Home    Service    Jobs    Newsletter    Company    Productsearch    eBooks    Shopping cart    Deutsch
Books | Electrical & Electronics Engineering | November 2012 | Vehicle Safety Communications




WileyOnline Library

Wiley JobNetwork

Wiley STMData

Ernst & Sohn

more >>
Zhang, Tao / Delgrossi, Luca
Vehicle Safety Communications
Protocols, Security, and Privacy
Information and Communication Technology

1. Edition November 2012
115.- Euro
2012. 400 Pages, Hardcover
ISBN 978-1-118-13272-2 - John Wiley & Sons

Sample Chapter

Short description
Owing to their safety applications, cooperative vehicle systems, which use sensors and wireless technologies to reduce traffic accidents, continue to be the focus of heavy research and development efforts around the world. Written by industry professionals, this book provides a systematic description of cooperative vehicle systems, discussing key technical issues in such systems, the latest advances in enabling technologies, and cutting-edge research trends. Coverage includes important technologies such as 5.9 GHz Dedicated Short Range Communications (DSRC), on-board equipment (OBE), and roadside equipment (RSE).

From the contents
Foreword xvRalf G. HerrtwichForeword xviiFlavio BonomiForeword xixAdam DrobotPreface xxiAcknowledgments xxv1 Traffic Safety 11.1 Traffic Safety Facts 11.2 European Union 51.3 Japan 71.4 Developing Countries 7References 82 Automotive Safety Evolution 102.1 Passive Safety 102.2 Active Safety 122.3 Advanced Driver Assistance Systems 142.4 Cooperative Safety 17References 183 Vehicle Architectures 203.1 Electronic Control Units 203.2 Vehicle Sensors 213.3 Onboard Communication Networks 223.4 Vehicle Data 253.5 Vehicle Data Security 263.6 Vehicle Positioning 27References 304 Connected Vehicles 324.1 Connected Vehicle Applications 324.2 Uniqueness in Consumer Vehicle Networks 344.3 Vehicle Communication Modes 364.4 Wireless Communications Technology for Vehicles 39References 425 Dedicated Short-Range Communications 445.1 The 5.9 GHz Spectrum 445.2 DSRC in the European Union 465.3 DSRC in Japan 475.4 DSRC Standards 48References 506 WAVE Physical Layer 526.1 Physical Layer Operations 526.2 PHY Amendments 556.3 PHY Layer Modeling 57References 627 WAVE Media Access Control Layer 647.1 Media Access Control Layer Operations 647.2 MAC Layer Amendments 667.3 MAC Layer Modeling 677.4 Overhauled ns-2 Implementation 72References 748 DSRC Data Rates 758.1 Introduction 758.2 Communication Density 768.3 Optimal Data Rate 85References 919 WAVE Upper Layers 939.1 Introduction 939.2 DSRC Multichannel Operations 949.3 Protocol Evaluation 979.4 WAVE Short Message Protocol 103References 10410 Vehicle-to-Infrastructure Safety Applications 10610.1 Intersection Crashes 10610.2 Cooperative Intersection Collision Avoidance System for Violations 10710.3 Integrated Safety Demonstration 118References 12411 Vehicle-to-Vehicle Safety Applications 12611.1 Cooperation among Vehicles 12611.2 V2V Safety Applications 12711.3 V2V Safety Applications Design 12811.4 System Implementation 13511.5 System Testing 138References 14012 DSRC Scalability 14112.1 Introduction 14112.2 DSRC Data Traffic 14212.3 Congestion Control Algorithms 14512.4 Conclusions 148References 14913 Security and Privacy Threats and Requirements 15113.1 Introduction 15113.2 Adversaries 15113.3 Security Threats 15213.4 Privacy Threats 15513.5 Basic Security Capabilities 15913.6 Privacy Protections Capabilities 16113.7 Design and Performance Considerations 161References 16514 Cryptographic Mechanisms 16714.1 Introduction 16714.2 Categories of Cryptographic Mechanisms 16714.3 Digital Signature Algorithms 17214.4 Message Authentication and Message Integrity Verifi cation 19614.5 Diffi e-Hellman Key Establishment Protocol 20014.6 Elliptic Curve Integrated Encryption Scheme (ECIES) 202References 20615 Public Key Infrastructure for Vehicle Networks 20915.1 Introduction 20915.2 Public Key Certificates 21015.3 Message Authentication with Certificates 21115.4 Certifi cate Revocation List 21215.5 A Baseline Reference Vehicular PKI Model 21315.6 Confi gure Initial Security Parameters and Assign Initial Certificates 21515.7 Acquire New Keys and Certifi cates 21715.8 Distribute Certifi cates to Vehicles for Signature Verifications 22015.9 Detect Misused Certifi cates and Misbehaving Vehicles 22215.10 Ways for Vehicles to Acquire CRLs 22615.11 How Often CRLs should be Distributed to Vehicles? 22815.12 PKI Hierarchy 23015.13 Privacy-Preserving Vehicular PKI 233References 23516 Privacy Protection with Shared Certificates 23716.1 Shared Certificates 23716.2 The Combinatorial Certificate Scheme 23716.3 Certificate Revocation Collateral Damage 23916.4 Certified Intervals 24216.5 Reduce Collateral Damage and Improve Certified Interval 24416.6 Privacy in Low Vehicle Density Areas 253References 25917 Privacy Protection with Short-Lived Unique Certificates 26017.1 Short-Lived Unique Certificates 26017.2 The Basic Short-Lived Certificate Scheme 26117.3 The Problem of Large CRL 26317.4 Anonymously Linked Certificates to Reduce CRL Size 26417.5 Reduce CRL Search Time 26817.6 Unlinked Short-Lived Certificates 26917.7 Reduce the Volume of Certificate Request and Response Messages 27017.8 Determine the Number of Certificates for Each Vehicle 270References 27318 Privacy Protection with Group Signatures 27418.1 Group Signatures 27418.2 Zero-Knowledge Proof of Knowledge 27518.3 The ACJT Group Signature Scheme and its Extensions 27718.4 The CG Group Signature Scheme with Revocation 28618.5 The Short Group Signatures Scheme 28818.6 Group Signature Schemes with Verifier-Local Revocation 292References 29319 Privacy Protection against Certificate Authorities 29519.1 Introduction 29519.2 Basic Idea 29519.3 Baseline Split CA Architecture, Protocol, and Message Processing 29719.4 Split CA Architecture for Shared Certifi cates 30119.5 Split CA Architecture for Unlinked Short-Lived Certificates 30219.6 Split CA Architecture for Anonymously Linked Short-Lived Certificates 308References 31420 Comparison of Privacy-Preserving Certificate Management Schemes 31520.1 Introduction 31520.2 Comparison of Main Characteristics 31620.3 Misbehavior Detection 32020.4 Abilities to Prevent Privacy Abuse by CA and MDS Operators 32120.5 Summary 32221 IEEE 1609.2 Security Services 32321.1 Introduction 32321.2 The IEEE 1609.2 Standard 32321.3 Certificates and Certificate Authority Hierarchy 32521.4 Formats for Public Key, Signature, Certificate, and CRL 32721.5 Message Formats and Processing for Generating Encrypted Messages 33321.6 Sending Messages 33521.7 Request Certifi cates from the CA 33621.8 Request and Processing CRL 34321.9 What the Current IEEE 1609.2 Standard Does Not Cover 344References 34622 4G for Vehicle Safety Communications 34722.1 Introduction 34722.2 Long-Term Revolution (LTE) 34722.3 LTE for Vehicle Safety Communications/ 353References 358Glossary 360Index 367



Tell a friend          RSS Feeds         Print-Version         Sitemap

©2015 Wiley-VCH Verlag GmbH & Co. KGaA - Provider
http://www.wiley-vch.de - mailto: info@wiley-vch.de
Data Protection