The Security Testbed for the Purposes of the ITS-G5 Communication Attacks Prevention.
Jirí PokornýPavel SedaJan DvorakLukas MalinaZdenek MartinasekPublished in: ICUMT (2021)
Keyphrases
- denial of service
- security mechanisms
- dos attacks
- security threats
- security problems
- security protocols
- security vulnerabilities
- resource constrained
- security measures
- computer security
- computer networks
- network security
- java card
- cyber attacks
- security breaches
- denial of service attacks
- countermeasures
- malicious attacks
- stream cipher
- security issues
- malicious users
- communication protocols
- security flaws
- fault injection
- cryptographic algorithms
- security risks
- security policies
- biometric template
- secure routing
- access control
- chosen plaintext
- secure communication
- key management
- security requirements
- information security
- security management
- intrusion detection
- attack scenarios
- information leakage
- cyber physical systems
- intrusion prevention
- smart card
- communication networks
- cryptographic protocols
- identity theft
- network management
- ddos attacks
- single point of failure
- intrusion detection system
- data acquisition
- physical layer