Verifiable Privacy Protection for Vehicular Communication Systems

Verifiable Privacy Protection for Vehicular Communication Systems
Author :
Publisher : Springer
Total Pages : 157
Release :
ISBN-10 : 9783658185503
ISBN-13 : 3658185503
Rating : 4/5 (03 Downloads)

Synopsis Verifiable Privacy Protection for Vehicular Communication Systems by : David Förster

David Förster examines privacy protection for vehicular communication under the assumption of an attacker that is able to compromise back-end systems – motivated by the large number of recent security incidents and revelations about mass surveillance. The author aims for verifiable privacy protection enforced through cryptographic and technical means, which safeguards user data even if back-end systems are not fully trusted. Förster applies advanced cryptographic concepts, such as anonymous credentials, and introduces a novel decentralized secret sharing algorithm to fulfill complex and seemingly contradicting requirements in several vehicle-to-x application scenarios. Many of the concepts and results can also be applied to other flavors of internet of things systems.

Networking Vehicles to Everything

Networking Vehicles to Everything
Author :
Publisher : Walter de Gruyter GmbH & Co KG
Total Pages : 230
Release :
ISBN-10 : 9781501507205
ISBN-13 : 1501507206
Rating : 4/5 (05 Downloads)

Synopsis Networking Vehicles to Everything by : Markus Mueck

Intro -- Acknowledgments -- Contents -- Preface -- Chapter 1. Introduction -- Chapter 2. Applications and Use Cases -- Chapter 3. V2X Requirements, Standards, and Regulations -- Chapter 4. Technologies -- Chapter 5. V2X networking and connectivity -- Chapter 6. Infotainment -- Chapter 7. Software Reconfiguration -- Chapter 8. Outlook -- Appendix A -- Index

Embedded Security in Cars

Embedded Security in Cars
Author :
Publisher : Springer Science & Business Media
Total Pages : 271
Release :
ISBN-10 : 9783540284284
ISBN-13 : 3540284281
Rating : 4/5 (84 Downloads)

Synopsis Embedded Security in Cars by : Kerstin Lemke

Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive IT systems against manipulation or intrusion has only recently started to emerge. Lemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive applications. After an introductory chapter written by the editors themselves, the contributions from experienced experts of different disciplines are structured into three parts. "Security in the Automotive Domain" describes applications for which IT security is crucial, like immobilizers, tachographs, and software updates. "Embedded Security Technologies" details security technologies relevant for automotive applications, e.g., symmetric and asymmetric cryptography, and wireless security. "Business Aspects of IT Systems in Cars" shows the need for embedded security in novel applications like location-based navigation systems and personalization. The first book in this area of fast-growing economic and scientific importance, it is indispensable for both researchers in software or embedded security and professionals in the automotive industry.

Vehicle Safety Communications

Vehicle Safety Communications
Author :
Publisher : John Wiley & Sons
Total Pages : 314
Release :
ISBN-10 : 9781118452196
ISBN-13 : 1118452194
Rating : 4/5 (96 Downloads)

Synopsis Vehicle Safety Communications by : Tao Zhang

Provides an up-to-date, in-depth look at the current research, design, and implementation of cooperative vehicle safety communication protocols and technology Improving traffic safety has been a top concern for transportation agencies around the world and the focus of heavy research and development efforts sponsored by both governments and private industries. Cooperative vehicle systems—which use sensors and wireless technologies to reduce traffic accidents—can play a major role in making the world's roads safer. Vehicle Safety Communications: Protocols, Security, and Privacy describes fundamental issues in cooperative vehicle safety and recent advances in technologies for enabling cooperative vehicle safety. It gives an overview of traditional vehicle safety issues, the evolution of vehicle safety technologies, and the need for cooperative systems where vehicles work together to reduce the number of crashes or mitigate damage when crashes become unavoidable. Authored by two top industry professionals, the book: Summarizes the history and current status of 5.9 GHz Dedicated Short Range Communications (DSRC) technology and standardization, discussing key issues in applying DSRC to support cooperative vehicle safety Features an in-depth overview of on-board equipment (OBE) and roadside equipment (RSE) by describing sample designs to illustrate the key issues and potential solutions Takes on security and privacy protection requirements and challenges, including how to design privacy-preserving digital certificate management systems and how to evict misbehaving vehicles Includes coverage of vehicle-to-infrastructure (V2I) communications like intersection collision avoidance applications and vehicle-to-vehicle (V2V) communications like extended electronic brake lights and intersection movement assist Vehicle Safety Communications is ideal for anyone working in the areas of—or studying—cooperative vehicle safety and vehicle communications.

Ad Hoc Networks

Ad Hoc Networks
Author :
Publisher : Springer
Total Pages : 927
Release :
ISBN-10 : 9783642117237
ISBN-13 : 3642117236
Rating : 4/5 (37 Downloads)

Synopsis Ad Hoc Networks by : Shiwen Mao

Ad hoc networks refer to the wireless networking paradigm that covers a variety of network forms for specific purposes, such as mobile ad hoc networks, sensor n- works, vehicular networks, underwater networks, underground networks, personal area networks, and home networks. The various forms of ad hoc networks promise a broad scope of applications in civilian, commercial, and military areas, which have led to significant new research problems and challenges, and have attracted great efforts from academia, industry, and government. This unique networking paradigm neces- tates re-examination of many established wireless networking concepts and protocols, and calls for developing new fundamental understanding of problems such as interf- ence, mobility, connectivity, capacity, and security, among others. While it is ess- tial to advance theoretical research on fundamentals and practical research on efficient algorithms and protocols, it is also critical to develop useful applications, experim- tal prototypes, and real-world deployments to achieve a practical impact on our so- ety for the success of this networking paradigm. The annual International Conference on Ad Hoc Networks (AdHocNets) is a new event that aims at providing a forum to bring together researchers from academia as well as practitioners from industry and government to meet and exchange ideas and recent research work on all aspects of ad hoc networks. As the first edition of this event, AdHocNets 2009 was successfully held in Niagara Falls, Ontario, Canada, during September 22–25, 2009.

Explainable Artificial Intelligence for Intelligent Transportation Systems

Explainable Artificial Intelligence for Intelligent Transportation Systems
Author :
Publisher : CRC Press
Total Pages : 286
Release :
ISBN-10 : 9781000968439
ISBN-13 : 100096843X
Rating : 4/5 (39 Downloads)

Synopsis Explainable Artificial Intelligence for Intelligent Transportation Systems by : Amina Adadi

Artificial Intelligence (AI) and Machine Learning (ML) are set to revolutionize all industries, and the Intelligent Transportation Systems (ITS) field is no exception. While ML, especially deep learning models, achieve great performance in terms of accuracy, the outcomes provided are not amenable to human scrutiny and can hardly be explained. This can be very problematic, especially for systems of a safety-critical nature such as transportation systems. Explainable AI (XAI) methods have been proposed to tackle this issue by producing human interpretable representations of machine learning models while maintaining performance. These methods hold the potential to increase public acceptance and trust in AI-based ITS. FEATURES: Provides the necessary background for newcomers to the field (both academics and interested practitioners) Presents a timely snapshot of explainable and interpretable models in ITS applications Discusses ethical, societal, and legal implications of adopting XAI in the context of ITS Identifies future research directions and open problems

Exploration of Novel Intelligent Optimization Algorithms

Exploration of Novel Intelligent Optimization Algorithms
Author :
Publisher : Springer Nature
Total Pages : 517
Release :
ISBN-10 : 9789811941092
ISBN-13 : 9811941092
Rating : 4/5 (92 Downloads)

Synopsis Exploration of Novel Intelligent Optimization Algorithms by : Kangshun Li

This book constitutes the refereed proceedings of the 12th International Symposium, ISICA 2021, held in Guangzhou, China, during November 19–21, 2021. The 48 full papers included in this book were carefully reviewed and selected from 99 submissions. They were organized in topical sections as follows: new frontier of multi-objective evolutionary algorithms; intelligent multi-media; data modeling and application of artificial intelligence; exploration of novel intelligent optimization algorithm; and intelligent application of industrial production.

Blockchain for Cybersecurity and Privacy

Blockchain for Cybersecurity and Privacy
Author :
Publisher : CRC Press
Total Pages : 291
Release :
ISBN-10 : 9781000060249
ISBN-13 : 1000060241
Rating : 4/5 (49 Downloads)

Synopsis Blockchain for Cybersecurity and Privacy by : Yassine Maleh

Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not matter. Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology and may be more so in the future. Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications is an invaluable resource to discover the blockchain applications for cybersecurity and privacy. The purpose of this book is to improve the awareness of readers about blockchain technology applications for cybersecurity and privacy. This book focuses on the fundamentals, architectures, and challenges of adopting blockchain for cybersecurity. Readers will discover different applications of blockchain for cybersecurity in IoT and healthcare. The book also includes some case studies of the blockchain for e-commerce online payment, retention payment system, and digital forensics. The book offers comprehensive coverage of the most essential topics, including: Blockchain architectures and challenges Blockchain threats and vulnerabilities Blockchain security and potential future use cases Blockchain for securing Internet of Things Blockchain for cybersecurity in healthcare Blockchain in facilitating payment system security and privacy This book comprises a number of state-of-the-art contributions from both scientists and practitioners working in the fields of blockchain technology and cybersecurity. It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on the blockchain for cybersecurity and privacy.

Machine Learning for Cyber Security

Machine Learning for Cyber Security
Author :
Publisher : Springer Nature
Total Pages : 640
Release :
ISBN-10 : 9783031200991
ISBN-13 : 3031200993
Rating : 4/5 (91 Downloads)

Synopsis Machine Learning for Cyber Security by : Yuan Xu

The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China. The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions.