As detailed, within Car-to-X communication each vehicle may detect and report dangerous situations. In Section A.1, some possible attacks on C2X use-cases are detailed. Consequently, multiple approaches to verify the trustworthiness of a message have to be applied upon message reception.
Unable to display preview. Download preview PDF.