The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Background/Objectives: Requirement for security and safety with interest and growth to C-ITS application is increased. It is needed to security threat issue and risk consideration in the connected vehicle environment. Methods/Statistical Analysis: For efficient communication assistance of connected vehicle, the understanding and access of WAVE mode such as CCH, SCH for multi channel and WSMP specification are preferred in control, communication and signal processing for cooperative intelligence transport system. In security risk assessment and debugging, it is applied to reviewing of source code, analysis and evaluating of compliance, fuzzing and conducting of vulnerability. Findings: Main objectives of this article are to see risk issue and cyber threats in connected vehicle of ITS. Understanding for issues of risk assessment such as debugging, fuzzing, real time application, evaluating of compliance, connectivity and computational performance are required. Also for build up security of ITS it should be established guideline of ITS security factors such as PKI, security architecture, cost and interoperable solution. Application/Improvements: The risk assessment and cyber threats are basically emphasized guideline of ITS security and safety in terms of cyber security procedure and security considerations.

Keywords

Intelligence Traffic Security, Standard, Traffic, Vehicle Communication.
User