Hello,Welcome toAutonomous Driving and OEM Cyber Security Convergence Technology Conference 2021!

Telematics Technology Development and Security Testing

Release Date:2019-09-05

The car networking related industry has been highly valued by the state. In 2018, the National Development and Reform Commission released the "Intellectual Vehicle Innovation Development Strategy Consultation Draft": By 2020, smart cars will account for 50% of new cars, about 15 million vehicles, and 5G wireless roads for smart highways in big cities. Communication network coverage reaches 90%.

The Internet of Vehicles will redefine the DNA and brain of the car. In the future, the car with “Car Network DNA” will not only be efficient and environmentally friendly, but more importantly, it will be intelligent and safe. It can provide unprecedented traffic safety and even cause traffic accidents for car drivers. The probability of reduction is zero。


At the "The 4th China Automotive Network Information Security Summit 2019" hosted by GRCC, Mr. Li Jianhua, Dean of the School of Cyberspace Security of Shanghai Jiaotong University, explained the development and security testing of the Internet of Vehicles technology.

First, Dean Li introduced us to the development trend and security risks of the Internet of Vehicles technology. The development trend of vehicle networking technology: 1. Intelligent platform: The vehicle intelligent platform is based on advanced sensing and artificial intelligence technology to provide integrated intelligent services for vehicles. 2. Networking: V2X (Car and Internet of Things) is a new automotive technology development direction through the integration of Global Positioning System (GPS) navigation technology, vehicle-to-vehicle communication technology, wireless communication and remote sensing technology. Manual driving and automatic driving are compatible. 3. Computation and networking collaboration: Computation and communication resources co-scheduling and optimization technology, innovative traditional network architecture, in line with the dynamic and high-information physical integration of the driving space of the car network networking needs. 4. Big data: build and utilize the big data platform of the Internet of Vehicles, with big data and content as the center, and produce fine-grained monitoring and full-process optimization for the production, application, driving, maintenance and value-added services of vehicles.

Hidden dangers in the Internet of Vehicles: The Internet of Vehicles uses a large number of foreign software and hardware devices, and there are hidden dangers such as loopholes and backdoors, which poses great risks. China still lacks a testing and guarantee system. Insecure information on the Internet of Vehicles will pose a huge threat to personal safety and social security, the most important of which is national security.


Then, Dean Li explained to us the new features of the security vulnerability of the Internet of Vehicles: 1. From the "outside-in" attack to the "inside-out" information leakage. 2. From a single point of attack to a multi-point information leak. 3. For a car, the identity is changed from "invaded object" to "latent spy."

The specific performance is as follows: 1. Sensor security vulnerability: The commonly used sensors on intelligent networked vehicles mainly involve laser radar, millimeter wave radar, and vision system. In the smart car sensor, the mainstream sensor is basically from the foreign millimeter wave radar MMIC chip, which has laid a big hidden danger for information security. China's own brand sensor is in urgent need of development. 2, car chip security vulnerability: car chip technology is also mostly monopolized by European and American companies. If it reserves a "back door" on the chip, it will pose a great threat to China's intelligent network car information security. 3, gateway security vulnerability: hackers can attack the radar, camera and other environmental awareness nodes; through the breakthrough of intelligent decision-making central processor, to obtain control of the vehicle; through cloud computing, cloud decision-making, V2X, OTA upgrade and other key The node attacks; it attacks through attacks such as Ethernet, 4G, and WiFi. 4. Navigation system security vulnerability: At present, the car navigation system mainly adopts the US GPS navigation system. According to statistics, GPS has monopolized more than 95% of navigation terminals in China. If the intelligent network car navigation system uses GPS for a long time, it will become the enemy's "spy" in wartime. 5, cloud platform security vulnerability: At present, cloud platform data security issues are mainly faced with the challenges of data privacy, data integrity and data recoverability. There are many security vulnerabilities in the Internet of Vehicles. Security testing from sensors, chips, gateways, navigation systems and security chips is essential to ensure the security of the Internet of Vehicles.



Finally, Dean Li explained to us how to build a self-controllable vehicle network safety test, breaking foreign technical barriers from standards, testing, and leakage prevention, and forming a continuous and benign upstream and downstream industry. It also shows the vehicle security monitoring system construction and security testing integrated service platform.

  • 电话咨询
  • 15021948198
  • +862122306692