Bücher Wenner
Mirna Funk liest und spricht über "Von Juden lernen"
10.10.2024 um 19:30 Uhr
Information Security of Intelligent Vehicles Communication
Overview, Perspectives, Challenges, and Possible Solutions
von Madhusudan Singh
Verlag: Springer Nature Singapore
Reihe: Studies in Computational Intelligence Nr. 978
E-Book / PDF
Kopierschutz: PDF mit Wasserzeichen

Hinweis: Nach dem Checkout (Kasse) wird direkt ein Link zum Download bereitgestellt. Der Link kann dann auf PC, Smartphone oder E-Book-Reader ausgeführt werden.
E-Books können per PayPal bezahlt werden. Wenn Sie E-Books per Rechnung bezahlen möchten, kontaktieren Sie uns bitte.

ISBN: 9789811622175
Auflage: 1st ed. 2021
Erschienen am 18.05.2021
Sprache: Englisch
Umfang: 245 Seiten

Preis: 96,29 €

Biografische Anmerkung
Inhaltsverzeichnis

Madhusudan Singh is an Assistant Professor/Director of ReBlockchain Research Group at School of Technology Studies, ECIS, Woosong University, South Korea. He is actively involved in entrepreneurialendeavors in Blockchain Technologies with Artificial Intelligence, Information Security, and Autonomous vehicles. And in his career, he has worked as a senior engineer in the R&D division at Samsung Display, Korea, and Research Professor in YICT, Yonsei University, Korea. He serves as a distinguished speaker forIEEE Computer Society and ACM Society, and as a senior member of IEEE. He has completed his Ph.D. in the Dept. of Ubiquitous IT at Dongseo University, South Korea, and M. Tech. Degree in Software Engineering at Indian Institute of Information Technology, Allahabad (IIIT-A), India.He has published several books as author/editor,10+Patents and 60+ research articles. 



Introduction


a. Cyber Physical System


b. Threat, Risk and Vulnerability models


c. Intelligent Autonomous Vehicle (IAV) Technology


d. Security issues in IAV Technology


e. Summary



2. Cyber Security for IAV


a. Overview


b. Issues


c. Vulnerability


d. Threats


e. Attacks


f. Security


g. Summary



3. Fundamental of Cryptography


a. Encryption


b. Decryption


c. Signatures


d. Certificates


e. Key Management


f. Hash Functions


g. Summary



4. Security Standards


a. SAE Security Standard


b. ITS Security Standard


c. Vehicle Security Standard Comparison


d. Summary



5. IAV Communication Cybersecurity Overview


a. IAV Communication


b. In-vehicle Communication


c. Vehicle-to-Infrastructure Communication


d. Vehicle-to-device Communication


e. Wireless Access vehicle Environment (Wave)


f. Dedicated Short Range Communication (DSRC)


g. Communication Standards


h. Security issues in Intelligent Autonomous Vehicle Communi-cation


i. Summary



6. Vehicle-2-Infrastructure(V2X) Communication Security


a. General


b. V2X Communication


c. V2X Communication Security


d. Summary




7. In-Vehicle Security


a. Overview


b. In-Vehicle Security Issues


c. Embedded security


d. Software Security


e. In-Vehicle Standardization


f. Summary




8. Vehicle-2-Device (V2D) Security


a. Overview


b. Vehicle-2-device Security issues


c. Vehicle-2-device security solutions


d. Standards


e. Summary



9. Cybersecurity for IAV, Projects and Solution


a. Industry Projects


b. Government Projects


c. Research organization Projects


andere Formate