[28] |
PATHAN K . Security of self-organizing networks:MANET,WSN,WMN,VANET[M]. Boca Raton: CRC PressPress, 2016.
|
[29] |
SAMARA G,AL-RABA’NAH Y . Security issues in vehicular ad hoc networks (VANET):a survey[Z]. 2017.
|
[30] |
BHARGAVA B , JOHNSON A M , MUNYENGABE G I ,et al. A systematic approach for attack analysis and mitigation in V2V networks[Z]. 2016.
|
[31] |
LIU J , SUN W , SHI Y P . In-vehicle network attacks and countermeasures:challenges and future directions[J]. IEEE Network, 2017,31(5): 50-58.
|
[1] |
Autoliv innovation and research[Z]. 2019.
|
[2] |
Waymo. On the road to fully self-driving[R]. 2017.
|
[32] |
LI K , VOICU R C , KANHERE S S ,et al. Energy efficient legitimate wireless surveillance of UAV communications[J]. IEEE Transactions on Vehicular Technology, 2019,68(3): 2283-2293.
|
[33] |
GARCIA F D , OSWALD D , KASPER T ,et al. Lock it and still lose it—on the (in) security of automotive remote keyless entry systems[C]// Proceedings of 25th USENIX Security Symposium.[S.l.:s.n]. 2016.
|
[3] |
工业和信息化部. 车联网(智能网联汽车)产业发展行动计划[R]. 2018.
|
|
Ministry of Industry and Information Technology. Action plan for the development of the connected car (smart connected car) industry[R]. 2018.
|
[34] |
中国通信学会. 车联网安全技术与标准发展态势前沿报告[R]. 2019.
|
|
China Institute of Communications. Frontier report on development trends of telematics security technology and standards[R]. 2019.
|
[4] |
MILLER C , VALASEK C . Remote exploitation of an unaltered passenger vehicle[R]. 2015.
|
[5] |
NIE S , LIU L , DU Y . Free-fall:hacking tesla from wireless to CAN bus[R]. 2017.
|
[35] |
LIM H S M , TAEIHAGH A . Autonomous vehicles for smart and sustainable cities:an in-depth exploration of privacy and cybersecurity implications[J]. Energies, 2018,11(5):1062.
|
[36] |
BURZIO G , CORDELLA G F , COLAJANNI M ,et al. Cybersecurity of connected autonomous vehicles:a ranking based approach[C]// Proceedings of the 2018 International Conference of Electrical and Electronic Technologies for Automotive. Piscataway:IEEE Press, 2018.
|
[6] |
CAI Z , WANG A , ZHANG W ,et al. 0-days & mitigations:roadways to exploit and secure connected BMW cars[R]. 2019.
|
[7] |
See “Hacking smart car alarm systems”[Z]. 2019.
|
[37] |
Auto-ISAC.Automotive cybersecurity best practices–executive summary[Z]. 2018.
|
[38] |
YAN Z , ROBERTSON T , YAN R ,et al. Finding the weakes links in the weakest link:how well do undergraduate students make cybersecurity judgment?[J]. Computers in Human Behavior, 2018(84): 375-382.
|
[39] |
NOY I Y , SHINAR D , HORREY W J . Automated driving:safety blind spots[J]. Safety Science, 2018(102): 68-78.
|
[8] |
PARKINSON S , WARD P , WILSON K ,et al. Cyber threats facing autonomous and connected vehicles:future challenges[J]. IEEE Transactions on Intelligent Transportation Systems, 2017,18(11): 2898-2915.
|
[9] |
Techcrunch. Why a cybersecurity solution for driverless cars may be found under the hood[Z]. 2017.
|
[40] |
陈山枝, 胡金玲, 时岩 ,等. LTE-V2X车联网技术、标准与应用[J]. 电信科学, 2018,34(4): 1-11.
|
|
CHEN S Z , HU J L , SHI Y ,et al. Technologies,standards and applications of LTE-V2X for vehicular networks[J]. Telecommunications Science, 2018,34(4): 1-11.
|
[10] |
Society of Automotive Engineers International. Taxonomy and definitions for terms related to on-road motor vehicle automated driving systems[Z]. 2014.
|
[11] |
KATO S , TAKEUCHI E , ISHIGURO Y ,et al. An open approach to autonomous vehicles[J]. IEEE Micro, 2015,35(6): 60-68.
|
[12] |
LYU X , DING Y , YANG S H . Safety and security risk assessment in cyber-physical systems[J]. IET Cyber-Physical Systems:Theory & Applications, 2019,4(3): 221-232.
|
[13] |
EL-REWINI Z , SADATSHARAN K , SELVARAJ D F ,et al. Cybersecurity challenges in vehicular communications[J]. Vehicular Communications, 2019:100214.
|
[14] |
LIBICKI M C , ABLON L , WEBB T . The defenders dilemma:charting a course toward cybersecurity[Z]. 2015.
|
[15] |
Survey:securing the modern vehicle[Z]. 2019.
|
[16] |
DE LA TORRE G,RAD P,CHOO K K R.Driverless vehicle security:challenges and future research opportunities[Z]. 2018.
|
[17] |
RABIEH K , MAHMOUD M M , GUO T N ,et al. Cross-layer scheme for detecting large-scale colluding Sybil attack in VANETs[C]// Proceedings of 2015 IEEE International Conference on Communications. Piscataway:IEEE Press, 2015: 7298-7303.
|
[18] |
BHAVESH N B , MAITY S , HANSDAH R C . A protocol for authentication with multiple levels of anonymity (AMLA) in VANETs[C]// Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA). Piscataway:IEEE Press, 2013: 462-469.
|
[19] |
MOKHTAR B , AZAB M . Survey on security issues in vehicular ad hoc networks[J]. Alexandria Engineering Journal, 2015,54(4): 1115-1126.
|
[20] |
WASEF A , SHEN X . EMAP:expedite message authentication protocol for vehicular Ad Hoc networks[J]. IEEE Transactions on Mobile Computing, 2013,12(1): 78-89.
|
[21] |
DIMITRIOU T , ALRASHED E A , KARAATA M H ,et al. Imposter detection for replication attacks in mobile sensor networks[J]. Computer Networks, 2016(108): 210-222.
|
[22] |
SEO S H , WON J , SULTANA S . Effective key management in dynamic wireless sensor networks[J]. IEEE Transactions on Information Forensics & Security, 2015,10(2): 371-383.
|
[23] |
PSIAKI M L , HUMPHREYS T E . GNSS spoofing and detection[J]. Proceedings of the IEEE, 2016,104(6): 1258-1270.
|
[24] |
CHEMINOD M , DURANTE L , VALENZANO A . Review of security issues in industrial networks[J]. IEEE Transactions on Industrial Informatics, 2013,9(1): 277-293.
|
[25] |
THILAK K D , AMUTHAN A . DOS attack on VANET routing and possible defending solutions-a survey[C]// Proceedings of International Conference on Information Communication and Embedded Systems (ICICES). Piscataway:IEEE Press, 2016: 1-7.
|
[26] |
YAN C , XU W Y , LIU J H . Can you trust autonomous vehicles:contactless attacks against sensors of self-driving vehicle[J]. 2016.
|
[27] |
SHUKLA D , VAIBHAV A , DAS S ,et al. Security and attack analysis for vehicular ad hoc network:a survey[C]// Proceedings of International Conference on Computing,Communication and Automation (ICCCA). Piscataway:IEEE Press, 2016: 625-630.
|
[41] |
YAN Z , ROBERTSON T , YAN R ,et al. Finding the weakes links in the weakest link:how well do undergraduate students make cybersecurity judgment?[J]. Computers in Human Behavior, 2018(84): 375-382
|