Research on Network Security and Privacy Protection Technology of Autonomous Vehicle

Authors

  • Di Wang

DOI:

https://doi.org/10.62051/ijcsit.v4n1.36

Keywords:

Self-driving cars, Network security, Privacy protection, Data encryption, Intrusion detection, Policies and regulations

Abstract

With the rapid development of information technology and the increasing maturity of intelligent transportation systems, autonomous vehicles, as an important carrier of future travel, are gradually moving from concept to commercial application. However, the highly connected and intelligent nature of autonomous vehicles also makes them face unprecedented cybersecurity and privacy protection challenges. This paper deeply discusses the security threats and privacy disclosure risks of autonomous vehicles in network architecture, data transmission, data processing and other links, and systematically reviews the current technical means and research progress to address these challenges. This paper Outlines the data collection and transmission mechanism of autonomous vehicles, including the collection and processing of sensor data as well as the communication process between vehicles and the cloud, other vehicles and transportation infrastructure, and analyzes in detail the network security threats faced by autonomous vehicles, including remote control attacks, malware attacks, communication hijacking, etc. These threats can lead to serious consequences such as vehicle failure, data breach, or system crash. At the same time, the paper also points out the challenges faced by autonomous vehicles in terms of privacy protection, such as the risk of leakage of sensitive data such as personal location information and driving habits, as well as the risk of data abuse and sharing. In order to address the above challenges, this paper focuses on the technical research progress of cybersecurity and privacy protection of autonomous vehicles. In the aspect of network security, this paper discusses the key technical means such as data encryption, access control, intrusion detection and response system, and emphasizes the importance of security hardware and software in improving the overall security of the system. In terms of privacy protection, this paper proposes strategies such as anonymization and desensitization technology, privacy protection protocols and standards to protect users' privacy from invasion.

Downloads

Download data is not yet available.

References

[1] SONAL PANSE, Futurama–Unveiling the City of the Future at the 1939 New York World’s Fair, at https://www.ststworld.com/1939-new-york-worlds-fair/, NOV.21, 2018.

[2] Mercedes-Benz, What is the Mercedes-Benz CASE Initiative? at https://www.silverstarny.com/blog/what-is-the-mercedes-benz-case-initiative/, Jun.26, 2018.

[3] McKinsey Center for the Future of Mobility: "China May Become the World's Largest Autonomous Driving Market", source: https://www.mckinsey.com.cn/%e9%ba%a6%e8%82%af%e9%94%a1%e6%9c%aa%e6%9d%a5%e5%87%ba%e8%a1%8c%e7%a0%94%e7%a9% b6%e4%b8%ad%e5%bf%83%ef%bc%9a%e4%b8%ad%e5%9b%bd%e6%88%96%e5%b0%86%e6%88%90%e4%b8%ba%e5%85%a8%e7%90%83%e6%9c %80%e5%a4%a7/

[4] Keisuke Nonaka, Ryo Watanabe, Kohei Tsukamoto, Real-time transmission of free view image using 5g network, Journal of Image Information Media Society, Vol 74, 2020, p.180-186.

[5] Andy Greenberg, The Jeep Hackers Are Back to Prove Car Hacking Can Get Much Worse, at https://www.wired.com/2016/08/jeep-hackers-return-high-speed-steering-acceleration-hacks/, AUG.1, 2016.

[6] Wang Defu, "On the Legal Attribute and Governance Approach of Artificial Intelligence Algorithm", Journal of Wuhan University (Philosophy and Social Sciences Edition), No.5, 2021.

[7] Zhang Yunyan, "The Contradiction and Unity of Artificial Intelligence and Data Security", Shanghai Law Research, volume 7, volume 55, 2021.

[8] Zhang Yujie, "On the Administrative Law Regulation of Driverless Cars", Administrative Law Research, 2018 (1).

[9] Wu Wufei et al. "Review on the Network Security of Intelligent Connected Vehicles", Journal of Communications, No. 6, 2020.

[10] Li Shuo, "Research on the Legislation of Autonomous Vehicles", Administrative Law Studies, 2019 (2).

Downloads

Published

13-09-2024

Issue

Section

Articles

How to Cite

Wang, D. (2024). Research on Network Security and Privacy Protection Technology of Autonomous Vehicle. International Journal of Computer Science and Information Technology, 4(1), 296-302. https://doi.org/10.62051/ijcsit.v4n1.36