Visible to the public Biblio

Filters: Author is Sun, Chunhui  [Clear All Filters]
2022-06-08
Jia, Xianfeng, Liu, Tianyu, Sun, Chunhui, Wu, Zhi.  2021.  Analysis on the Application of Cryptographic Technology in the Communication Security of Intelligent Networked Vehicles. 2021 6th International Conference on Automation, Control and Robotics Engineering (CACRE). :423–427.

Intelligent networked vehicles are rapidly developing in intelligence and networking. The communication architecture is becoming more complex, external interfaces are richer, and data types are more complex. Different from the information security of the traditional Internet of Things, the scenarios that need to be met for the security of the Internet of Vehicles are more diverse and the security needs to be more stable. Based on the security technology of traditional Internet of Things, password application is the main protection method to ensure the privacy and non-repudiation of data communication. This article mainly elaborates the application of security protection methods using password-related protection technologies in car-side scenarios and summarizes the security protection recommendations of contemporary connected vehicles in combination with the secure communication architecture of the Internet of Vehicles.

2020-04-06
Zhou, Yejun, Qiu, Lede, Yu, Hang, Sun, Chunhui.  2018.  Study on Security Technology of Internet of Things Based on Network Coding. 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). :353–357.
Along with the continuous progress of the information technology, Internet of Things is the inevitable way for realizing the fusion of communication and traditional network technology. Network coding, an important breakthrough in the field of communication, has many applied advantages in information network. This article analyses the eavesdropping problem of Internet of Things and presents an information secure network coding scheme against the eavesdropping adversaries. We show that, if the number of links the adversaries can eavesdrop on is less than the max-flow of a network, the proposed coding scheme not only `achieves the prefect information secure condition but also the max-flow of the network.