MARC details
000 -LEADER |
fixed length control field |
05880cam a2200217Ii 4500 |
INTERNATIONAL STANDARD BOOK NUMBER |
ISBN |
9789811580536 |
INTERNATIONAL STANDARD BOOK NUMBER |
ISBN |
9811580537 |
MAIN ENTRY--AUTHOR NAME |
Personal name |
Kim, Shiho, |
TITLE STATEMENT |
Title |
Automotive cyber security : |
Remainder of title |
introduction, challenges, and standardization / |
Statement of responsibility, etc |
Shiho Kim, Rakesh Shrestha. |
Copyright Date |
Place of publication |
Singapore : |
Name of publisher |
Springer, |
Year of publication or production |
2020. |
PHYSICAL DESCRIPTION |
Number of Pages |
1 online resource (xvii, 216 pages) : |
Other physical details |
illustrations (some color). |
FORMATTED CONTENTS NOTE |
Formatted contents note |
Intro -- Preface -- Acknowledgements -- Contents -- About the Authors -- 1 Introduction to Automotive Cybersecurity -- 1.1 Overview -- 1.2 Introduction -- 1.2.1 Security and Its Impact -- 1.3 Cyber Security in Automotive Technology -- 1.3.1 The Rising Threat -- 1.4 Vehicular Ransomware Attack -- 1.4.1 Vehicle Ransomware Attack Scheme -- 1.5 Overview of Topics -- References -- 2 Intelligent Autonomous Vehicle -- 2.1 Overview -- 2.2 History of Intelligent and Autonomous Vehicle -- 2.3 Classification of Autonomous Vehicle Based on Driving Levels -- 2.3.1 SAE and NHTS Classification |
FORMATTED CONTENTS NOTE |
Formatted contents note |
2.4 State of the Art of Intelligent and Autonomous Vehicle Technologies -- 2.4.1 Autonomous Vehicle -- 2.4.2 Connected Vehicle Technology -- 2.5 Battle for Adoption -- 2.6 Market Demand of Automotive Cyber Security -- 2.7 Summary -- References -- 3 Security and Privacy in Intelligent Autonomous Vehicles -- 3.1 Overview -- 3.2 Cryptography Introduction -- 3.3 Cryptography Objective -- 3.3.1 Confidentiality -- 3.3.2 Data Integrity -- 3.3.3 Authentication -- 3.3.4 Non-repudiation -- 3.4 Cryptographic Primitives -- 3.4.1 Symmetric Key or Secret Key Encryption |
FORMATTED CONTENTS NOTE |
Formatted contents note |
3.4.2 Asymmetric Key or Public Key Encryption -- 3.4.3 Digital Signatures -- 3.4.4 Homomorphic Encryption -- 3.5 Cyber Security in Intelligent and Autonomous Vehicles -- 3.5.1 Cyber Security Framework -- 3.5.2 Cybersecurity Layers by Design -- 3.5.3 Threat Modeling Method (TMM) -- 3.5.4 HARA and TARA Safety and Security Methods -- 3.5.5 Security and Privacy Threats in Vehicular Networks -- 3.5.6 Autonomous Vehicle Cyber Security -- 3.5.7 Connected Vehicle Security -- 3.5.8 Trust Management in VANET -- 3.5.9 Blockchain as a Security in VANET -- 3.6 Summary -- References |
FORMATTED CONTENTS NOTE |
Formatted contents note |
4 In-Vehicle Communication and Cyber Security -- 4.1 Overview -- 4.2 In-Vehicle System -- 4.2.1 Vehicle Electrical and Electronic System -- 4.3 In-Vehicle Communication -- 4.3.1 In-Vehicle Sensing Technologies -- 4.3.2 In-Vehicle Network (IVN) Systems -- 4.4 In-Vehicle Network Architecture and Topology -- 4.5 Functional Safety and Cybersecurity -- 4.6 In-Vehicle Cybersecurity Issues and Challenges -- 4.6.1 Challenges of IVN Architecture -- 4.6.2 In-Vehicle Onboard Ports, Threats, and Countermeasures -- 4.7 Cyber Security in In-Vehicle Network (IVN) |
FORMATTED CONTENTS NOTE |
Formatted contents note |
4.7.1 In-Vehicle Network (IVN) Security Threats -- 4.7.2 Cybersecurity Protection Layers -- 4.7.3 Cybersecurity for ECU -- 4.8 Summary -- References -- 5 AUTOSAR Embedded Security in Vehicles -- 5.1 Overview -- 5.2 Introduction -- 5.2.1 Background -- 5.3 Threat Models for the Automotive Domain -- 5.3.1 Adaptation of TARA -- 5.3.2 Adaptation of STRIDE -- 5.4 Applying the Adapted Threat Models to the Automotive Domain -- 5.4.1 TARA -- 5.4.2 STRIDE -- 5.5 Results -- 5.5.1 TARA -- 5.5.2 STRIDE -- 5.5.3 Related Work -- 5.5.4 Discussion and Future Work -- 5.6 Conclusion -- References |
SUMMARY, ETC. |
Summary, etc |
This book outlines the development of safety and cybersecurity, threats and activities in automotive vehicles. This book discusses the automotive vehicle applications and technological aspects considering its cybersecurity issues. Each chapter offers a suitable context for understanding the complexities of the connectivity and cybersecurity of intelligent and autonomous vehicles. A top-down strategy was adopted to introduce the vehicles intelligent features and functionality. The area of vehicle-to-everything (V2X) communications aims to exploit the power of ubiquitous connectivity for the traffic safety and transport efficiency. The chapters discuss in detail about the different levels of autonomous vehicles, different types of cybersecurity issues, future trends and challenges in autonomous vehicles. Security must be thought as an important aspect during designing and implementation of the autonomous vehicles to prevent from numerous security threats and attacks. The book thus provides important information on the cybersecurity challenges faced by the autonomous vehicles and it seeks to address the mobility requirements of users, comfort, safety and security. This book aims to provide an outline of most aspects of cybersecurity in intelligent and autonomous vehicles. It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security technology as well as to readers with a security background and experience who want to know more about cybersecurity concerns in modern and future automotive applications and cybersecurity. In particular, this book helps people who need to make better decisions about automotive security and safety approaches. Moreover, it is beneficial to people who are involved in research and development in this exciting area. As seen from the table of contents, automotive security covers a wide variety of topics. In addition to being distributed through various technological fields , automotive cybersecurity is a recent and rapidly moving field, such that the selection of topics in this book is regarded as tentative solutions rather than a final word on what exactly constitutes automotive security. All of the authors have worked for many years in the area of embedded security and for a few years in the field of different aspects of automotive safety and security, both from a research and industry point of view. |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Term |
Automated vehicles |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Shrestha, Rakesh, |
ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |