LEADER 03763nam 2200541 a 450 001 9910437567703321 005 20200520144314.0 010 $a3-658-02531-X 024 7 $a10.1007/978-3-658-02531-1 035 $a(CKB)3280000000007752 035 $a(EBL)1317021 035 $a(SSID)ssj0000897399 035 $a(PQKBManifestationID)11520447 035 $a(PQKBTitleCode)TC0000897399 035 $a(PQKBWorkID)10902089 035 $a(PQKB)11615702 035 $a(DE-He213)978-3-658-02531-1 035 $a(MiAaPQ)EBC1317021 035 $a(PPN)170493512 035 $a(EXLCZ)993280000000007752 100 $a20130418d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aMultilayered security and privacy protection in Car-to-X networks $esolutions from application down to physical layer /$fHagen Stubing 205 $a1st ed. 2013. 210 $aNew York $cSpringer$d2013 215 $a1 online resource (204 p.) 300 $aDescription based upon print version of record. 311 $a3-658-02530-1 320 $aIncludes bibliographical references. 327 $aSecurity and Privacy in Car-to-X Communication Networks -- Public Key Infrastructure -- Mobility Data Verification -- Privacy Protocols -- Secure Car-to-X Beamforming. 330 $aCar-to-X (C2X) communication in terms of Car-to-Car (C2C) and Car-to-Infrastructure (C2I) communication aims at increasing road safety and traffic efficiency by exchanging foresighted traffic information. Thereby, security and privacy are regarded as an absolute prerequisite for successfully establishing the C2X technology on the market. Towards the paramount objective of covering the entire ITS reference model with security and privacy measures, Hagen Stübing develops dedicated solutions for each layer, respectively. On application layer a security architecture in terms of a Public Key Infrastructure is presented, which provides low complexity and operational costs, while at the same time security and privacy constraints are preserved. On facility layer complementary security solutions based on mobility data verification are proposed, which promise efficient message content protection at a low computational complexity. On network layer a privacy protocol is presented aiming at a creation of cryptographic mix zones by means of group keys, which enhance privacy towards a global adversary. On physical layer a technique denoted as Secure C2X Beamforming is presented, which enhances privacy and security by means of radiation pattern control.   Contents ·         Security and Privacy in Car-to-X Communication Networks ·         Public Key Infrastructure ·         Mobility Data Verification ·         Privacy Protocols ·         Secure Car-to-X Beamforming   Target groups ·         Researchers and students in the field of security and privacy in mobile and vehicular ad hoc networks. ·         Practitioners in the field of security and privacy protocol design in vehicular communication networks.   The author Hagen Stübing completed his doctoral thesis at the department of Integrated Circuits and Systems Lab, Technische Universität Darmstadt, under the supervision of Prof. Dr.-Ing. Sorin A. Huss. 606 $aTraffic safety 606 $aTraffic regulations 615 0$aTraffic safety. 615 0$aTraffic regulations. 676 $a004.6 700 $aStubing$b Hagen$01065555 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910437567703321 996 $aMultilayered Security and Privacy Protection in Car-to-X Networks$92546629 997 $aUNINA