
Securing the Wireless Vehicle-to-Infrastructure Environment
Diagnostics and Firmware Updates
Versandkostenfrei!
Versandfertig in 6-10 Tagen
44,99 €
inkl. MwSt.
PAYBACK Punkte
22 °P sammeln!
In recent years, information technology has enteredthe automobile domain. There is an emerging trendamong automobile manufacturers to perform wirelessdiagnostics and firmware updates. This wirelessvehicle-to-infrastructure environment, where theautomobile manufacturer establishes a wirelessconnection to a vehicle, introduces a number ofsecurity threats. This book focuses on the security aspects of suchenvironments. Security challenges for this andsimilar scenarios are first identified and analyzed.Based on such analyses and the challenges identifiedtherein, specific solutions for the wirelessv...
In recent years, information technology has entered
the automobile domain. There is an emerging trend
among automobile manufacturers to perform wireless
diagnostics and firmware updates. This wireless
vehicle-to-infrastructure environment, where the
automobile manufacturer establishes a wireless
connection to a vehicle, introduces a number of
security threats.
This book focuses on the security aspects of such
environments. Security challenges for this and
similar scenarios are first identified and analyzed.
Based on such analyses and the challenges identified
therein, specific solutions for the wireless
vehicle-to-infrastructure environment are suggested.
The security issues and solutions presented in this
book may serve as a roadmap for future research in
this field, and should be especially useful for
professionals in Network Security and Vehicle
Communication fields, or anyone else who may be
interested in future computer security trends for
vehicle-to-infrastructure environments.
the automobile domain. There is an emerging trend
among automobile manufacturers to perform wireless
diagnostics and firmware updates. This wireless
vehicle-to-infrastructure environment, where the
automobile manufacturer establishes a wireless
connection to a vehicle, introduces a number of
security threats.
This book focuses on the security aspects of such
environments. Security challenges for this and
similar scenarios are first identified and analyzed.
Based on such analyses and the challenges identified
therein, specific solutions for the wireless
vehicle-to-infrastructure environment are suggested.
The security issues and solutions presented in this
book may serve as a roadmap for future research in
this field, and should be especially useful for
professionals in Network Security and Vehicle
Communication fields, or anyone else who may be
interested in future computer security trends for
vehicle-to-infrastructure environments.