A State-of-the-Art Assessment of US and EU C-ITS Security Solutions

A State-of-the-Art Assessment of US and EU C-ITS Security Solutions

Yessenia Berenice Llive, Norbert Varga, László Bokor
Copyright: © 2018 |Pages: 29
ISBN13: 9781522557364|ISBN10: 1522557369|EISBN13: 9781522557371
DOI: 10.4018/978-1-5225-5736-4.ch014
Cite Chapter Cite Chapter

MLA

Llive, Yessenia Berenice, et al. "A State-of-the-Art Assessment of US and EU C-ITS Security Solutions." Security and Privacy in Smart Sensor Networks, edited by Yassine Maleh, et al., IGI Global, 2018, pp. 309-337. https://doi.org/10.4018/978-1-5225-5736-4.ch014

APA

Llive, Y. B., Varga, N., & Bokor, L. (2018). A State-of-the-Art Assessment of US and EU C-ITS Security Solutions. In Y. Maleh, A. Ezzati, & M. Belaissaoui (Eds.), Security and Privacy in Smart Sensor Networks (pp. 309-337). IGI Global. https://doi.org/10.4018/978-1-5225-5736-4.ch014

Chicago

Llive, Yessenia Berenice, Norbert Varga, and László Bokor. "A State-of-the-Art Assessment of US and EU C-ITS Security Solutions." In Security and Privacy in Smart Sensor Networks, edited by Yassine Maleh, Abdellah Ezzati, and Mustapha Belaissaoui, 309-337. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-5736-4.ch014

Export Reference

Mendeley
Favorite

Abstract

In the near future with the innovative services and solutions being currently tested and deployed for cars, homes, offices, transport systems, smart cities, etc., the user connectivity will considerably change. It means that smart devices will be connected to the internet and produce a big impact on the internet traffic, increasing the service demand generated by devices and sensors. However most of these devices are vulnerable to attacks. Hence, the security and privacy become a crucial feature to be included in towards its appropriate deployment. Interconnected, cooperative, service-oriented devices and their related hardware/software solutions will contain sensitive data making such systems susceptible to attacks and leakage of information. Therefore, robust secure communication infrastructures must be established to aid suitable deployment. This chapter is a state-of-the-art assessment of US and EU C-ITS security solutions.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.