Computer Science ›› 2022, Vol. 49 ›› Issue (4): 340-353.doi: 10.11896/jsjkx.210400112

• Information Security • Previous Articles     Next Articles

Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era

SONG Tao1,2,3, LI Xiu-hua1,2, LI Hui1,2, WEN Jun-hao1,2, XIONG Qing-yu1,2, CHEN Jie4   

  1. 1 Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University) Ministry of Education, Chongqing 401331, China;
    2 School of Big Data & Software Engineering, Chongqing University, Chongqing 401331, China;
    3 China Academy of Information and Communications Technology, Beijing 100191, China;
    4 Special Equipment Inspection and Research Institute of Chongqing, Chongqing 401121, China
  • Received:2021-04-11 Revised:2021-07-25 Published:2022-04-01
  • About author:SONG Tao,born in 1992,Ph.D candidate,is a student member of China Computer Federation.His main research interests include IoV application,IoV security,cloud computing and deep learning.LI Xiu-hua,born in 1987,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.His main research interests include mobile edge computing/caching,big data analysis and machine learning.
  • Supported by:
    This work was supported by the National Nature Science Foundation of China(61902044,61672117,62072060),National Key R&D Program of China(2018YFB2100100,2018YFF0214700),Chongqing Research Program of Basic Research and Frontier Technology(cstc2019jcyj-msxmX0589),Key Research Program of Chongqing Science&Technology Commission(CSTC2017jcyjBX0025,CSTC2019jscx-zdztzxX0031) and Fundamental Research Funds for the Central Universities(2020CDJQY-A022).

Abstract: With the increasing risks of Internet of vehicles (IoV) attack, the network security threats of vehicle-mounted systems, vehicle-mounted terminals, vehicle-mounted information and service applications, the operation and service platform of intelligent connected vehicles (ICVs) are prominent.Information tampering and virus intrusion in the generalized network attack have been proved to be suitable for the attack of ICVs.The characteristics of weak password authentication and weak encryption in traditional IoV are hard to satisfy the current requirements of multi-network and multi-node security protection in the field of IoV.In addition, the lack of domestic security encryption authentication mechanism and the imperfect encryption authentication system make it more difficult to satisfy the requirements of IoV security.To solve the problem of IoV security encryption authentication, the paper studies IoV security encryption authentication technology in the age of big data.Firstly, this paper introduces the current situation and relevant concepts of IoV security in the era of big data.Then it contrasts and analyzes the current IoV security architecture, and puts forward IoV security encryption authentication system in the era of big data, and elaborates systematically the IoV security technology architecture and the encryption authentication way of IoV communication module.Then the architecture proposed in this paper is compared with the information security standards of the IoV and elaborates key technology and innovations of the IoV security encryption authentication.Finally, the paper summarizes and proposes the problems and challenges faced by the current security encryption authentication technology of IoV.

Key words: Encryption authentication, Internet of vehicles security, Network attack, Security protection, Security threat

CLC Number: 

  • TP393
[1] WANG Y H.Research on the Authentication Technology andAlgorithm for Internet of Vehicles[D].Chongqing:Chongqing University of Posts and Telecommunications,2017.
[2] YE P,HAO T L,ZHAO D H,et al.Research on the Information Security Technology of Car Networking from the Perspective of Automobile Enterprise[J].Journal of Automobile Technology,2019(5):59-63.
[3] LIU X L.Research on OBU-based Multilevel Security Architecture and Communication Scheme for Internet of Vehicles[D].Zhenjiang:Jiangsu University,2018.
[4] China Institute of Communications.Internet of Vehicles Security Technology and Standards Development Frontier Report (2019)[EB/OL].https://www.docin.com/p-363483387.html.
[5] China Academy of Information and Communications Technology.White Paper on Internet of Vehicles Network Security(2018)[R/OL].
[2018-05-20].https://max.book118.com/html/2018/1224/6004040055001241.shtm.
[6] China Academy of Information and Communications Technology.White Paper on Internet of Vehicles Network Security(2017)[R/OL].
[2017-09-21].http://www.caict.ac.cn/kxyj/qwfb/bps/202001/t20200102_273007.htm.
[7] ZHAO X B.Research on Network Security and Standardization of Connected Vehicles[J].Network Security Technology and Application,2020,229(1):141-142.
[8] YANG N,KANG R B.Network of Vehicles Security ThreatAnalysis and Protection Ideas[J].Communications Technology,2015,48(12):1421-1426.
[9] WANG C Q.Network of Vehicles Security Threat Analysis and Protection Ideas[J].Computer Products & Circulation,2020(2):132-135.
[10] HUANG Y X.Research on Internet of Vehicles Network Secu-rity Technology[J].Electronic World,2018,553(19):51-52.
[11] YUAN K.Research on Routing Algorithm of Vehicle Network in Urban Environment [D].Chongqing:Chongqing University of Posts and Telecommunications,2019.
[12] National Technical Committee on Information Security of Stan-dardization Administration.Technical requirements and test eva-luation method of network intrusion detection system:GB/T20275-2013[S].Beijing:Standards Press of China,2013.
[13] XIE K L,LU Y.Discussion on Current Situation and Development Trend of Information Security of Vehicle Network System[C]//Proceedings of the 14th Henan Province Automotive Engineering Science and Techno-logy Symposium.2017.
[14] LI X L.Strategy Research of Private Equity Fund Participating in Private Placement [D].Wuhan:Hubei University of Techno-logy,2020.
[15] Channel industry.China’s information security market development pattern and the information security market development demand trend analysis (2019)[OL].
[2019-11-01].https://www.chyxx.com/industry/201911/800523.html.
[16] XIE K L,LU Y.Brief Discussion on the Current Situation and Development Trend of Information Security of Internet of Vehicles System[C]//Proceedings of the 14th Henan Provincial Symposium on Automotive Engineering Science and Technology.2017:7-8.
[17] GB/T 25066-2010B/T 25066-2010.Information Security Product Category andCode[S].Beijing:Standards Press of China,2010.
[18] WANG Q.Research on Safety Mechanism and Key Technology of Internet of Vehicles[D].Nanjing:Nanjing University of Science and Technology,2016.
[19] FENG T.Research on Information Security in Internet of Vehicles Technology[J].Information Security and Technology,2011(8):28-30.
[20] China Academy of Information and Communications Technology.White Paper on Internet of Vehicles Network Security(2018)[R/OL].
[2020-09-24].https://download.csdn.net/download/dipolar/14020028?utm_source=iteye_new.
[21] ZHU K Y,SONG J,YE L,et al.Research on Evaluation Index System of Vehicular Terminal Information Security[J].Industrial Technology Innovation,2018,29(6):11-17.
[22] WANG S L,JIANG F,GU Y Y.Research on Internet of Vehicles Test Based on TBOX Test[J].Automotive Electrical App-liance,2018,362(10):38-39.
[23] WANG L M,LI T T,CHEN L.Structure and Security of Internet of Vehicles Based on Vehicle Identity[J].Journal of Network and Information Security,2016,2(2):41-54.
[24] DU X J.Design of Integrated Circuit Based on CAN Bus for Automotive Electronic Control Unit (ECU) [D].Tianjin:Tianjin Polytechnic University,2007.
[25] LIAO F,HUANG J,LI J H.Discussion on the application of automobile OBD interface[J].Automobile and Driving Maintenance:Maintenance Edition,2017(12):143.
[26] ZENG F.Research and Implementation of Intrusion Detection System for Connected Vehicles [D].Chengdu:University of Electronic Science and Technology of China,2018.
[27] SEKAR R,GUPTA A,FRULLO J,et al.Specification-basedanomaly detection:a new approach for detecting network intrusions[C]//Proceedings of the 9th ACM Conference on Compu-ter and Communications Security.ACM,2002:265-274.
[28] SHUKLA A S,MAURYA R.Entropy-Based Anomaly Detec-tion in a Network[J].Wireless Personal Communications an Internaional Journal,2018(99):1487-1501.
[29] WANG D B.The Hierarchical Architecture and Cloud Re-source Management of IoV Cloud System [D].Guangzhou:Guangdong University of Technology,2015.
[30] YANG N,KANG R B.Network of Vehicles Security ThreatAnalysis and Protection Ideas[J].Communications Technology,2015(12):1421-1426.
[31] YANG Z Q,ZHENG Y F,XIU J P.Research on Internet of Vehicles Security System Based on Digital Signature[J/OL].Computer Engineering and Application.https://kns.cnki.net/kcms/detail/11.2127.TP.20210331.1554.034.html.
[32] HUANG H X.Research on Security Technology of Internet of Vehicles Based on Anonymous Authentication[J].Communication Technology,2020,338(2):233-236.
[33] WAN Z L,KUANG F.Research on Internet of Vehicles Security Architecture Based on Blockchain Technology[J].Jiangxi Communications Science and Technology,2019(1):41-44.
[34] WANG X C.Security of 5G Internet of Vehicles Based on V2X Security Chip[J].Information Security Research,2020(8):705-709.
[35] CHEN N.Design and Analysis of Safety Protection System for Internet of Vehicles[J].Computer Development and Application,2014,27(10):32-35.
[36] LI X H,ZHONG C,CHEN Y,et al.Review of Internet of Vehicles Security[J].Journal of Information Security,2019,4(3):17.
[37] GUI Z.Research on Cryptographic Application Technology for Secure Communication of Internet of Vehicles [D].Chengdu:University of Electronic Science and Technology of China,2017.
[38] HE W F.Common Threats and Control of Cloud Security[J].Information & Computer,2018(7):179-180.
[39] WU S Z.Research on Identity Authtification Method Based on Vehicle-borne CAN Bus Network [D].Changchun:Jilin University,2018.
[40] Vehicle Electrical System Security Committee.CybersecurityGuidebook for Cyber-Physical Vehicle Systems:SAE J3061_201601[S].Philadephia:SAE International,2016.
[41] PENG Y,RONG H,WANG W Y,et al.T-box password security protection scheme[J].Automotive Electrical Appliances,2017(5):64-66.
[42] QIN Q L,XIE L B.Network of Vehicles Data Security RiskAnalysis and Related Suggestions[J].Information Communication Technology and Policy,2020(8):37-40.
[43] LU Z,QU G,LIU Z.A Survey on Recent Advances in Vehicular Network Security,Trust,an Privacy[J].IEEE Transactios on Intelligent Transportation Systemsk,2018,20(2):760-776.
[44] KOO D,SHIN Y,YUN J,et al.An Online Data-oriented Authentication Based on Merkle Tree with Improved Reliability[C]//2017 IEEE International Conference on Web Services(ICWS).2017:840-843.
[45] YU T Q,HU J L,JIN J,et al.Mobile Edge Computing Based In-vehicle CAN Network Intrusion Detection Method[J].Compu-ter Science,2021,48(1):34-39.
[46] LIU Y,WU G X.Research on Connected Car Connectivity Mo-del Based on 802.11 p/WAVE and Its Application[J].Journal of Communications,2017,34(6):85-91.
[47] HE X.Distributed Database Security Architecture Based on Intrusion Tolerance[D].Changsha:Central South University,2010.
[48] RAWAT A,SHARMA S,SUSHIL R.VANET:Security At-tacks and Its Possible Solutions[J].Journal of Information and Operations Management,2012,3(1):301.
[49] GB/T 20271-2006B/T 20271-2006.Ministry of Industry and Information Technology,People’s Republic of China.Technical Requirements for Security Protection of Information Service Platform of Internet of Vehicles [S].Beijing:Standards Press of China,2020.
[50] SHAMIR A.Identity-Based Cryptosystems and SignatureSchemes[J].Lect.notes Comput.,1985,196(2):47-53.
[51] CHEN P,GAO T G.Multi-topic and Multi-correlation Automatic Negotiation and Its Application in Distributed Decision Environment [M].Harbin Engineering University Press,2013.
[52] CHEN W.Quantitative Analysis Method for High Availability System Design [D].Hangzhou:Zhejiang University,2006.
[53] TANG X D,LIANG H B,ZHE F P,et al.Computer Operating System[M].Xi’an:Xidian University Press,2007:1-20.
[54] KARAME G,CAPKUN S.Blockchain Security and Privacy[J].IEEE Security & Privacy,2018,16(4):11-12.
[1] TANG Liang, LI Fei. Research on Forecasting Model of Internet of Vehicles Security Situation Based on Decision Tree [J]. Computer Science, 2021, 48(6A): 514-517.
[2] WANG Jin-heng, SHAN Zhi-long, TAN Han-song, WANG Yu-lin. Network Security Situation Assessment Based on Genetic Optimized PNN Neural Network [J]. Computer Science, 2021, 48(6): 338-342.
[3] SHI Lin-shan, MA Chuang, YANG Yun, JIN Min. Anomaly Detection Algorithm Based on SSC-BP Neural Network [J]. Computer Science, 2021, 48(12): 357-363.
[4] MA Lin, WANG Yun-xiao, ZHAO Li-na, HAN Xing-wang, NI Jin-chao, ZHANG Jie. Network Intrusion Detection System Based on Multi-model Ensemble [J]. Computer Science, 2021, 48(11A): 592-596.
[5] CHENG Qing-feng, LI Yu-ting, LI Xing-hua, JIANG Qi. Research on Application of Cryptography Technology for Edge Computing Environment [J]. Computer Science, 2020, 47(11): 10-18.
[6] CAO Kang-hua, DONG Wei-wei, WANG Jin-liang, ZHOU Lin, WANG Yong. Attack Detection Method for Electricity Information Collection System Based on Virtual Honeynet [J]. Computer Science, 2019, 46(11A): 455-459.
[7] CHEN Jin-yin,XU Xuan-yan,SU Meng-meng. Research on Network Attack Detection Based on Self-adaptive Immune Computing [J]. Computer Science, 2018, 45(6A): 364-370.
[8] TANG Zan-yu and LIU Hong. Study on Evaluation Method of Network Security Situation under Multi-stage Large-scale Network Attack [J]. Computer Science, 2018, 45(1): 245-248.
[9] QI Yong, GUO Shi-wei and LI Qian-mu. Design and Security Threats Analysis for Information Platform of Fusion Ubiquitous Network in Power Grid [J]. Computer Science, 2017, 44(3): 150-152.
[10] WANG Wei, WANG Jia-jun, WANG Ming-ming, ZHANG Wen-jing and CHEN Jin-guang. Defense Technology Based on Dynamic Space-Time Performance for Flooding Attacks in Mobile Ad Hoc Networks [J]. Computer Science, 2017, 44(1): 159-166.
[11] SHEN Pu-bing, ZHAO Zhan-dong and GONG Qiang-bing. Research on Evaluation of Computer Network Operation Based on Capacity Factor [J]. Computer Science, 2016, 43(Z6): 505-507.
[12] LI Xin-guo, LI Peng-wei, FU Jian-ming and DING Xiao-yi. Risk-controllable Common Elastic Mobile Cloud Computing Framework [J]. Computer Science, 2015, 42(Z11): 357-363.
[13] ZHOU Qiang and PENG Hui. Research on Network Traffic Prediction Scheme Based on Autoregressive Moving Average [J]. Computer Science, 2014, 41(4): 75-79.
[14] CAO Li-feng,LI Zhong,CHEN Xing-yuan and FENG Yu. Method of Binding Secure Label to Data Object Based on XML [J]. Computer Science, 2013, 40(8): 124-128.
[15] WANG Qian,FENG Ya-jun,YANG Zhao-min,YAO Lei. Network Attack Model Based on Ontology and its Application [J]. Computer Science, 2010, 37(6): 114-117.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!