Security in Vehicular Networks

Synopsis
Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages, which are frequently exchanged on road. This book serves as a guide for students, developers and researchers who are interested in vehicular networks and the associated security and privacy issues. It facilitates the understanding of the technologies used and their various types, highlighting the importance of privacy and security issues and the direct impact they have on the safety of their users. It also explains various solutions and proposals to protect location and identity privacy, including two anonymous authentication methods that preserve identity privacy and a total of five schemes that preserve location privacy in the vehicular ad hoc networks and the cloud-enabled internet of vehicles, respectively. This book also presents a new privacy-aware blockchain-based pseudonym management framework.Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages, which are frequently exchanged on road. This book serves as a guide for students, developers and researchers who are interested in vehicular networks and the associated security and privacy issues. It facilitates the understanding of the technologies used and their various types, highlighting the importance of privacy and security issues and the direct impact they have on the safety of their users. It also explains various solutions and proposals to protect location and identity privacy, including two anonymous authentication methods that preserve identity privacy and a total of five schemes that preserve location privacy in the vehicular ad hoc networks and the cloud-enabled internet of vehicles, respectively. This book also presents a new privacy-aware blockchain-based pseudonym management framework. Leila
- Copyright:
- 2022 ISTE Ltd
Book Details
- Book Quality:
- ISBN-13:
- 9781394172603
- Publisher:
- Wiley
- Date of Addition:
- 2022-10-12T15:22:31Z
- Language:
- English
- Categories:
- Computers and Internet, Nonfiction,
- Usage Restrictions:
- This is a copyrighted book.
Choosing a Book Format
EPUB is the standard publishing format used by many e-book readers including iBooks, Easy Reader, VoiceDream Reader, etc. This is the most popular and widely used format.
DAISY format is used by GoRead, Read2Go and most Kurzweil devices.
Audio (MP3) format is used by audio only devices, such as iPod.
Braille format is used by Braille output devices.
DAISY Audio format works on DAISY compatible players such as Victor Reader Stream.
Accessible Word format can be unzipped and opened in any tool that supports .docx files.