Shenzhen Genvict Technologies Co., Ltd.
Shenzhen Genvict Technologies Co., Ltd.
Contact
Data and Cyber Security in V2X Communications
Intelligent traffic
Enjoy your smart life

Data and Cyber Security in V2X Communications

Vehicle-to-Everything (V2X), the key technology for autonomous driving, is the typical application of Internet of Things in transportation field. Although intelligent and connected vehicles bring us convenient and comfortable mobility experience, people concern about the data and cyber security issues coming along with.


Measures and mechanisms are taken to protect user privacy and cyber security:

1. Node authentication

Before accessing network, the node will be verified by the authentication center and then allocated with corresponding key. The deployment of anonymous technology can also protect the communication privacy.


2. Permission management

Network attack and information leakage can be done by insiders who are granted with permissions to access the system. The permission settings will put the system operator under close scrutiny.


3. Security scanning on mobile terminals

  • Account security: to check whether the password is transmitted and stored in cipher text, and to check the account locking and cancellation mechanism;

  • Communication security: to check data encryption and transmission, and to verify digital certificate and data validity;

  • Interface security: to check whether SQL injection, XSS attack, cross-site request forgery and unauthorized access exist;


4. Network security scanning

  • Communication protocol: to check consistency and interoperability of communication protocol; to conduct vulnerability detection on communication protocol authentication, impersonation attack, data leakage, and other perspectives;

  • Transmission confidentiality: to check whether data is transmitted in encrypted text, and to ensure the precision and consistency of data transmission;

  • Network border: to check whether it support to connect with external system, monitor the internal system border, and deploy border protection devices;


5. Security scanning on server/storage equipment

The scanning aims to fully monitor the server functions and performance. Black-box testing is adopted to verify the operability and validity of server system functions, while automated tools are used to simulate different conditions to test server system performance.