4.6 Review

An Overview of Vehicular Cybersecurity for Intelligent Connected Vehicles

Journal

SUSTAINABILITY
Volume 14, Issue 9, Pages -

Publisher

MDPI
DOI: 10.3390/su14095211

Keywords

vehicular network; intelligent connected vehicle; cyber security

Funding

  1. National Key Research and Development Program of China [2021YFE0203600]
  2. National Natural Science Foundation of China [U1864204]
  3. Fundamental Research Funds for the Central Universities in China [300102220204]

Ask authors/readers for more resources

Cybersecurity poses significant challenges to intelligent connected vehicle systems, as interconnected vehicles are susceptible to various network security attacks that jeopardize passenger safety. This review paper analyzes the vulnerabilities of the current vehicle network and discusses the implementation methods of network security threats. It also highlights the importance of researching and deploying vehicle network security, and explores techniques for enhancing vehicle network security and detecting abnormal intrusions.
Cybersecurity is one of the most important challenges in the intelligent connected vehicle system. Interconnected vehicles are vulnerable to different network security attacks, which endanger the safety of passengers. This review paper firstly analyses the reasons why the current vehicle network is vulnerable to network attack and summarizes the three implementation methods of network security threats. The necessity of vehicle network security research and deployment is also analyzed. After giving a short introduction to the vehicular network security, this review paper identifies major security attacks on intelligent connected vehicles. Then the security enhancement technology of vehicle networks from three aspects are introduced, including vehicle network data encryption technology, vehicle network message authentication technology, and vehicle network anomaly intrusion detection technology. Then we analyze three common methods of abnormal intrusion detection in vehicle networks and explore the future research for preventing attacks on the network security of intelligent vehicle systems.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available