Unlock instant, AI-driven research and patent intelligence for your innovation.

A protection method for preventing data injection attacks in the data collection of the Internet of Vehicles

A technology of data injection and data collection, applied in the field of Internet of Vehicles information security, to prevent data injection attacks, ensure validity, and simplify data legality analysis

Active Publication Date: 2015-10-28
DALIAN UNIV OF TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method requires the cooperation of multiple users, and it does not provide an effective solution to the legality analysis of traffic flow data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A protection method for preventing data injection attacks in the data collection of the Internet of Vehicles
  • A protection method for preventing data injection attacks in the data collection of the Internet of Vehicles
  • A protection method for preventing data injection attacks in the data collection of the Internet of Vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The specific embodiments of the present invention will be described in detail below in conjunction with the technical solutions and accompanying drawings.

[0020] 1. The internal communication method and network topology of the Internet of Vehicles

[0021] Such as figure 2 As shown, the communication between the vehicle and the roadside can be mainly based on the short-distance communication technology (DSRC). This solution mainly considers the communication method of 802.11p or Zigbee as the communication medium. The specific network topology is, the figure 2 The roadside infrastructure in the center is fixed on the side of the road, 1-10 meters away from the roadside, and the communication distance is about 100 meters. In the sub-network of the Internet of Vehicles, when malicious data attackers invade, the schematic diagram of the sub-network of the Internet of Vehicles is as follows: image 3 shown.

[0022] 2. Representation of vehicle identity (ID) in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a protection method for preventing a data input attack aiming at car networking data collection, and belongs to the technical field of car networking information security. The protection method is characterized in that firstly a two dimension traffic flow mold is built for vehicle running speed and traffic flow by utilizing a cusp mutation theory; secondly analysis, recognition and process of the vehicle running speed of vehicles received by roadside infrastructure and the traffic flow counted by the roadside infrastructure are carried out based on the mold; and finally when data are detected to be data produced in the input attack, the data are abandoned, and all data sent later by a belonged user are shielded. The protection method has the advantages that the data input attack is recognized by utilizing characteristics of traffic flow data, complex authentication is not needed, and therefore an effective safety method used for preventing the data input attack is provided for a great quantity of cofigurative users in the car networking.

Description

technical field [0001] The invention belongs to the technical field of information security of the Internet of Vehicles, and relates to a protection method for preventing data injection attacks in the process of collecting traffic flow data by using the Internet of Vehicles. Background technique [0002] The Internet of Vehicles is a data-centric network. Among them, the traffic flow data (speed, flow, etc.) obtained based on the Internet of Vehicles is the basis of many applications based on the Internet of Vehicles. For example, traffic signal control systems, vehicle anti-collision, traffic flow guidance, etc. are all based on the above traffic flow data. Therefore, the security of traffic flow data obtained based on the Internet of Vehicles is particularly important. Then, because the Internet of Vehicles network is open to users, however, this openness also provides the possibility for many network attacks. Among them, data injection attacks are particularly important...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 丁男谭国真
Owner DALIAN UNIV OF TECH