Intelligent and connected vehicle security

Intelligent and Connected Vehicles (ICVs) are moving into the mainstream of the worldwide automotive industry. A lot of advanced technologies, like artificial intelligence, big data, millimeter wave radar, LiDAR and high-definition camera based real-time environmental perception, etc., are increasin...

Full description

Saved in:
Bibliographic Details
Main Authors: Liu, Jiajia, (Author), Benslimane, Abderrahim, (Author)
Format: eBook
Language: English
Published: [United States] : River Publishers, [2021]
Subjects:
ISBN: 9788770223669
8770223661
9781003338598
1003338593
9781000797237
1000797236
9781000794076
1000794075
9788770223676
Physical Description: 1 online resource

Cover

Table of contents

Description
Summary: Intelligent and Connected Vehicles (ICVs) are moving into the mainstream of the worldwide automotive industry. A lot of advanced technologies, like artificial intelligence, big data, millimeter wave radar, LiDAR and high-definition camera based real-time environmental perception, etc., are increasingly being applied in ICVs, making them more intelligent and connected with devices surrounding the vehicles. However, although the versatile connection and information exchange among ICVs, external devices and human beings provides vehicles with a better and faster perception of surrounding environments and a better driving experience for users, they also create a series of intrusion portals for malicious attackers which threaten the safety of drivers and passengers. This book is concerned with the recognition and protection against such threats. Security for ICVs includes information across the fields of automobile engineering, artificial intelligence, computer, microelectronics, automatic control, communication technology, big data, edge/cloud computing and others. This book comprehensively and systematically introduces security threats to ICVs coming from automotive technology development, on-board sensors, vehicle networking, automobile communications, intelligent transportation, big data, cloud computing, etc. Then, through discussion of some typical automobile cyber-attack cases studies, readers will gain a deeper understanding of the working principle of ICVs, so that they can test vehicles more objectively and scientifically. In this way they will find the existence of vulnerabilities and security risks and take the corresponding protective measures to prevent malicious attacks.
Bibliography: Includes bibliographical references and index.
ISBN: 9788770223669
8770223661
9781003338598
1003338593
9781000797237
1000797236
9781000794076
1000794075
9788770223676
Access: Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty