Mo Wang, Yi Zheng, Chongze Lin, Yan Cui, Yuxin Wu, Shuping Wang
{"title":"车联网隐私保护技术","authors":"Mo Wang, Yi Zheng, Chongze Lin, Yan Cui, Yuxin Wu, Shuping Wang","doi":"10.1109/cscloud-edgecom58631.2023.00075","DOIUrl":null,"url":null,"abstract":"In the context of increasingly improved transportation infrastructure and increasing difficulty in vehicle management, vehicle networking technology has emerged in the public eye. Through rapid development in recent years, the Internet of Vehicles has formed a relatively stable system structure. Subsequently, the risk of attacks on the Internet of Vehicles continues to increase, and the weak password authentication and weak encryption of traditional Internet of Vehicles are no longer able to meet the current privacy protection requirements in the field of Internet of Vehicles. In order to solve the problem of information security in the Internet of Vehicles, privacy protection technology for the Internet of Vehicles was studied in the article. Firstly, the existing security risks of the Internet of Vehicles were introduced, followed by a specific analysis of privacy protection technologies such as Identity-Based Cryptograph, key management technology, and multi-dimensional authentication technology. Then, based on the development trend of existing technologies, the future development direction was predicted, and finally, the current privacy protection technologies for the Internet of Vehicles were summarized.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"14 1","pages":"405-410"},"PeriodicalIF":3.7000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Privacy Protection Technology for Internet of Vehicles\",\"authors\":\"Mo Wang, Yi Zheng, Chongze Lin, Yan Cui, Yuxin Wu, Shuping Wang\",\"doi\":\"10.1109/cscloud-edgecom58631.2023.00075\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the context of increasingly improved transportation infrastructure and increasing difficulty in vehicle management, vehicle networking technology has emerged in the public eye. Through rapid development in recent years, the Internet of Vehicles has formed a relatively stable system structure. Subsequently, the risk of attacks on the Internet of Vehicles continues to increase, and the weak password authentication and weak encryption of traditional Internet of Vehicles are no longer able to meet the current privacy protection requirements in the field of Internet of Vehicles. In order to solve the problem of information security in the Internet of Vehicles, privacy protection technology for the Internet of Vehicles was studied in the article. Firstly, the existing security risks of the Internet of Vehicles were introduced, followed by a specific analysis of privacy protection technologies such as Identity-Based Cryptograph, key management technology, and multi-dimensional authentication technology. Then, based on the development trend of existing technologies, the future development direction was predicted, and finally, the current privacy protection technologies for the Internet of Vehicles were summarized.\",\"PeriodicalId\":56007,\"journal\":{\"name\":\"Journal of Cloud Computing-Advances Systems and Applications\",\"volume\":\"14 1\",\"pages\":\"405-410\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2023-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Cloud Computing-Advances Systems and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1109/cscloud-edgecom58631.2023.00075\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Cloud Computing-Advances Systems and Applications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1109/cscloud-edgecom58631.2023.00075","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Privacy Protection Technology for Internet of Vehicles
In the context of increasingly improved transportation infrastructure and increasing difficulty in vehicle management, vehicle networking technology has emerged in the public eye. Through rapid development in recent years, the Internet of Vehicles has formed a relatively stable system structure. Subsequently, the risk of attacks on the Internet of Vehicles continues to increase, and the weak password authentication and weak encryption of traditional Internet of Vehicles are no longer able to meet the current privacy protection requirements in the field of Internet of Vehicles. In order to solve the problem of information security in the Internet of Vehicles, privacy protection technology for the Internet of Vehicles was studied in the article. Firstly, the existing security risks of the Internet of Vehicles were introduced, followed by a specific analysis of privacy protection technologies such as Identity-Based Cryptograph, key management technology, and multi-dimensional authentication technology. Then, based on the development trend of existing technologies, the future development direction was predicted, and finally, the current privacy protection technologies for the Internet of Vehicles were summarized.
期刊介绍:
The Journal of Cloud Computing: Advances, Systems and Applications (JoCCASA) will publish research articles on all aspects of Cloud Computing. Principally, articles will address topics that are core to Cloud Computing, focusing on the Cloud applications, the Cloud systems, and the advances that will lead to the Clouds of the future. Comprehensive review and survey articles that offer up new insights, and lay the foundations for further exploratory and experimental work, are also relevant.