Become a Readings Member to make your shopping experience even easier. Sign in or sign up for free!

Become a Readings Member. Sign in or sign up for free!

Hello Readings Member! Go to the member centre to view your orders, change your details, or view your lists, or sign out.

Hello Readings Member! Go to the member centre or sign out.

Multilayered Security and Privacy Protection in Car-to-X Networks: Solutions from Application down to Physical Layer
Paperback

Multilayered Security and Privacy Protection in Car-to-X Networks: Solutions from Application down to Physical Layer

$138.99
Sign in or become a Readings Member to add this title to your wishlist.

This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.

Car-to-X (C2X) communication in terms of Car-to-Car (C2C) and Car-to-Infrastructure (C2I) communication aims at increasing road safety and traffic efficiency by exchanging foresighted traffic information. Thereby, security and privacy are regarded as an absolute prerequisite for successfully establishing the C2X technology on the market. Towards the paramount objective of covering the entire ITS reference model with security and privacy measures, Hagen Stubing develops dedicated solutions for each layer, respectively. On application layer a security architecture in terms of a Public Key Infrastructure is presented, which provides low complexity and operational costs, while at the same time security and privacy constraints are preserved. On facility layer complementary security solutions based on mobility data verification are proposed, which promise efficient message content protection at a low computational complexity. On network layer a privacy protocol is presented aiming at a creation of cryptographic mix zones by means of group keys, which enhance privacy towards a global adversary. On physical layer a technique denoted as Secure C2X Beamforming is presented, which enhances privacy and security by means of radiation pattern control.

Read More
In Shop
Out of stock
Shipping & Delivery

$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout

MORE INFO
Format
Paperback
Publisher
Springer Fachmedien Wiesbaden
Country
Germany
Date
3 June 2013
Pages
191
ISBN
9783658025304

This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.

Car-to-X (C2X) communication in terms of Car-to-Car (C2C) and Car-to-Infrastructure (C2I) communication aims at increasing road safety and traffic efficiency by exchanging foresighted traffic information. Thereby, security and privacy are regarded as an absolute prerequisite for successfully establishing the C2X technology on the market. Towards the paramount objective of covering the entire ITS reference model with security and privacy measures, Hagen Stubing develops dedicated solutions for each layer, respectively. On application layer a security architecture in terms of a Public Key Infrastructure is presented, which provides low complexity and operational costs, while at the same time security and privacy constraints are preserved. On facility layer complementary security solutions based on mobility data verification are proposed, which promise efficient message content protection at a low computational complexity. On network layer a privacy protocol is presented aiming at a creation of cryptographic mix zones by means of group keys, which enhance privacy towards a global adversary. On physical layer a technique denoted as Secure C2X Beamforming is presented, which enhances privacy and security by means of radiation pattern control.

Read More
Format
Paperback
Publisher
Springer Fachmedien Wiesbaden
Country
Germany
Date
3 June 2013
Pages
191
ISBN
9783658025304