Thinking about the application of commercial cryptography in intelligent connected vehicles

Authors

  • Yuning Li
  • Kaitian Li
  • Xuebin Shao

DOI:

https://doi.org/10.62051/IJGEM.v2n3.28

Keywords:

Network-connected vehicle, Commercial cryptography, Information security, Identity authentication, Data encryption, Secure communication, Technology research and development, Standardization, Industry cooperation

Abstract

As an important part of intelligent transportation, the information security of connected vehicles has become increasingly prominent. As a key technology to ensure the information security of networked vehicles, commercial cryptography plays an important role in vehicle identity authentication, data encryption and secure communication. In this paper, the status quo, challenges and future development trend of commercial cryptography application in connected vehicles are discussed, and some suggestions are put forward to strengthen technology research and development, standardization and industry cooperation. By continuously optimizing the application strategy of commercial cryptography, the information security level of connected vehicles can be effectively improved, providing strong support for the security development of the industry.

Downloads

Download data is not yet available.

References

ZHANG Manjun, Lu Xie, YAO Ge, et al. Research on the application of 5G network business security [J]. Post and Telecommunications Design Technology, 2023, (08):75-80.

Qin Weiqiang, Ji Ruiqi, Ma Yujun, et al. Feasibility Analysis and Engineering Modeling of Simultaneous Promotion of Business Security Evaluation and isoassurance evaluation [J]. Wireless Internet Technology, 2023, 20(14):150-153. (in Chinese)

Lai Jun, Gu Peng, Xing Xianghong, et al. Design of information Security PLC Control System based on business secret [J]. Communications Technology, 2023, 56(07):901-908.

Huang Wenyin, Gao Xiujing, You Shuanghe, et al. A commercial cipher algorithm of commercial vehicle CAN secure communication scheme [J]. Journal of southern fujian normal university (natural science edition), 2023, 4 (01): 41-49. DOI: 10.16007 / j.carol carroll nki issn2095-7122.2023.01.016.

Sun Shugang, Zuo Linlin, Yang Pengfei, et al. C bank a new generation of OA system and network security system research [J]. Journal of network security and data management, 2022, 9 (12): 3-9. DOI: 10.19358 / j.i SSN. 2097-1788.2022.06.001.

Zhu Liufu, Li Jiguo, Lai Jianchang, et al. Attribute based Online/Offline Signature Scheme based on Shang Mi SM9 [J]. Journal of Computer Research and Development, 2023, 60(02):362-370. (in Chinese)

Quan Bin, Wei Wei, Guo Lili. Commercial password techniques in the industry of the national key dealer net [J]. The application of digital technology and applications, 2022, 40 (02): 232-236. The DOI: 10.19695 / j.carol carroll nki cn12-1369.2022.02.75.

Lai Jianchang, Huang Xinyi, He Debiao, et al. Based on commercial cipher SM9 efficient identification sign close [J]. Journal of password, 2021, 8 (02): 314-329. The DOI: 10.13868 / j.carol carroll nki JCR. 000440.

Downloads

Published

25-04-2024

Issue

Section

Arcicles

How to Cite

Li, Y., Li, K., & Shao, X. (2024). Thinking about the application of commercial cryptography in intelligent connected vehicles. International Journal of Global Economics and Management, 2(3), 238-246. https://doi.org/10.62051/IJGEM.v2n3.28