Deng, 2011 - Google Patents
Connected Vehicle Information AssuranceDeng, 2011
- Document ID
- 9076964339196654826
- Author
- Deng J
- Publication year
External Links
Snippet
Modern vehicles are now information systems, with the ability to communicate. Vehicle security requires more than physical security. Research to date has been piece-meal, looking for vulnerabilities in specific implementations of isolated applications. Most of this …
- 238000011160 research 0 abstract description 32
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/30—Detection related to theft or to other events relevant to anti-theft systems
- B60R25/33—Detection related to theft or to other events relevant to anti-theft systems of global position, e.g. by providing GPS coordinates
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/10—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
- B60R25/102—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lamssaggad et al. | A survey on the current security landscape of intelligent transportation systems | |
| Sun et al. | A survey on cyber-security of connected and autonomous vehicles (CAVs) | |
| Ahmad et al. | Machine learning and blockchain technologies for cybersecurity in connected vehicles | |
| Dibaei et al. | An overview of attacks and defences on intelligent connected vehicles | |
| Kaur et al. | Security issues in vehicular ad-hoc network (VANET) | |
| Kelarestaghi et al. | Intelligent transportation system security: Impact-oriented risk assessment of in-vehicle networks | |
| Karim et al. | Architecture, protocols, and security in IoV: Taxonomy, analysis, challenges, and solutions | |
| Othmane et al. | A survey of security and privacy in connected vehicles | |
| Gillani et al. | A survey on security in vehicular ad hoc networks | |
| Kim et al. | Automotive cyber security | |
| Patsakis et al. | Towards a distributed secure in-vehicle communication architecture for modern vehicles | |
| Tyagi et al. | Investigating the security threats in vehicular ad hoc networks (VANETs): towards security engineering for safer on-road transportation | |
| Brooks et al. | Automobile security concerns | |
| Ahmad et al. | A systematic approach for cyber security in vehicular networks | |
| Sumra et al. | Trust and trusted computing in VANET | |
| Takahashi | An overview of cyber security for connected vehicles | |
| Kelarestaghi et al. | Vehicle security: Risk assessment in transportation | |
| Steger et al. | Secup: Secure and efficient wireless software updates for vehicles | |
| Oyler et al. | Security in automotive telematics: a survey of threats and risk mitigation strategies to counter the existing and emerging attack vectors | |
| Qureshi et al. | Authentication scheme for unmanned aerial vehicles based internet of vehicles networks | |
| Kim et al. | Introduction to automotive cybersecurity | |
| Varshney et al. | Security protocol for VANET by using digital certification to provide security with low bandwidth | |
| BK et al. | Ensuring security and privacy in vanet: A comprehensive survey of authentication approaches | |
| Dewangan et al. | Cyber threats and its mitigation to intelligent transportation system | |
| Ali et al. | Navigating the challenges and opportunities of securing internet of autonomous vehicles with lightweight authentication |