Zigang Chen , Hongwei Zhang , Qinyu Mu , Danlong Li , Haihua Zhu
{"title":"车载设备数据篡改检测:基于相关计算和数据关系进行准确识别","authors":"Zigang Chen , Hongwei Zhang , Qinyu Mu , Danlong Li , Haihua Zhu","doi":"10.1016/j.cose.2025.104648","DOIUrl":null,"url":null,"abstract":"<div><div>The rapid advancement of intelligent connected vehicles (ICVs), driven by the integration of AI and 5G, has intensified the need for reliable accident forensics. We present a novel correlation analysis-based method for detecting tampered vehicle electronic data, addressing critical security vulnerabilities in current systems. Our approach establishes multivariate relationship clusters from in-vehicle data characteristics, performs dimensionality reduction, and computes anomaly scores through tail probability analysis. The experimental results demonstrate that the proposed method exhibits superior detection performance compared to existing approaches for random injection attacks, targeted tampering attacks, and outlier attacks.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"158 ","pages":"Article 104648"},"PeriodicalIF":5.4000,"publicationDate":"2025-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"In-vehicle device data tampering detection: Accurate identification based on correlation calculation and data relationship\",\"authors\":\"Zigang Chen , Hongwei Zhang , Qinyu Mu , Danlong Li , Haihua Zhu\",\"doi\":\"10.1016/j.cose.2025.104648\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The rapid advancement of intelligent connected vehicles (ICVs), driven by the integration of AI and 5G, has intensified the need for reliable accident forensics. We present a novel correlation analysis-based method for detecting tampered vehicle electronic data, addressing critical security vulnerabilities in current systems. Our approach establishes multivariate relationship clusters from in-vehicle data characteristics, performs dimensionality reduction, and computes anomaly scores through tail probability analysis. The experimental results demonstrate that the proposed method exhibits superior detection performance compared to existing approaches for random injection attacks, targeted tampering attacks, and outlier attacks.</div></div>\",\"PeriodicalId\":51004,\"journal\":{\"name\":\"Computers & Security\",\"volume\":\"158 \",\"pages\":\"Article 104648\"},\"PeriodicalIF\":5.4000,\"publicationDate\":\"2025-08-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0167404825003372\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825003372","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
In-vehicle device data tampering detection: Accurate identification based on correlation calculation and data relationship
The rapid advancement of intelligent connected vehicles (ICVs), driven by the integration of AI and 5G, has intensified the need for reliable accident forensics. We present a novel correlation analysis-based method for detecting tampered vehicle electronic data, addressing critical security vulnerabilities in current systems. Our approach establishes multivariate relationship clusters from in-vehicle data characteristics, performs dimensionality reduction, and computes anomaly scores through tail probability analysis. The experimental results demonstrate that the proposed method exhibits superior detection performance compared to existing approaches for random injection attacks, targeted tampering attacks, and outlier attacks.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.