The Internet of Vehicles is developing by leaps and bounds, but the security problem is still the biggest difficulty.

According to the latest research data, it is estimated that the cumulative automobile sales in China will reach 26.19 million by the end of 2016. By then, the number of cars will reach an astonishing 193 million, which is also the highest data of car ownership in China. With the gradual saturation of the domestic automobile market and the maturity of the traditional car-making technology, the entire automobile industry is bound to usher in an upgrade and transformation, and today’s rapid development of the Internet of Vehicles is one of the breakthroughs in the automobile industry that are now highly anticipated by Chinese people.

The Internet of Vehicles, specifically, refers to a large-scale system network that carries out wireless communication and information exchange among V2V, V2R, V2H and V2I through electronic components such as GPS positioning, RFID (radio frequency technology) identification, sensors, cameras and image processing integrated in automobiles according to agreed communication protocols and data interaction standards.It is an integrated network that can realize intelligent traffic management, intelligent dynamic information service and intelligent vehicle control..

Many people understand car networking as car networking, but it is actually an interconnected system on every car, and its mechanism is similar to the relationship between mobile phones and mobile phone systems. After constructing the information platform, the Internet of Vehicles can integrate ITS, logistics, passenger and freight transportation, dangerous vehicles, auto repair and auto parts, car rental, vehicle management of enterprises and institutions, automobile manufacturers, 4S shops, vehicle management, insurance, emergency rescue, mobile Internet and other ecological chains.

In the existing promotion of domestic car networking products, almost all of them are large-size touch screens based on Android system. If you think about the actual functions of these products, smartphones can actually be realized. On the other side of the ocean, the car networking in the United States is fundamentally different from smart phones. It shares the information of all participants in traffic, thus making the whole transportation system smarter and more efficient, and greatly reducing accidents and congestion.

From a straight point of view, the functions that the Internet of Vehicles should realize are: when reversing, the system will remind whether there is a vehicle passing behind; When passing an intersection without a signal light, the system will warn whether there is a car in the blind area of vision; After the combination of vehicle networking and autonomous driving, vehicles can obtain the speed, direction and location information of all traffic participants through the vehicle networking, as well as the information of traffic lights and signs. Under the automatic planning of the system, traffic congestion will also be greatly reduced.

It is not what most people know: you can chat on WeChat, order a takeaway, look at the webpage and find a parking lot through the car platform.

And the reason for this phenomenon is not difficult to think of.At this stage, the domestic car networking is almost dominated by Internet companies, and Internet companies have not yet got rid of the habit of being keen on grabbing Internet portal resources. In this way, at this stage, the domestic car networking still stays in the networking of vehicles, and has not really realized the interconnection of vehicles.

From the perspective of the entire car networking industry chain, the main body is divided into four sections: end, management, cloud and big data.

The terminal, namely the intelligent display mode of V2X interaction, is responsible for collecting and obtaining the intelligent information of vehicles and sensing the driving state and environment. The derivatives include smart phones, car navigation machines, car central control screens and so on.

Tube, that is, the vehicle behavior and other conditions are transmitted to the channel of the cloud platform through data, and the interconnection problems between vehicles (V2V), vehicles and infrastructure (V2I) and vehicles and cloud (V2C) are solved, which are mainly transmitted by network operators. Derivatives include network communication sources and mobile data signals.

Cloud, that is, through the cloud platform, provides cloud services for vehicle scheduling, monitoring, management and data aggregation.

Big data platform, that is, by integrating, calculating and applying data, connects the cloud platform with 4S stores, automakers, insurance companies and Internet companies, and provides them with data-based user portraits, marketing strategies and other support services.

However, in order to realize V2X, the tube plays a key role. At this stage, whether it is the front-loading networking products of traditional car companies or the after-loading smart car networking products of various Internet companies, they are basically still in the stage of closed-door creation, and the ecology is relatively closed. Perhaps there can be some interconnection between their own products, but they have not achieved cross-brand interconnection.

Of course, the realization of V2X is not achieved by one or two enterprises. First of all, we lack a mandatory and effective platform and standard, without which there is no way. Secondly, the domestic road traffic situation has always been quite complicated, and drivers’ driving habits are also different. Even the supporting traffic facilities need to be improved, so it is easy to imagine the difficulty of connecting these infrastructures to the Internet. Further, the Internet of Vehicles also relies heavily on high-precision maps and road information to judge the lane and accurately locate it, but at present, the domestic high-precision has not been truly commercialized.

Regarding the current situation of car networking in China, Wang Qiang, CEO of Feichi Magnesium, thinks that car networking is not simply equivalent to car+Internet, and it is not just to connect the car directly with the mobile phone and pad, or to transplant the application on the mobile phone to the big screen in the car. The real car networking in the sense of front-loading should be "car+car networking", in which the car networking is a relatively closed technical system as opposed to the public mobile Internet. Because the attribute of a car is a safe and high-speed vehicle, the most basic thing is safety, not functional richness.

Therefore, if you want to connect vehicles, both safety and intelligence are indispensable, which is the first difference in concept. Many people think that the Internet of Vehicles is the central control screen, but in fact, the car is a part. Mobile phones and wearable devices should also be able to access related services on the cloud, and display different services according to the characteristics of the screen, which are uniformly provided by the cloud.

Therefore, the root cause of the domestic car networking not realizing V2X lies in the lack of relevant industry standards.However, at the 3GPP meeting in September this year, the formulation of LTEV2V standard was formally completed, and it is expected that the formulation of other standards such as V2X will be completed in March 2017. China joined the 3GPP as early as 1999, so the related standards of car networking may also be applicable in China, so the real car networking era may break out next year.

With the continuous expansion of the application scope of the Internet of Vehicles, security attacks will increase accordingly. There have been many accidents and attacks on the Internet of Vehicles, such as:

The recall of Fiat Chrysler Automobile Company in the United States. Hackers use internet technology to invade the "Uconnect" system of a moving Cherokee jeep and remotely control the acceleration and braking system, radio and wipers of the car.

The BMW ConnectedDrive digital service system was invaded, and hackers could use this vulnerability to invade the interior of the vehicle in a remote and wireless way and open the door.

Tesla Model S was invaded, and network security experts opened the door and drove away through the loopholes in Model S. At the same time, they could send a "suicide" command to Model S and suddenly shut down the system engine during normal driving of the vehicle.

In addition, the MegamosCrypto protection system of Volkswagen brands such as Audi, Porsche, Bentley and Lamborghini has also been breached.

The general network architecture of the Internet of Vehicles is based on the TSP background, and vehicles are connected to it through the car or T-box, and the App on smart devices interacts with it through Wi-Fi or other communication networks, and third-party content and service providers need to be connected to it. In addition, TSP may also be connected to some other systems within the car enterprise. Therefore, to sum up, the car networking system is vulnerable to attacks as follows:

1. Car end: infotainment system, T-box, internal CAN network and external keys.

2. Apps on mobile phones and watches

3. OBD equipment connected with CAN network.

4. Cloud server where the TSP background is located

5. Communication process, including communication from car, T-box to background, communication from App to background, etc.

Next, we will start from the perspective of multiple market segments in the field of car networking to see how they ensure the security of the car networking network.

  • After loading networking equipment, it is necessary to isolate the bottom of the vehicle.

At present, the smart rearview mirror is the most common among the after-installed smart car networking products in the automobile market, while the smart rearview mirror products in China, such as Jidou Car Networking Company, connect the equipment with the CAN network of the vehicle to monitor the vehicle data. So how can the security of such a connection be guaranteed? Wang Yifei, CEO of Jidou Car Network, said that their products adopt the way of isolating the bottom of the car and adding a hardware firewall to ensure the safety of the car. In case of hacker intrusion, the hacker can’t obtain the underlying information of the vehicle, so he can’t control the vehicle, and the relevant data of the vehicle can’t be obtained and tampered with. At the software and cloud level, polar bean has also done a lot of security work, thus forming a set of all-round protection.

However, most of these rear-loading networking devices are connected by OBD interface, and hackers need to ensure that OBD devices are in the car and not far away from the car if they want to attack, so it is unlikely that hackers will attack.

  • Operators of front-loading networking equipment and networking platform adopt terminal hardware protection and cloud key application.

Cai Dong, the executive vice president of Feichi Magnesium, summed up the above-mentioned vulnerable points, which are actually the three core points of vehicle terminal, server terminal and mobile terminal in the Internet of Vehicles, and their security solutions are mainly concentrated on these three key points. In the vehicle terminal, the embedded security chip is used to manage keys and encryption operations. At present, the T-BOX product ConnectedEngine adopts this technology, and the security level has been recognized by the automobile factory, which has entered the pre-assembly sequence of the automobile factory. On the server side, the security products and policies provided by the cloud service provider are configured, and the self-developed key application SDK is loaded, which is responsible for encrypting data with the vehicle-mounted terminal and the mobile terminal.

In the mobile terminal APP, the key codes are dynamically encrypted and tampered with, and the mobile terminal equipment, user account number, information and mobile phone number are bound by digital certificate technology to ensure the legal reliability of the mobile terminal. In the aspect of password application, the combination of symmetric encryption and decryption, asymmetric encryption and decryption and HASH algorithm is adopted to ensure the security and integrity of data communication while minimizing the impact on performance.

  • Communication service providers adopt hierarchical security architecture to ensure the safety isolation of equipment.

As the world’s top communication service provider, Huawei is also involved in the field of vehicle networking communication, and Huawei’s Kald Lab is an organization specializing in vehicle networking security architecture. Dr. Li Tieyan from Huawei’s Kald Lab, when preaching the security architecture of vehicle networking, said: "In order to deal with all kinds of security threats inside and outside the vehicle, a new hierarchical security architecture is needed to ensure the safe isolation of vehicle-vehicle heterogeneous networks. The outermost defense line reduces all kinds of network attacks from the outside by strengthening the authentication technology between the vehicle and the outside world (V2X); The second line of defense can adopt firewall and intelligent detection technology to realize the security isolation, access control and anomaly detection between the entertainment and navigation systems in the car and the internal network of the car.

The existing vehicle architecture lacks the necessary security mechanism, which can’t avoid the hacker’s infiltration attack from the outside to the inside. It is necessary to rebuild the hierarchical linkage security architecture to realize the layer-by-layer protection of the safety-sensitive CAN(Controller Area Network) network segment and key ECU(Electronic Control Unit) components. "

As a key technology to support the hierarchical car networking security architecture, Kald Lab also shared their latest research results:

1. The CAN Bus message authentication scheme based on the international security standard ISO/IEC 9798-2 is simple and efficient, and can be integrated without adding new hardware.

2. A new anonymous authentication mechanism called Extended Dynamic Accumulator is proposed, which can ensure the true source of the message and not reveal the identity of the owner when communicating between cars and roadside facilities in the future, and effectively balance several key requirements (SAE J2945/1) put forward by SAE, such as safety, privacy, efficiency and dynamic membership change.

The future development trend of the Internet of Vehicles is irreversible. Major car companies and Internet companies are developing corresponding hardware, cloud and communication methods. However, at this stage, different modes are definitely not accessible, and data, technologies and standards of all parties should be integrated. When all enterprises in the field of car networking can follow the standards, the car networking may be able to usher in a real outbreak.

In addition, the Internet of Vehicles has been controversial since its birth, and it can be said that it has never been trusted by consumers, precisely because its security is not absolutely guaranteed. At this stage, the popularity of the Internet of Vehicles has not yet reached, and its powerful intelligent performance needs more users to use the same application before the corresponding big data can achieve the expected effect.

Let’s imagine that when the Internet of Vehicles becomes the mainstream product in the future automobile market, the resulting security problems will probably appear more frequently. Although related companies have been doing product safety maintenance and upgrading, there is no absolutely safe firewall in the world, and people certainly don’t want to drive their own vehicles at any time to be taken over by others. After all, the safety of vehicles is related to our lives, so safety is the most important thing on the road of vehicle networking development. We should not only see how the Internet of Vehicles makes our life more efficient and convenient, but ignore the dangers it may bring at any time.

 [titanium media author introduction: JOKER@ magnesium guest network, WeChat WeChat official account "magnesium guest network", Weibo @ magnesium guest network]

More industry analysis, pay attention to titanium media micro-signal (ID: taimeiti), or download titanium media App.

If you want to know how to cultivate a fighting nation, these Russian dramas can be pursued.

Stills of "The Cultivation of Fighting Nation".

The last Russian drama I watched was the Soviet version of War and Peace in 1966, and it is simply two extremes from the recent Russian comedy The Formation of the Fighting Nation-the latter is bright and always summer; The characters inside don’t say that they are thinking inside, and they don’t even have daily life. They all have enough chicken blood to poke their jokes, and they even make people want to stop.

After watching this drama, nine times out of ten you will fall in love with this nation with a cold appearance and a delicate heart. Indeed, it is an out-and-out "Russian modern national spirit" propaganda film, and it also satisfies the curiosity of people who know nothing about Russia about this fighting nation, and can be regarded as a "Russian introductory manual".

However, it is because a targeted "propaganda" comedy is a pure comedy that is willing to put down its body and spare no effort to tickle you, so that you don’t have a little gloomy mood when watching the drama and don’t have to think about a little bit of your own shit.

Stills of "The Cultivation of Fighting Nation".

At the beginning of the story, alex, an honest and stupid young American journalist, was "sent down" to Russia by his boss for offending a member of parliament. His grandmother is Russian, so the young man speaks Russian so fluently that he even scolds "bastards".

After arriving in Russia, his good friend Rome has appeared in his life. Rome has a doctor sister who has a soft light effect and claims to sell his organs all day. Rome also has a girlfriend who is the daughter of an oligarch. Like many oligarchs in Russian dramas, the oligarch himself pulls out a shotgun if he doesn’t agree with a word. When chasing a girl, the whole bulb head will be slightly pink shyly. The girl pursued by oligarchs is the violent and courageous female editor of the newspaper where alex and Rome are located.

In the play, every character seems to have no need to live, just show the most "Russian" side. Therefore, oligarchs don’t have to talk about business and politics, but just parade through the city with two Mongolian-faced twin bodyguards; All members of the newspaper don’t have to go to work, painting their nails, playing games, talking on the phone, drinking and doing everything; In addition to driving in his own job, Rome spent most of his time blowing water and lying in a serious way, so that he only expected a sly smile behind him later; Only the doctor’s sister is always at work, but the patients in the ambulance seem to be all dummies, which does not affect her love to stop and buy a pack of chewing gum.

After watching six episodes, apart from the usual madness and small-space plot twists in comedies, there are nothing more than these four themes: self-darkness, black America, showing the power of the bear, and showing the gentle and meticulous heart of the bear.

Blackness is everywhere: the oligarch’s luxury car is crowded on the congested road, and he says, "Oh, our president took time to come to work today. Our life is better if he doesn’t go to work. "

Black America is a concentrated expression: in the first episode, when the hero wrote an article attacking the congressman in the United States, the editor-in-chief criticized him: "Can you stop writing these articles that will make these losers jump?" In addition, Americans with a smirk and rigid rules all day are as naive and helpless as primary school students in front of lazy and unruly Russian big brother, which symbolizes that inexperienced young people are a little immature in the face of experienced old people?

The power of the bear: in the first episode, the oligarch sits in a mansion full of specimens of beasts, and pulling out a shotgun is as casual as pulling out a toy. The spirits he provided knocked the hero to the ground in the first episode, and he began a wonderful trip to Russia.

Gentle Mao Xiong Xin: In an episode, the hero rented a room, but it was the grandson of the owner who rented the room for money while grandpa was away. Grandpa vowed to teach his grandson a lesson. When he came to make trouble, he took out a shotgun filled with salt, and with a bang, he looked smug: "You know what you’re doing, little rabbit!"

Just like our "Tiny Times", "The Cultivation of the Fighting Nation" is extremely glamorous. Where is this Russia in memory? What about the Soviet-era banlou? What about gray? Instead, there are brightly lit night scenes, long legs and pretty girls all over the street, Manhattan-style high-rise buildings, local tyrants’ houses full of hairy bear specimens, newspapers with modern design, and several sets of thick and exquisite apartments that can be called models of indoor green plants.

But it seems that this can also be understood as Russian self-mockery. After all, at the end of each episode, the protagonist will write several columns of Russian Diary. There are many good words in it, and occasionally there are a few truths.

Compared with Americans who believe in struggle by "living peacefully in friends’ land", the Russian nation believes not only in the ancient philosophy of "no matter how hard it is to come, fortune and misfortune depend on each other", but also in the negative survival philosophy of "sometimes doing nothing is better than fighting hard".

Just like this nation is addicted to alcohol, getting drunk for being wild is one thing, and it is more important to forget the miserable life. Russian-style survival thinking is far from American-style, and it is as difficult for young people and old people to understand each other.

As an ancient nation, the survival philosophy of Russians is similar to ours, and even some living habits make people smile.

For example, a shirtless man indoors! For example, a balcony full of sundries and even plastic bags are carefully collected! These habits are really not learned from the Soviet Union during the honeymoon period between China and the Soviet Union, but the embodiment of the ancient people who survived the disaster knowing the importance of nip in the bud. Bare-chested is not only cool, but also because the sauce will not stain the clothes when eating; The use of sundries can’t be said in a few words, and you must never throw them away casually. Do you not believe me, try throwing away your grandmother’s old sundries?

Therefore, although "The Cultivation of Fighting Nations" is not serious at all, and it can even be said that it is all a trick to make people happy, it is just like "War and Peace", and it can bump into its own life if it is not careful, and then laugh with the protagonists.

By the way, I recommend some Russian dramas that have been translated by subtitle groups in China. If you are tired of watching British and American dramas, you can also catch up with Russian dramas.

Chernobyl

According to the present scientific research results, the past cannot be changed. Even if you get enough energy to create a cavity and go back to the past, it will only fall into a cycle and cannot change history.

But time travel shows don’t see it that way. The second season of Chernobyl this year takes the protagonist back to 1986 to stop the accident at the Chernobyl nuclear power plant, thus rewriting history.

The drama is sought after not because it conforms to the scientific travel story, in fact, there are many loopholes in it, but because of the encyclopedic display of two eras and the thinking of the Soviet era and the Russian era.

What Russians miss still seems to be the Soviet era.

Dude

The story of the rich second generation young master growing up in the process of tracing old cases. It is said to be an inspirational drama, with a lot of handsome men and beautiful women. However, there is tragedy in the bones. The sentimentality and openness of the Russian nation coexist, and the dead people who followed each other in the process of investigating the case are also very artistic.

Hotel infatuation

Maxim came to work in a luxury restaurant opened by a celebrity in Moscow, with the heart of becoming a chef. Since its launch in 2012, it has become the most popular sitcom in Russia. It is famous for its high shooting cost and pure humor, and is now shooting the third season.

Intern

On the surface, it is serious medical drama, but actually jokes and spits off the charts, accompanied by Russian symphonies and spirits. Note that under the doctor’s white coat are a pair of strong flower arms, and the screenwriter also feels that there is no need to hide his contempt for women and homosexuals.

In short, the Russian people have no scruples about having fun, but the cultural background of the Russians appears from time to time, and the allusion to a joke is enough to make people gasp in admiration.

Physical education teacher

A sitcom as famous as Intern. The hero, Fuma, used to be the right-hand man of the gangster. In order to get back to the gangster, he did not hesitate to work as a physical education teacher at his daughter’s school.

Violence and spitting bear man’s iron man tenderness. This setting alone is enough. After all, the most concentrated producing area of this kind of bear man is in Russia.

Love in Petersburg

Lengthy love-hate entanglements, there are actually 127 episodes.

It was also broadcast on CCTV that year. Although Mandarin dubbing weakened the sense of court, there were no ugly and obscene characters among them, and the relationship and heart of the characters could make people who had seen it memorable for a long time, thus establishing its classic status.

Some people say that this drama has made them suffer from "Petersburg syndrome", and they will miss and watch this cold country’s love drama every winter, which shows charm.

Credit card handling skills

Credit card handling skills

  Nowadays, more and more people like to apply for credit card overdraft, which is convenient and does not need to carry too much cash with them. However, banks are relatively strict in applying for credit cards, so how can they apply for credit cards smoothly? The following is providedCredit card handling skillsFor your reference, let’s have a look.

  1. Usually, the amount of credit card application for the first time is relatively low, unless you can provide sufficient proof of assets, such as proof of income, proof of house ownership, proof of mortgage purchase, proof of automobile ownership, bank deposit certificate or securities certificate. Of course, in addition to the asset certificate, other certificates that can prove your personal ability will also help you get a high credit card, such as academic certificate, technical grade certificate and other qualification certificates.

[Credit card handling skills] Try to prepare sufficient proof of assets.

  Second, fill in the credit card application form carefully (generally speaking, the following aspects on the application form will affect the bank’s credit evaluation score for you. The higher the credit score, the higher the probability of obtaining credit card approval and the higher the quota):

  1. Do you have a fixed telephone number in this city (having a fixed telephone number in this city means that your residence is stable, which will increase the bank’s credit evaluation score for you);

  2. Whether or not to get married (the score of married is higher than that of unmarried);

  3. Whether it is a local hukou (the score of local hukou is higher than that of foreign hukou);

  4. Whether there is a house (owning a house is higher than not having a house, and living by oneself is higher than living with parents);

  5. Education level (the higher the education level, the higher the score);

  6, the nature of the work unit (the more stable and well-known the work unit, the higher the score. For example, institutions, large state-owned enterprises and the world’s top 500 enterprises all scored higher, while unknown private enterprises and small foreign enterprises scored lower);

  7. Position (The higher the position, the higher the score. For example, civil servants and company managers score higher than ordinary employees, and any bank has a credit card. If you meet these conditions, it is good to choose a bank.

  Third, the credit card has the overdraft function, and you can swipe your card for shopping without money in the card, so not everyone can apply for a credit card, and banks only issue credit cards to people they think are honest. Compare and see if you meet the requirements for issuing credit cards by banks:

  1, aged between 18 and 65 years old;

  2. Have a stable occupation and income;

  3. Have good credit and the ability to repay interest on time;

  4. Natural persons with full capacity for civil conduct (robots, vegetarians, minors and a certain degree of mental illness are not allowed).

  4. If you haven’t met the requirements for applying for an ordinary credit card, you can apply for a supplementary card through your parents and spouse. To apply for a supplementary card, you must meet the following conditions:

  1. Natural persons with full capacity for civil conduct or limited capacity for civil conduct.

  2. At least 13 years old

  3. Applicants for supplementary cards under the age of 16 must provide a copy of the household registration book when applying.

  5. Not everyone can apply for some cards, which have some special requirements for cardholders. For example, the Magic Credit Card of CITIC Bank can only be applied by women.

[Credit card handling skills] You need to prepare various asset certificates.

Tips for successfully applying for a credit card:

  At present, banks pay more and more attention to risk control, and the approval of credit cards is also very strict. Many friends who apply for credit cards or high-quota cards for the first time have received rejection from banks. What are the tips for successfully applying for a credit card?

  1. Please try to prepare sufficient proof of assets. If you have applied for a credit card and have a good credit record, you only need to copy the credit card you already have and send it with the application form. Because the bank can check your personal credit record through the personal credit information system, whether the credit record is good is also one of the conditions for the bank to judge whether it has the qualification to issue cards.

  2. If it is the first time to apply for a credit card and there is no credit consumption record, you need to prepare various asset certificates. Because the bank decides whether to approve the card and the size of the credit line according to your various income and assets.

  Above isCredit card handling skillsIn detail, friends who need to apply for a credit card can try it according to the above methods.