Inclusion of cyber security mechanisms in the development of the telematics system
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28160%2F22%3A63552678" target="_blank" >RIV/70883521:28160/22:63552678 - isvavai.cz</a>
Result on the web
<a href="https://link.springer.com/chapter/10.1007/978-3-030-94774-3_37" target="_blank" >https://link.springer.com/chapter/10.1007/978-3-030-94774-3_37</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1007/978-3-030-94774-3_37" target="_blank" >10.1007/978-3-030-94774-3_37</a>
Alternative languages
Result language
angličtina
Original language name
Inclusion of cyber security mechanisms in the development of the telematics system
Original language description
The increase in demand for the transport of people and goods is leading to a rapid development of transport systems. Data protection must include the privacy and security of end users, service providers and application providers. In this document, we propose a new data protection framework based on privacy and security technologies. Privacy technology allows users and service providers to define a flexible data model. Security technology provides traditional features such as encryption, authentication, and denial. In addition, it provides a secure environment for secure execution, which is necessary to restrict access to data for specific purposes. The increase in the number of system components places high demands on the management of the entire system. Intelligent control systems used by computer architectures such as cloud computing, fog computing, SDN or NFV architecture. The safety of this system is essential for safe and efficient transport. They also use development systems from research projects that improve the individual functions of telematics systems. Necessary solution already in the development phase, where the requirements of cyber security must be implemented. This study examines the weaknesses of cyber security. Threats and attacks exploiting these vulnerabilities are identified and classified. The final part proposes and discusses the development guidelines and mitigation strategies to be used in the development of autonomous and unmanned systems.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
—
OECD FORD branch
20104 - Transport engineering
Result continuities
Project
—
Continuities
V - Vyzkumna aktivita podporovana z jinych verejnych zdroju
Others
Publication year
2022
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Transbaltica XII: Transportation Science and Technology
ISBN
—
ISSN
2523-3440
e-ISSN
2523-3459
Number of pages
10
Pages from-to
375-384
Publisher name
Springer
Place of publication
Cham
Event location
Vilnius
Event date
Sep 16, 2021
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
000763725500037