<p>Even though most vehicular IT systems are indeed developed to face technical failures, they rarely consider a systematic malicious encroachment. However, in the degree that vehicular electronics are becoming software-driven, digitally networked and interactive IT systems, dependable security meas
Security Engineering for Vehicular IT Systems
β Scribed by Marko Wolf
- Year
- 2009
- Tongue
- English
- Leaves
- 218
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Even though most vehicular IT systems are indeed developed to face technical failures, they rarely consider a systematic malicious encroachment. However, in the degree that vehicular electronics are becoming software-driven, digitally networked and interactive IT systems, dependable security measures are essential to ensure driving safety and enable the automotive industry to achieve different legal requirements. Marko Wolf provides a comprehensive overview of the merging area of vehicular security. Having identified potential threats, attacks, and attackers for current and future vehicular IT applications, the author presents practical security measures to meet the identified security requirements efficiently and dependably.
π SIMILAR VOLUMES
<p>This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS). It presents mathematical models and numerical results obtained from experiments and simulations,
<p>David FΓΆrster examines privacy protection for vehicular communication under the assumption of an attacker that is able to compromise back-end systems β motivated by the large number of recent security incidents and revelations about mass surveillance. The author aims for verifiable privacy protec
<p><span>Digital transformation, also known as Industry 4.0, Smart Industry, and Smart Manufacturing, is at the top of leadersβ agendas. Such a transformation stimulates innovation in new products and services, the digital transformation of processes, and the creation of new business models and ecos
<p>This book comprehensively covers a wide range of topics from the smart transportation domain. It discusses protocols, applications, and security concerns in various vehicular networks using examples and easy-to-understand figures. The book's first four chapters focus on vehicular network protocol
<span>This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elli