Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Strategic Study of CAE >> 2019, Volume 21, Issue 3 doi: 10.15302/J-SSCAE-2019.03.006

Implementation Countermeasures for Information Security Management of Intelligent Connected Vehicles

1. Ministry of Industry and Information Technology Equipment Industry Development Center, Beijing 100846, China;

2. China Software Test Center, Beijing 100048, China;

3. School of Vehicle and Mobility, Tsinghua University, Beijing 100084, China;

4. Center for Strategic Studies, CAE, Beijing 100088, China

Received: 2019-05-06 Revised: 2019-05-09

Next Previous

Abstract

A new round of technological and industrial changes has accelerated technological integration. Intelligent connected vehicles (ICVs) have provided consumers with convenient use, rich application contents, and a safe driving environment. Meanwhile, multiple risks are also brought to information security by intelligentization and networking. In recent years, hacker attacks frequently occur, and information security not only affects driving safety and user data safety, but also threatens national security when being damaged. So, information security issues have attracted great attention from governments all over the world. Major developed countries and regions, such as the United States, Europe, and Japan, are taking active actions to safeguard information security. In this context, China should promote the development and management of the information security of the ICVs, take active measures, make rational planning, and make every effort to ensure the information security of ICVs, thus to promote the steady development of the ICVs.

Figures

Fig. 1

Fig. 2

References

[ 1 ] Zhong Z H, Qiao Y J, Wang J Q, et al. Summary of strategy research on automobile power in new era (I) [J]. Strategic Study of CAE, 2018, 20(1): 1–10. Chinese. link1

[ 2 ] Zhong Z H, Qiao Y J, Wang J Q, et al. Summary of strategy research on automobile power in new era (II) [J]. Strategic Study of CAE, 2018, 20(1): 11–19. Chinese. link1

[ 3 ] Ponemon Institute. Car cybersecurity: What do the automakers really think? [R]. Traverse City: Ponemon Institute, 2015.

[ 4 ] IBM Business Value Research Institute. Accelerating vehicle information security: Winning vehicle integrity and data privacy competition [R]. Beijing: IBM Business Value Research Institute, 2017. Chinese.

[ 5 ] Zhao F Q, Liu Z W, Hao H, et al. Analysis of China’s strategy for a stronger automotive country and its implementation pathway [J]. Forum on Science and Technology in China, 2016 (8): 45–51. Chinese. link1

[ 6 ] Yu H. Research on connected vehicle cyber security and anomaly detection technology for in-vehicle CAN Bus [D]. Jilin: Jilin University (Doctoral dissertation), 2016. Chinese. link1

[ 7 ] Li Y H. Research of the information security gateway of electric vehicle and research on wolfSSL protocol [D]. Hefei: University of Science and Technology of China (Master’s thesis), 2017. Chinese. link1

[ 8 ] Zhao S J, Zhao F Q, Hao H, et al. The current situation and countermeasures in Chinese charging infrastructure of new energy vehicles [J]. Forum on Science and Technology in China, 2017 (10): 97–104. Chinese. link1

[ 9 ] Feng Z J, He M, Li B, et al. Research on car information security attack and protection technology [J]. Journal of Cyber Security, 2017, 2(2): 1–14. Chinese. link1

[10] Yin X, Wei D, Huang W Q, et al. Current situation and analysis of information security of vehicle networking in Japan [J]. China Information Security, 2017 (1): 98–101. Chinese. link1

Related Research