Telecommunications Science ›› 2020, Vol. 36 ›› Issue (4): 36-45.doi: 10.11959/j.issn.1000-0801.2020127
• Topic: Internet of Vehicles and Security • Previous Articles Next Articles
Yufeng LI1,Xiaoyuan LU1,2,Chenhong CAO1,Jiangtao LI1,Hongyi ZHU2,Nan MENG3
Revised:
2020-04-03
Online:
2020-04-20
Published:
2020-04-24
Supported by:
CLC Number:
Yufeng LI,Xiaoyuan LU,Chenhong CAO,Jiangtao LI,Hongyi ZHU,Nan MENG. A survey of cybersecurity for intelligent connected-automated vehicle[J]. Telecommunications Science, 2020, 36(4): 36-45.
"
等级 | 名称(SAE) | SAE定义 | 驾驶操作 | 驾驶环境监控 | 后备支援 | 作用域(条件及环境) |
L0 | 无自动化 | 人全权操作,完成所有DDT | 人类 | 人类 | 人类 | 无 |
L1 | 驾驶支援 | 通过驾驶环境对方向盘或加减速中的一项提供驾驶支援,其他DDT都由人进行操作 | 人类和系统 | 人类 | 人类 | 部分 |
L2 | 部分自动化 | 通过驾驶环境对方向盘或加减速中的多项操作提供支援,其他DDT都由人进行操作 | 系统 | 人类 | 人类 | 部分 |
L3 | 条件自动化 | 在限定的 ODD 内自动完成所有的 DDT,根据系统请求人回应和干预 | 系统 | 系统 | 人类 | 部分 |
L4 | 高度自动化 | 在限定的 ODD 内自动完成所有 DDT,可以无须人类驾驶员介入 | 系统 | 系统 | 系统 | 部分 |
L5 | 完全自动化 | 在所有道路和环境下自动完成所有驾驶操作 | 系统 | 系统 | 系统 | 全域 |
"
攻击 | 属性 | 防御措施 | 参考文献 |
Sybil | 身份认证、完整性 | 加密方案、身份确认方案和信誉机制 | [ |
假冒攻击 | 身份认证、完整性 | 消息签名、身份验证等 | [ |
密钥/证书复制攻击 | 身份认证、完整性 | 完善的密钥管理方案 | [ |
欺骗攻击 | 身份认证、保密性 | 加密方案和身份验证 | [ |
DoS/DDoS攻击 | 可用性、身份认证 | 身份验证方案和防火墙、入侵检测等方法 | [ |
干扰攻击 | 可用性、完整性 | 设置冗余部件,多传感器数据融合 | [ |
恶意软件 | 可用性、保密性 | 恶意软件检测和防火墙等 | [ |
黑洞攻击 | 可用性、完整性 | 信誉机制、基于机器学习的恶意行为检测 | [ |
延迟攻击 | 可用性、身份认证 | 经过身份验证的计时方法 | [ |
伪造信息 | 完整性、可用性、身份认证 | 消息签名和基于信誉的方案 | [ |
重放攻击 | 完整性、身份认证 | 使用序列号,时间戳和安全通信 | [ |
伪装攻击 | 完整性、身份认证 | 恶意行为检测和身份验证 | [ |
篡改攻击 | 完整性、可用性 | 签名并验证传输的消息 | [ |
窃听攻击 | 机密性、身份认证 | 加密方案,网络隔离机制 | [ |
拦截攻击 | 机密性、身份认证 | 加密方案、身份验证 | [ |
"
未来方向 | 研究关注 |
功能安全和网络安全一体化 | CAV全生命周期内的功能安全、网络安全一体化设计方法、分析方法 |
内生安全技术 | 通过内生安全构造技术,使汽车获得非特异性免疫能力,应对0-Day等未知网络威胁 |
CAV网络证书管理 | 证书管理系统的系统架构、模型和信任锚点等 |
测试技术 | CAV网络安全如何构建体系化的网络安全测试床,并能实施有效的测试 |
区块链技术 | 区块链的CAV网络应用及网络安全增强 |
轻量级认证技术 | 满足CAV高速实时应用的轻量级快速认证技术 |
深度学习防御 | 保护智能车载系统各个方面(入侵检测、软件漏洞检测、恶意软件检测)的深度学习方法 |
云网融合的安全 | 云网融合背景下的CAV流式数据安全处理等 |
软件定义的安全 | 使用软件定义平台实现网络威胁检测和威胁缓解的自动化 |
5G智能网联汽车安全 | 引入5G技术后的CAV网络安全研究 |
[28] | PATHAN K . Security of self-organizing networks:MANET,WSN,WMN,VANET[M]. Boca Raton: CRC PressPress, 2016. |
[29] | SAMARA G,AL-RABA’NAH Y . Security issues in vehicular ad hoc networks (VANET):a survey[Z]. 2017. |
[30] | BHARGAVA B , JOHNSON A M , MUNYENGABE G I ,et al. A systematic approach for attack analysis and mitigation in V2V networks[Z]. 2016. |
[31] | LIU J , SUN W , SHI Y P . In-vehicle network attacks and countermeasures:challenges and future directions[J]. IEEE Network, 2017,31(5): 50-58. |
[1] | Autoliv innovation and research[Z]. 2019. |
[2] | Waymo. On the road to fully self-driving[R]. 2017. |
[32] | LI K , VOICU R C , KANHERE S S ,et al. Energy efficient legitimate wireless surveillance of UAV communications[J]. IEEE Transactions on Vehicular Technology, 2019,68(3): 2283-2293. |
[33] | GARCIA F D , OSWALD D , KASPER T ,et al. Lock it and still lose it—on the (in) security of automotive remote keyless entry systems[C]// Proceedings of 25th USENIX Security Symposium.[S.l.:s.n]. 2016. |
[3] | 工业和信息化部. 车联网(智能网联汽车)产业发展行动计划[R]. 2018. |
Ministry of Industry and Information Technology. Action plan for the development of the connected car (smart connected car) industry[R]. 2018. | |
[34] | 中国通信学会. 车联网安全技术与标准发展态势前沿报告[R]. 2019. |
China Institute of Communications. Frontier report on development trends of telematics security technology and standards[R]. 2019. | |
[4] | MILLER C , VALASEK C . Remote exploitation of an unaltered passenger vehicle[R]. 2015. |
[5] | NIE S , LIU L , DU Y . Free-fall:hacking tesla from wireless to CAN bus[R]. 2017. |
[35] | LIM H S M , TAEIHAGH A . Autonomous vehicles for smart and sustainable cities:an in-depth exploration of privacy and cybersecurity implications[J]. Energies, 2018,11(5):1062. |
[36] | BURZIO G , CORDELLA G F , COLAJANNI M ,et al. Cybersecurity of connected autonomous vehicles:a ranking based approach[C]// Proceedings of the 2018 International Conference of Electrical and Electronic Technologies for Automotive. Piscataway:IEEE Press, 2018. |
[6] | CAI Z , WANG A , ZHANG W ,et al. 0-days & mitigations:roadways to exploit and secure connected BMW cars[R]. 2019. |
[7] | See “Hacking smart car alarm systems”[Z]. 2019. |
[37] | Auto-ISAC.Automotive cybersecurity best practices–executive summary[Z]. 2018. |
[38] | YAN Z , ROBERTSON T , YAN R ,et al. Finding the weakes links in the weakest link:how well do undergraduate students make cybersecurity judgment?[J]. Computers in Human Behavior, 2018(84): 375-382. |
[39] | NOY I Y , SHINAR D , HORREY W J . Automated driving:safety blind spots[J]. Safety Science, 2018(102): 68-78. |
[8] | PARKINSON S , WARD P , WILSON K ,et al. Cyber threats facing autonomous and connected vehicles:future challenges[J]. IEEE Transactions on Intelligent Transportation Systems, 2017,18(11): 2898-2915. |
[9] | Techcrunch. Why a cybersecurity solution for driverless cars may be found under the hood[Z]. 2017. |
[40] | 陈山枝, 胡金玲, 时岩 ,等. LTE-V2X车联网技术、标准与应用[J]. 电信科学, 2018,34(4): 1-11. |
CHEN S Z , HU J L , SHI Y ,et al. Technologies,standards and applications of LTE-V2X for vehicular networks[J]. Telecommunications Science, 2018,34(4): 1-11. | |
[10] | Society of Automotive Engineers International. Taxonomy and definitions for terms related to on-road motor vehicle automated driving systems[Z]. 2014. |
[11] | KATO S , TAKEUCHI E , ISHIGURO Y ,et al. An open approach to autonomous vehicles[J]. IEEE Micro, 2015,35(6): 60-68. |
[12] | LYU X , DING Y , YANG S H . Safety and security risk assessment in cyber-physical systems[J]. IET Cyber-Physical Systems:Theory & Applications, 2019,4(3): 221-232. |
[13] | EL-REWINI Z , SADATSHARAN K , SELVARAJ D F ,et al. Cybersecurity challenges in vehicular communications[J]. Vehicular Communications, 2019:100214. |
[14] | LIBICKI M C , ABLON L , WEBB T . The defenders dilemma:charting a course toward cybersecurity[Z]. 2015. |
[15] | Survey:securing the modern vehicle[Z]. 2019. |
[16] | DE LA TORRE G,RAD P,CHOO K K R.Driverless vehicle security:challenges and future research opportunities[Z]. 2018. |
[17] | RABIEH K , MAHMOUD M M , GUO T N ,et al. Cross-layer scheme for detecting large-scale colluding Sybil attack in VANETs[C]// Proceedings of 2015 IEEE International Conference on Communications. Piscataway:IEEE Press, 2015: 7298-7303. |
[18] | BHAVESH N B , MAITY S , HANSDAH R C . A protocol for authentication with multiple levels of anonymity (AMLA) in VANETs[C]// Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA). Piscataway:IEEE Press, 2013: 462-469. |
[19] | MOKHTAR B , AZAB M . Survey on security issues in vehicular ad hoc networks[J]. Alexandria Engineering Journal, 2015,54(4): 1115-1126. |
[20] | WASEF A , SHEN X . EMAP:expedite message authentication protocol for vehicular Ad Hoc networks[J]. IEEE Transactions on Mobile Computing, 2013,12(1): 78-89. |
[21] | DIMITRIOU T , ALRASHED E A , KARAATA M H ,et al. Imposter detection for replication attacks in mobile sensor networks[J]. Computer Networks, 2016(108): 210-222. |
[22] | SEO S H , WON J , SULTANA S . Effective key management in dynamic wireless sensor networks[J]. IEEE Transactions on Information Forensics & Security, 2015,10(2): 371-383. |
[23] | PSIAKI M L , HUMPHREYS T E . GNSS spoofing and detection[J]. Proceedings of the IEEE, 2016,104(6): 1258-1270. |
[24] | CHEMINOD M , DURANTE L , VALENZANO A . Review of security issues in industrial networks[J]. IEEE Transactions on Industrial Informatics, 2013,9(1): 277-293. |
[25] | THILAK K D , AMUTHAN A . DOS attack on VANET routing and possible defending solutions-a survey[C]// Proceedings of International Conference on Information Communication and Embedded Systems (ICICES). Piscataway:IEEE Press, 2016: 1-7. |
[26] | YAN C , XU W Y , LIU J H . Can you trust autonomous vehicles:contactless attacks against sensors of self-driving vehicle[J]. 2016. |
[27] | SHUKLA D , VAIBHAV A , DAS S ,et al. Security and attack analysis for vehicular ad hoc network:a survey[C]// Proceedings of International Conference on Computing,Communication and Automation (ICCCA). Piscataway:IEEE Press, 2016: 625-630. |
[41] | YAN Z , ROBERTSON T , YAN R ,et al. Finding the weakes links in the weakest link:how well do undergraduate students make cybersecurity judgment?[J]. Computers in Human Behavior, 2018(84): 375-382 |
[1] | Zhilong ZHANG, Tianqi ZHANG, Xuefei LI, Danpu LIU. Research on collaborative resource optimization technology based on convergence of computing, control and communication in Internet of vehicles [J]. Telecommunications Science, 2023, 39(4): 17-30. |
[2] | Bo GU, Ting AO. Application of MEC-based positioning technology in the Internet of vehicles [J]. Telecommunications Science, 2022, 38(Z1): 250-258. |
[3] | Jiao WANG, Gongan QIU, Shibing ZHANG. Adaptive channel status based access class barring scheme for traffic emergency communication [J]. Telecommunications Science, 2022, 38(1): 95-101. |
[4] | Ning HUI,Jie WU,Yiqing ZHOU,Ling LIU,Zhengang PAN. Future vehicular fog computing networks [J]. Telecommunications Science, 2020, 36(6): 14-27. |
[5] | Zhenting CHANG,Zhendong XIE,Zhiguo DONG. Research on the construction and operation mode of urban cellular vehicle to everything [J]. Telecommunications Science, 2020, 36(4): 69-73. |
[6] | Lin LIN,Lu LI,Yuming GE. Analysis of the communication standardization and industry development of internet of vehicles [J]. Telecommunications Science, 2020, 36(4): 15-26. |
[7] | Wei LIU,Yipeng ZHANG,Xuying GUAN,Shangchao KUANG,Feng LI. C-V2X city-scale demonstration application [J]. Telecommunications Science, 2020, 36(4): 27-35. |
[8] | Bo JIN,Yanming HU. Overview and prospect for the development of C-V2X internet of vehicles industry [J]. Telecommunications Science, 2020, 36(3): 93-99. |
[9] | FANG Jian,FENG Daquan,DUAN Haijun,ZHENG Canjian,QIAN Gongbin. An overview of V2X communications [J]. Telecommunications Science, 2019, 35(6): 102-112. |
[10] | Libo TANG,Chen KANG. Integration development trend of the internet of vehicles industry [J]. Telecommunications Science, 2019, 35(11): 96-100. |
[11] | Yongfang QIU,Gong'an QIU,Yongzheng ZHOU. Variable distance based D2D connection selection scheme in internet of vehicles [J]. Telecommunications Science, 2017, 33(5): 39-45. |
[12] | HUANG Haikun. Technology and business of remote provisioning for embedded SIM [J]. Telecommunications Science, 2016, 32(9): 2016245-. |
[13] | Qiong Yang,Jing Hu,Weiwei Xia. Mobility Management and Resource Management of Internet of Vehicles in Converged Heterogeneous Network Scenario [J]. Telecommunications Science, 2015, 31(9): 60-65. |
[14] | Qun Wang,Huanyan Qian. Architecture and Key Technologies for Internet of Vehicles [J]. Telecommunications Science, 2012, 28(12): 1-9. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|