Advertisement

Situation Maintenance

  • Attila Jaeger
Chapter

Abstract

As detailed, within Car-to-X communication each vehicle may detect and report dangerous situations. In Section A.1, some possible attacks on C2X use-cases are detailed. Consequently, multiple approaches to verify the trustworthiness of a message have to be applied upon message reception.

Keywords

Mobility Data Weather Type Vehicle Tracker Weather Situation Host Vehicle 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Fachmedien Wiesbaden 2016

Authors and Affiliations

  1. 1.DarmstadtGermany

Personalised recommendations