电信科学 ›› 2023, Vol. 39 ›› Issue (3): 1-15.doi: 10.11959/j.issn.1000-0801.2023046
• 专题:智能网联汽车与车联网 • 下一篇
陈滏媛1, 董振江1, 董建阔1, 徐敏杰2
修回日期:
2023-03-15
出版日期:
2023-03-20
发布日期:
2023-03-01
作者简介:
陈滏媛(2000- ),女,南京邮电大学博士生,主要研究方向为车联网安全、网络空间安全与密码工程基金资助:
Fuyuan CHEN1, Zhenjiang DONG1, Jiankuo DONG1, Minjie XU2
Revised:
2023-03-15
Online:
2023-03-20
Published:
2023-03-01
Supported by:
摘要:
车路云协同的车联网体系已经逐步上升为国家战略,车联网安全关系到行车安全、生命财产安全甚至国家安全,正日益成为行业研究热点。首先介绍了车联网技术架构与安全行业的整体状况;其次,以车联网“车-路-云”技术体系为基准,从车联网终端安全、车联网路侧安全、车联网云端安全 3 个层面,讨论了国内外研究现状,并分析了车联网安全防护领域的问题与挑战;最后,展望了车联网安全防护技术未来的发展与研究重点。
陈滏媛, 董振江, 董建阔, 徐敏杰. 车联网安全防护技术综述[J]. 电信科学, 2023, 39(3): 1-15.
Fuyuan CHEN, Zhenjiang DONG, Jiankuo DONG, Minjie XU. A survey of V2X security protection technologies[J]. Telecommunications Science, 2023, 39(3): 1-15.
[1] | 陈山枝, 时岩, 胡金玲 . 蜂窝车联网(C-V2X)综述[J]. 中国科学基金, 2020,34(2): 179-185. |
CHEN S Z , SHI Y , HU J L . Cellular vehicle to everything (C-V2X):a review[J]. Bulletin of National Natural Science Foundation of China, 2020,34(2): 179-185. | |
[2] | 陈山枝, 葛雨明, 时岩 . 蜂窝车联网(C-V2X)技术发展、应用及展望[J]. 电信科学, 2022,38(1): 1-12. |
CHEN S Z , GE Y M , SHI Y . Technology development,application and prospect of cellular vehicle-to-everything (C-V2X)[J]. Telecommunications Science, 2022,38(1): 1-12. | |
[3] | AHMED E , GHARAVI H . Cooperative vehicular networking:a survey[J]. IEEE Transactions on Intelligent Transportation Systems:a Publication of the IEEE Intelligent Transportation Systems Council, 2018,19(3): 996-1014. |
[4] | CAVALCANTI E R , DE SOUZA J A R , SPOHN M A ,et al. VANETs’ research over the past decade[J]. ACM SIGCOMM Computer Communication Review, 2018,48(2): 31-39. |
[5] | 张宏涛 . 车载信息娱乐系统安全研究[D]. 郑州:战略支援部队信息工程大学, 2021. |
ZHANG H T . Research on security of In-vehicle infotainment system[D]. Zhengzhou:Information Engineering University, 2021. | |
[6] | 周建华, 侯英哲, 吕臣臣 ,等. 智能网联汽车安全防护技术研究综述[J]. 武汉大学学报(理学版), 2022:10.14188/j.1671-8836.2022.0191. |
ZHOU J H , HOU Y Z , LYU C C ,et al. A review on security and defense technologies for intelligent connected vehicle[J]. Journal of Wuhan University (Natural Science Edition), 2022:10.14188/j.1671-8836.2022.0191. | |
[7] | AMINIFAR A , ELES P , PENG Z B . Optimization of message encryption for real-time applications in embedded systems[J]. IEEE Transactions on Computers, 2018,67(5): 748-754. |
[8] | MUNIR A , KOUSHANFAR F . Design and analysis of secure and dependable automotive CPS:a steer-by-wire case study[J]. IEEE Transactions on Dependable and Secure Computing, 2020,17(4): 813-827. |
[9] | LUO F , HU Q . Security mechanisms design for in-vehicle network gateway[C]// Proceedings of SAE Technical Paper Series. Warrendale:SAE International, 2018. |
[10] | RIZVI S , WILLETT J , PERINO D ,et al. Protecting an automobile network using distributed firewall system[C]// Proceedings of the 2nd International Conference on Internet of Things,Data and Cloud Computing. New York:ACM Press, 2017: 1-6. |
[11] | TAYLOR A , JAPKOWICZ N , LEBLANC S . Frequency-based anomaly detection for the automotive CAN bus[C]// Proceedings of 2015 World Congress on Industrial Control Systems Security (WCICSS). Piscataway:IEEE Press, 2016: 45-49. |
[12] | CHECKOWAY S , MCCOY D , KANTOR B ,et al. Comprehensive experimental analyses of automotive attack surfaces[C]// Proceedings of the 20th USENIX Conference on Security. New York:ACM Press, 2011:6. |
[13] | JO H J , KIM J H , CHOI H Y ,et al. MAuth-CAN:masquerade-attack-proof authentication for In-vehicle networks[J]. IEEE Transactions on Vehicular Technology, 2020,69(2): 2204-2218. |
[14] | BOZDAL M , SAMIE M , ASLAM S ,et al. Evaluation of CAN bus security challenges[J]. Sensors (Basel,Switzerland), 2020,20(8): 2364. |
[15] | 吴尚则, 秦贵和, 刘毅 ,等. 车载控制器局域网络总线的动态口令身份认证方法[J]. 西安交通大学学报, 2017,51(6): 97-102. |
WU S Z , QIN G H , LIU Y ,et al. A method for identifying authentication of dynamic passwords for In-vehicle controller area network buses[J]. Journal of Xi’an Jiaotong University, 2017,51(6): 97-102. | |
[16] | 丁山, 臧仕义, 曹殿明 ,等. 基于动态ID跳变的CAN总线安全调度算法[J]. 东北大学学报(自然科学版), 2022,43(3): 350-358. |
DING S , ZANG S Y , CAO D M ,et al. Security scheduling algorithm of CAN bus based on dynamic ID hopping[J]. Journal of Northeastern University (Natural Science), 2022,43(3): 350-358. | |
[17] | LIN C W , SANGIOVANNI-VINCENTELLI A ,, . Cyber-security for the controller area network (CAN) communication protocol[C]// Proceedings of 2012 International Conference on Cyber Security. Piscataway:IEEE Press, 2013: 1-7. |
[18] | KANG K D , BAEK Y , LEE S ,et al. Lightweight authentication method for controller area network[C]// Proceedings of 2016 IEEE 22nd International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA). Piscataway:IEEE Press, 2016:101. |
[19] | GENG R , WANG X J , LIU J . A software defined networking-oriented security scheme for vehicle networks[J]. IEEE Access, 2018(6): 58195-58203. |
[20] | CARSTEN P , ANDEL T R , YAMPOLSKIY M ,et al. In-vehicle networks:attacks,vulnerabilities,and proposed solutions[C]// Proceedings of the 10th Annual Cyber and Information Security Research Conference. New York:ACM Press, 2015: 1-8. |
[21] | 于赫 . 网联汽车信息安全问题及 CAN 总线异常检测技术研究[D]. 长春:吉林大学, 2016. |
YU H . Research on connected vehicle cyber security and anomaly detection technology for In-vehicle CAN bus[D]. Changchun:Jilin University, 2016. | |
[22] | BEZEMSKIJ A , LOUKAS G , ANTHONY R J ,et al. Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle[C]// Proceedings of 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 International Symposium on Cyberspace and Security (IUCC-CSS). Piscataway:IEEE Press, 2017: 61-68. |
[23] | LEVI M , ALLOUCHE Y , KONTOROVICH A . Advanced analytics for connected car cybersecurity[C]// Proceedings of 2018 IEEE 87th Vehicular Technology Conference (VTC Spring). Piscataway:IEEE Press, 2018: 1-7. |
[24] | OLUFOWOBI H , BLOOM G , YOUNG C ,et al. Work-in-progress:real-time modeling for intrusion detection in automotive controller area network[C]// Proceedings of 2018 IEEE Real-Time Systems Symposium (RTSS). Piscataway:IEEE Press, 2019: 161-164. |
[25] | STUDNIA I , ALATA E , NICOMETTE V ,et al. A language-based intrusion detection approach for automotive embedded networks[J]. International Journal of Embedded Systems, 2018,10(1): 1-12. |
[26] | 董振江, 古永承, 梁健 ,等. C-V2X 车联网关键技术与方案概述[J]. 电信科学, 2020,36(4): 3-14. |
DONG Z J , GU Y C , LIANG J ,et al. Overview on key technology and solution of C-V2X for Internet of vehicles[J]. Telecommunications Science, 2020,36(4): 3-14. | |
[27] | 俞建业, 戚湧, 王宝茁 . 基于 Spark 的车联网分布式组合深度学习入侵检测方法[J]. 计算机科学, 2021,48(S1): 518-523. |
YU J Y , QI Y , WANG B Z . Distributed combination deep learning intrusion detection method for Internet of vehicles based on spark[J]. Computer Science, 2021,48(S1): 518-523. | |
[28] | 吴茂强, 黄旭民, 康嘉文 ,等. 面向车路协同推断的差分隐私保护研究[J]. 计算机工程, 2022,48(7): 29-35. |
WU M Q , HUANG X M , KANG J W ,et al. Research on differential privacy protection for collaborative vehicle-road inference[J]. Computer Engineering, 2022,48(7): 29-35. | |
[29] | 李明磊, 章阳, 康嘉文 ,等. 基于多智能体强化学习的区块链赋能车联网中的安全数据共享[J]. 广东工业大学学报, 2021,38(6): 62-69. |
LI M L , ZHANG Y , KANG J W ,et al. Multi-agent reinforcement learning for secure data sharing in blockchain-empowered vehicular networks[J]. Journal of Guangdong University of Technology, 2021,38(6): 62-69. | |
[30] | ZHANG D J , YANG R Z ,et al. A deep reinforcement learning-based trust management scheme for software-defined vehicular networks[C]// Proceedings of the 8th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications. New York:ACM, 2018: 1-7. |
[31] | YOON S , CHO J H , KIM D S ,et al. DESOLATER:deep reinforcement learning-based resource allocation and moving target defense deployment framework[J]. IEEE Access, 2021(9): 70700-70714. |
[32] | WANG S B , YAO N M . LIAP:a local identity-based anonymous message authentication protocol in VANETs[J]. Computer Communications, 2017,112: 154-164. |
[33] | WASEF A , LU R X , LIN X D ,et al. Complementing public key infrastructure to secure vehicular ad hoc networks[security and privacy in emerging wireless networks][J]. IEEE Wireless Communications, 2010,17(5): 22-28. |
[34] | ZHANG L , HU C Y , WU Q H ,et al. Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response[J]. IEEE Transactions on Computers, 2016,65(8): 2562-2574. |
[35] | ZHANG L , WU Q H , DOMINGO-FERRER J , ,et al. Distributed aggregate privacy-preserving authentication in VANETs[J]. IEEE Transactions on Intelligent Transportation Systems, 2017,18(3): 516-526. |
[36] | XU C , HUANG X H , MA M D ,et al. A secure and efficient message authentication scheme for vehicular networks based on LTE-V[J]. KSII Transactions on Internet and Information Systems, 2018,12(6): 2841-2860. |
[37] | 李晓伟, 杨邓奇, 曾新 ,等. 车联网环境下跨域间认证与密钥协商协议[J]. 西安电子科技大学学报, 2021,48(1): 141-148. |
LI X W , YANG D Q , ZENG X ,et al. Cross-domain authentication and the key agreement protocol in VANETs[J]. Journal of Xidian University, 2021,48(1): 141-148. | |
[38] | JIANG W B , LI H W , XU G W ,et al. PTAS:privacy-preserving thin-client authentication scheme in blockchain-based PKI[J]. Future Generation Computer Systems, 2019,96: 185-195. |
[39] | GABAY D , AKKAYA K , CEBE M . Privacy-preserving authentication scheme for connected electric vehicles using blockchain and zero knowledge proofs[J]. IEEE Transactions on Vehicular Technology, 2020,69(6): 5760-5772. |
[40] | SUN J Y , ZHANG C , ZHANG Y C ,et al. An identity-based security system for user privacy in vehicular ad hoc networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2010,21(9): 1227-1239. |
[41] | XU C , LIU H Z , PAN Z H ,et al. A group authentication and privacy-preserving level for vehicular networks based on fuzzy system[J]. Journal of Intelligent & Fuzzy Systems:Applications in Engineering and Technology, 2020,39(2): 1547-1562. |
[42] | PARK Y , SUR C , RHEE K H . Pseudonymous authentication for secure V2I services in cloud-based vehicular networks[J]. Journal of Ambient Intelligence and Humanized Computing, 2016,7(5): 661-671. |
[43] | ZHOU L , YU L , DU S G ,et al. Achieving differentially private location privacy in edge-assistant connected vehicles[J]. IEEE Internet of Things Journal, 2019,6(3): 4472-4481. |
[44] | BAZA M , SHERIF A , MAHMOUD M M E A ,et al. Privacy-preserving blockchain-based energy trading schemes for electric vehicles[J]. IEEE Transactions on Vehicular Technology, 2021,70(9): 9369-9384. |
[45] | CHEN J G , LI K L , YU P S . Privacy-preserving deep learning model for decentralized VANETs using fully homomorphic encryption and blockchain[J]. IEEE Transactions on Intelligent Transportation Systems, 2022,23(8): 11633-11642. |
[46] | YANG Y H , WEI L J , WU J ,et al. A blockchain-based multidomain authentication scheme for conditional privacy preserving in vehicular ad-hoc network[J]. IEEE Internet of Things Journal, 2022,9(11): 8078-8090. |
[47] | WANG Q P , GAO D Y , ZHU W T . Cloud-enabled software-defined vehicular networks:architecture,applications and challenges[J]. Journal of Internet Technology, 2019,20(6): 1819-1828. |
[48] | 牛雅丽, 屈光洪 . 基于PaaS的车联网云平台开发探究[J]. 汽车实用技术, 2020(9): 47-48,76. |
NIU Y L , QU G H . Research on development of vehicle networking cloud platform based on PaaS cloud platform[J]. Automobile Applied Technology, 2020(9): 47-48,76. | |
[49] | ARAIN Q A , DENG Z L , MEMON I ,et al. Map services based on multiple mix-zones with location privacy protection over road network[J]. Wireless Personal Communications, 2017,97(2): 2617-2632. |
[50] | 王瑞锦, 唐榆程, 张巍琦 ,等. 基于同态加密和区块链技术的车联网隐私保护方案[J]. 网络与信息安全学报, 2020,6(1): 46-53. |
WANG R J , TANG Y C , ZHANG W Q ,et al. Privacy protection scheme for Internet of vehicles based on homomorphic encryption and block chain technology[J]. Chinese Journal of Network and Information Security, 2020,6(1): 46-53. | |
[51] | 彭长根, 何兴, 谭伟杰 ,等. 人工智能算法安全研究现状与对策[J]. 贵州师范大学学报(自然科学版), 2022,40(6): 1-16,134. |
PENG C G , HE X , TAN W J ,et al. Research status and countermeasures of artificial intelligence algorithm security[J]. Journal of Guizhou Normal University (Natural Sciences), 2022,40(6): 1-16,134. | |
[52] | ZHU C , CHENG Y , GAN Z ,et al. FreeLB:enhanced adversarial training for natural language understanding[J]. arXiv preprint, 2019,arXiv:1909.11764. |
[53] | VILONE G , LONGO L . Explainable artificial intelligence:a systematic review[J]. arXiv preprint, 2020,arXiv:2006.00093. |
[1] | 吴忠平, 王路杰, 许佳诺, 王彦博, 章立伟. 基于量子保密通信及5G硬切片专网的配网应用研究[J]. 电信科学, 2022, 38(1): 159-169. |
[2] | 刘道远,孙科达,周君良,范海东. 模糊综合评判法在电力企业网络信息安全评估中的应用[J]. 电信科学, 2020, 36(3): 34-41. |
[3] | 衷宇清,王浩,林泽兵,王敏,陈立业. 多密钥加密方法设计[J]. 电信科学, 2020, 36(11): 89-97. |
[4] | 张园,王慧芬,王翰铭. 机器视觉技术、标准及安全产业应用[J]. 电信科学, 2020, 36(11): 104-112. |
[5] | 奚晓音,袁晓云. 国内外行业标杆企业在网络与信息安全领域的实践分析[J]. 电信科学, 2020, 36(11): 134-140. |
[6] | 刘汉生,唐洪玉,薄明霞,牛剑锋,李天博,李玲晓. 基于机器学习的多源威胁情报质量评价方法[J]. 电信科学, 2020, 36(1): 119-126. |
[7] | 王静,高昆仑,张波. 基于网络隔离与安全数据交换的发电集团双网体系研究与设计[J]. 电信科学, 2017, 33(2): 163-176. |
[8] | 李洁. 互联网汽车发展及关键技术分析[J]. 电信科学, 2016, 32(8): 34-38. |
[9] | 徐影,吴钊,李祉岐. 面向大型企业信息安全建设的虚拟化威胁感知技术[J]. 电信科学, 2016, 32(12): 149-156. |
[10] | 刘镝,张云勇,张尼,张曼君. “沃互联”统一认证技术研究[J]. 电信科学, 2015, 31(6): 6-11. |
[11] | 吴佳,苏丹,李旺,袁卫国,杨睿. 面向运检业务的移动GIS平台建设与应用[J]. 电信科学, 2015, 31(6): 132-136. |
[12] | 郭保平,程建,刘维平. 军事云信息安全保障体系架构[J]. 电信科学, 2015, 31(12): 70-75. |
[13] | 程叶霞,杜跃进,杨凯,何申,彭晋,姜文. 一种基于二进制序列的秘密共享新方法[J]. 电信科学, 2015, 31(11): 23-29. |
[14] | 刘兰,林军,蔡君. 面向大数据的异构网络安全监控及关联算法研究[J]. 电信科学, 2014, 30(7): 84-89. |
[15] | 黄斯炜,李洪. 短信平台安全域改造研究初探[J]. 电信科学, 2013, 29(8): 63-68. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|