Skip to main content

Security

  • Chapter
  • First Online:
  • 948 Accesses

Abstract

We make the observation that all of the communication regimes require reliable security [1]. The main purpose of the comprehensive set of security mechanisms is to assure the physical safety of the passengers in the vehicle.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. T. Kosch, Technical concept and prerequisites of car-to-car communication, München: BMW group research and technology, http://www.car-to-car.org

  2. A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach, R. Kroh, and T. Leinmüller, Attacks on inter vehicle communication systems – an analysis. In Proceedings of Third International Workshop on Intelligent Transportation, WIT 2006, Hamburg, Germany, March 2006

    Google Scholar 

  3. M. Gerlach, security challenges for C2C CC standards and relevant research. Presentation at car2car forum, May 2007

    Google Scholar 

  4. J.P. Hubaux, S. Capkun, and J. Luo, The security and privacy of smart vehicles. IEEE Security and Privacy, Vol. 4, No. 3, pp. 49––55, 2004

    Google Scholar 

  5. B. Parno and A. Perring, Challenges in securing vehicular networks. In Proceeding of Workshop on Hot Topics in Networks (HotNets-IV), November 2005

    Google Scholar 

  6. E. Fonseca and A. Festag, A survey of existing approaches for secure ad hoc routing and their applicability to VANETS, NEC network laboratories, March 2006

    Google Scholar 

  7. IEEE, IEEE standard 1471–2000: IEEE recommended practice for architectural description of software-intensive systems, 2000

    Google Scholar 

  8. http://www.network-on-wheels.de

  9. M. Gerlach, NoW – Network on Wheels: C2X security. In Proceedings of the 5th Workshop on Intelligent Transportation Systems, WIT, Hamburg, February 2008

    Google Scholar 

  10. M. Gerlach, A. Festag, T. Leinmüller, G. Goldacker, and C. Harsch, Security architecture for vehicular communication, NoW project, WIT 2007

    Google Scholar 

  11. http://www.sevecom.org

  12. A. Kung, Security architecture and mechanisms for V2V/V2I. Public deliverable D2.1, Sevecom project, 2007

    Google Scholar 

  13. http://www.gstforum.org

  14. http://evita-project.org

  15. http://www.preciosa-project.org

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Radu Popescu-Zeletin .

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Popescu-Zeletin, R., Radusch, I., Rigani, M.A. (2010). Security. In: Vehicular-2-X Communication. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77143-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77143-2_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77142-5

  • Online ISBN: 978-3-540-77143-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics