首页 | 本学科首页   官方微博 | 高级检索  
     

智能网联汽车通信终端信息安全加密方法仿真
引用本文:李芳丽,吴晓建. 智能网联汽车通信终端信息安全加密方法仿真[J]. 计算机仿真, 2020, 37(5): 86-90
作者姓名:李芳丽  吴晓建
作者单位:江西科技学院汽车工程学院,江西 南昌330098;南昌大学机电工程学院,江西 南昌330031
基金项目:江西省教育厅科技项目;教学改革项目
摘    要:为有效提高当前智能网联汽车通信终端信息传输的安全性,提出车载网络信息安全加密方法,采用JAVA语言进行参数设计,基于汽车网络节点路径确定各项关系参数,在改进数据加密的基础上缓存加密流程,利用临时ID号码生成密匙替换传统单一节点密匙,以此生成临时加密数据获取最优加密路径。将上述路径交叉到原始路径中,即可提取当前新的加密ID。再将其与当前车载ECU衡量标准进行对比保证缓存合理性,完成信息密匙管理。最后建立CAN总线异常检测模型,分别利用统计信息熵和支持向量机对CAN ID和CAN Data进行检测,辅助上述密匙管理,共同完成信息安全加密。仿真数据表明,在外部入侵环境下,应用设计的安全加密方法,路径密匙安全节点影响率降低了27%,洪范攻击、重放攻击检测和报文异常检测效果均有明显提高。

关 键 词:网联汽车  通信终端  安全加密  洪范攻击

Intelligent Network Communication Terminal Information Security Simulation Method
LI Fang-li,WU Xiao-jian. Intelligent Network Communication Terminal Information Security Simulation Method[J]. Computer Simulation, 2020, 37(5): 86-90
Authors:LI Fang-li  WU Xiao-jian
Affiliation:(School of Automotive Engineering,Jiangxi University of Technology,Nanchang Jiangxi 330098,China;School of Mechanitronics Engineering,Nanchang University,Nanchang Jiangxi 330031,China)
Abstract:In order to effectively improve the security of network communication terminal information transmission of intelligent connected vehicle(ICV), this article puts forward an information security encryption method for vehicle-mounted network. Firstly, Java language was used to design the parameters, and then the relational parameters were determined based on the path of automobile network node. By improving the data encryption, the encryption flow was cached, and the temporary ID number was used to generate the key, so as to replace the traditional single node key. On this basis, the temporary encrypted data were generated and the optimal encryption path was found. Moreover, the above path was combined with the original path, so that a new encryption ID was extracted. After that, it was compared with the vehicle-mounted ECU standard to ensure the rationality of cache and thus to complete the information key management. Finally, the abnormal detection model of CAN bus was built. Respectively, statistical information entropy and support vector machine were used to detect CAN ID and CAN Data, so as to assist the key management in jointly completing the information security encryption. According to simulation data, we can see that when the designed method is applied in the external intrusion environment, the influence rate of key security node of path is reduced by 27%. Meanwhile, the detection effect of flooding attacks, replay-attack and packet abnormal detection is improved obviously.
Keywords:Intelligent Connected Vehicle  Communication terminal  Secure encryption  Flooding attacks
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号