Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
ISCC '03 Proceedings of the Eighth IEEE International Symposium on Computers and Communications
Cisco Router Firewall Security
Cisco Router Firewall Security
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Conducting forensic investigations of cyber attacks on automobile in-vehicle networks
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Simulated attacks on CAN buses: vehicle virus
AsiaCSN '08 Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks
SECURING VEHICULAR COMMUNICATIONS
IEEE Wireless Communications
Hi-index | 0.00 |
A set of guidelines for creating a secure infrastructure for wireless diagnostics and software updates in vehicles is presented. The guidelines are derived from a risk assessment for a wireless infrastructure. From the outcome of the risk assessment, a set of security requirements to counter the identified security risks were developed. The security requirements can be viewed as guidelines to support a secure implementation of the wireless infrastructure. Moreover, we discuss the importance of defining security policies.