Essential Technics of Cybersecurity for Intelligent Connected Vehicles: Comprehensive Review and Perspective

Along with the promotion of intelligent connected vehicles, the problems of network attacks have rapidly increased, and thus the cybersecurity has drawn much attention. Unfortunately, although remarkable progress has been achieved both in technics and standard, it still remains vague for designing v...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE internet of things journal 2023-12, Vol.10 (24), p.1-1
Hauptverfasser: Shichun, Yang, Zheng, Zuo, Bin, Ma, Yifan, Zheng, Sida, Zhou, Mingyan, Liu, Yu, Lu, Qiangwei, Li, Xinan, Zhou, Mengyue, Zhang, Yang, Hua, Fei, Chen, Yaoguang, Cao
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Along with the promotion of intelligent connected vehicles, the problems of network attacks have rapidly increased, and thus the cybersecurity has drawn much attention. Unfortunately, although remarkable progress has been achieved both in technics and standard, it still remains vague for designing vehicular cybersecurity. In this article, the general technical profile of cybersecurity for intelligent connected vehicles has been comprehensively reviewed, including threat analysis and risk assessment, static defense and intrusion detection. The potential attacking vulnerabilities for ICVs are summarized, within in-vehicle network and mobile networks. Then, the identity authentication and secure communication methods are introduced from static defense, where the conventional and novel intelligent approach are included. And the intrusion detection is introduced as the active methods including conventional and novel ones. Moreover, the general procedure and management for designing the vehicular cybersecurity are also summarized according to the current standard system. It hopes that the review of research progress on technical method may help researchers and manufactures, and delivers the potential direction for future cybersecurity development.
ISSN:2327-4662
2327-4662
DOI:10.1109/JIOT.2023.3299554