SoEKS-based intelligent networked vehicle situation awareness method and system
A situational awareness, intelligent network technology, applied in the direction of services, transmission systems, vehicle components, etc. based on a specific environment, can solve the problems of not being able to deploy security risks, not conducting global situational correlation, and not establishing a safe and reliable automotive electronic system architecture.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0072] Such as figure 2 , image 3 As shown, car A collects vehicle network security-related data in real time through the on-board information system, and obtains SoEKS experience after experience. If compared with the experience database, if there is relevant experience, it will judge and predict the current security incidents that may occur. Then the experience is sent to the TSP, and then the TSP judges whether the experience is a threat to the safety of the car, and if so, the SoEKS experience is synchronized to the SoKES library of the B car information system of the same type of car.
[0073] In the embodiment of the present invention, SoEKS experience includes:
[0074] First, according to the collected data, it is organized into SoEKS (Set of Experience Knowledge Structure, SOEKS) experience; here is a brief introduction to SoEKS, SoEKS has four basic components-variables, functions, constraints and Rules, whose structure is similar to human genes, such as Figure 4 As sh...
Embodiment 2
[0082] The present invention will be further described in combination with the SoEKS-based intelligent networked vehicle internal and external network security situation detection method.
[0083] The intelligent networked vehicle contains a variety of networks, and the parts related to network security such as Figure 5 Shown.
[0084] There are nine types of network security-related components on the intelligent networked vehicle, which can be divided into three categories according to the purpose of the attacker. 1. Attacks on the CAN bus, which affect CAN bus data through various means, and control the ECU, such as It can be through the use of related bugs such as the on-board operating system, OBD, OTA, etc.; 2. Attacks against intelligent networked vehicle sensors, such as denial of service attacks against sensors; 3. Relay attacks against multi-function vehicle keys; such as Image 6 Shown.
[0085] The first type of attack perception can focus on detecting whether the messag...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


