TY - JOUR
T1 - Side-Channel Analysis for Intelligent and Connected Vehicle Security
T2 - A New Perspective
AU - Xun, Yijie
AU - Liu, Jiajia
AU - Zhang, Yanning
N1 - Publisher Copyright:
© 1986-2012 IEEE.
PY - 2020/3/1
Y1 - 2020/3/1
N2 - With the continuous expansion and deepening of ICVs, advanced technologies continue to emerge, making ICVs more intelligent to serve and protect drivers. Although the development of ICVs has brought great convenience and better driving experiences for users, at the same time it also brings many intrusion portals for malicious attackers. There are many hostile invaders who only focus on how to achieve malicious invasions by exploiting some attack technologies, such as stealing users' privacy via SCA. However, technology is a double-edged sword. We can utilize existing attack technologies to do something meaningful, which is beneficial to social development. To this end, the security threats are investigated in ICVs, especially the application of SCA. After that, we propose the schemes of driver identification and illegal driver detection by using SCA, and provide an insight into the advantages and limitations of each scheme. The experimental results showed that identity authentication accuracy can reach 100 percent by using at least 10-minute training data and more than 1-minute testing data. Based on recent progress, future research opportunities are discussed to motivate more researchers to focus on the safety of ICVs.
AB - With the continuous expansion and deepening of ICVs, advanced technologies continue to emerge, making ICVs more intelligent to serve and protect drivers. Although the development of ICVs has brought great convenience and better driving experiences for users, at the same time it also brings many intrusion portals for malicious attackers. There are many hostile invaders who only focus on how to achieve malicious invasions by exploiting some attack technologies, such as stealing users' privacy via SCA. However, technology is a double-edged sword. We can utilize existing attack technologies to do something meaningful, which is beneficial to social development. To this end, the security threats are investigated in ICVs, especially the application of SCA. After that, we propose the schemes of driver identification and illegal driver detection by using SCA, and provide an insight into the advantages and limitations of each scheme. The experimental results showed that identity authentication accuracy can reach 100 percent by using at least 10-minute training data and more than 1-minute testing data. Based on recent progress, future research opportunities are discussed to motivate more researchers to focus on the safety of ICVs.
UR - http://www.scopus.com/inward/record.url?scp=85083086313&partnerID=8YFLogxK
U2 - 10.1109/MNET.001.1900214
DO - 10.1109/MNET.001.1900214
M3 - 文献综述
AN - SCOPUS:85083086313
SN - 0890-8044
VL - 34
SP - 150
EP - 157
JO - IEEE Network
JF - IEEE Network
IS - 2
M1 - 8839975
ER -