[1] |
MATHEUS K . Automotive ethernet[M]. Cambridge: Cambridge University Press, 2015.
|
[2] |
呼布钦, 秦贵和, 刘颖 ,等. 下一代汽车网络:车载以太网技术现状与发展[J]. 计算机工程与应用, 2016(24): 29-36.
|
|
HU B Q , QIN G H , LIU Y ,et al. Next generation automotive network:technology status and development of automotive ethernet in-vehicle network[J]. Computer Engineering and Applications, 2016,(24): 29-36.
|
[3] |
李克强, 戴一凡, 李升波 ,等. 智能网联汽车(ICV)技术的发展现状及趋势[J]. 汽车安全与节能学报, 2017,8(1): 1-14.
|
|
LI K Q , DAI Y F , LI S B ,et al. State-of-the-art and technical trends of intelligent and connected vehicles[J]. Automotive Safety and Energy. 2017,8(1): 1-14.
|
[4] |
LIN C W , YU H . Cooperation or competition? Coexistence of safety and security in next-generation ethernet-based automotive networks[C]// IEEE Design Automation Conference. 2016.
|
[5] |
RAY S , WEN C , BHADRA J ,et al. Extensibility in automotive security:current practice and challenges[C]// Proceedings of the Design Automation Conference, 2017.
|
[6] |
罗超 . 面向联网汽车车内网络的防御技术研究与实现[D]. 成都:电子科技大学, 2020.
|
|
LUO C . Research and implementation of defense technology for in-vehicle network of connected vehicle[D]. Chengdu:UESTC, 2020.
|
[7] |
IEEE standard for local and metropolitan area networks[R]. 2004.
|
[8] |
FUNK P , BLAKEWILSON S . EAP tunneled TLS authentication protocol (EAP-TTLS)[R]. 2004.
|
[9] |
ZELLE D , CHRISTOPH K , HUBERT S ,et al. On using TLS to secure in-vehicle networks[P]. Availability,Reliability and Security, 2017.
|
[10] |
KOHL J , NEUMAN C . The kerberos network authentication service (V5)[S]. RFC Editor, 1993.
|
[11] |
MUNDHENK P , PAVERD A , MROWCA A ,et al. Security in automotive networks[J]. ACM Transactions on Design Automation of Electronic Systems, 2017.
|
[12] |
程安宇 . 乘用车网络控制系统中调度算法的研究与实现[D]. 武汉:武汉大学, 2014.
|
|
CHENG A Y . The research and implementation of scheduling algorithm in passenger vehicle network control system[D]. Wuhan:WHU, 2014.
|
[13] |
GB/T 32918-2016. 信息安全技术 SM2 椭圆曲线公钥密码算法[S]. 北京:中国质检出版社, 2016.
|
|
GB/T 32918-2016. Information security technology— public key cryptographic algorithm SM2 based on elliptic curves[S]. Beijing:China Quality Press, 2016.
|
[14] |
GB/T 32905-2016. 信息安全技术SM3 密码杂凑算法[M]. 北京: 中国质检出版社, 2016.
|
|
GB/T 32905-2016. Information security technology— SM3 cryptographic hash algorithm[S]. Beijing:China Quality Press, 2016.
|
[15] |
GB/T 32907-2016. 信息安全技术 SM4 分组密码算法[M]. 北京: 中国质检出版社, 2016.
|
|
GB/T 32907-2016. Information security technology— SM4 block cipher algorithm[S]. Beijing:China Quality Press, 2016.
|
[16] |
吴志红, 赵建宁, 朱元 ,等. 国密算法和国际密码算法在车载单片机上应用的对比研究[J]. 信息网络安全, 2019(8): 68-75.
|
|
WU J H , ZHAO J N , ZHU Y ,et al. Comparative study on application of chinese cryptographic algorithms and international cryptographic algorithms in vehicle microcontrollers[J]. Netinfo Security, 2019(8): 68-75.
|
[17] |
修佳鹏, 田超宇, 杨正球 ,等. SecOC 安全机制中国密算法应用方案研究[J]. 信息安全研究, 2020,6(9): 775-782.
|
|
XIU J P , TIAN C Y , YANG Z Q ,et al. Research on application scheme of national secret algorithm SecOC security mechanism[J]. Journal of Information Security Research. 2020,6(9): 775-782.
|
[18] |
AL-JARRAH O Y , MAPLE C , DIANATI M ,et al. Intrusion detection systems for intra-vehicle networks:a review[J]. IEEE Access, 2019: 1-10.
|
[19] |
胡鑫鑫, 刘彩霞, 刘树新 ,等. 移动通信网鉴权认证综述[J]. 网络与信息安全学报, 2018,4(12): 1-15.
|
|
HU X X , LIU C X , LIU S X ,et al. Overview of mobile communication network authentication[J]. Chinese Journal of Network and Information Security, 2018,4(12): 1-15.
|