2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 2016
DOI: 10.1109/icitst.2016.7856736
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-sensitive data in connected cars

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Similar security issues of encrypting communications with the vehicle and securing the vehicle system arise, as well as those for managing data collected by the vehicle, as in other IoT systems-security issues for autonomous vehicles are discussed elsewhere [50,51]. Given the wide range of data collected about vehicles, from telemetry data to location data, as well as logs of user interaction with the vehicle computer, privacy management of vehicular data is an issue [52].…”
Section: Hackable Vehicles and The Moral Dilemma For Autonomous Vehicles (Avs)mentioning
confidence: 99%
“…Similar security issues of encrypting communications with the vehicle and securing the vehicle system arise, as well as those for managing data collected by the vehicle, as in other IoT systems-security issues for autonomous vehicles are discussed elsewhere [50,51]. Given the wide range of data collected about vehicles, from telemetry data to location data, as well as logs of user interaction with the vehicle computer, privacy management of vehicular data is an issue [52].…”
Section: Hackable Vehicles and The Moral Dilemma For Autonomous Vehicles (Avs)mentioning
confidence: 99%
“…Various applications in the vehicle network pose specific requirements and challenges in the wireless communication technology and it is needed multiple security control techniques to secure privacy sensitive data [14] and privacy of the ecosystem [15]. To provide the communication infrastructure required by vehicle communication as shown in Fig.…”
Section: Communication Infrastructurementioning
confidence: 99%
“…These privacy-sensitive data (Nawrath et al, 2016) attracted attackers and hackers at large from significant manufacturer embedded backdoors (Tien et al, 2018), infiltrated (Krall et al, 2016), penetrated (Patel et al, 2019), and assumed guidance of vehicular operations, making safety messaging system insecure (Nawrath et al, 2016;Tien et al, 2018;Krall et al, 2016;Patel et al, 2019). Insecurity among in-vehicular units was a multi-jurisdiction problem and lately had become a systemic problem for the automotive manufacturing organizations operating in an information-centric, data-driven, and security-aware environment.…”
Section: Study Problem/opportunitymentioning
confidence: 99%