Madhusudan Singh is an Assistant Professor/Director of ReBlockchain Research Group at School of Technology Studies, ECIS, Woosong University, South Korea. He is actively involved in entrepreneurialendeavors in Blockchain Technologies with Artificial Intelligence, Information Security, and Autonomous vehicles. And in his career, he has worked as a senior engineer in the R&D division at Samsung Display, Korea, and Research Professor in YICT, Yonsei University, Korea. He serves as a distinguished speaker forIEEE Computer Society and ACM Society, and as a senior member of IEEE. He has completed his Ph.D. in the Dept. of Ubiquitous IT at Dongseo University, South Korea, and M. Tech. Degree in Software Engineering at Indian Institute of Information Technology, Allahabad (IIIT-A), India.He has published several books as author/editor,10+Patents and 60+ research articles.
Introduction
a. Cyber Physical System
b. Threat, Risk and Vulnerability models
c. Intelligent Autonomous Vehicle (IAV) Technology
d. Security issues in IAV Technology
e. Summary
2. Cyber Security for IAV
a. Overview
b. Issues
c. Vulnerability
d. Threats
e. Attacks
f. Security
g. Summary
3. Fundamental of Cryptography
a. Encryption
b. Decryption
c. Signatures
d. Certificates
e. Key Management
f. Hash Functions
g. Summary
4. Security Standards
a. SAE Security Standard
b. ITS Security Standard
c. Vehicle Security Standard Comparison
d. Summary
5. IAV Communication Cybersecurity Overview
a. IAV Communication
b. In-vehicle Communication
c. Vehicle-to-Infrastructure Communication
d. Vehicle-to-device Communication
e. Wireless Access vehicle Environment (Wave)
f. Dedicated Short Range Communication (DSRC)
g. Communication Standards
h. Security issues in Intelligent Autonomous Vehicle Communi-cation
i. Summary
6. Vehicle-2-Infrastructure(V2X) Communication Security
a. General
b. V2X Communication
c. V2X Communication Security
d. Summary
7. In-Vehicle Security
a. Overview
b. In-Vehicle Security Issues
c. Embedded security
d. Software Security
e. In-Vehicle Standardization
f. Summary
8. Vehicle-2-Device (V2D) Security
a. Overview
b. Vehicle-2-device Security issues
c. Vehicle-2-device security solutions
d. Standards
e. Summary
a. Industry Projects
b. Government Projects
c. Research organization Projects