National Repository of Grey Literature 2 records found  Search took 0.00 seconds. 
Secure Communication in the Internet of Vehicles
Kolaja, David ; Martinásek, Zdeněk (referee) ; Malina, Lukáš (advisor)
Public roads can get dangerous if a police force is trying to stop a vehicle in which the driver is running away from hit-and-run situation. This fact increases the probability of causing more harm to the public. It is also why it should be made possible for police to safely and remotely stop the vehicle using modern technologies. This master thesis deals with possibilities of utilizing Internet of Vehicles (IoV) technologies, in which Cooperative Intelligent Transport Systems (C-ITS) play a big role. We can find description of C-ITS security architecture in the theoretical introduction. The task is to design a secure infrastructure and communication for applications which can remotely stop a vehicle. The security of such communication should be made using modern cryptography algorithms which ensure unauthorized access and usage of the application. Lastly, the security implementation is tested on an On-Board Unit on which the memory consumption and time delay is evaluated.
Secure Communication in the Internet of Vehicles
Kolaja, David ; Martinásek, Zdeněk (referee) ; Malina, Lukáš (advisor)
Public roads can get dangerous if a police force is trying to stop a vehicle in which the driver is running away from hit-and-run situation. This fact increases the probability of causing more harm to the public. It is also why it should be made possible for police to safely and remotely stop the vehicle using modern technologies. This master thesis deals with possibilities of utilizing Internet of Vehicles (IoV) technologies, in which Cooperative Intelligent Transport Systems (C-ITS) play a big role. We can find description of C-ITS security architecture in the theoretical introduction. The task is to design a secure infrastructure and communication for applications which can remotely stop a vehicle. The security of such communication should be made using modern cryptography algorithms which ensure unauthorized access and usage of the application. Lastly, the security implementation is tested on an On-Board Unit on which the memory consumption and time delay is evaluated.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.