为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 区块链知识> 正文

车联网安全问题区块链解决方案,车联网安全问题区块链解决办法

发布时间:2023-12-06-09:34:00 来源:网络 区块链知识 区块   安全问题

车联网安全问题区块链解决方案,车联网安全问题区块链解决办法


请查看相关英文文档

❶ What security problems may be encountered in the Internet of Vehicles and how to avoid them

1. Implementation of the Internet of Vehicles.

In fact, the Internet of Things is a "cloud + end + operation" service. Through the integration and interaction of front and back ends, the most efficient operation and value can be obtained with the help of data. Such effects often exceed those in the traditional sense. The "end" is the value of the sensor itself. So we say that the core of the Internet of Things is actually operational services.

So what kind of development trend will there be when the automobile transportation industry is combined with the Internet of Things with operational services? This time, Ruige will use DAS, a well-known American car shipping company, to introduce it to everyone.

DAS is a company mainly engaged in car shipping in the United States. In the United States, it is very common to move back and forth between two places, whether for work or life needs. Therefore, with the help of such market demand, the car shipping business in the United States is very developed, and many excellent car shipping companies have been cultivated. Companies, such as: Bluesky, Auto-shipper, DAS, etc. The DAS introduced in this article is the largest car shipping company in the United States.

In 2012, DAS announced its cooperation with Peoplenet Online, a professional logistics intelligence company: the latter provided the former with a complete set of hardware and software systems, thereby upgrading its entire operating platform. Subsequently, Peoplenet Online installed a vehicle-mounted computer called Blue3.0 they developed in each transportation vehicle. This vehicle-mounted computer integrates a Sensor engine and can transmit data such as location, speed, mileage, status, etc. through the station. The field's WIFI or 3G/4G module is passed to Peoplenet Online's data center and displayed through its Fleet Manager management backend.

2. Interpret the service model.

Now Rui Ge will try to use this service model to analyze the cloud computing classification for everyone. For the specific three-level classification of cloud computing, you can check the article on November 27. Peoplenet Online is just a SaaS (software service) cloud computing service company, which itself is built on 2lemetry’s enterprise-level IoT cloud platform Thing Fabric (for information about the Thing Fabric platform, please see the article on November 29), therefore, 2lemetry is a pure PaaS (Platform as a Service) cloud computing company. And because 2lemetry uses AWS's EC2 architecture server, and since this server is provided by Amazon, Amazon is a real IaaS (infrastructure services) company.

Through such practical examples, I believe everyone will understand more clearly how detailed the cloud computing architecture is in the division of labor in the actual industry. But in the current Internet of Things industry in China, many companies hope toIt is actually very dangerous to hold all the data in your own hands and invest huge amounts of money to build SaaS, PaaS, and even IaaS architectures.

Rui Ge believes that the trend of economic development must be detailed division of labor and mastery of integration. The current operational thinking of many companies is actually a lack of macro understanding, which leads to some blind investments. As long as the carrying capacity reaches a certain value in the future, they will soon encounter a series of problems such as capacity expansion, security, privacy, and power consumption. . So Rui Ge would like to use this example to give you some third-party suggestions. We always say that cloud computing is very important, but when it comes to execution, detailed tactics are particularly important.

3. The powerful driving force of the Internet of Vehicles.

Peoplenet Online uses hardware and software to help DAS operate the entire logistics management process. This long-term and stable service has achieved these results:

① Through the embedded on-board computer, DAS can Record the status information of the entire vehicle. Although the on-board computer has built-in 3G and 4G networks, because almost all current logistics stations are covered with enterprise-level WIFI, communication within the station basically relies on WIFI. This is also the reason why logistics handheld phones are equipped with WIFI as standard. . Similarly, Peoplenet Online's hardware products can also be customized based on this requirement to make the product more consistent with the requirements;

Peoplenet Online will upload these data to the data center. And the data is displayed visually through fleet Manager. Please note that this software platform will involve employee information of customers (customers here refer to DAS), including dispatchers, maintenance personnel, IT personnel, etc.

② Reduce large expenses including gasoline, operating expenses, etc. No matter what industry, its real development still requires finding ways to create economic benefits and promote industry development by generating revenue or saving expenses. The same is true for the Internet of Things. Ruige believes that in fact, Chinese logistics service companies can create a business model to popularize such products. For example, Peoplenet Online can formulate such a plan with DAS: DAS does not need to pay service fees to Peoplenet Online. According to DAS’s annual quota of US$10 million For gas costs, DAS only needs to pay 70% of the gas costs to Peoplenet Online and agree to use Peoplenet Online's services and products. Then the entire gas costs of DAS will be borne by Peoplenet Online. With such promotion, Ruige believes that this market will soon expand. Internet of Things technology can be popularized.

Maintenance personnel can pay attention to the real-time status of the vehicle through the software interface and make the fastest back-end maintenance preparations; enterprise managers can understand the operating status of the entire team's efficiency and the overall efficiency of the entire team through a dedicated page.The process optimization of the company's operations is displayed with quantitative data.

4. The powerful advantages of IoT services.

In addition to the above highlights, Peoplenet Online also provides logistics companies like DAS with the most optimized process service business, including scheduling processes, refueling processes, etc., and has brought good results to DAS through the above services. Benefits and cost savings, such as:

① Improved user satisfaction.

Compared with competitors, DAS can allocate vehicles as quickly as possible while obtaining user needs, and respond quickly. At the same time, full-process monitoring also avoids the delay in the arrival of customer goods due to unexpected situations while the vehicle is driving;

② The company's products and services are manageable and controllable.

Peopletnet Online connects data through hardware, so that the data can be saved in the cloud. With the help of Driver Log's business, the software platform can fully refine the work content and use data to guide and optimize the process. , be well-founded;

③Accelerate the advancement of enterprises in cloud computing, whether it is security, privacy or expansion.

Due to the involvement of professional PaaS companies, Peopletnet Online can be expanded according to customer needs without affecting the infrastructure. It is very flexible to use. Even if cloud services are embedded, there is no need to be billed if you do not use it, achieving the most efficient cloud deployment.

Rui Ge believes that the development of professional IoT cloud platforms actually follows a similar trajectory to the development of enterprise ERP. Now a small business may also consider using professional division software to manage business instead of using traditional Office software. For example, you will use Guanyitong to manage purchase, sale and inventory, and you will also use Kingdee to manage finances. ; Foreign companies will use Salesforce for CRM management and SAP for internal sales forecasting, price and production management. As for cloud services, Ruige believes that 2lemetry’s Thing Fabric platform will be used as software for remote device management in the future. Ruige believes that a professional cloud service platform can definitely make a real contribution to the advancement of the Internet of Things in the industry.

❷ What role can the now popular blockchain technology play in the automotive industry?

Blockchain technology plays an important role in the development of the automotive industry Functions, such as: forming an ecological alliance in the automotive industry supply chain, application in the second-hand car market, application in automotive safety, etc.

1. Automotive industry supply chain financial alliance ecology based on blockchain technology

The integrated supply chain information platform based on blockchain technology connects enterprises in the automotive supply network with alliance chains In the form of interconnection through the sdpos consensus mechanism, a multi-center efficient supply system chain information system and auto parts sources are established, production processes, sales channel tracking, maintenance records and other important information are recorded in this chain. The information generated in the automobile manufacturing process will automatically trigger the corresponding smart contract, realize the automatic recording of the transaction information of upstream and downstream enterprises in the power supply chain, and automatically transfer the payment, and ultimately form a system with the automobile product information flow as the main body, the business flow and the logistics flow as the flow and The information structure supported by capital flow enables efficient and accurate storage and traceability of product information.

❸ How to solve the problem of blockchain usage security

It needs to be mentioned here that the basic system structure of blockchain is as follows
① Network routing ② Crypto algorithm ③ Script system ③ Consensus mechanism
As for blockchain security issues, the script system is mainly completed by the script system. In blockchain technology, it is a relatively abstract concept. It is also an extremely important function. In the blockchain, the reason why a valuable network can be formed relies on the script system, which is driven like an engine. The blockchain continuously sends and receives data. The so-called script refers to a set of The rules then confirm the procedures of certain systems in the system. The rules are fixed. For example, in the Bitcoin system, only Bitcoin can be sent and received. Sending and receiving are done through Bitcoin scripts. The system allows users to edit their own programs. Once the program rules are completed, they can be deployed into the blockchain ledger, so that the functions of the entire blockchain system can be expanded. For example, Ethereum realizes the functions of smart contracts through this set of customized script systems. , then specific scenario applications or real life cases such as order logistics information supply chain information.

❹ What is blockchain and its application in the automotive field

1. The decentralization, transparency and trust of blockchain technology are to solve the current problems in the automotive industry Problems such as leakage of user privacy, poor dispersion of maintenance services, and irregularities have brought opportunities. The key to the application of blockchain in the automotive field lies in the construction and integration of car identity and user credit systems to create car logos, completely record key information during the manufacturing and use of cars, promote the standardization of the traditional automotive industry chain, and establish a reliable system for car companies. The service platform quality control system and optimized inventory dynamic management provide users with better repair, maintenance and second-hand car trading services. Combining car identity and personal credit, it is connected to the blockchain system and can transform the original car sharing business process. In the future, blockchain, as the underlying technology, will be combined with edge technologies such as the Internet of Things and big data to achieve safe interconnection of different smart devices, continuously improve the processing capabilities of blockchain technology, and accelerate its development in the fields of autonomous driving and intelligence. application.

3. Blockchain system information transparency, tamper-proof, and forgery can effectively solve this problem, which will have an impact on the financial Internet of Things, supply chain, government services and other fields. deep influence. Due to its transparent, reliable and traceable characteristics, blockchain technology can build a car identity and completely record the source and production of car parts.Production process flow, sales channels, use and maintenance, vehicle positioning and other data are promoted into the standard of "research, production, supply and marketing after market" of the traditional automobile industry chain. At the same time, a tamper-proof and securely encrypted user credit system can be built through the blockchain to record, store, and integrate user online transaction information and credit evaluations such as asset information, user information, and user behavior. Because the application of car retail, leasing, sharing and other scenarios is essentially an extension of the personal credit system, the blockchain system will eventually bring information such as identity, user credit and service history to owners through the blockchain system, which will be associated with car identities to improve the security of interconnection. to realize the application of blockchain autonomous driving in fields such as Internet of Vehicles and vehicle sharing.

❺ Jiang Bing, Chairman of State Grid Electric Vehicle Company: Blockchain technology promotes mobile energy Internet

On January 11-13, the China Electric Vehicles 100 Forum (2019) was held at Held at Diaoyutai State Guesthouse in Beijing, Jiang Bing, Chairman of State Grid Electric Vehicle Service Co., Ltd., delivered a keynote speech. The content of the speech is as follows:

Dear host, distinguished guests, I am Jiang Bing, Chairman of State Grid Electric Vehicle Service Co., Ltd. ice.

State Grid Electric Vehicle Company is the specialized electric vehicle segment of State Grid Corporation of China. It currently operates the world's largest charging network and owns the world's largest Internet of Vehicles platform. The theme of this 100-person meeting is "Transportation, Energy and Cities". I would like to talk about our experience of the next development trend of electric vehicles and energy based on our work.

First, the era of electrification of transportation.

We believe that the development of electric vehicles has entered a new development period and has launched the comprehensive electrification of transportation. We can all see that the development of electric vehicles increasingly reflects its energy attributes. It is not just a means of transportation, which was fully explained in Chairman Chen Qingtai’s speech yesterday. Let me share some insights based on our work.

This is an analysis of the strategic direction of transportation electrification from an energy perspective. The above picture is the entire life cycle flow chart of our electric vehicles, which was made by Tsinghua University. We can see that in the entire energy life cycle process, about 30% of the entire energy becomes power, and finally it is utilized. This is the entire synergy effect. In terms of power generation, we are talking about coal. The picture below shows the current efficiency of high-performance automobile fuel engines, from oil to gasoline to power. According to the most advanced technology, it is only 15%, so its system efficiency is only half that of electrification. Therefore, from the perspective of energy revolution, the electrification of transportation is a historical necessity. When we compare electric vehicles and gasoline vehicles, we cannot compare them purely from an economic point of view, because these are different things. From the perspective of energy efficiency, it is a revolution and a change. Therefore, we believe that the electrification of transportation is a common development trend of the transportation revolution and the energy revolution.

GoThere was a historic moment last year. In November last year, the production and sales of new energy vehicles in China exceeded 1 million. At the same time, for the first time in history, the consumption of fuel vehicles stopped growing, falling by 13% in November. Everyone knows this number. November 2018 is a historic moment, a moment when the growth of fuel vehicles stopped, and a turning point in the century-old history of human automobile development. Don’t underestimate November 2018. This is a historic moment.

These are trucks, more than 800 of them, burning diesel. Once the trucks are on the road, the blow to fuel-powered vehicles will be devastating. Why do you say that? Mr. Yang Lei is in the oil business. In our current refining industry, diesel and gasoline have a fixed ratio. Diesel is the power for ships and trucks. If no one uses diesel, gasoline cannot be produced. This has nothing to do with price. , so the truck is of great significance.

A new trend in transportation electrification is port shore power. Now inland rivers and along the Yangtze River, ports have been gradually converting to shore power. This is the shore power of the Yangtze River Three Gorges ship lock built by the State Grid Corporation in November last year. , has been put into trial operation. This is the largest shore power project in the world.

This is a cargo ship launched by the Guangzhou Shipping Bureau. This is a passenger ship manufactured in Taizhou, Jiangsu. It will be delivered in February this year. It is the first time that electric power has appeared as a passenger ship on the Yangtze River. The whole thing has 2200 kilowatt-hours of electricity and can last 120 kilometers on a single charge. After its passenger and freight transportation becomes electric for small tonnage, its technology will rapidly develop to large tonnage, and will further develop to coastal freighters and offshore freighters. As long as the next port can be found within 200 kilometers, it can be electrified. The freighter burns heavy oil, and the refining is gasoline, diesel and heavy oil. If no one uses diesel and heavy oil, it will be a devastating blow to the refining industry. Our fuel vehicles and gasoline vehicles will have no fuel to refill, which in turn will further accelerate the development trend of transportation electrification. We believe that this trend has already begun.

I just talked about cars and boats, and airplanes. There are currently more than 20 well-known companies developing electric aircraft around the world. There are electric aircraft in Europe and America. The simplest electric aircraft is our drone. Nowadays, drones are basically electric. Regarding the development trend of electric aircraft, we believe that commercial operation can be achieved by 2030. This is an electric aircraft designed by Boeing. In 2030, Boeing will launch a commercial electric aircraft line. This is an American electric aircraft company that Geely just acquired.

Tesla President Elon Musk once said: "Except rockets, all transportation can be electrified." We think Elon Musk was wrong when he said rockets could be electric too. NASA has a special laboratory to study plasma rocket propulsion. This has already entered the experiment and will be used for interstellar flight in the future.The power is plasma propulsion and electric. Therefore, we conclude that as long as it is transportation, it can be electrified. Therefore, we created an English word that is not in the dictionary. We made it ourselves, called Electriclize Everything. The electric era is coming. We have now built a new application on the Internet of Vehicles platform called Internet of Boats. The platform for Internet of Vehicles has been established. Next, after the power ship is launched, we can add another variety, not only for car charging, but also for It’s the recharging of the boat. So our first big judgment is that the era of electric everything has arrived.

Second, mobile energy Internet.

We believe that the mobile energy Internet composed of electric vehicles, distributed energy, energy storage and smart grids is about to emerge. We know that mobile phones have promoted the development of mobile Internet, and this is how the concept of mobile energy Internet came about. Yesterday, Chairman Chen Qingtai predicted that by 2030, the sales of electric vehicles will exceed 1.5 million and the number of electric vehicles will exceed 80 million. . We believe that this data is the lower limit of the forecast. We believe that we have sufficient confidence to predict that the number of electric vehicles in China will exceed 100 million in 2030. The power of these 100 million electric vehicles exceeds 1 billion kilowatts, which is equivalent to all current power stations and coal-fired power stations in China, equivalent to 50 Three Gorges. In 2040, the number of electric vehicles may exceed 200 million, equivalent to 100 Three Gorges power stations. This is not the most important thing. The most important thing is that these 100 Three Gorges power stations are moving and changing every moment.

How to deal with a huge mobile power supply? After adding intelligent factors, we believe that the development prototype of the mobile energy Internet has begun to emerge. In this mobile energy Internet, every electric vehicle should be a mobile power generation terminal. Now V2G technology has no technical obstacles. It has been fully realized in our laboratories and demonstration stations. Now V2G only needs is the government’s electricity price policy. What’s the next step to get online? Dispatch interaction with the grid? Our second concept is the concept of mobile energy Internet, which is already ready to come out. Next, a question will be raised. If every electric vehicle can be charged and discharged, then every electric vehicle will become an energy user and producer, and become a power source. The direct problem it brings is that if a thousand electric vehicles interact with the power grid, then our current power grid dispatching will have no problem and can be dealt with. If 10,000 units interact with the power grid at the same time, the current dispatch will basically stop functioning.

Let’s say that by 2030, if there are 10,000 or 100 million electric vehicles, it is possible to interact with the power grid anytime and anywhere, and they can charge and discharge, then what should we do? How can we support this system? To deal with this problem, we have already taken action.

The third blockchain technology promotes the mobile energy Internet.

We have introduced blockchain technology into the current Internet of Vehicles. Blockchain technology is applied to mobile power supplies. This is the most powerful implementation of blockchain technology in the industrial field. With these 100 million electric vehicles, it is impossible for you to wait until 11pm every Double Eleven to start selecting products, entering passwords, ordering quantity, and making payments. This is impossible. So what to do? It must be intelligent. In the future, the interaction between the power grid and the tram, this dispatch must be a smart brain, a super brain. It will definitely adopt new technology, and we are blockchain technology. Blockchain technology actually maps these power grids and electric vehicles in the physical world to the virtual world with fidelity. We people in the physical world cannot handle 100 million devices interacting at the same time. We map them to the virtual world with fidelity. Smart technology can do it.

To this end, State Grid Electric Vehicle Company has established China’s first energy blockchain laboratory. Our 1.0 products have been successfully researched and blockchain edge computing equipment has been installed in interactive charging On the pile. This is our equipment. On the left is an interactive charging pile. The small box on the top is the "mung bean" edge computing terminal. It is not modular yet. If it is modularized, it will be made into a module as big as a fingernail. It is only in the experimental stage now. , which is still relatively large.

We generated the world’s first energy blockchain hash value on May 31, 2018. We have made this hash value into a commemorative medal, and it is the world’s first generated energy area. Regarding the hash value of the blockchain, we have registered the "Mung Bean" trademark. This is our blockchain experimental platform and is now running. It is also the world's first practical energy blockchain platform. This is the Hash value generated every moment on the blockchain platform, producing the mapping of our blockchain. This is the mobile version of our blockchain platform. We have implemented the transfer and transaction of generated "green beans" through the mobile version. The first stage is to install the stake and install the blockchain on the pile; the second stage is to install the energy storage and battery; the third stage is to install the car and the power system of the car. If we complete these three steps, we will no longer need to scan codes when charging our cars in the future, and we will no longer need to take out our mobile phones to pay. We will achieve initial non-intrusive, intelligent, and safe charging and payment. At present, we have already entered the the second stage.

What I will report to you today includes the electrification of transportation. Our State Grid Electric Technology Innovation Center has just been established, called the Transportation Electrification Innovation Center. Our concept covers not only cars, but also boats. Planes, and aircraft. As I said just now, there are still rockets in the long term. This is for the application of energy blockchain in the field of electric vehicles. The short-term goal has reached 1.0, energy storage is 2.0, and driving is 3.0. In the next step, based on the overall intelligent development of the power grid, blockchain technology will be used as the core supporting technology of the future mobile energy Internet..

Due to time constraints, I will simply report here. Please forgive me for any inappropriateness. Thank you!

Please pay attention to Gasgoo’s “2019 Electric Vehicles 100 People Meeting” special record

Note: This article is compiled based on speeches. Please do not reprint without expert review.

On February 20-21, 2019, the 2nd Global Autonomous Driving Forum hosted by Gasgoo will be held in Wuhan China Optics Valley. The forum will invite 500+ industry guests, bringing together core technology executives in the field of autonomous driving, senior practitioners in the automotive industry and other contacts. Buy now: https://m.gasgoo.com/topic/sns/zdjs2019/

❻ How does blockchain ensure the security of data in the network

How does blockchain ensure the security of data in the network:
In blockchain technology, digital encryption technology is one of the The key point is that the asymmetric encryption algorithm is generally used, that is, the password for encryption and the password for unlocking are different. To put it simply, we have an exclusive private key. As long as we protect our private key and give the public key to the other party, the other party will use the public key to encrypt the file to generate ciphertext, and then pass the ciphertext to you, and we will use the private key. Decrypting the plain text can ensure that the transmission content is not seen by others. In this way, the encrypted data transmission is completed!
At the same time, there is also a digital signature that adds an extra layer of protection for us to prove that the document has not been tampered with during the process of sending it to the other party. It can be seen that the encryption technology of blockchain can effectively solve the security problems in the process of data circulation and sharing, which can be said to have great potential. Chaoshe

❼ How to solve blockchain security issues

One of the characteristics of blockchain projects (especially public chains) is open source. Open source code improves the credibility of the project and allows more people to participate. But the openness of source code also makes it easier for attackers to attack the blockchain system. There have been many hacker attacks in the past two years. Recently, the anonymous currency Verge (XVG) has been attacked again. The attacker has locked a vulnerability in the XVG code, which allows malicious miners to add false times to blocks. After stamping, new blocks were quickly mined, and nearly US$1.75 million worth of digital currency was obtained in just a few hours. Although the attack was successfully stopped, no one can guarantee whether the attacker will attack again in the future.
Of course, blockchain developers can also take some measures
The first is to use professional code audit services,
The second is to understand safe coding standards and nip problems in the bud.
Security of cryptographic algorithms
The development of quantum computers will bring major security threats to the cryptographic systems currently used. Blockchain mainly relies on elliptic curve public key encryption algorithm to generate digital signatures to secure transactions. CurrentlyThe most commonly used ECDSA, RSA, DSA, etc. cannot withstand quantum attacks in theory, and there will be greater risks. More and more researchers are paying attention to cryptographic algorithms that can resist quantum attacks.
Of course, in addition to changing the algorithm, there is another way to improve security:
Refer to Bitcoin's handling of public key addresses to reduce the potential risks caused by public key leaks. As a user, especially a Bitcoin user, the balance after each transaction is stored in a new address to ensure that the public key of the address where Bitcoin funds are stored is not leaked.
Security of consensus mechanism
The current consensus mechanisms include Proof of Work (PoW), Proof of Stake (PoS), and Delegated Proof of Stake (DPoS). , Practical Byzantine Fault Tolerance (PBFT), etc.
PoW faces 51% attack problem. Since PoW relies on computing power, when an attacker has a computing power advantage, the probability of finding a new block will be greater than that of other nodes. At this time, it has the ability to undo transactions that have already occurred. It should be noted that even in this case, the attacker can only modify his own transactions and not the transactions of other users (the attacker does not have the private keys of other users).
In PoS, an attacker can only successfully attack when he holds more than 51% of the token amount, which is more difficult than 51% of the computing power in PoW.
In PBFT, the system is safe when the malicious nodes are less than 1/3 of the total nodes. In general, any consensus mechanism has its conditions for establishment. As an attacker, you also need to consider that once the attack is successful, the value of the system will be reduced to zero. At this time, the attacker has nothing to do except destroy it. Get other valuable rewards.
For designers of blockchain projects, they should understand the advantages and disadvantages of each consensus mechanism, so as to choose an appropriate consensus mechanism or design a new consensus mechanism according to the needs of the scenario.
Security of smart contracts
Smart contracts have the advantages of low running costs and low risks of human intervention. However, if there are problems with the design of smart contracts, it may cause greater losses. In June 2016, The DAO, Ethereum's most crowdfunded project, was attacked. Hackers obtained more than 3.5 million Ethereum coins, which later caused Ethereum to fork into ETH and ETC.
The measures proposed in this regard have two aspects:
The first is to conduct security audits of smart contracts,
The second is to follow the principles of safe development of smart contracts.
The safe development principles of smart contracts include: be prepared for possible errors, ensure that the code can correctly handle bugs and vulnerabilities; release smart contracts with cautionContracts, do functional testing and security testing, fully consider boundaries; keep smart contracts concise; pay attention to blockchain threat intelligence, and check for updates in a timely manner; be clear about the characteristics of the blockchain, such as cautiously calling external contracts, etc.
Security of digital wallets
Digital wallets mainly have three security risks: First, design flaws. At the end of 2014, a serious random number problem (duplication of R values) caused users to lose hundreds of digital assets in a certain lottery. Second, digital wallets contain malicious code. Third, lost assets caused by loss or damage of computers and mobile phones.
There are four main countermeasures:
The first is to ensure the randomness of the private key;
The second is to verify the hash value before installing the software to ensure that the digital wallet software has not been tampered with ;
The third is to use a cold wallet;
The fourth is to back up the private key.

❽ What are the emerging attack methods on intelligent connected cars and their characteristics?

1. Remote control hijacking attack based on vehicle communication module information leakage

Security Researchers found that most domestic self-owned brand cars use dedicated APNs to connect to the TSP backend server related to vehicle control through the T-box in the in-car communication module. Pulling out a dedicated line through the ISP can protect the security of the back-end server to a certain extent, but it will also bring more security risks to the back-end server. Due to the existence of private network apn, Tsp will not be exposed to the public network, causing Tsp security personnel to ignore the security issues of the private network and Tsp itself. There is no strict security access control inside the private network, and T-box is too trustworthy, allowing T-box to access the internal assets of the private network at will. At the same time, many unnecessary infrastructure services are also exposed in the APN private network, which will lead to more security risks.

2. Autonomous driving algorithm attack based on generative adversarial network

This attack is due to the lack of special training data, such as countermeasure samples, during the training process of the deep learning model. Therefore, a common defense method is to enhance the robustness of the neural network itself, put adversarial samples into the training data, retrain the network, and label unidentified samples during use, and use these data to continuously train the network, To continuously improve the recognition accuracy of input data. However, no matter how many adversarial samples are added during the training process, there are still new adversarial attack samples that can fool the network again.

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 37258 文章总数
  • 3637265访问次数
  • 3078建站天数