期刊文献+

低时延、高可靠的车云协同安全策略研究 被引量:1

Research on Low Delay and High Reliability Vehicle Cloud Collaborative Security Strategy
下载PDF
导出
摘要 随着车联网日益向智能化及网联化发展,车联网在实际应用过程中面临信息截获、假冒攻击的威胁。此外,区别于传统的通信网络,车联网对信息的传输时延提出了更高的要求。文章结合车联网安全通信需求和应用场景,分析了车联网在通信过程中遇到的问题,利用内生安全与量子密钥加密技术,提出了一种低时延、高可靠的车云协同安全策略,解决车联网中的信息可靠性与传输时延等问题。 With the development of Internet of vehicles to intelligence and networking,the Internet of Vehicles is facing the threat of information interception and counterfeiting attacks in the actual application process.In addition,different from the traditional mobile communication networks,the Internet of vehicles puts forward higher requirements for the transmission delay of information.Combined with the security communication requirements and application scenarios of the Internet of Vehicles,this paper analyzes the problems encountered in the communication process of the Internet of Vehicles.Based on the endogenous security and quantum key encryption technology,this paper proposes a vehicle cloud collaborative security strategy to solve the problems of information reliability and transmission delay in the Internet of Vehicles.
作者 梁洪源 曹凌云 Liang Hongyuan;Cao Lingyun(HengTong Qasky Quantum Information Research Institute Co.,Ltd.,Suzhou 215000,China)
出处 《信息通信技术》 2022年第5期18-22,共5页 Information and communications Technologies
关键词 车联网 内生安全 信息安全 传输时延 Internet of Vehicles Endogenous Security Information Security Transmission Latency
  • 相关文献

参考文献5

二级参考文献26

  • 1魏楚元,李陶深,王高才.基于代理的分布式大型动态组播密钥管理协议[J].计算机工程与应用,2007,43(7):155-159. 被引量:3
  • 2章如峰,宋婷,吴昊曼,等.车联网产业发展与市场前景分析[c].第八届中国智能交通年会.2013.
  • 3Bo Yu,Cheng-Zhong Xu,Bin Xiao.Detecting Sybil attacks in VANETs[J]. Journal of Parallel and Distributed Computing . 2013 (6)
  • 4ABBAS S,MERABTI M,LLEWELLYN J D, et al.Lightweight Sybil attack detection in MANETs. IEEE Systems Journal . 2013
  • 5Douceur J R.The Sybil attack. Proceedings of the 1st In-ternational Workshop on Peer-to-Peer Systems,IPTPS2002 . 2002
  • 6Tong ZhouR.R. Choudhury,Peng Ni.P <sup>2</sup>DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks. IEEE Journal on Selected Areas in Communications . 2011
  • 7Shan Chang,Yong Qi,Hongzi Zhu,Jizhong Zhao,Xuemin (Sherman) Shen.Footprint: Detecting Sybil Attacks in Urban Vehicular Networks. IEEE Transactions on Parallel and Distributed Systems . 2012
  • 8N. Borisov."Computational puzzles as sybil defenses,". Peer-to-Peer Computing . 2006
  • 9Chen Chen,Wang X,Han Wei-li,et al.A robust detection of the Sybil attack in urban VANETs. The 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009) . 2009
  • 10Chaurasia B K,Verma S.Infrastructure based authentication in VANETs. International Journal of Multimedia and Ubiquitous Engineering . 2011

共引文献30

同被引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部