Verifiable Privacy Protection for Vehicular Communication Systems

Verifiable Privacy Protection for Vehicular Communication Systems PDF Author: David Förster
Publisher: Springer
ISBN: 3658185503
Category : Computers
Languages : en
Pages : 157

Get Book Here

Book Description
David Förster examines privacy protection for vehicular communication under the assumption of an attacker that is able to compromise back-end systems – motivated by the large number of recent security incidents and revelations about mass surveillance. The author aims for verifiable privacy protection enforced through cryptographic and technical means, which safeguards user data even if back-end systems are not fully trusted. Förster applies advanced cryptographic concepts, such as anonymous credentials, and introduces a novel decentralized secret sharing algorithm to fulfill complex and seemingly contradicting requirements in several vehicle-to-x application scenarios. Many of the concepts and results can also be applied to other flavors of internet of things systems.

Verifiable Privacy Protection for Vehicular Communication Systems

Verifiable Privacy Protection for Vehicular Communication Systems PDF Author: David Förster
Publisher: Springer
ISBN: 3658185503
Category : Computers
Languages : en
Pages : 157

Get Book Here

Book Description
David Förster examines privacy protection for vehicular communication under the assumption of an attacker that is able to compromise back-end systems – motivated by the large number of recent security incidents and revelations about mass surveillance. The author aims for verifiable privacy protection enforced through cryptographic and technical means, which safeguards user data even if back-end systems are not fully trusted. Förster applies advanced cryptographic concepts, such as anonymous credentials, and introduces a novel decentralized secret sharing algorithm to fulfill complex and seemingly contradicting requirements in several vehicle-to-x application scenarios. Many of the concepts and results can also be applied to other flavors of internet of things systems.

Networking Vehicles to Everything

Networking Vehicles to Everything PDF Author: Markus Mueck
Publisher: Walter de Gruyter GmbH & Co KG
ISBN: 1501507206
Category : Computers
Languages : en
Pages : 230

Get Book Here

Book Description
Intro -- Acknowledgments -- Contents -- Preface -- Chapter 1. Introduction -- Chapter 2. Applications and Use Cases -- Chapter 3. V2X Requirements, Standards, and Regulations -- Chapter 4. Technologies -- Chapter 5. V2X networking and connectivity -- Chapter 6. Infotainment -- Chapter 7. Software Reconfiguration -- Chapter 8. Outlook -- Appendix A -- Index

Vehicle Safety Communications

Vehicle Safety Communications PDF Author: Tao Zhang
Publisher: John Wiley & Sons
ISBN: 1118452194
Category : Technology & Engineering
Languages : en
Pages : 314

Get Book Here

Book Description
Provides an up-to-date, in-depth look at the current research, design, and implementation of cooperative vehicle safety communication protocols and technology Improving traffic safety has been a top concern for transportation agencies around the world and the focus of heavy research and development efforts sponsored by both governments and private industries. Cooperative vehicle systems—which use sensors and wireless technologies to reduce traffic accidents—can play a major role in making the world's roads safer. Vehicle Safety Communications: Protocols, Security, and Privacy describes fundamental issues in cooperative vehicle safety and recent advances in technologies for enabling cooperative vehicle safety. It gives an overview of traditional vehicle safety issues, the evolution of vehicle safety technologies, and the need for cooperative systems where vehicles work together to reduce the number of crashes or mitigate damage when crashes become unavoidable. Authored by two top industry professionals, the book: Summarizes the history and current status of 5.9 GHz Dedicated Short Range Communications (DSRC) technology and standardization, discussing key issues in applying DSRC to support cooperative vehicle safety Features an in-depth overview of on-board equipment (OBE) and roadside equipment (RSE) by describing sample designs to illustrate the key issues and potential solutions Takes on security and privacy protection requirements and challenges, including how to design privacy-preserving digital certificate management systems and how to evict misbehaving vehicles Includes coverage of vehicle-to-infrastructure (V2I) communications like intersection collision avoidance applications and vehicle-to-vehicle (V2V) communications like extended electronic brake lights and intersection movement assist Vehicle Safety Communications is ideal for anyone working in the areas of—or studying—cooperative vehicle safety and vehicle communications.

Embedded Security in Cars

Embedded Security in Cars PDF Author: Kerstin Lemke
Publisher: Springer Science & Business Media
ISBN: 3540284281
Category : Computers
Languages : en
Pages : 271

Get Book Here

Book Description
Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive IT systems against manipulation or intrusion has only recently started to emerge. Lemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive applications. After an introductory chapter written by the editors themselves, the contributions from experienced experts of different disciplines are structured into three parts. "Security in the Automotive Domain" describes applications for which IT security is crucial, like immobilizers, tachographs, and software updates. "Embedded Security Technologies" details security technologies relevant for automotive applications, e.g., symmetric and asymmetric cryptography, and wireless security. "Business Aspects of IT Systems in Cars" shows the need for embedded security in novel applications like location-based navigation systems and personalization. The first book in this area of fast-growing economic and scientific importance, it is indispensable for both researchers in software or embedded security and professionals in the automotive industry.

Ad Hoc Networks

Ad Hoc Networks PDF Author: Shiwen Mao
Publisher: Springer
ISBN: 3642117236
Category : Computers
Languages : en
Pages : 927

Get Book Here

Book Description
Ad hoc networks refer to the wireless networking paradigm that covers a variety of network forms for specific purposes, such as mobile ad hoc networks, sensor n- works, vehicular networks, underwater networks, underground networks, personal area networks, and home networks. The various forms of ad hoc networks promise a broad scope of applications in civilian, commercial, and military areas, which have led to significant new research problems and challenges, and have attracted great efforts from academia, industry, and government. This unique networking paradigm neces- tates re-examination of many established wireless networking concepts and protocols, and calls for developing new fundamental understanding of problems such as interf- ence, mobility, connectivity, capacity, and security, among others. While it is ess- tial to advance theoretical research on fundamentals and practical research on efficient algorithms and protocols, it is also critical to develop useful applications, experim- tal prototypes, and real-world deployments to achieve a practical impact on our so- ety for the success of this networking paradigm. The annual International Conference on Ad Hoc Networks (AdHocNets) is a new event that aims at providing a forum to bring together researchers from academia as well as practitioners from industry and government to meet and exchange ideas and recent research work on all aspects of ad hoc networks. As the first edition of this event, AdHocNets 2009 was successfully held in Niagara Falls, Ontario, Canada, during September 22–25, 2009.

Vehicular Social Networks

Vehicular Social Networks PDF Author: Anna Maria Vegni
Publisher: CRC Press
ISBN: 1498749208
Category : Computers
Languages : en
Pages : 192

Get Book Here

Book Description
The book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects applied to vehicular environments. Selected topics are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, and novel trends and challenges in VSNs. It provides significant technical and practical insights in different aspects from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.

Explainable Artificial Intelligence for Intelligent Transportation Systems

Explainable Artificial Intelligence for Intelligent Transportation Systems PDF Author: Amina Adadi
Publisher: CRC Press
ISBN: 100096843X
Category : Technology & Engineering
Languages : en
Pages : 286

Get Book Here

Book Description
Artificial Intelligence (AI) and Machine Learning (ML) are set to revolutionize all industries, and the Intelligent Transportation Systems (ITS) field is no exception. While ML, especially deep learning models, achieve great performance in terms of accuracy, the outcomes provided are not amenable to human scrutiny and can hardly be explained. This can be very problematic, especially for systems of a safety-critical nature such as transportation systems. Explainable AI (XAI) methods have been proposed to tackle this issue by producing human interpretable representations of machine learning models while maintaining performance. These methods hold the potential to increase public acceptance and trust in AI-based ITS. FEATURES: Provides the necessary background for newcomers to the field (both academics and interested practitioners) Presents a timely snapshot of explainable and interpretable models in ITS applications Discusses ethical, societal, and legal implications of adopting XAI in the context of ITS Identifies future research directions and open problems

Exploration of Novel Intelligent Optimization Algorithms

Exploration of Novel Intelligent Optimization Algorithms PDF Author: Kangshun Li
Publisher: Springer Nature
ISBN: 9811941092
Category : Computers
Languages : en
Pages : 517

Get Book Here

Book Description
This book constitutes the refereed proceedings of the 12th International Symposium, ISICA 2021, held in Guangzhou, China, during November 19–21, 2021. The 48 full papers included in this book were carefully reviewed and selected from 99 submissions. They were organized in topical sections as follows: new frontier of multi-objective evolutionary algorithms; intelligent multi-media; data modeling and application of artificial intelligence; exploration of novel intelligent optimization algorithm; and intelligent application of industrial production.

Database Systems for Advanced Applications

Database Systems for Advanced Applications PDF Author: Makoto Onizuka
Publisher: Springer Nature
ISBN: 981975562X
Category :
Languages : en
Pages : 564

Get Book Here

Book Description


Blockchain for Cybersecurity and Privacy

Blockchain for Cybersecurity and Privacy PDF Author: Yassine Maleh
Publisher: CRC Press
ISBN: 1000060241
Category : Computers
Languages : en
Pages : 291

Get Book Here

Book Description
Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not matter. Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology and may be more so in the future. Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications is an invaluable resource to discover the blockchain applications for cybersecurity and privacy. The purpose of this book is to improve the awareness of readers about blockchain technology applications for cybersecurity and privacy. This book focuses on the fundamentals, architectures, and challenges of adopting blockchain for cybersecurity. Readers will discover different applications of blockchain for cybersecurity in IoT and healthcare. The book also includes some case studies of the blockchain for e-commerce online payment, retention payment system, and digital forensics. The book offers comprehensive coverage of the most essential topics, including: Blockchain architectures and challenges Blockchain threats and vulnerabilities Blockchain security and potential future use cases Blockchain for securing Internet of Things Blockchain for cybersecurity in healthcare Blockchain in facilitating payment system security and privacy This book comprises a number of state-of-the-art contributions from both scientists and practitioners working in the fields of blockchain technology and cybersecurity. It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on the blockchain for cybersecurity and privacy.