGAR S , JANA S ,et al. The most dangerous code in the world:validating SSL certificates in non-browser software[C]// Proceedings of the 2012 ACM conference on Computer and Communications Security. ACM, 2012: 38-49.
|
[21] |
LIANG X , SHETTY S , ZHANG L ,et al. Man in the cloud (MITC) defender:SGX-based user credential protection for synchronization applications in cloud computing platform[C]// 2017 IEEE 10th International Conference on Cloud Computing(CLOUD). IEEE, 2017: 302-309.
|
[22] |
GARIP M T , GURSOY M E , REIHER P ,et al. Congestion attacks to autonomous cars using vehicular botnets[C]// NDSS Workshop on Security of Emerging Networking Technologies (SENT). 2015.
|
[23] |
张德干, 赵彭真, 高瑾馨 ,等. 面向车联网的智能数据传输新方法[J]. 物联网学报, 2019,3(2): 89-99.
|
|
ZHANG D G , ZHAO P Z , GAO J X ,et al. A new intelligent data transmission method for intelligent and connected vehicles[J]. Chinese Journal on Internet of Things, 2019,3(2): 89-99.
|
[24] |
余辰, 张丽娟, 金海 . 大数据驱动的智能交通系统研究进展与趋势[J]. 物联网学报, 2018,2(1): 56-63.
|
|
YU C , ZHANG L J , JIN H . Research progress and trend of intelligent transportation system driven by big data[J]. Chinese Journal on Internet of Things, 2018,2(1): 56-63.
|