期刊文献+

基于国产密码算法的V2X通信安全可信体系 被引量:1

V2X communication trusted system based on commercial cipher codes
下载PDF
导出
摘要 随着LTE-V和5G通信标准的推进以及V2X应用场景的明晰,车联网已逐步走向商用化。相对于网络设备信息安全已具有一定的防护水平,车辆之间的通信安全需求成为关注的焦点:一方面,车联网V2X通信方式传递的多是关于行车安全、交通事故的实时信息,必须保证消息是合法设备所发出的,而且没有被篡改;另一方面,在对车辆及用户的身份进行鉴别时,要避免直接使用车辆或其所有者的信息而造成的用户隐私泄露。因此,建设车联网V2X通信安全可信体系要充分平衡信息完整性、真实性的防护和隐私保护需求。同时,还要兼顾车联网V2X通信高吞吐量的特点和低时延的要求。车联网V2X通信安全可信体系是应用国产密码算法和自主可控技术打造的国家级车联网通信身份认证系统,可以为汽车制造商的V2X功能量产车辆提供身份认证及安全防护服务,系统全面地保障车联网V2X通信的安全。 With the advancement of LTE-V and 5G communication standards and the maturity of V2X application scenarios,V2X has gradually moved towards commercialization.Compared to network security which already reached a certain level,the communication security requirements between vehicles attracts more attention:On the one hand,the V2X mostly send real-time message about driving safety and traffic info,so it must be ensured that the message is issued by a legitimate device and has not been tampered.On the other hand,when identifying the vehicle and the user,it is necessary to avoid the leakage of user privacy caused by the direct use of the information of the vehicle or its owner.Therefore,to build a V2X communication trusted system should fully balance the protection of information integrity,authenticity,and privacy.At the same time,the characteristics of high-throughput and low-latency requirements of the V2X communication of the vehicle network must also be considered.The V2X communication trusted system is a national-level vehicle identity authentication system based on China's commercial cipher codes.The system can support V2X-enabled mass-produced vehicles for OEMs to provide identity authentication and security protection services,and hence guarantee the security of V2X communications for connected vehicles.
作者 周唯 刘建行 罗璎珞 Zhou Wei;Liu Jianxing;Luo Yingluo(China Intelligent and Connected Vehicles(Beijing)Research Institute Co,Ltd.,Beijing 100176)
出处 《网络空间安全》 2019年第11期59-63,共5页 Cyberspace Security
关键词 国产密码算法 V2X安全认证 可信体系 commercial cipher codes V2X security trusted system
  • 相关文献

参考文献1

共引文献3

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部