ABSTRACT
As a product of the development of automobile networking, automotive digital keys not only bring convenience to users, but also bring some network security risks. At present, it is still in the initial stage of mass application of digital keys in automobiles, and the focus of each digital key product is still in the stage of functional realization, and there is a general lack of threat protection and risk assessment in network security. This paper mainly combines the existing network security standards to refine the network security threat scenarios of digital keys, and proposes test methods and evaluation models. According to the network security threats found by a large number of tests on the existing digital key scheme, a targeted test scheme is proposed to evaluate the network security of the digital key system in all aspects, so as to solve the problem of the lack of digital key test evaluation method. This paper proposes a network security test and evaluation model for automotive digital keys, which can support automobile manufacturers to complete the digital key system part of the threat analysis and risk assessment, and carry out functional design, test verification and other work.
- Zhang Jianzhong and Cui Shuangyi. Enhanced Bidirection Secure Communication Based on Digital Key and Chaotic Random Optical Feedback. IEEE Photonics Journal, 2018, 10(6) : 1-8.Google Scholar
- Gove Robert. Automatic Narrative Summarization for Visualizing Cyber Security Logs and Incident Reports.. IEEE transactions on visualization and computer graphics, 2021, PPGoogle Scholar
- Rathore Shailendra and Park Jong Hyuk. A Blockchain-Based Deep Learning Approach for Cyber Security in Next Generation Industrial Cyber-Physical Systems. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17(8) : 5522-5532.Google Scholar
- Xie Guoqi Recent Advances and Future Trends in Automotive Functional Safety Design Methodologies. IEEE Transactions on Industrial Informatics, 2020, : 1-1.Google Scholar
- Robert W. Heath. Communications and Sensing: An Opportunity for Automotive Systems. IEEE Signal Processing Magazine, 2020, 37(4) : 3-13.Google ScholarCross Ref
- Fedor Smirnov Automatic Optimization of the VLAN Partitioning in Automotive Communication Networks.. ACM Trans. Design Autom. Electr. Syst., 2019, 24(1) : 9:1-9:23.Google Scholar
- Radu Hanzu-Pazara and Gabriel Raicu and Remus Zagan. The Impact of Human Behaviour on Cyber Security of the Maritime Systems. Advanced Engineering Forum, 2019, 4893 : 267-274.Google ScholarCross Ref
- Vinayaka Jyothi and Sateesh Addepalli and Ramesh Karri. DPFEE: A High Performance Scalable Pre-Processor for Network Security Systems.. IEEE Trans. Multi-Scale Computing Systems, 2018, 4(1) : 55-68.Google ScholarCross Ref
- Qiong Ren and Jun Tao. The Research on Monitoring System Design and Implementation for the Network Security. Applied Mechanics and Materials, 2015, 3830(733-733) : 821-824.Google ScholarCross Ref
- Jun Huang. Information Security Assessment Data and Control Algorithm. Applied Mechanics and Materials, 2014, 3634(687-691) : 2925-2928.Google ScholarCross Ref
- Renaud Karen and Coles Kemp Lizzie. Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge. SN Computer Science, 2022, 3(5) : 346-346.Google ScholarDigital Library
- Wells Mary. Key components of successful digital remote monitoring in oncology.. Nature medicine, 2022, 28(6) : 1128-1129.Google Scholar
- Kuang Randy and Perepechaenko Maria and Barbeau Michel. A new quantum-safe multivariate polynomial public key digital signature algorithm. Scientific Reports, 2022, 12(1) : 13168-13168.Google ScholarCross Ref
- Yu Yingle. Big data network security defense mode of deep learning algorithm. Open Computer Science, 2022, 12(1) : 345-356.Google ScholarCross Ref
- Altulaihan Esra and Almaiah Mohammed Amin and Aljughaiman Ahmed. Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions. Electronics, 2022, 11(20) : 3330-3330.Google Scholar
- Prabhakar Priti Cyber Security of Smart Metering Infrastructure Using Median Absolute Deviation Methodology. Security and Communication Networks, 2022, 2022.Google Scholar
Index Terms
- A Network Security Test Evaluation Model of Automobile Digital Key
Recommendations
The Security Research of Digital Library Network
MECS '15: Proceedings of the 2015 International Conference on Mechanical Engineering and Control SystemsDigital library is a self-development needs for the modern library to meet the development requirements of the times, changing the way services and so on. Digital library from the hardware, technology, management and other aspects to objective analysis ...
Users' evaluation of digital libraries (DLs): Their uses, their criteria, and their assessment
Millions of dollars have been invested into the development of digital libraries. There are many unanswered questions regarding their evaluation, in particular, from users' perspectives. This study intends to investigate users' use, their criteria and ...
Research on Network Security Evaluation Model Based on AHP and BP Neural Network
icWCSN '23: Proceedings of the 2023 10th International Conference on Wireless Communication and Sensor NetworksThe Internet's sharing and openness have made information interaction more vulnerable to security risks. As a result, a comprehensive evaluation of the security of computer network systems has become a more effective means of preventing various network ...
Comments