Verifiable Privacy Protection for Vehicular Communication Systems

Verifiable Privacy Protection for Vehicular Communication Systems

Author: David Förster

Publisher: Springer

Published: 2017-05-31

Total Pages: 157

ISBN-13: 3658185503

DOWNLOAD EBOOK

David Förster examines privacy protection for vehicular communication under the assumption of an attacker that is able to compromise back-end systems – motivated by the large number of recent security incidents and revelations about mass surveillance. The author aims for verifiable privacy protection enforced through cryptographic and technical means, which safeguards user data even if back-end systems are not fully trusted. Förster applies advanced cryptographic concepts, such as anonymous credentials, and introduces a novel decentralized secret sharing algorithm to fulfill complex and seemingly contradicting requirements in several vehicle-to-x application scenarios. Many of the concepts and results can also be applied to other flavors of internet of things systems.


Networking Vehicles to Everything

Networking Vehicles to Everything

Author: Markus Mueck

Publisher: Walter de Gruyter GmbH & Co KG

Published: 2018

Total Pages: 230

ISBN-13: 1501507206

DOWNLOAD EBOOK

Intro -- Acknowledgments -- Contents -- Preface -- Chapter 1. Introduction -- Chapter 2. Applications and Use Cases -- Chapter 3. V2X Requirements, Standards, and Regulations -- Chapter 4. Technologies -- Chapter 5. V2X networking and connectivity -- Chapter 6. Infotainment -- Chapter 7. Software Reconfiguration -- Chapter 8. Outlook -- Appendix A -- Index


Vehicle Safety Communications

Vehicle Safety Communications

Author: Tao Zhang

Publisher: John Wiley & Sons

Published: 2012-09-04

Total Pages: 314

ISBN-13: 1118452194

DOWNLOAD EBOOK

Provides an up-to-date, in-depth look at the current research, design, and implementation of cooperative vehicle safety communication protocols and technology Improving traffic safety has been a top concern for transportation agencies around the world and the focus of heavy research and development efforts sponsored by both governments and private industries. Cooperative vehicle systems—which use sensors and wireless technologies to reduce traffic accidents—can play a major role in making the world's roads safer. Vehicle Safety Communications: Protocols, Security, and Privacy describes fundamental issues in cooperative vehicle safety and recent advances in technologies for enabling cooperative vehicle safety. It gives an overview of traditional vehicle safety issues, the evolution of vehicle safety technologies, and the need for cooperative systems where vehicles work together to reduce the number of crashes or mitigate damage when crashes become unavoidable. Authored by two top industry professionals, the book: Summarizes the history and current status of 5.9 GHz Dedicated Short Range Communications (DSRC) technology and standardization, discussing key issues in applying DSRC to support cooperative vehicle safety Features an in-depth overview of on-board equipment (OBE) and roadside equipment (RSE) by describing sample designs to illustrate the key issues and potential solutions Takes on security and privacy protection requirements and challenges, including how to design privacy-preserving digital certificate management systems and how to evict misbehaving vehicles Includes coverage of vehicle-to-infrastructure (V2I) communications like intersection collision avoidance applications and vehicle-to-vehicle (V2V) communications like extended electronic brake lights and intersection movement assist Vehicle Safety Communications is ideal for anyone working in the areas of—or studying—cooperative vehicle safety and vehicle communications.


Embedded Security in Cars

Embedded Security in Cars

Author: Kerstin Lemke

Publisher: Springer Science & Business Media

Published: 2006-03-28

Total Pages: 271

ISBN-13: 3540284281

DOWNLOAD EBOOK

Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive IT systems against manipulation or intrusion has only recently started to emerge. Lemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive applications. After an introductory chapter written by the editors themselves, the contributions from experienced experts of different disciplines are structured into three parts. "Security in the Automotive Domain" describes applications for which IT security is crucial, like immobilizers, tachographs, and software updates. "Embedded Security Technologies" details security technologies relevant for automotive applications, e.g., symmetric and asymmetric cryptography, and wireless security. "Business Aspects of IT Systems in Cars" shows the need for embedded security in novel applications like location-based navigation systems and personalization. The first book in this area of fast-growing economic and scientific importance, it is indispensable for both researchers in software or embedded security and professionals in the automotive industry.


Ad Hoc Networks

Ad Hoc Networks

Author: Shiwen Mao

Publisher: Springer

Published: 2010-01-23

Total Pages: 927

ISBN-13: 3642117236

DOWNLOAD EBOOK

Ad hoc networks refer to the wireless networking paradigm that covers a variety of network forms for specific purposes, such as mobile ad hoc networks, sensor n- works, vehicular networks, underwater networks, underground networks, personal area networks, and home networks. The various forms of ad hoc networks promise a broad scope of applications in civilian, commercial, and military areas, which have led to significant new research problems and challenges, and have attracted great efforts from academia, industry, and government. This unique networking paradigm neces- tates re-examination of many established wireless networking concepts and protocols, and calls for developing new fundamental understanding of problems such as interf- ence, mobility, connectivity, capacity, and security, among others. While it is ess- tial to advance theoretical research on fundamentals and practical research on efficient algorithms and protocols, it is also critical to develop useful applications, experim- tal prototypes, and real-world deployments to achieve a practical impact on our so- ety for the success of this networking paradigm. The annual International Conference on Ad Hoc Networks (AdHocNets) is a new event that aims at providing a forum to bring together researchers from academia as well as practitioners from industry and government to meet and exchange ideas and recent research work on all aspects of ad hoc networks. As the first edition of this event, AdHocNets 2009 was successfully held in Niagara Falls, Ontario, Canada, during September 22–25, 2009.


Vehicular Social Networks

Vehicular Social Networks

Author: Anna Maria Vegni

Publisher: CRC Press

Published: 2017-03-31

Total Pages: 192

ISBN-13: 1498749208

DOWNLOAD EBOOK

The book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects applied to vehicular environments. Selected topics are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, and novel trends and challenges in VSNs. It provides significant technical and practical insights in different aspects from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.


Explainable Artificial Intelligence for Intelligent Transportation Systems

Explainable Artificial Intelligence for Intelligent Transportation Systems

Author: Amina Adadi

Publisher: CRC Press

Published: 2023-10-20

Total Pages: 286

ISBN-13: 100096843X

DOWNLOAD EBOOK

Artificial Intelligence (AI) and Machine Learning (ML) are set to revolutionize all industries, and the Intelligent Transportation Systems (ITS) field is no exception. While ML, especially deep learning models, achieve great performance in terms of accuracy, the outcomes provided are not amenable to human scrutiny and can hardly be explained. This can be very problematic, especially for systems of a safety-critical nature such as transportation systems. Explainable AI (XAI) methods have been proposed to tackle this issue by producing human interpretable representations of machine learning models while maintaining performance. These methods hold the potential to increase public acceptance and trust in AI-based ITS. FEATURES: Provides the necessary background for newcomers to the field (both academics and interested practitioners) Presents a timely snapshot of explainable and interpretable models in ITS applications Discusses ethical, societal, and legal implications of adopting XAI in the context of ITS Identifies future research directions and open problems


Exploration of Novel Intelligent Optimization Algorithms

Exploration of Novel Intelligent Optimization Algorithms

Author: Kangshun Li

Publisher: Springer Nature

Published: 2022-07-31

Total Pages: 517

ISBN-13: 9811941092

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 12th International Symposium, ISICA 2021, held in Guangzhou, China, during November 19–21, 2021. The 48 full papers included in this book were carefully reviewed and selected from 99 submissions. They were organized in topical sections as follows: new frontier of multi-objective evolutionary algorithms; intelligent multi-media; data modeling and application of artificial intelligence; exploration of novel intelligent optimization algorithm; and intelligent application of industrial production.


Blockchain for Cybersecurity and Privacy

Blockchain for Cybersecurity and Privacy

Author: Yassine Maleh

Publisher: CRC Press

Published: 2020-08-03

Total Pages: 291

ISBN-13: 1000060241

DOWNLOAD EBOOK

Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not matter. Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology and may be more so in the future. Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications is an invaluable resource to discover the blockchain applications for cybersecurity and privacy. The purpose of this book is to improve the awareness of readers about blockchain technology applications for cybersecurity and privacy. This book focuses on the fundamentals, architectures, and challenges of adopting blockchain for cybersecurity. Readers will discover different applications of blockchain for cybersecurity in IoT and healthcare. The book also includes some case studies of the blockchain for e-commerce online payment, retention payment system, and digital forensics. The book offers comprehensive coverage of the most essential topics, including: Blockchain architectures and challenges Blockchain threats and vulnerabilities Blockchain security and potential future use cases Blockchain for securing Internet of Things Blockchain for cybersecurity in healthcare Blockchain in facilitating payment system security and privacy This book comprises a number of state-of-the-art contributions from both scientists and practitioners working in the fields of blockchain technology and cybersecurity. It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on the blockchain for cybersecurity and privacy.