Research on security enhancement design of in-vehicle network under functional safety objective in intelligent networked vehicle environment

This paper consists of four parts: a brief introduction to the background of ICV network security, relevant standards and guidelines for ICV information network security, an introduction to the relevant work of the research group, and research prospects.

This paper consists of four parts: a brief introduction to the background of ICV network security, relevant standards and guidelines for ICV information network security, an introduction to the relevant work of the research group, and research prospects.

Trends facing the in-vehicle network in the ICV: With the application of information and communication technologies such as intelligent sensing, artificial intelligence, big data, cloud computing and 5G networks in the new generation of automotive Electronic systems, the in-vehicle network will face new challenges. problems and challenges. Intelligent functions such as advanced assisted driving and advanced assisted driving rely on the in-vehicle network to share communication bandwidth, storage and computing resources, and collaboratively process a large amount of real-time data.

Cybersecurity is a future challenge

Security enhancement is subject to the following constraints: 1: limited bandwidth and real-time requirements; 2: limited computing resources and storage resources; 3: limited cost

Table 1 Analysis and comparison of security attacks against automobiles in the past 10 years

Research on security enhancement design of in-vehicle network under functional safety objective in intelligent networked vehicle environment

Research on security enhancement design of in-vehicle network under functional safety objective in intelligent networked vehicle environment

Figure 1 Schematic diagram of the network structure of the ICV from the perspective of the intra-vehicle network

Research on security enhancement design of in-vehicle network under functional safety objective in intelligent networked vehicle environment

Figure 2 Schematic diagram of the attack entrance of the in-vehicle network in the intelligent networked vehicle environment

Introduction of related work in the field of in-vehicle network security

1 Design of vehicle network information security enhancement mechanism based on ID Hopping; 2 Design of vehicle network information security enhancement controller based on FPGA; 3 Vehicle network anomaly intrusion detection based on information entropy

Research on security enhancement design of in-vehicle network under functional safety objective in intelligent networked vehicle environment

Research on security enhancement design of in-vehicle network under functional safety objective in intelligent networked vehicle environment

Research on security enhancement design of in-vehicle network under functional safety objective in intelligent networked vehicle environment

Research on security enhancement design of in-vehicle network under functional safety objective in intelligent networked vehicle environment

Research on security enhancement design of in-vehicle network under functional safety objective in intelligent networked vehicle environment

Research on security enhancement design of in-vehicle network under functional safety objective in intelligent networked vehicle environment

Research on security enhancement design of in-vehicle network under functional safety objective in intelligent networked vehicle environment

For more comprehensive technical information about this article, please download http://download.eccn.com/download/show.html?pid=2019061014031544

The Links:   LB070WV3-SD03 KCG057QV1DB-G77