Proceedings of the 2nd International Conference on Big Data, Cloud and Applications 2017
DOI: 10.1145/3090354.3090412
|View full text |Cite
|
Sign up to set email alerts
|

Security of communications in connected cars Modeling and safety assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Different encryption algorithms and methods like PKI, symmetric encryption, hybrid encryption, and group key (temporary key for the session derived from the master key) have been used to stop each attack that we have discussed earlier. Schemes in this connection include the previous works 18,21,24,25,35,41,44,48,53,54,56,58,60,6678.…”
Section: Survey Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Different encryption algorithms and methods like PKI, symmetric encryption, hybrid encryption, and group key (temporary key for the session derived from the master key) have been used to stop each attack that we have discussed earlier. Schemes in this connection include the previous works 18,21,24,25,35,41,44,48,53,54,56,58,60,6678.…”
Section: Survey Resultsmentioning
confidence: 99%
“…The schemes that use this approach in order to secure VANET and IoV include the previous works. 18,21,22,24,25,35,41,44,48,54,56,[63][64][65][66][67] 2. Physical detection: The main idea behind this defense is to put a radar or signal receiver that detects the physical existence of the vehicles around it.…”
Section: Solutions For Each Problemmentioning
confidence: 99%
“…Compromised communication is the most frequently reported concern, caused primarily by the operational nature of the connected cars. Focusing on this specific concern, for example, Tbatou et al [23] recommended solutions that span from securing the external interfaces (such as communication channel) to the security of processing the communicated data. The authors propose deploying safeguards at every level of the connected car network.…”
Section: Discussionmentioning
confidence: 99%
“…By pilfering data and deploying malicious software updates, they can transmit false information to drivers, initiate DDoS attacks on vehicle occupants, unethically reprogram electronic control units (ECUs) with infected software, and even download inaccurate navigation maps. These attacks have been categorized into many sections [111].…”
Section: B Category 2: Children's Iot (Smart Toys)mentioning
confidence: 99%