In recent years, information technology has entered
the automobile domain. There is an emerging trend
among automobile manufacturers to perform wireless
diagnostics and firmware updates. This wireless
vehicle-to-infrastructure environment, where the
automobile manufacturer establishes a wireless
connection to a vehicle, introduces a number of
security threats.
This book focuses on the security aspects of such
environments. Security challenges for this and
similar scenarios are first identified and analyzed.
Based on such analyses and the challenges identified
therein, specific solutions for the wireless
vehicle-to-infrastructure environment are suggested.
The security issues and solutions presented in this
book may serve as a roadmap for future research in
this field, and should be especially useful for
professionals in Network Security and Vehicle
Communication fields, or anyone else who may be
interested in future computer security trends for
vehicle-to-infrastructure environments.
the automobile domain. There is an emerging trend
among automobile manufacturers to perform wireless
diagnostics and firmware updates. This wireless
vehicle-to-infrastructure environment, where the
automobile manufacturer establishes a wireless
connection to a vehicle, introduces a number of
security threats.
This book focuses on the security aspects of such
environments. Security challenges for this and
similar scenarios are first identified and analyzed.
Based on such analyses and the challenges identified
therein, specific solutions for the wireless
vehicle-to-infrastructure environment are suggested.
The security issues and solutions presented in this
book may serve as a roadmap for future research in
this field, and should be especially useful for
professionals in Network Security and Vehicle
Communication fields, or anyone else who may be
interested in future computer security trends for
vehicle-to-infrastructure environments.