Abstract

With the rapid development of mobile internet technology, the Intelligent Connected Vehicles(ICV), as an important support system for intelligent transportation, has become the future development direction of the intelligent networked industry. The 5G mobile network is characterized by three aspects, ultra-high speed, ultra-large connection, and ultra-low latency. These characteristics realize the digitization and visualization of the perception ability of vehicles in the Internet of Vehicles(IoV), and promote the integration and development of related technologies in the ICV. It is foreseeable that the IoV will generate a large amount of communication data in future application scenarios. However, the application of the IoV frequently involves private information data such as vehicle’s location, driving-data, and user-identity. Therefore, the increasing demand in communication volume will aggravate the leakage of communication data in the ICV. The risk maybe lead to safety hazards. Based on the design characteristics of its own interface mode of the Internet in the ICV communication system, the ICV is prone to network attacks, such as malicious network attacks such as illegal intrusion, remote control and anonymous tracking. This paper intends to explore the methods to solve the hidden dangers in communication security through the theoretical research and analysis of the information security model in the ICV.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.