Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2019, 2(3); doi: 10.25236/AJCIS.020309.

Research on Vehicle Network Security Technology


Yingying Ji1, Huaijin Zhao2, *, Zhimin Wu2 and Chenglei Yu3

Corresponding Author:
Huaijin Zhao

1 National Internet Emergency Center of China Zhejiang Branch, hangzhou 310052, Zhejiang,China
2 National Internet Emergency Center of China, beijing 100029, China
3 Hangzhou dianzi university, hangzhou 310018, Zhejiang, China
*Corresponding author e-mail: [email protected]


The security risks of the Internet of Vehicles have become increasingly prominent. Information tampering and virus intrusion have been used by hackers in cyber attacks on smart cars. The car network attack incident is mainly concentrated on the TSP server attack. Therefore, the establishment of the car network TSP server attack monitoring system has a general significance for the domestic vehicle network security risk situation. This paper studies the design of the vehicle network TSP server attack monitoring system program, collects and analyzes the status and intelligence of the networked car, realizes the security monitoring of the vehicle-to-TSP cloud data, finds the vulnerabilities contained in the vehicle, and improves the security of the car network TSP platform. It is of great significance.


Network attacks, vehicle networking TSP, attack detection, system scheme

Cite This Paper

Yingying Ji, Huaijin Zhao, Zhimin Wu and Chenglei Yu. Research on Vehicle Network Security Technology. Academic Journal of Computing & Information Science (2019), Vol. 2, Issue 3: 75-82. https://doi.org/10.25236/AJCIS.020309.


[1] Yang Nan, Kang Rongbao. Analysis and Protection of Vehicle Network Security Threats [J]. Communication Technology, 2015, 48 (12): 1421-1426.
[2] Ling Zhiwei. Discussion on Information Security Issues in Internet of Vehicles [J]. Electromechanical Technology, 2017 (1): 110-112.
[3] Lü Liudi, Zheng Dong, Zhang Yinghui, Yan Ming, Su Yunan. Identity-based Aggregated Signature Authentication in Internet of Vehicles [J]. Computer Engineering and Design, 2018.
[4] Zhang Yuyu. Research on security authentication and privacy protection mechanism based on vehicle cloud [D]. Beijing Jiaotong University, 2018.
[5] WANG Liangmin, LI Tingting, CHEN Long. The Structure and Security of Vehicle Network Based on Vehicle Identity [J]. Journal of Network and Information Security, 2016, 2 (2): 41-54.
[6] Huang Yuzhen. Research on network security technology of vehicle network [J]. Electronic World, 2018.
[7] Song Zefeng. Research and implementation of in-vehicle network penetration testing for CAN bus [D]. Chengdu: University of Electronic Science and Technology, 2018.
[8] Wang Shaoqiang, Shao Dan, Wang Yanbai. Analysis and research of network penetration testing technology [J]. Electronic World, 2015, (17): 154-155.
[9] Zhao Xi. Research and implementation of penetration testing integrated platform based on Android system [D]. Shanghai: Donghua University, 2016.
[10] Qu Zhuo, Zhou Hanxun, Pei Tianhua. Research on Information Security Penetration Testing Process [J]. Northern Transportation, 2015, (12): 112-114.
[11] Liu Yang. Case Analysis and Prevention Strategy of Vulnerability Hazard Based on Penetration Test [J]. Cyberspace Security, 2018, (9): 76-78.