
Implementation Countermeasures for Information Security Management of Intelligent Connected Vehicles
Shijia Zhao, Ke Xu, Xiaoqing Xue, Yingjun Qiao
Strategic Study of CAE ›› 2019, Vol. 21 ›› Issue (3) : 108-113.
Implementation Countermeasures for Information Security Management of Intelligent Connected Vehicles
A new round of technological and industrial changes has accelerated technological integration. Intelligent connected vehicles (ICVs) have provided consumers with convenient use, rich application contents, and a safe driving environment. Meanwhile, multiple risks are also brought to information security by intelligentization and networking. In recent years, hacker attacks frequently occur, and information security not only affects driving safety and user data safety, but also threatens national security when being damaged. So, information security issues have attracted great attention from governments all over the world. Major developed countries and regions, such as the United States, Europe, and Japan, are taking active actions to safeguard information security. In this context, China should promote the development and management of the information security of the ICVs, take active measures, make rational planning, and make every effort to ensure the information security of ICVs, thus to promote the steady development of the ICVs.
intelligent connected vehicles / information security / automotive industry / management
[1] |
钟志华, 乔英俊, 王建强, 等. 新时代汽车强国战略研究综述(一) [J]. 中国工程科学, 2018, 20(1): 1–10. Zhong Z H, Qiao Y J, Wang J Q, et al. Summary of strategy research on automobile power in new era (I) [J]. Strategic Study of CAE, 2018, 20(1): 1–10.
|
[2] |
钟志华, 乔英俊, 王建强, 等. 新时代汽车强国战略研究综述(二) [J]. 中国工程科学, 2018, 20(1): 11–19. Zhong Z H, Qiao Y J, Wang J Q, et al. Summary of strategy research on automobile power in new era (II) [J]. Strategic Study of CAE, 2018, 20(1): 11–19.
|
[3] |
Ponemon Institute. Car cybersecurity: What do the automakers really think? [R]. Traverse City: Ponemon Institute, 2015.
|
[4] |
IBM 商业价值研究院. 加速车辆信息安全: 赢得车辆完整性和 数据隐私性竞争 [R]. 北京: IBM 商业价值研究院, 2017. IBM Business Value Research Institute. Accelerating vehicle information security: Winning vehicle integrity and data privacy competition [R]. Beijing: IBM Business Value Research Institute, 2017.
|
[5] |
赵福全, 刘宗巍, 郝瀚, 等. 中国实现汽车强国的战略分析和实 施路径 [J]. 中国科技论坛, 2016 (8): 45–51. Zhao F Q, Liu Z W, Hao H, et al. Analysis of China’s strategy for a stronger automotive country and its implementation pathway [J]. Forum on Science and Technology in China, 2016 (8): 45–51.
|
[6] |
于赫. 网联汽车信息安全问题及CAN 总线异常检测技术研究 [D]. 吉林: 吉林大学(博士学位论文), 2016. Yu H. Research on connected vehicle cyber security and anomaly detection technology for in-vehicle CAN Bus [D]. Jilin: Jilin University (Doctoral dissertation), 2016.
|
[7] |
李逸瀚. 电动汽车信息安全网关研制与 wolfSSL 协议研究 [D]. 合肥: 中国科学技术大学(硕士学位论文), 2017. Li Y H. Research of the information security gateway of electric vehicle and research on wolfSSL protocol [D]. Hefei: University of Science and Technology of China (Master’s thesis), 2017.
|
[8] |
赵世佳, 赵福全, 郝瀚, 等. 中国新能源汽车充电基础设施发展 现状与应对策略 [J]. 中国科技论坛, 2017 (10): 97–104. Zhao S J, Zhao F Q, Hao H, et al. The current situation and countermeasures in Chinese charging infrastructure of new energy vehicles [J]. Forum on Science and Technology in China, 2017 (10): 97–104.
|
[9] |
冯志杰, 何明, 李彬, 等. 汽车信息安全攻防关键技术研究进展 [J]. 信息安全学报, 2017, 2(2): 1–14. Feng Z J, He M, Li B, et al. Research on car information security attack and protection technology [J]. Journal of Cyber Security, 2017, 2(2): 1–14.
|
[10] |
印曦, 魏冬, 黄伟庆, 等. 日本车联网信息安全发展现状与分析 [J]. 中国信息安全, 2017 (1): 98–101. Yin X, Wei D, Huang W Q, et al. Current situation and analysis of information security of vehicle networking in Japan [J]. China Information Security, 2017 (1): 98–101.
|
/
〈 |
|
〉 |