A protection method for preventing data injection attacks in the data collection of the Internet of Vehicles
A technology of data injection and data collection, applied in the field of Internet of Vehicles information security, to prevent data injection attacks, ensure validity, and simplify data legality analysis
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] The specific embodiments of the present invention will be described in detail below in conjunction with the technical solutions and accompanying drawings.
[0020] 1. The internal communication method and network topology of the Internet of Vehicles
[0021] Such as figure 2 As shown, the communication between the vehicle and the roadside can be mainly based on the short-distance communication technology (DSRC). This solution mainly considers the communication method of 802.11p or Zigbee as the communication medium. The specific network topology is, the figure 2 The roadside infrastructure in the center is fixed on the side of the road, 1-10 meters away from the roadside, and the communication distance is about 100 meters. In the sub-network of the Internet of Vehicles, when malicious data attackers invade, the schematic diagram of the sub-network of the Internet of Vehicles is as follows: image 3 shown.
[0022] 2. Representation of vehicle identity (ID) in the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 