All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Inclusion of cyber security mechanisms in the development of the telematics system

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28160%2F22%3A63552678" target="_blank" >RIV/70883521:28160/22:63552678 - isvavai.cz</a>

  • Result on the web

    <a href="https://link.springer.com/chapter/10.1007/978-3-030-94774-3_37" target="_blank" >https://link.springer.com/chapter/10.1007/978-3-030-94774-3_37</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1007/978-3-030-94774-3_37" target="_blank" >10.1007/978-3-030-94774-3_37</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Inclusion of cyber security mechanisms in the development of the telematics system

  • Original language description

    The increase in demand for the transport of people and goods is leading to a rapid development of transport systems. Data protection must include the privacy and security of end users, service providers and application providers. In this document, we propose a new data protection framework based on privacy and security technologies. Privacy technology allows users and service providers to define a flexible data model. Security technology provides traditional features such as encryption, authentication, and denial. In addition, it provides a secure environment for secure execution, which is necessary to restrict access to data for specific purposes. The increase in the number of system components places high demands on the management of the entire system. Intelligent control systems used by computer architectures such as cloud computing, fog computing, SDN or NFV architecture. The safety of this system is essential for safe and efficient transport. They also use development systems from research projects that improve the individual functions of telematics systems. Necessary solution already in the development phase, where the requirements of cyber security must be implemented. This study examines the weaknesses of cyber security. Threats and attacks exploiting these vulnerabilities are identified and classified. The final part proposes and discusses the development guidelines and mitigation strategies to be used in the development of autonomous and unmanned systems.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    20104 - Transport engineering

Result continuities

  • Project

  • Continuities

    V - Vyzkumna aktivita podporovana z jinych verejnych zdroju

Others

  • Publication year

    2022

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Transbaltica XII: Transportation Science and Technology

  • ISBN

  • ISSN

    2523-3440

  • e-ISSN

    2523-3459

  • Number of pages

    10

  • Pages from-to

    375-384

  • Publisher name

    Springer

  • Place of publication

    Cham

  • Event location

    Vilnius

  • Event date

    Sep 16, 2021

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    000763725500037