Cargando…

Vehicle safety communications : protocols, security, and privacy /

"Owing to their safety applications, cooperative vehicle systems, which use sensors and wireless technologies to reduce traffic accidents, continue to be the focus of heavy research and development efforts around the world. Written by industry professionals, this book provides a systematic desc...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Delgrossi, Luca
Otros Autores: Zhang, Tao, 1962-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, New Jersey : John Wiley & Sons, Inc., [2012]
Colección:Information and communication technology series ; 103
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • WILEY SERIES ON INFORMATION AND COMMUNICATION TECHNOLOGY
  • COPYRIGHT PAGE
  • FOREWORD
  • FOREWORD
  • FOREWORD
  • BOOK OUTLINE
  • 1. TRAFFIC SAFETY
  • 1.1. TRAFFIC SAFETY FACTS
  • 1.2. EUROPEAN UNION
  • 1.3. JAPAN
  • 1.4. DEVELOPING COUNTRIES
  • 2. AUTOMOTIVE SAFETY EVOLUTION
  • 2.1. PASSIVE SAFETY
  • 2.2. ACTIVE SAFETY
  • 2.3. ADVANCED DRIVER ASSISTANCE SYSTEMS
  • 2.4. COOPERATIVE SAFETY
  • 3. VEHICLE ARCHITECTURES
  • 3.1. ELECTRONIC CONTROL UNITS
  • 3.2. VEHICLE SENSORS
  • 3.3. ONBOARD COMMUNICATION NETWORKS
  • 3.4. VEHICLE DATA
  • 3.5. VEHICLE DATA SECURITY
  • 3.6. VEHICLE POSITIONING.
  • 4. CONNECTED VEHICLES4.1 CONNECTED VEHICLE APPLICATIONS
  • 4.2. UNIQUENESS IN CONSUMER VEHICLE NETWORKS
  • 4.3. VEHICLE COMMUNICATION MODES
  • 4.4. WIRELESS COMMUNICATIONS TECHNOLOGY FOR VEHICLES
  • 5. DEDICATED SHORT-RANGE COMMUNICATIONS
  • 5.1. THE 5.9 GHZ SPECTRUM
  • 5.2. DSRC IN THE EUROPEAN UNION
  • 5.3. DSRC IN JAPAN
  • 5.4. DSRC STANDARDS
  • 6. WAVE PHYSICAL LAYER
  • 6.1. PHYSICAL LAYER OPERATIONS
  • 6.2. PHY AMENDMENTS
  • 6.3. PHY LAYER MODELING
  • 7. WAVE MEDIA ACCESS CONTROL LAYER
  • 7.1. MEDIA ACCESS CONTROL LAYER OPERATIONS
  • 7.2. MAC LAYER AMENDMENTS
  • 7.3. MAC LAYER MODELING
  • 7.4. OVERHAULED NS-2 IMPLEMENTATION.
  • 8. DSRC DATA RATES8.1 INTRODUCTION
  • 8.2. COMMUNICATION DENSITY
  • 8.3. OPTIMAL DATA RATE
  • 9. WAVE UPPER LAYERS
  • 9.1. INTRODUCTION
  • 9.2. DSRC MULTICHANNEL OPERATIONS
  • 9.3. PROTOCOL EVALUATION
  • 9.4. WAVE SHORT MESSAGE PROTOCOL
  • 10. VEHICLE-TO-INFRASTRUCTURE SAFETY APPLICATIONS
  • 10.1. INTERSECTION CRASHES
  • 10.2. COOPERATIVE INTERSECTION COLLISION AVOIDANCE SYSTEM FOR VIOLATIONS
  • 10.3. INTEGRATED SAFETY DEMONSTRATION
  • 11. VEHICLE-TO-VEHICLE SAFETY APPLICATIONS
  • 11.1. COOPERATION AMONG VEHICLES
  • 11.2. V2V SAFETY APPLICATIONS
  • 11.3. V2V SAFETY APPLICATIONS DESIGN
  • 11.4. SYSTEM IMPLEMENTATION
  • 11.5. SYSTEM TESTING.
  • 12. DSRC SCALABILITY12.1 INTRODUCTION
  • 12.2. DSRC DATA TRAFFIC
  • 12.3. CONGESTION CONTROL ALGORITHMS
  • 12.4. CONCLUSIONS
  • 13. SECURITY AND PRIVACY THREATS AND REQUIREMENTS
  • 13.1. INTRODUCTION
  • 13.2. ADVERSARIES
  • 13.3. SECURITY THREATS
  • 13.4. PRIVACY THREATS
  • 13.5. BASIC SECURITY CAPABILITIES
  • 13.6. PRIVACY PROTECTIONS CAPABILITIES
  • 13.7. DESIGN AND PERFORMANCE CONSIDERATIONS
  • 14. CRYPTOGRAPHIC MECHANISMS
  • 14.1. INTRODUCTION
  • 14.2. CATEGORIES OF CRYPTOGRAPHIC MECHANISMS
  • 14.3. DIGITAL SIGNATURE ALGORITHMS
  • 14.4. MESSAGE AUTHENTICATION AND MESSAGE INTEGRITY VERIFICATION.
  • 14.5. DIFFIE-HELLMAN KEY ESTABLISHMENT PROTOCOL14.6 ELLIPTIC CURVE INTEGRATED ENCRYPTION SCHEME (ECIES)
  • 15. PUBLIC KEY INFRASTRUCTURE FOR VEHICLE NETWORKS
  • 15.1. INTRODUCTION
  • 15.2. PUBLIC KEY CERTIFICATES
  • 15.3. MESSAGE AUTHENTICATION WITH CERTIFICATES
  • 15.4. CERTIFICATE REVOCATION LIST
  • 15.5. A BASELINE REFERENCE VEHICULAR PKI MODEL
  • 15.6. CONFIGURE INITIAL SECURITY PARAMETERS AND ASSIGN INITIAL CERTIFICATES
  • 15.7. ACQUIRE NEW KEYS AND CERTIFICATES
  • 15.8. DISTRIBUTE CERTIFICATES TO VEHICLES FOR SIGNATURE VERIFICATIONS
  • 15.9. DETECT MISUSED CERTIFICATES AND MISBEHAVING VEHICLES.
  • 15.10. WAYS FOR VEHICLES TO ACQUIRE CRLs.