Eine Plattform für die Wissenschaft: Bauingenieurwesen, Architektur und Urbanistik
Vehicle safety communications : protocols, security, and privacy
"Provides an up-to-date, in-depth look at current crucial issues in the research community, automotive industry, and government agencies around the world"--
"Owing to their safety applications, cooperative vehicle systems, which use sensors and wireless technologies to reduce traffic accidents, continue to be the focus of heavy research and development efforts around the world. Written by industry professionals, this book provides a systematic description of cooperative vehicle systems, discussing key technical issues in such systems, the latest advances in enabling technologies, and cutting-edge research trends. Coverage includes important technologies such as 5.9 GHz Dedicated Short Range Communications (DSRC), on-board equipment (OBE), and roadside equipment (RSE)"--
15.10.WAYS FOR VEHICLES TO ACQUIRE CRLs.
14.5.DIFFIE-HELLMAN KEY ESTABLISHMENT PROTOCOL14.6 ELLIPTIC CURVE INTEGRATED ENCRYPTION SCHEME (ECIES) --15.PUBLIC KEY INFRASTRUCTURE FOR VEHICLE NETWORKS --15.1.INTRODUCTION --15.2.PUBLIC KEY CERTIFICATES --15.3.MESSAGE AUTHENTICATION WITH CERTIFICATES --15.4.CERTIFICATE REVOCATION LIST --15.5.A BASELINE REFERENCE VEHICULAR PKI MODEL --15.6.CONFIGURE INITIAL SECURITY PARAMETERS AND ASSIGN INITIAL CERTIFICATES --15.7.ACQUIRE NEW KEYS AND CERTIFICATES --15.8.DISTRIBUTE CERTIFICATES TO VEHICLES FOR SIGNATURE VERIFICATIONS --15.9.DETECT MISUSED CERTIFICATES AND MISBEHAVING VEHICLES.
12.DSRC SCALABILITY12.1 INTRODUCTION --12.2.DSRC DATA TRAFFIC --12.3.CONGESTION CONTROL ALGORITHMS --12.4.CONCLUSIONS --13.SECURITY AND PRIVACY THREATS AND REQUIREMENTS --13.1.INTRODUCTION --13.2.ADVERSARIES --13.3.SECURITY THREATS --13.4.PRIVACY THREATS --13.5.BASIC SECURITY CAPABILITIES --13.6.PRIVACY PROTECTIONS CAPABILITIES --13.7.DESIGN AND PERFORMANCE CONSIDERATIONS --14.CRYPTOGRAPHIC MECHANISMS --14.1.INTRODUCTION --14.2.CATEGORIES OF CRYPTOGRAPHIC MECHANISMS --14.3.DIGITAL SIGNATURE ALGORITHMS --14.4.MESSAGE AUTHENTICATION AND MESSAGE INTEGRITY VERIFICATION.
4.CONNECTED VEHICLES4.1 CONNECTED VEHICLE APPLICATIONS --4.2.UNIQUENESS IN CONSUMER VEHICLE NETWORKS --4.3.VEHICLE COMMUNICATION MODES --4.4.WIRELESS COMMUNICATIONS TECHNOLOGY FOR VEHICLES --5.DEDICATED SHORT-RANGE COMMUNICATIONS --5.1.THE 5.9 GHZ SPECTRUM --5.2.DSRC IN THE EUROPEAN UNION --5.3.DSRC IN JAPAN --5.4.DSRC STANDARDS --6.WAVE PHYSICAL LAYER --6.1.PHYSICAL LAYER OPERATIONS --6.2.PHY AMENDMENTS --6.3.PHY LAYER MODELING --7.WAVE MEDIA ACCESS CONTROL LAYER --7.1.MEDIA ACCESS CONTROL LAYER OPERATIONS --7.2.MAC LAYER AMENDMENTS --7.3.MAC LAYER MODELING --7.4.OVERHAULED NS-2 IMPLEMENTATION.
8.DSRC DATA RATES8.1 INTRODUCTION --8.2.COMMUNICATION DENSITY --8.3.OPTIMAL DATA RATE --9.WAVE UPPER LAYERS --9.1.INTRODUCTION --9.2.DSRC MULTICHANNEL OPERATIONS --9.3.PROTOCOL EVALUATION --9.4.WAVE SHORT MESSAGE PROTOCOL --10.VEHICLE-TO-INFRASTRUCTURE SAFETY APPLICATIONS --10.1.INTERSECTION CRASHES --10.2.COOPERATIVE INTERSECTION COLLISION AVOIDANCE SYSTEM FOR VIOLATIONS --10.3.INTEGRATED SAFETY DEMONSTRATION --11.VEHICLE-TO-VEHICLE SAFETY APPLICATIONS --11.1.COOPERATION AMONG VEHICLES --11.2.V2V SAFETY APPLICATIONS --11.3.V2V SAFETY APPLICATIONS DESIGN --11.4.SYSTEM IMPLEMENTATION --11.5.SYSTEM TESTING.
WILEY SERIES ON INFORMATION AND COMMUNICATION TECHNOLOGY --COPYRIGHT PAGE --FOREWORD --FOREWORD --FOREWORD --BOOK OUTLINE --1.TRAFFIC SAFETY --1.1.TRAFFIC SAFETY FACTS --1.2.EUROPEAN UNION --1.3.JAPAN --1.4.DEVELOPING COUNTRIES --2.AUTOMOTIVE SAFETY EVOLUTION --2.1.PASSIVE SAFETY --2.2.ACTIVE SAFETY --2.3.ADVANCED DRIVER ASSISTANCE SYSTEMS --2.4.COOPERATIVE SAFETY --3.VEHICLE ARCHITECTURES --3.1.ELECTRONIC CONTROL UNITS --3.2.VEHICLE SENSORS --3.3.ONBOARD COMMUNICATION NETWORKS --3.4.VEHICLE DATA --3.5.VEHICLE DATA SECURITY --3.6.VEHICLE POSITIONING.
Vehicle safety communications : protocols, security, and privacy
"Provides an up-to-date, in-depth look at current crucial issues in the research community, automotive industry, and government agencies around the world"--
"Owing to their safety applications, cooperative vehicle systems, which use sensors and wireless technologies to reduce traffic accidents, continue to be the focus of heavy research and development efforts around the world. Written by industry professionals, this book provides a systematic description of cooperative vehicle systems, discussing key technical issues in such systems, the latest advances in enabling technologies, and cutting-edge research trends. Coverage includes important technologies such as 5.9 GHz Dedicated Short Range Communications (DSRC), on-board equipment (OBE), and roadside equipment (RSE)"--
15.10.WAYS FOR VEHICLES TO ACQUIRE CRLs.
14.5.DIFFIE-HELLMAN KEY ESTABLISHMENT PROTOCOL14.6 ELLIPTIC CURVE INTEGRATED ENCRYPTION SCHEME (ECIES) --15.PUBLIC KEY INFRASTRUCTURE FOR VEHICLE NETWORKS --15.1.INTRODUCTION --15.2.PUBLIC KEY CERTIFICATES --15.3.MESSAGE AUTHENTICATION WITH CERTIFICATES --15.4.CERTIFICATE REVOCATION LIST --15.5.A BASELINE REFERENCE VEHICULAR PKI MODEL --15.6.CONFIGURE INITIAL SECURITY PARAMETERS AND ASSIGN INITIAL CERTIFICATES --15.7.ACQUIRE NEW KEYS AND CERTIFICATES --15.8.DISTRIBUTE CERTIFICATES TO VEHICLES FOR SIGNATURE VERIFICATIONS --15.9.DETECT MISUSED CERTIFICATES AND MISBEHAVING VEHICLES.
12.DSRC SCALABILITY12.1 INTRODUCTION --12.2.DSRC DATA TRAFFIC --12.3.CONGESTION CONTROL ALGORITHMS --12.4.CONCLUSIONS --13.SECURITY AND PRIVACY THREATS AND REQUIREMENTS --13.1.INTRODUCTION --13.2.ADVERSARIES --13.3.SECURITY THREATS --13.4.PRIVACY THREATS --13.5.BASIC SECURITY CAPABILITIES --13.6.PRIVACY PROTECTIONS CAPABILITIES --13.7.DESIGN AND PERFORMANCE CONSIDERATIONS --14.CRYPTOGRAPHIC MECHANISMS --14.1.INTRODUCTION --14.2.CATEGORIES OF CRYPTOGRAPHIC MECHANISMS --14.3.DIGITAL SIGNATURE ALGORITHMS --14.4.MESSAGE AUTHENTICATION AND MESSAGE INTEGRITY VERIFICATION.
4.CONNECTED VEHICLES4.1 CONNECTED VEHICLE APPLICATIONS --4.2.UNIQUENESS IN CONSUMER VEHICLE NETWORKS --4.3.VEHICLE COMMUNICATION MODES --4.4.WIRELESS COMMUNICATIONS TECHNOLOGY FOR VEHICLES --5.DEDICATED SHORT-RANGE COMMUNICATIONS --5.1.THE 5.9 GHZ SPECTRUM --5.2.DSRC IN THE EUROPEAN UNION --5.3.DSRC IN JAPAN --5.4.DSRC STANDARDS --6.WAVE PHYSICAL LAYER --6.1.PHYSICAL LAYER OPERATIONS --6.2.PHY AMENDMENTS --6.3.PHY LAYER MODELING --7.WAVE MEDIA ACCESS CONTROL LAYER --7.1.MEDIA ACCESS CONTROL LAYER OPERATIONS --7.2.MAC LAYER AMENDMENTS --7.3.MAC LAYER MODELING --7.4.OVERHAULED NS-2 IMPLEMENTATION.
8.DSRC DATA RATES8.1 INTRODUCTION --8.2.COMMUNICATION DENSITY --8.3.OPTIMAL DATA RATE --9.WAVE UPPER LAYERS --9.1.INTRODUCTION --9.2.DSRC MULTICHANNEL OPERATIONS --9.3.PROTOCOL EVALUATION --9.4.WAVE SHORT MESSAGE PROTOCOL --10.VEHICLE-TO-INFRASTRUCTURE SAFETY APPLICATIONS --10.1.INTERSECTION CRASHES --10.2.COOPERATIVE INTERSECTION COLLISION AVOIDANCE SYSTEM FOR VIOLATIONS --10.3.INTEGRATED SAFETY DEMONSTRATION --11.VEHICLE-TO-VEHICLE SAFETY APPLICATIONS --11.1.COOPERATION AMONG VEHICLES --11.2.V2V SAFETY APPLICATIONS --11.3.V2V SAFETY APPLICATIONS DESIGN --11.4.SYSTEM IMPLEMENTATION --11.5.SYSTEM TESTING.
WILEY SERIES ON INFORMATION AND COMMUNICATION TECHNOLOGY --COPYRIGHT PAGE --FOREWORD --FOREWORD --FOREWORD --BOOK OUTLINE --1.TRAFFIC SAFETY --1.1.TRAFFIC SAFETY FACTS --1.2.EUROPEAN UNION --1.3.JAPAN --1.4.DEVELOPING COUNTRIES --2.AUTOMOTIVE SAFETY EVOLUTION --2.1.PASSIVE SAFETY --2.2.ACTIVE SAFETY --2.3.ADVANCED DRIVER ASSISTANCE SYSTEMS --2.4.COOPERATIVE SAFETY --3.VEHICLE ARCHITECTURES --3.1.ELECTRONIC CONTROL UNITS --3.2.VEHICLE SENSORS --3.3.ONBOARD COMMUNICATION NETWORKS --3.4.VEHICLE DATA --3.5.VEHICLE DATA SECURITY --3.6.VEHICLE POSITIONING.
Vehicle safety communications : protocols, security, and privacy
Delgrossi, Luca (Autor:in) / Zhang, Tao
2012
1 Online-Ressource (1 online resource)
Includes bibliographical references and index
Buch
Elektronische Ressource
Englisch
DDC:
629.2/76
IoT Security, Privacy, Safety and Ethics
Springer Verlag | 2019
|British Library Online Contents | 1999
|SECURITY PROTOCOLS AND PERFORMANCE
British Library Online Contents | 2000
|