Fr. 70.00

Multilayered Security and Privacy Protection in Car-to-X Networks - Solutions from Application down to Physical Layer

Englisch · Taschenbuch

Versand in der Regel in 6 bis 7 Wochen

Beschreibung

Mehr lesen

Car-to-X (C2X) communication in terms of Car-to-Car (C2C) and Car-to-Infrastructure (C2I) communication aims at increasing road safety and traffic efficiency by exchanging foresighted traffic information. Thereby, security and privacy are regarded as an absolute prerequisite for successfully establishing the C2X technology on the market. Towards the paramount objective of covering the entire ITS reference model with security and privacy measures, Hagen Stübing develops dedicated solutions for each layer, respectively. On application layer a security architecture in terms of a Public Key Infrastructure is presented, which provides low complexity and operational costs, while at the same time security and privacy constraints are preserved. On facility layer complementary security solutions based on mobility data verification are proposed, which promise efficient message content protection at a low computational complexity. On network layer a privacy protocol is presented aiming at a creation of cryptographic mix zones by means of group keys, which enhance privacy towards a global adversary. On physical layer a technique denoted as Secure C2X Beamforming is presented, which enhances privacy and security by means of radiation pattern control.

Inhaltsverzeichnis

Security and Privacy in Car-to-X Communication Networks.- Public Key Infrastructure.- Mobility Data Verification.- Privacy Protocols.- Secure Car-to-X Beamforming.

Über den Autor / die Autorin

Hagen Stübing completed his doctoral thesis at the department of Integrated Circuits and Systems Lab, Technische Universität Darmstadt, under the supervision of Prof. Dr.-Ing. Sorin A. Huss.

Zusammenfassung

Car-to-X (C2X) communication in terms of Car-to-Car (C2C) and Car-to-Infrastructure (C2I) communication aims at increasing road safety and traffic efficiency by exchanging foresighted traffic information. Thereby, security and privacy are regarded as an absolute prerequisite for successfully establishing the C2X technology on the market. Towards the paramount objective of covering the entire ITS reference model with security and privacy measures, Hagen Stübing develops dedicated solutions for each layer, respectively. On application layer a security architecture in terms of a Public Key Infrastructure is presented, which provides low complexity and operational costs, while at the same time security and privacy constraints are preserved. On facility layer complementary security solutions based on mobility data verification are proposed, which promise efficient message content protection at a low computational complexity. On network layer a privacy protocol is presented aiming at a creation of cryptographic mix zones by means of group keys, which enhance privacy towards a global adversary. On physical layer a technique denoted as Secure C2X Beamforming is presented, which enhances privacy and security by means of radiation pattern control.

Produktdetails

Autoren Hagen Stübing
Verlag Springer, Berlin
 
Sprache Englisch
Produktform Taschenbuch
Erschienen 30.06.2013
 
EAN 9783658025304
ISBN 978-3-658-02530-4
Seiten 191
Abmessung 150 mm x 14 mm x 210 mm
Gewicht 288 g
Illustration XVII, 191 p. 82 illus., 26 illus. in color.
Themen Naturwissenschaften, Medizin, Informatik, Technik > Informatik, EDV > Informatik

C, computer science, Computer Engineering and Networks, Computer Systems Organization and Communication Networks, Computer organization, Computer networking & communications, Distributed databases, Input/Output and Data Communications, Input-output equipment (Computers)

Kundenrezensionen

Zu diesem Artikel wurden noch keine Rezensionen verfasst. Schreibe die erste Bewertung und sei anderen Benutzern bei der Kaufentscheidung behilflich.

Schreibe eine Rezension

Top oder Flop? Schreibe deine eigene Rezension.

Für Mitteilungen an CeDe.ch kannst du das Kontaktformular benutzen.

Die mit * markierten Eingabefelder müssen zwingend ausgefüllt werden.

Mit dem Absenden dieses Formulars erklärst du dich mit unseren Datenschutzbestimmungen einverstanden.