| The automobile industry is the pillar industry of the national economy.The rapid development of artificial intelligence,Internet of Things,5G technology,big data and IT industry has promoted the transformation of traditional automobiles to intelligent IOV.The wide application of these technologies in such various fields as automatic driving,navigation and intelligent transportation has realized the information sharing between automobile and automobile,automobile and cloud,automobile and intelligent transportation facility.The accelerated integration of IOV centered on the intelligent network-connected vehicles and the IT industry brings convenience to people,but also brings new security threats to the intelligent network-connected vehicles.The endless security problems bring a lot of uncertainties to the development prospect of IOV system.At the same time,the connotation of IOV security is changing.Therefore,it is urgent to establish IOV security protection system.Starting from the "Cloud-Pipe-Device" architecture of IOV,this thesis introduces the "Cloud-Pipe-Device" architecture of IOV in detail,the main body of the "Cloud-PipeDevice" and their security threats and protection strategies respectively.The specific research work is as follow:(1)The main body of "Cloud" is the telematics service providing system(TSP)of intelligent network-connected vehicles.TSP system is the data center of IOV.It mainly faces the attack of application layer and analyzes the principle of network attack aiming at the application layer network security attack of TSP system.In addition,it puts forward an innovative way to extract attack features by automatic attack tools from the angle of attacker.Finally,it proposes an attack detection system for the application layer of IOV’s TSP based on feature matching algorithm,and realizes the TSP intrusion detection system combined with the advantages of traditional WAF;(2)The main body of "Pipe" is IOV communication system,which consists of DSRC and LTE-V.The two communication modes have their own advantages but the hybrid architecture of DSRC and LTE-V has obvious advantages in solving the V2 X communication problem of IOV.However,DSRC communication equipment is expensive and there is no domestic equipment provider.Based on 802.11 p protocol,DSRC realized the communication of 802.11 p protocol on Linux system,solved the realistic problem that scholars’ research on 802.11 p protocol and DSRC can only be based on simulation and laid a foundation for the research of DSRC protocol by modifying ATH9 K driver,Linux kernel space and user space;(3)The main body of " Device " is the intelligent network-connected vehicles.This thesis introduces the wireless MITM security threats of the intelligent vehicle networking in detail,describes the implementation forms of a series of attack methods in the intelligent vehicle networking,and proposes two automatic attack paths of identity authentication page injection and App update hijacking.Finally,the wireless MITM attack platform of the intelligent network-connected vehicle is implemented for the security researchers to communicate and learn from each other,providing more thoughts and directions for the security research in the intelligent network-connected vehicle field.This thesis focuses on the "cloud-pipe-device " safety protection system of IOV to make up for the lack of the safety protection system of IOV.In-depth research has been made respectively from three aspects: the intrusion detection of TSP in the "cloud",the research and implementation of key technologies of 802.11 p protocol in the "pipe" and the wireless safety of IOV in the "device". |