Journal of Xidian University ›› 2023, Vol. 50 ›› Issue (4): 215-228.doi: 10.19665/j.issn1001-2400.2023.04.021
• Special Issue on Cyberspace Security • Previous Articles Next Articles
YANG Bo1,2(),ZHONG Yongchao1,2(),YANG Haonan1,2(),XU Zifeng1(),LI Xiaoqi1,2(),ZHANG Yuqing1,2()
Received:
2023-02-22
Online:
2023-08-20
Published:
2023-10-17
Contact:
Yuqing ZHANG
E-mail:yangb@nipc.org.cn;zhongyc@nipc.org.cn;yanghn@nipc.org.cn;zfxu@hainanu.edu.cn;csxqli@hainanu.edu.cn;zhangyq@nipc.org.cn
CLC Number:
YANG Bo,ZHONG Yongchao,YANG Haonan,XU Zifeng,LI Xiaoqi,ZHANG Yuqing. Research on the Wi-Fi privacy leakage risk of intelligent connected vehicles[J].Journal of Xidian University, 2023, 50(4): 215-228.
"
车辆 | 终端 | TSP域名 | 隐私字段名 |
---|---|---|---|
VELITE6 | ICV | sgmlink1.amap.com | VIN/convoy/PhoneNumber/Vehicle_Odo/Fuel_Information/ powerpercent |
open.kaolafm.com | albumName/playUrl/PhoneNumber | ||
p1.music.126.net | songlist | ||
restapi.amap.com | location/direction | ||
Malibu XL | 手机 | api.shanghaionstar.com | dealerName/latitude/longitude/PhoneNumber/distance/address/ignitionPOI/parkPOI/speedAverage/speedMaximum/tripMileage/drivescore/startDate/last trip distance/odometer/fuel tank info/vehicle range/lifetime fuel econ/last trip fuel economy/email/Addresss/birthDate/gender/jobTitle/msn/languagePreference/qq/userName/workPhoneNumber/governmentId |
www.onstar.com.cn | nickName/VIN/statisticsDate/countDate/FuelConsumption(8)/ FuelRatio(8)/Mileage(8)/fuelCost(9) |
"
终端 | 协议 | TSP域名 | 隐私字段名 | 敏感性 | 关联性 | 评级 |
---|---|---|---|---|---|---|
ICV | HTTP | content.wecar.map.qq.com | Songlist | 敏感 | 间接 | 中等 |
ICV | HTTP | m5.amap.com | latitude\longitude\direction\distance | 敏感 | 间接 | 中等 |
ICV | HTTP | wecarplat.map.qq.com | VIN | 不敏感 | 间接 | 忽略 |
ICV | HTTPS | cloud.eryanet.com | altitude\speed | 敏感 | 间接 | 中等 |
手机 | HTTP | scrm.changan.com.cn | ownerName\idcard\registdate\ productTime\dealername\maintaindata\ mileage\phoneNumber | 高度敏感 | 直接 | 严重 |
手机 | HTTPS | scrm.changan.com.cn | education\email\familymember\gender\ income\marriage\occupation\ purchaseDate | 高度敏感 | 直接 | 严重2 |
手机 | HTTPS | m.iov.changan.com.cn | oil\oilAvrgCostYesterday\ feeCostYesterday\ remainedOilMile\totalMeterYesterday\ totalOdometer\faceImg\ignitionPOI\ parkPOI\address | 高度敏感 | 直接 | 严重2 |
[1] | 罗康. 医疗数据发布的隐私泄露风险评估系统设计与实现[D]. 贵阳: 贵州大学, 2022. |
[2] | ISO/SAE. ISO/SAE DIS 21434:2021; Road Vehicle-Cybersecurity Engineering[S]. ISO/SAE International: Geneva, Switzerland, 2021. |
[3] | MONTEUUIS J P, BOUDGUIGA A, ZHANG J, et al. SARA:Security Automotive Risk Analysis Method[C]// Proceedings of the 4th ACM Workshop on Cyber-Physical System Security. New York: ACM, 2018:3-14. |
[4] | LAUTENBACH A, ALMGREN M, OLOVSSON T. Proposing HEAVENS 2.0-An Automotive Risk Assessment Model[C]// Proceedings of the 5th ACM Computer Science in Cars Symposium. New York: ACM, 2021:1-12. |
[5] | RING M, FRKAT D, SCHMIEDECKER M. Cybersecurity Evaluation of Automotive E/E Architectures[C]// ACM Computer Science in Cars Symposium (CSCS 2018). New York: ACM, 2018:1-7. |
[6] | SION L, VAN LANDUYT D, WUYTS K, et al. Privacy Risk Assessment for Data Subject-Aware Threat Modeling[C]// 2019 IEEE Security and Privacy Workshops (SPW).Piscataway:IEEE, 2019:64-71. |
[7] | BORGAONKAR R, HIRSCHI L, PARK S, et al. New Privacy Threat on 3G,4G,and Upcoming 5G AKA Protocols[J]. Proceedings on Privacy Enhancing Technologies, 2019, 2019(3):108-127. |
[8] | NGUYEN T H, VU T G, TRAN H L, et al. Emerging Privacy and Trust Issues for Autonomous Vehicle Systems[C]// 2022 International Conference on Information Networking (ICOIN).Piscataway:IEEE, 2022:52-57. |
[9] | LI Z, PEI Q, MARKWOOD I, et al. Location Privacy Violation via GPS-Agnostic Smart Phone Car Tracking[J]. IEEE Transactions on Vehicular Technology, 2018, 67(6):5042-5053. |
[10] | 宋成, 金彤, 倪水平, 等. 一种面向移动终端的K匿名位置隐私保护方案[J]. 西安电子科技大学学报, 2021, 48(3):138-145. |
SONG Cheng, JIN Tong, NI Shuiping, et al. A K-Anonymity Location Privacy Protection Scheme for Mobile Terminals[J]. Journal of Xidian University, 2021, 48 (3):138-145. | |
[11] | FRASSINELLI D, PARK S, NÜRNBERGER S. I Know Where You Parked Last Summer:Automated Reverse Engineering and Privacy Analysis of Modern Cars[C]// 2020 IEEE Symposium on Security and Privacy (SP).Piscataway:IEEE, 2020:1401-1415. |
[12] |
YANG W, CHEN X, XIONG Z, et al. A Privacy-Preserving Aggregation Scheme Based on Negative Survey for Vehicle Fuel Consumption Data[J]. Information Sciences, 2021, 570:526-544.
doi: 10.1016/j.ins.2021.05.009 |
[13] |
ZAVVOS E, GERDING E H, YAZDANPANAH V, et al. Privacy and Trust in the Internet of Vehicles[J]. IEEE Transactions on Intelligent Transportation Systems, 2022, 23(8):10126-10141.
doi: 10.1109/TITS.2021.3121125 |
[14] | XIONG W, LAGERSTRÖM R. Threat Modeling of Connected Vehicles:A Privacy Analysis and Extension of Vehiclelang[C]// 2019 International Conference on Cyber Situational Awareness,Data Analytics and Assessment (Cyber SA).Piscataway:IEEE, 2019:1-7. |
[15] | 江秋情. 车联网隐私泄露检测系统的设计与实现[D]. 北京: 北京邮电大学, 2020. |
[16] | CRONK R J, SHAPIRO S S. Quantitative Privacy Risk Analysis[C]// 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).Piscataway:IEEE, 2021:340-350. |
[17] | SINGH V P, UJJWAL R L. Privacy Attack Modeling and Risk Assessment Method for Name Data Networking[C]// Advances in Computer Communication and Computational Sciences:Proceedings of IC4S 2018.Heidelberg:Springer, 2019:109-119. |
[18] | DI TIZIO G, MASSACCI F, ALLODI L, et al. An Experimental Approach for Estimating Cyber Risk:A Proposal Building upon Cyber Ranges and Capture the Flags[C]// 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).Piscataway:IEEE, 2020:56-65. |
[19] |
WEI Y C, WU W C, LAI G H, et al. PISRA:Privacy Considered Information Security Risk Assessment Model[J]. The Journal of Supercomputing, 2020, 76(3):1468-1481.
doi: 10.1007/s11227-018-2371-0 |
[20] | SION L, VAN L, JOOSEN W. The Never-Ending Story:On the Need for Continuous Privacy Impact Assessment[C]// 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).Piscataway:IEEE, 2020:314-317. |
[21] | 申云成. 个人大数据定价方法研究[D]. 成都: 四川大学, 2021. |
[22] | 互联网天地. 《中华人民共和国个人信息保护法》公布[J]. 互联网天地, 2021, 9:3-11. |
Internet World. Personal Information Protection Law of the People’s Republic of China Promulgated[J]. Internet World, 2021, 9:3-11. | |
[23] |
SILVA P, GONÇALVES C, ANTUNES N, et al. Privacy Risk Assessment and Privacy-Preserving Data Monitoring. Expert Systems with Applications, 2022, 200:116867.
doi: 10.1016/j.eswa.2022.116867 |
[24] | 彭慧波. 数据交易中定价机制研究[D]. 北京: 北京邮电大学, 2019. |
[25] | SHERAZI H H R, KHAN Z A, IQBAL R, et al. A Heterogeneous IoV Architecture for Data Forwarding in Vehicle to Infrastructure Communication[J]. Mobile Information Systems, 2019, 2019:1-18. |
[26] | ASTRIDA D N, SAPUTRA A R, ASSAUFI A I. Analysis and Evaluation of Wireless Network Security with the Penetration Testing Execution Standard (PTES)[J]. Sinkron:Jurnal Dan Penelitian Teknik Informatika, 2022, 7(1):147-154. |
[27] | BHARATI S, PODDER P, MONDAL M, et al. Threats and Countermeasures of Cyber Security in Direct and Remote Vehicle Communication Systems (2020)[J/OL].[2020-06-11]. https://arxiv.org/abs/2006.08723. |
[28] | KIM M, SHIN Y, SHON T. MitM Tool Analysis for TLS Forensics[C]// 2021 International Conference on Platform Technology and Service (PlatCon).Piscataway:IEEE, 2021:1-4. |
[1] | WANG Fangwei,XIE Meiyun,LI Qingru,WANG Changguang. Differentially private federated learning framework with adaptive clipping [J]. Journal of Xidian University, 2023, 50(4): 111-120. |
[2] | WANG Chao, ZHOU Meng, DING Yinfan, TANG Lin. Visual turning:research on the wireless sensing monitoring algorithm for the corner field of the view blind area [J]. Journal of Xidian University, 2023, 50(2): 197-204. |
[3] | YANG Hongyu;NING Yuguang. Cloud platform dynamic risk access control model [J]. Journal of Xidian University, 2018, 45(5): 80-88. |
[4] | XU Chao;SHENG Min;YANG Chungang;MA Xiao. Correlated equilibrium-based spectrum sharing algorithm design for the cognitive Wi-Fi networks [J]. J4, 2014, 41(3): 95-102+109. |
[5] | WU De;LIU Sanyang. Risk assessment model of information security SVRAMIS [J]. J4, 2013, 40(1): 44-47+154. |
|