Automotive Cyber Security - Shiho Kim, Rakesh Shrestha

Automotive Cyber Security (eBook)

Introduction, Challenges, and Standardization
eBook Download: PDF
2020 | 1st ed. 2020
XVII, 216 Seiten
Springer Singapore (Verlag)
978-981-15-8053-6 (ISBN)
Systemvoraussetzungen
106,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book outlines the development of safety and cybersecurity, threats and activities in automotive vehicles. This book discusses the automotive vehicle applications and technological aspects considering its cybersecurity issues. Each chapter offers a suitable context for understanding the complexities of the connectivity and cybersecurity of intelligent and autonomous vehicles. A top-down strategy was adopted to introduce the vehicles' intelligent features and functionality. The area of vehicle-to-everything (V2X) communications aims to exploit the power of ubiquitous connectivity for the traffic safety and transport efficiency. The chapters discuss in detail about the different levels of autonomous vehicles, different types of cybersecurity issues, future trends and challenges in autonomous vehicles. Security must be thought as an important aspect during designing and implementation of the autonomous vehicles to prevent from numerous security threats and attacks. The book thus provides important information on the cybersecurity challenges faced by the autonomous vehicles and it seeks to address the mobility requirements of users, comfort, safety and security. 

This book aims to provide an outline of most aspects of cybersecurity in intelligent and autonomous vehicles. It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security technology as well as to readers with a security background and experience who want to know more about cybersecurity concerns in modern and future automotive applications and cybersecurity. In particular, this book helps people who need to make better decisions about automotive security and safety approaches. Moreover, it is beneficial to people who are involved in research and development in this exciting area. 

As seen from the table of contents, automotive security covers a wide variety of topics. In addition to being distributed through various technological fields, automotive cybersecurity is a recent and rapidly moving field, such that the selection of topics in this book is regarded as tentative solutions rather than a final word on what exactly constitutes automotive security. All of the authors have worked for many years in the area of embedded security and for a few years in the field of different aspects of automotive safety and security, both from a research and industry point of view. 



Prof. Shiho Kim received his Ph.D. degree in Department of Electrical Engineering from KAIST, Korea. He has a long career in semiconductor research area especially working in LG Electronics, Sandisk and LG Semicon as a Research Engineer or Semiconductor Device Engineer from 1988 to 1996. From 1997, he began to perform research in universities, Wonkwang University and Chungbuk National University. And since 2011, he has been Professor of the School of Integrated Technology at Yonsei University. He was also a Chair of IEEE Solid-State Circuit Society Seoul Chapter and Chair of IEIE Vehicle Electronics Research Group.

Dr. Rakesh Shrestha (M' 19) received his B.E in Electronics and Communication Engineering from Tribhuwan University (TU), Nepal in 2006. He received his M.E in Information and Communication Engineering from Chosun University, in 2010 and PhD degree in Information and Communication Engineering from Yeungnam University in 2018 respectively. From Feb. 2010 to May 2011, he worked for Honeywell Security system as a security Engineer. From Jun. 2010 to Sep. 2012, he worked as a Core Network Engineer at Huawei Technologies Co. Ltd, Nepal. From 2018 Feb to 2019 Feb, he worked as a Postdoctoral Researcher at Department of Information and Communication Engineering, Yeungnam University, Korea. He is currently working as a Postdoctoral Researcher in Yonsei Institute of Convergence Technology (YICT), Yonsei University. He was invited as a keynote speaker in the Third IEEE ICCCS conference. He has worked as a reviewer in several renowned journal and conferences. He is currently an IEEE member and his main research interests include wireless communications, Mobile ad-hoc networks, Vehicular ad-hoc network, blockchain, IoT, homomorphic encryption, deep learning, wireless security, etc.




This book outlines the development of safety and cybersecurity, threats and activities in automotive vehicles. This book discusses the automotive vehicle applications and technological aspects considering its cybersecurity issues. Each chapter offers a suitable context for understanding the complexities of the connectivity and cybersecurity of intelligent and autonomous vehicles. A top-down strategy was adopted to introduce the vehicles' intelligent features and functionality. The area of vehicle-to-everything (V2X) communications aims to exploit the power of ubiquitous connectivity for the traffic safety and transport efficiency. The chapters discuss in detail about the different levels of autonomous vehicles, different types of cybersecurity issues, future trends and challenges in autonomous vehicles. Security must be thought as an important aspect during designing and implementation of the autonomous vehicles to prevent from numerous security threats and attacks. The book thus provides important information on the cybersecurity challenges faced by the autonomous vehicles and it seeks to address the mobility requirements of users, comfort, safety and security. This book aims to provide an outline of most aspects of cybersecurity in intelligent and autonomous vehicles. It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security technology as well as to readers with a security background and experience who want to know more about cybersecurity concerns in modern and future automotive applications and cybersecurity. In particular, this book helps people who need to make better decisions about automotive security and safety approaches. Moreover, it is beneficial to people who are involved in research and development in this exciting area. As seen from the table of contents, automotive security covers a wide variety of topics. In addition to being distributed throughvarious technological fields, automotive cybersecurity is a recent and rapidly moving field, such that the selection of topics in this book is regarded as tentative solutions rather than a final word on what exactly constitutes automotive security. All of the authors have worked for many years in the area of embedded security and for a few years in the field of different aspects of automotive safety and security, both from a research and industry point of view. 
Erscheint lt. Verlag 24.9.2020
Zusatzinfo XVII, 216 p. 78 illus., 76 illus. in color.
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Technik Bauwesen
Technik Fahrzeugbau / Schiffbau
Technik Maschinenbau
Schlagworte Automotive Cyber Security • Cryptography Algorithm for Automotive Security • IT Security for Automotive • Security Standardization for Automotive Technology • V2I Communication Security • Vehicle Communication Security • Vehicle to Infrastructure Communication • Vehicle to Vehicle Communication
ISBN-10 981-15-8053-7 / 9811580537
ISBN-13 978-981-15-8053-6 / 9789811580536
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 7,3 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99