Abstract
The implementation of the car driving identification system will help to improve the safety and efficiency of navigation. The safety analysis technology can filter the attack events of the automatic identification system of car driving and reduce the error rate of safety analysis. To this end, a deep learning-based safety analysis method for car driving identification system is proposed. Based on the deep learning theory, a safety behavior analysis model of the car driving identification system is constructed. Through data collection, security analysis and response processing, the identification of abnormal communication security data strength is completed. A Cartesian coordinate system is established, and a heterogeneous data processing model is constructed. Based on the deep learning analysis process of security data, based on deep learning, by accessing system operation data, stream processing and data mining of security data, complete system security data defense control, and realize system security analysis. The experimental results show that the method in this paper has strong security analysis ability, and its matching range is large, which can match all security behaviors and reduce the error rate of security analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sun, X., Shi, W., Cheng, Q., et al.: An LED detection and recognition method based on deep learning in vehicle optical camera communication. IEEE Access 9, 80897–80905 (2021)
Chu, N., Zhang, S., Gao, Y., et al.: Safety analysis method of aero-engine systems based on Simscape model. J. Aeros. Power 36(04), 885–896 (2021)
Yang, H., Sun, Y., Ruan, H.: Research on safety assessment method for IMA system based on AADL and HiP-HOPS. Aeron. Comput. Techn. 49(06), 85–88 (2019)
Alzubi, O.A.: A deep learning-based frechet and dirichlet model for intrusion detection in IWSN. J. Intell. Fuzzy Syst. 42(2), 873–883 (2022)
Wang, Z., Liu, Y., He, D., et al.: Intrusion detection methods based on integrated deep learning model. Comput. Secur. 103, 102177 (2021)
Lu, J., Liu, X., Zhang, S., et al.: Research and analysis of electromagnetic trojan detection based on deep learning. Secur. Commun. Netw. 2020(4), 1–13 (2020)
Riyaz, B., Ganapathy, S.: A deep learning approach for effective intrusion detection in wireless networks using CNN. Soft. Comput. 24(22), 17265–17278 (2020)
Mallick, M., Chang, K.C., Arulampalam, S., et al.: Heterogeneous track-to-track fusion in 2D using sonar and radar sensors. In: 2019 22th International Conference on Information Fusion (FUSION), pp. 1–8. IEEE (2019)
Singla, J.: Comparing ROC curve based thresholding methods in online transactions fraud detection system using deep learning. In: 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), pp. 9–12. IEEE (2021)
Sufen, L., Xueli, Y.: Mathematical modeling and simulation of data buffer replacement algorithm in heterogeneous network. Comput. Simul. 38(12), 286–290 (2021)
Acknowledgement
1. Science and Technology Youth Program of Chongqing Education Commission in 2020:Design of A pillar blind zone vision system for passenger cars (Project No.: KJQN202004602).
2021 Chongqing Vocational Institute of Tourism Mass Innovation Space Project:Universal Vision Given by Science and Technology -- Development of Visual System for Blind Zone of Passenger Car A Pillar (Project No.: 2021DC01).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Wei, X., Zhang, R. (2024). Security Analysis of Car Driving Identification System Based on Deep Learning. In: Wang, B., Hu, Z., Jiang, X., Zhang, YD. (eds) Multimedia Technology and Enhanced Learning. ICMTEL 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 532. Springer, Cham. https://doi.org/10.1007/978-3-031-50571-3_34
Download citation
DOI: https://doi.org/10.1007/978-3-031-50571-3_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-50570-6
Online ISBN: 978-3-031-50571-3
eBook Packages: Computer ScienceComputer Science (R0)