Header menu link for other important links
X
Design and safety verification for vehicle networks
, H. Vasudev
Published in Springer Verlag
2018
Volume: 218
   
Pages: 220 - 232
Abstract
There is a serious mismatch between the growing traffic volume and the availability of resources to support the traffic. Some of the important reasons for this mismatch are the rapid development of our economy, increased affordability of our society, multiple vehicles per family, and so on. We believe that the mismatch will continue to grow and adversely affect our traffic infrastructure unless efficient traffic management solutions that include system integration, design, prediction, safety verification, validation, and security are developed and deployed. Security has appeared as an important issue for Intelligent Transportation Systems (ITS). Some security threats become more challenging task with the emergence of Vehicle-to-Vehicle (V2V) communication and Vehicle-to-Roadside (V2R) communication in vehicular networks. Addressing the security issues in smart vehicular communication systems requires new effective and efficient algorithm that encompass considerations of new security techniques, safety things, communication related resource limitations, and other related new performance metrics. In this paper, we recommend a unified framework and new metrics that combines integrated modelling, system integration and optimization, official certification and validation, and automatic synthesis approaches for analysing the security and safety of ITS and booming out design space investigation of both in-vehicle electronic control systems and vehicle-to-vehicle communications. This integrated framework will facilitated the system integration and optimization and enable validation of various design the new metrics for vehicular networks such as timing, direction, reliability, speed, security and performance. © 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
About the journal
JournalData powered by TypesetLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
PublisherData powered by TypesetSpringer Verlag
ISSN18678211