Information Security of Intelligent Vehicles Communication
Overview, Perspectives, Challenges, and Possible Solutions
Paperback Engels 2022 9789811622199Samenvatting
This book highlights cyber-security overview, perspectives, and challenges that affect advanced Vehicular technology. It considers vehicular security issues and possible solutions, with the aim of providing secure vehicle-to-vehicle, vehicle-to-infrastructure and inside-of-vehicle communication. This book introduces vehicle cryptography mechanism including encryption and decryption approaches and cryptography algorithms such as symmetric and asymmetric cryptography, Hash functions and Digital Signature certificates for modern vehicles. It discusses cybersecurity structure and provides specific security challenges and possible solutions in Vehicular Communication such as vehicle to vehicle communication, vehicle to Infrastructure and in-vehicle communciation. It also presents key insights from security with regards to vehicles collaborative information technology. The more our vehicles become intelligent, the more we need to work on safety and security for vehicle technology. This book is of interest to automotive engineers and technical managers who want to learn about security technologies, and for those with a security background who want to learn about basic security issues in modern automotive applications.
Specificaties
Lezersrecensies
Inhoudsopgave
<p>a. Cyber Physical System </p>
<p>b. Threat, Risk and Vulnerability models </p>
<p>c. Intelligent Autonomous Vehicle (IAV) Technology </p>
<p>d. Security issues in IAV Technology </p>
<p>e. Summary </p>
<p> </p>
<p>2. Cyber Security for IAV </p>
<p>a. Overview </p>
<p>b. Issues </p>
<p>c. Vulnerability </p>
<p>d. Threats </p>
<p>e. Attacks </p>
<p>f. Security </p>
<p>g. Summary </p>
<p> </p>
<p>3. Fundamental of Cryptography </p>
<p>a. Encryption </p>
<p>b. Decryption </p>
<p>c. Signatures </p>
<p>d. Certificates </p>
<p>e. Key Management </p>
<p>f. Hash Functions </p>
<p>g. Summary </p>
<p> </p>
<p>4. Security Standards </p>
<p>a. SAE Security Standard </p>
<p>b. ITS Security Standard </p>
<p>c. Vehicle Security Standard Comparison </p>
<p>d. Summary </p>
<p> </p>
<p>5. IAV Communication Cybersecurity Overview </p>
<p>a. IAV Communication </p>
<p>b. In-vehicle Communication </p>
<p>c. Vehicle-to-Infrastructure Communication </p>
<p>d. Vehicle-to-device Communication </p>
<p>e. Wireless Access vehicle Environment (Wave) </p>
<p>f. Dedicated Short Range Communication (DSRC) </p>
<p>g. Communication Standards </p>
<p>h. Security issues in Intelligent Autonomous Vehicle Communi-cation </p>
<p>i. Summary </p>
<p> </p>
<p>6. Vehicle-2-Infrastructure(V2X) Communication Security </p>
<p>a. General </p>
<p>b. V2X Communication </p>
<p>c. V2X Communication Security </p>
<p>d. Summary </p>
<p> </p>
<p> </p>
<p>7. In-Vehicle Security </p>
<p>a. Overview </p>
<p>b. In-Vehicle Security Issues </p>
<p>c. Embedded security </p>
<p>d. Software Security </p>
<p>e. In-Vehicle Standardization </p>
<p>f. Summary </p>
<p> </p>
<p> </p>
<p>8. Vehicle-2-Device (V2D) Security </p>
<p>a. Overview </p>
<p>b. Vehicle-2-device Security issues </p>
<p>c. Vehicle-2-device security solutions </p>
<p>d. Standards </p>
<p>e. Summary</p>
<p> </p>
9. Cybersecurity for IAV, Projects and Solution <p></p>
<p>a. Industry Projects </p>
<p>b. Government Projects </p>
<p>c. Research organization Projects</p>
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan