[1] 李聪聪.面向车联网信息安全问题的安全机制研究[D].北京:
北京交通大学,2019.
[2] 刘宴兵,常光辉,李暾.车联网安全关键技术解析[M].北京:科学 出版社,2019.
[3] Wang J,Li J,Wang H,et al.Dynamic scalable elliptic curve crypto?graphic scheme and its application to in-vehicle security[J].
IEEE Internet of Things Journal, 2018,6(4):5892-5901.
[4] Wang R,Song H, Jing Y, et al. A Sensor Attack Detection Method
in Intelligent Vehicle with Multiple Sensors[C]//2019 IEEE
International Conference on Industrial Internet (ICII).IEEE,2019:
219-226.
[5] Souli N, Laoudias C, Kolios P, et al. GNSS Location Verification
in Connected and Autonomous Vehicles Using in-Vehicle
Multimodal Sensor Data Fusion[C]//2020 22nd International
Conference on Transparent Optical Networks (ICTON). IEEE,
2020:1-4.
[6] Pi W,Yang P,Duan D,et al.Malicious user detection for coopera?tive mobility tracking in autonomous driving[J].IEEE internet of
things journal,2020,7(6):4922-4936.
[7] Lenard T,Bolboac? R,Genge B,et al.MixCAN:Mixed and Back?ward-Compatible Data Authentication Scheme for Controller
Area Networks[C]//2020 IFIP Networking Conference (Networ?king).IEEE, 2020:395-403.
[8] Jo H J, Kim J H, Choi H Y, et al. MAuth-CAN: Masquerade?Attack- Proof authentication for in-vehicle networks[J].IEEE
transactions on vehicular technology,2019,69(2):2204-2218.
[9] Xiao L, Lu X, Xu T, et al. Reinforcement Learning-Based Physi?cal Layer Authentication for Controller Area Networks[J].IEEE
Transactions on Information Forensics and Security,2021,16:
2535-2547.
[10] Sami M,Ibarra M,Esparza A C,et al.Rapid,Multi-vehicle and
Feedforward Neural Network based Intrusion Detection System
for Controller Area Network Bus[C]//2020 IEEE Green Energy
and Smart Systems Conference (IGESSC).IEEE,2020:1-6.
[11] Yu T,Wang X. Topology verification enabled intrusion detection
for invehicle CANFD networks[J].IEEE Communications Letters,
2019,24(1):227-230.
[12] Khan Z,Chowdhury M, Islam M, et al. Long short-term memory
neural network-based attack detection model for in-vehicle net?work security[J]. IEEE Sensors Letters,2020,4(6):1-4.
[13] Kalkan S C,Sahingoz O K.In-Vehicle Intrusion Detection Sys-
第 24 期 宁玉桥,等:车联网网络安全技术研究 21
tem on Controller Area Network with Machine Learning
Models[C]// 2020 11th International Conference on Computing,
Communication and Networking Technologies (ICCCNT).
IEEE,2020:1-6.
[14] Sunny J, Sankaran S, Saraswat V. A Hybrid Approach for Fast
Anomaly Detection in Controller Area Networks[C]//2020
IEEE International Conference on Advanced Networks and
Telecommu- nications Systems (ANTS). IEEE,2020:1-6.
[15] Kexun H,Changyuan W,Yanyan H, et al. Research on cyber
security Technology and Test Method of OTA for Intelligent
Connected Vehicle[C]//2020 International Conference on Big
Data, Artificial Intelligence and Internet of Things Engineering
(ICBAIE). IEEE, 2020:194-198.
[16] Mtetwa N S,Sibeko N,Tarwireyi P, et al. OTA firmware updates
for LoRaWAN using blockchain[C]//2020 2nd International
Multidis- ciplinary Information Technology and Engineering
Conference (IMITEC). IEEE, 2020:1-8.
[17] Mahmood S,Fouillade A,Nguyen H N,et al.A Model-Based
Security Testing Approach for Automotive Over-The-Air
Updates[C]//2020 IEEE International Conference on Software
Testing, Verification and Validation Workshops (ICSTW).IEEE,
2020:6-13.
[18] Moiz A,Alalfi M H.An Approach for the Identification of Information Leakage in Automotive Infotainment systems[C]//2020
IEEE 20th International Working Conference on Source Code
Analysis and Manipulation (SCAM). IEEE,2020:110-114.
[19] 邓稳.基于车联网环境的安全通信技术研究与实现[D].成都: 电子科技大学, 2020.
[20] Xie G, Yang L T, Liu Y, et al. Security Enhancement for RealTime Independent In-Vehicle CAN-FD Messages in Vehicular
Networks[J].IEEE Transactions on Vehicular Technology, 2021,
70(6):5244- 5253.
[21] Costantino G, Matteucci I, Morales D. EARNEST: A challengebased intrusion prevention system for CAN messages[C]//2020
IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE,2020:243-248.
[22] D'Angelo G,Castiglione A,Palmieri F.A cluster-based multidimensional approach for detecting attacks on connected vehicles
[J].IEEE Internet of Things Journal,2020.
[23] Song L,Sun G, Yu H, et al. Fbia: A fog-based identity authentication scheme for privacy preservation in internet of vehicles
[J]. IEEE Transactions on Vehicular Technology, 2020, 69(5):
5403-5415.
[24] Vasudev H,Deshpande V,Das D,et al.A lightweight mutual
authenti- cation protocol for V2V communication in internet of
vehicles[J]. IEEE Transactions on Vehicular Technology,2020,69(6):
6709-6717.
[25] Zhang J,Zhong H, Cui J,et al. SMAKA: Secure Many-to-Many
Authentication and Key Agreement Scheme for Vehicular
Networks[J].IEEE Transactions on Information Forensics and
Security, 2020,16:1810-1824.
[26] Wang C,Song R,Liu Z.Simulation of Vehicle Network Communication Security Based on Random Geometry and Data Mining[J]. IEEE Access,2020,8: 69389-69400.
[27] Sutrala A K,Bagga P,Das A K,et al.On the design of conditional
privacy preserving batch verification-based authentication
scheme for Internet of vehicles deployment[J].IEEE Transactions on Vehi- cular Technology,2020,69(5):5535-5548.
[28] Tian Z, Gao X, Su S, et al. Vcash: a novel reputation framework
for identifying denial of traffic service in internet of connected
vehicles[J].IEEE Internet of Things Journal,2019,7(5):3901-
3909.
[29] Huang Q,Li N,Zhang Z,et al.Secure and Privacy-Preserving
War- ning Message Dissemination in Cloud-Assisted Internet
of Vehicles [C]//2019 IEEE Conference on Communications
and Network Security(CNS).IEEE,2019:1-8.
[30] García-Magari?o I,Sendra S,Lacuesta R,et al.Security in vehicles with IoT by prioritization rules, vehicle certificates, and
trust management[J].IEEE Internet of Things Journal,2018,6(4):
5927-5934.
[31] Rech A,Pistauer M,Steger C.A Novel Embedded Platform for
Secure and Privacy-Concerned Cross-Domain Service Access
[C]//2019 IEEE Intelligent Vehicles Symposium (IV).IEEE,
2019:1961- 1967.
[32] Gupta M,Awaysheh F M,Benson J,et al.An Attribute-Based
Access Control for Cloud Enabled Industrial Smart Vehicles
[J].IEEE Transactions on Industrial Informatics,2020,17(6):
4288-4297.
[33] Lu Y,Huang X,Zhang K,et al.Blockchain empowered asynchronous federated learning for secure data sharing in internet of
vehicles[J]. IEEE Transactions on Vehicular Technology,2020,69(4):
4298-4311.
[34] Cui J, Song Z, Liu Q, et al. A Generalized Obfuscation Method
to Protect Software of Mobile Apps[C]//2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks
(MSN).IEEE, 2019:31-36.
[35] Homayoun S,Dehghantanha A,Parizi R M,et al. A blockchainbased framework for detecting malicious mobile applications
in app stores[C]//2019 IEEE Canadian Conference of Electrical
and Com- puter Engineering (CCECE).IEEE,2019:1-4.
[36] Chen L,Ma Y,Zhipeng S,et al. Research on Mobile Application
Local Denial of Service Vulnerability Detection Technology
Based on Rule Matching[C]//2019 IEEE International Conference on Energy Internet (ICEI).IEEE,2019:585-590. |