Method and device for attacking V2X equipment based on Internet of Vehicles, and storage medium

A V2X and Internet of Vehicles technology, which is applied in the direction of services based on specific environments, communication between vehicles and infrastructure, and vehicle components, to achieve the effects of high attack concealment, large vehicle security threats, and a wide range of applicable scenarios

Pending Publication Date: 2022-04-19
BEIJING REALAI TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the main target of attack methods for autonomous vehicles is environmental information acquired by sensors, such as image signals, 3D point clouds, etc., and such attack methods require specific attack conditions; rarely reported

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for attacking V2X equipment based on Internet of Vehicles, and storage medium
  • Method and device for attacking V2X equipment based on Internet of Vehicles, and storage medium
  • Method and device for attacking V2X equipment based on Internet of Vehicles, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solution and advantages of the application clearer, the technical solution of the application will be clearly and completely described below in conjunction with specific embodiments of the application and corresponding drawings. Apparently, the described embodiments are only a part of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0027] The technical solutions provided by various embodiments of the present application will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0028] In order to further explain t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to the technical field of automatic driving, and provides a method and device for attacking V2X equipment based on the Internet of Vehicles and a storage medium, the method is applied to target V2X equipment in a V2X communication system, and the target V2X equipment is located on a target vehicle. The method comprises the following steps: acquiring an original V2X message; updating the original V2X message, and generating a confrontation signal; taking the adversarial signal as a target pseudo V2X message; and displaying the target pseudo V2X message, wherein the target pseudo V2X message is used for replacing the original V2X message. The method does not need to generate the confrontation sample in a display mode, is wide in application scene, expands the attack objects of an existing attack method in the automatic driving field, is higher in attack concealment, and is larger in threat to vehicle safety.

Description

technical field [0001] The embodiment of the present application relates to the technical field of automatic driving, and specifically relates to a method, device and storage medium for attacking a V2X device based on the Internet of Vehicles. Background technique [0002] At present, self-driving vehicles interact with the surrounding environment mainly through two ways: multi-sensor fusion technology, sensors such as cameras, radars, and lidars, and vehicle networking technologies, such as V2X. The safety of autonomous driving depends on the accuracy of the acquired surrounding environment information, so it is necessary to study the attack methods of autonomous driving vehicles, which can prevent possible security vulnerabilities in the automatic driving system. [0003] At present, the main target of attack methods for autonomous vehicles is environmental information acquired by sensors, such as image signals, 3D point clouds, etc., and such attack methods require specif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): B60W60/00H04W4/44H04W4/46
CPCB60W60/00188B60W60/0015H04W4/44H04W4/46
Inventor 不公告发明人
Owner BEIJING REALAI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products