Information Security of Intelligent Vehicles Communication

Overview, Perspectives, Challenges, and Possible Solutions

Paperback Engels 2022 9789811622199
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

This book highlights cyber-security overview, perspectives, and challenges that affect advanced Vehicular technology. It considers vehicular security issues and possible solutions, with the aim of providing secure vehicle-to-vehicle, vehicle-to-infrastructure and inside-of-vehicle communication. This book introduces vehicle cryptography mechanism including encryption and decryption approaches and cryptography algorithms such as symmetric and asymmetric cryptography, Hash functions and Digital Signature certificates for modern vehicles. It discusses cybersecurity structure and provides specific security challenges and possible solutions in Vehicular Communication such as vehicle to vehicle communication, vehicle to Infrastructure and in-vehicle communciation. It also presents key insights from security with regards to vehicles collaborative information technology. The more our vehicles become intelligent, the more we need to work on safety and security for vehicle technology. This book is of interest to automotive engineers and technical managers who want to learn about security technologies, and for those with a security background who want to learn about basic security issues in modern automotive applications.

Specificaties

ISBN13:9789811622199
Taal:Engels
Bindwijze:paperback
Uitgever:Springer Nature Singapore

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>Introduction </p>

<p>a. Cyber Physical System </p>

<p>b. Threat, Risk and Vulnerability models </p>

<p>c. Intelligent Autonomous Vehicle (IAV) Technology </p>

<p>d. Security issues in IAV Technology </p>

<p>e. Summary </p>

<p>&nbsp;</p>

<p>2. Cyber Security for IAV </p>

<p>a. Overview </p>

<p>b. Issues </p>

<p>c. Vulnerability </p>

<p>d. Threats </p>

<p>e. Attacks </p>

<p>f. Security </p>

<p>g. Summary </p>

<p>&nbsp;</p>

<p>3. Fundamental of Cryptography </p>

<p>a. Encryption </p>

<p>b. Decryption </p>

<p>c. Signatures </p>

<p>d. Certificates </p>

<p>e. Key Management </p>

<p>f. Hash Functions </p>

<p>g. Summary </p>

<p>&nbsp;</p>

<p>4. Security Standards </p>

<p>a. SAE Security Standard </p>

<p>b. ITS Security Standard </p>

<p>c. Vehicle Security Standard Comparison </p>

<p>d. Summary </p>

<p>&nbsp;</p>

<p>5. IAV Communication Cybersecurity Overview </p>

<p>a. IAV Communication </p>

<p>b. In-vehicle Communication </p>

<p>c. Vehicle-to-Infrastructure Communication </p>

<p>d. Vehicle-to-device Communication </p>

<p>e. Wireless Access vehicle Environment (Wave) </p>

<p>f. Dedicated Short Range Communication (DSRC) </p>

<p>g. Communication Standards </p>

<p>h. Security issues in Intelligent Autonomous Vehicle Communi-cation </p>

<p>i. Summary </p>

<p>&nbsp;</p>

<p>6. Vehicle-2-Infrastructure(V2X) Communication Security </p>

<p>a. General </p>

<p>b. V2X Communication </p>

<p>c. V2X Communication Security </p>

<p>d. Summary </p>

<p>&nbsp;</p>

<p>&nbsp;</p>

<p>7. In-Vehicle Security </p>

<p>a. Overview </p>

<p>b. In-Vehicle Security Issues </p>

<p>c. Embedded security </p>

<p>d. Software Security </p>

<p>e. In-Vehicle Standardization </p>

<p>f. Summary </p>

<p>&nbsp;</p>

<p>&nbsp;</p>

<p>8. Vehicle-2-Device (V2D) Security </p>

<p>a. Overview </p>

<p>b. Vehicle-2-device Security issues </p>

<p>c. Vehicle-2-device security solutions </p>

<p>d. Standards </p>

<p>e. Summary</p>

<p>&nbsp;</p>

9. Cybersecurity for IAV, Projects and Solution <p></p>

<p>a. Industry Projects </p>

<p>b. Government Projects </p>

<p>c. Research organization Projects</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Information Security of Intelligent Vehicles Communication