The Research on Security Model Algorithm in Intelligent Connected Vehicles

Shaojun Xiong,Xiangtao Qi
DOI: https://doi.org/10.1109/sdpc55702.2022.9915868
2022-08-05
Abstract:With the rapid development of mobile internet technology, the Intelligent Connected Vehicles(ICV), as an important support system for intelligent transportation, has become the future development direction of the intelligent networked industry. The 5G mobile network is characterized by three aspects, ultra-high speed, ultra-large connection, and ultra-low latency. These characteristics realize the digitization and visualization of the perception ability of vehicles in the Internet of Vehicles(IoV), and promote the integration and development of related technologies in the ICV. It is foreseeable that the IoV will generate a large amount of communication data in future application scenarios. However, the application of the IoV frequently involves private information data such as vehicle’s location, driving-data, and user-identity. Therefore, the increasing demand in communication volume will aggravate the leakage of communication data in the ICV. The risk maybe lead to safety hazards. Based on the design characteristics of its own interface mode of the Internet in the ICV communication system, the ICV is prone to network attacks, such as malicious network attacks such as illegal intrusion, remote control and anonymous tracking. This paper intends to explore the methods to solve the hidden dangers in communication security through the theoretical research and analysis of the information security model in the ICV.
Engineering,Computer Science
What problem does this paper attempt to address?