skip to main content
10.1145/3617184.3630131acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccsieConference Proceedingsconference-collections
research-article

A Network Security Test Evaluation Model of Automobile Digital Key

Published:28 December 2023Publication History

ABSTRACT

As a product of the development of automobile networking, automotive digital keys not only bring convenience to users, but also bring some network security risks. At present, it is still in the initial stage of mass application of digital keys in automobiles, and the focus of each digital key product is still in the stage of functional realization, and there is a general lack of threat protection and risk assessment in network security. This paper mainly combines the existing network security standards to refine the network security threat scenarios of digital keys, and proposes test methods and evaluation models. According to the network security threats found by a large number of tests on the existing digital key scheme, a targeted test scheme is proposed to evaluate the network security of the digital key system in all aspects, so as to solve the problem of the lack of digital key test evaluation method. This paper proposes a network security test and evaluation model for automotive digital keys, which can support automobile manufacturers to complete the digital key system part of the threat analysis and risk assessment, and carry out functional design, test verification and other work.

References

  1. Zhang Jianzhong and Cui Shuangyi. Enhanced Bidirection Secure Communication Based on Digital Key and Chaotic Random Optical Feedback. IEEE Photonics Journal, 2018, 10(6) : 1-8.Google ScholarGoogle Scholar
  2. Gove Robert. Automatic Narrative Summarization for Visualizing Cyber Security Logs and Incident Reports.. IEEE transactions on visualization and computer graphics, 2021, PPGoogle ScholarGoogle Scholar
  3. Rathore Shailendra and Park Jong Hyuk. A Blockchain-Based Deep Learning Approach for Cyber Security in Next Generation Industrial Cyber-Physical Systems. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17(8) : 5522-5532.Google ScholarGoogle Scholar
  4. Xie Guoqi Recent Advances and Future Trends in Automotive Functional Safety Design Methodologies. IEEE Transactions on Industrial Informatics, 2020, : 1-1.Google ScholarGoogle Scholar
  5. Robert W. Heath. Communications and Sensing: An Opportunity for Automotive Systems. IEEE Signal Processing Magazine, 2020, 37(4) : 3-13.Google ScholarGoogle ScholarCross RefCross Ref
  6. Fedor Smirnov Automatic Optimization of the VLAN Partitioning in Automotive Communication Networks.. ACM Trans. Design Autom. Electr. Syst., 2019, 24(1) : 9:1-9:23.Google ScholarGoogle Scholar
  7. Radu Hanzu-Pazara and Gabriel Raicu and Remus Zagan. The Impact of Human Behaviour on Cyber Security of the Maritime Systems. Advanced Engineering Forum, 2019, 4893 : 267-274.Google ScholarGoogle ScholarCross RefCross Ref
  8. Vinayaka Jyothi and Sateesh Addepalli and Ramesh Karri. DPFEE: A High Performance Scalable Pre-Processor for Network Security Systems.. IEEE Trans. Multi-Scale Computing Systems, 2018, 4(1) : 55-68.Google ScholarGoogle ScholarCross RefCross Ref
  9. Qiong Ren and Jun Tao. The Research on Monitoring System Design and Implementation for the Network Security. Applied Mechanics and Materials, 2015, 3830(733-733) : 821-824.Google ScholarGoogle ScholarCross RefCross Ref
  10. Jun Huang. Information Security Assessment Data and Control Algorithm. Applied Mechanics and Materials, 2014, 3634(687-691) : 2925-2928.Google ScholarGoogle ScholarCross RefCross Ref
  11. Renaud Karen and Coles Kemp Lizzie. Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge. SN Computer Science, 2022, 3(5) : 346-346.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Wells Mary. Key components of successful digital remote monitoring in oncology.. Nature medicine, 2022, 28(6) : 1128-1129.Google ScholarGoogle Scholar
  13. Kuang Randy and Perepechaenko Maria and Barbeau Michel. A new quantum-safe multivariate polynomial public key digital signature algorithm. Scientific Reports, 2022, 12(1) : 13168-13168.Google ScholarGoogle ScholarCross RefCross Ref
  14. Yu Yingle. Big data network security defense mode of deep learning algorithm. Open Computer Science, 2022, 12(1) : 345-356.Google ScholarGoogle ScholarCross RefCross Ref
  15. Altulaihan Esra and Almaiah Mohammed Amin and Aljughaiman Ahmed. Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions. Electronics, 2022, 11(20) : 3330-3330.Google ScholarGoogle Scholar
  16. Prabhakar Priti Cyber Security of Smart Metering Infrastructure Using Median Absolute Deviation Methodology. Security and Communication Networks, 2022, 2022.Google ScholarGoogle Scholar

Index Terms

  1. A Network Security Test Evaluation Model of Automobile Digital Key

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCSIE '23: Proceedings of the 8th International Conference on Cyber Security and Information Engineering
      September 2023
      370 pages
      ISBN:9798400708800
      DOI:10.1145/3617184

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 December 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)9
      • Downloads (Last 6 weeks)3

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format