Muutke küpsiste eelistusi

Guide to Automotive Connectivity and Cybersecurity: Trends, Technologies, Innovations and Applications 1st ed. 2019 [Kõva köide]

  • Formaat: Hardback, 645 pages, kõrgus x laius: 235x155 mm, kaal: 1166 g, 81 Illustrations, color; 129 Illustrations, black and white; XXV, 645 p. 210 illus., 81 illus. in color., 1 Hardback
  • Sari: Computer Communications and Networks
  • Ilmumisaeg: 12-Apr-2019
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 331973511X
  • ISBN-13: 9783319735115
  • Kõva köide
  • Hind: 95,02 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 111,79 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Hardback, 645 pages, kõrgus x laius: 235x155 mm, kaal: 1166 g, 81 Illustrations, color; 129 Illustrations, black and white; XXV, 645 p. 210 illus., 81 illus. in color., 1 Hardback
  • Sari: Computer Communications and Networks
  • Ilmumisaeg: 12-Apr-2019
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 331973511X
  • ISBN-13: 9783319735115
This comprehensive text/reference presents an in-depth review of the state of the art of automotive connectivity and cybersecurity with regard to trends, technologies, innovations, and applications. The text describes the challenges of the global automotive market, clearly showing where the multitude of innovative activities fit within the overall effort of cutting-edge automotive innovations, and provides an ideal framework for understanding the complexity of automotive connectivity and cybersecurity.

Topics and features: discusses the automotive market, automotive research and development, and automotive electrical/electronic and software technology; examines connected cars and autonomous vehicles, and methodological approaches to cybersecurity to avoid cyber-attacks against vehicles; provides an overview on the automotive industry that introduces the trends driving the automotive industry towards smart mobility and autonomous driving; reviews automotive research and development, offering background on the complexity involved in developing new vehicle models; describes the technologies essential for the evolution of connected cars, such as cyber-physical systems and the Internet of Things; presents case studies on Car2Go and car sharing, car hailing and ridesharing, connected parking, and advanced driver assistance systems; includes review questions and exercises at the end of each chapter.









The insights offered by this practical guide will be of great value to graduate students, academic researchers and professionals in industry seeking to learn about the advanced methodologies in automotive connectivity and cybersecurity.

Arvustused

The authors do a good job of explaining the rapid growth of IC T in the automotive industry. Importantly, the cybersecurity risks associated with this uptake are discussed--issues which the automotive industry, unlike the IT industry, would most likely not have previously encountered. This is a timely red flag to the industry that may help ensure cybersecurity risks are considered and addressed during vehicle systems design. (David B. Henderson, Computing Reviews, October 9, 2020)

1 Introduction 1(12)
1.1 The Automotive Industry
3(4)
1.2 Scope of This Book
7(2)
1.3 Overview of Topics
9(2)
References and Further Reading
11(2)
2 The Automotive Industry 13(32)
2.1 The Automotive Market
13(6)
2.2 The Automotive Megatrends
19(11)
2.2.1 Tighter Emission Controls and the Rise of Electric Vehicles
20(3)
2.2.2 Car Ownership Versus Mobility
23(2)
2.2.3 Connectivity
25(1)
2.2.4 Safety and Advanced Driver Assistance Systems
26(2)
2.2.5 Autonomous Driving
28(1)
2.2.6 Digitalization
29(1)
2.3 Automotive OEMs and Suppliers
30(3)
2.4 New Players and Challenges
33(1)
2.5 The Digital Transformation of the Automotive Industry
34(3)
2.6 Exercises
37(2)
References and Further Reading
39(6)
3 Automotive Research and Development 45(38)
3.1 The Automotive Development Process
45(18)
3.1.1 Requirements Engineering
59(1)
3.1.2 Design as a Multiparameter Optimization Problem
60(3)
3.2 Automotive Modularization and Platforms
63(1)
3.3 Virtual Product Creation
64(5)
3.4 Product Life Cycle Management
69(8)
3.4.1 Loss of Control in Life Cycle Management
70(1)
3.4.2 Systems Engineering Approach
71(2)
3.4.3 Product Life Cycle Stages
73(2)
3.4.4 Software Life Cycle Processes
75(2)
3.5 Exercises
77(2)
References and Further Reading
79(4)
4 Automotive E/E and Automotive Software Technology 83(88)
4.1 Mechatronic Systems in the Car
83(3)
4.2 Automotive Electronics
86(23)
4.2.1 Body Electronics
89(3)
4.2.2 Chassis Electronics
92(2)
4.2.3 Comfort Electronics
94(1)
4.2.4 Driver Assistance Electronics
94(4)
4.2.5 Electronic Control Units
98(2)
4.2.6 Entertainment/Infotainment Electronics
100(2)
4.2.7 Sensor Technology
102(7)
4.3 E/E Architectures and Topologies
109(12)
4.3.1 Objectives
110(1)
4.3.2 Architectures and Topologies
111(3)
4.3.3 Bus Systems and ISO Standards
114(7)
4.4 Functional Safety
121(5)
4.5 Automotive Software Engineering
126(16)
4.5.1 Increasing Software Content and Product Complexity
127(3)
4.5.2 Model-Based Development
130(3)
4.5.3 Hardware-in-the-Loop Tests
133(9)
4.6 AUTOSAR
142(5)
4.7 AUTOSAR Adaptive Platform
147(1)
4.8 GENIVI
147(2)
4.9 Example: Advanced Driver Assistance System
149(14)
4.9.1 ADAS Functionalities
151(4)
4.9.2 ADAS Sensor Types
155(7)
4.9.3 Pros and Cons of the ADAS Sensor Suite
162(1)
4.10 Trends
163(1)
4.11 Exercises
164(3)
References and Further Reading
167(4)
5 The Connected Car 171(94)
5.1 Cyber-Physical Systems
171(35)
5.1.1 Introduction to Cyber-Physical Systems
172(8)
5.1.2 Cyber-Physical Systems Design Recommendations
180(4)
5.1.3 Cyber-Physical Systems Requirements
184(5)
5.1.4 Cyber-Physical Control Systems
189(11)
5.1.5 Cyber-Physical Vehicle Tracking
200(6)
5.2 Internet of Things
206(8)
5.2.1 Internet of Things Enabling Technologies
208(2)
5.2.2 RFID and WSN Technology
210(4)
5.3 Telematics, Infotainment, and the Evolution of the Connected Car
214(19)
5.3.1 Telematics
215(7)
5.3.2 Infotainment
222(2)
5.3.3 Evolution of the Connected Car
224(9)
5.4 Platforms and Architectures
233(8)
5.4.1 Connected Car Architecture and Challenges
234(3)
5.4.2 Connected Car Reference Platform
237(1)
5.4.3 Connected Car in the Cloud
238(3)
5.5 Autonomous Vehicles
241(6)
5.6 GENIVI Alliance
247(2)
5.7 Case Studies
249(8)
5.7.1 BMW ConnectedDrive Store
249(3)
5.7.2 Mercedes COMAND Online
252(2)
5.7.3 HERE: Digital Maps for Fully Autonomous Driving
254(3)
5.8 Exercises
257(3)
References and Further Reading
260(5)
6 Automotive Cybersecurity 265(114)
6.1 Introduction to Cybersecurity
266(50)
6.1.1 Cybersecurity and Vulnerability
272(1)
6.1.2 Artificial Intelligence
272(10)
6.1.3 Control Theory
282(2)
6.1.4 Epidemic Theory
284(3)
6.1.5 Game Theory
287(4)
6.1.6 Graph Theory
291(3)
6.1.7 Importance of Cybersecurity
294(8)
6.1.8 Automotive IT and Cybersecurity
302(5)
6.1.9 Attack Value Chain
307(2)
6.1.10 Holistic Cybersecurity Solutions
309(7)
6.2 IT Security in Automotive Cyber-Physical Systems
316(13)
6.2.1 Vehicle Network Technologies and Cybersecurity
322(4)
6.2.2 Cyberattack Taxonomy
326(3)
6.3 Hacking and Automotive Attack Surfaces and Vulnerabilities
329(11)
6.3.1 Hacking
329(1)
6.3.2 Automotive Attack Surfaces and Vulnerabilities
330(10)
6.4 Intrusion Detection and Prevention
340(10)
6.4.1 Intrusion Detection
340(3)
6.4.2 Intrusion Prevention
343(7)
6.5 Functional Safety and Security
350(12)
6.5.1 Security for Wireless Mobile Networks
350(4)
6.5.2 Security for Sensor Networks
354(2)
6.5.3 Platform Security
356(1)
6.5.4 Cloud Computing and Data Security
357(3)
6.5.5 Functional Safety
360(2)
6.6 Car Hacking Examples
362(6)
6.6.1 2010: Vehicles Disabled Remotely via Web Application
363(1)
6.6.2 2010 and 2011 CAESS Experimental Analysis
364(1)
6.6.3 2013 Miller and Valasek Physical Hack
365(2)
6.6.4 2015 Miller and Valasek Remote Hack
367(1)
6.7 Exercises
368(3)
References and Further Reading
371(8)
7 Mobile Apps for the Connected Car 379(60)
7.1 Automotive IT
380(4)
7.1.1 IT Management and Systems in the Automotive Industry
382(2)
7.2 Agile Software Development
384(4)
7.2.1 Challenges and Two-Speed IT
387(1)
7.3 The Smartphone and App Market
388(1)
7.4 iOS
389(4)
7.4.1 The History of iOS
389(1)
7.4.2 The iOS Platform
390(1)
7.4.3 The iOS Architecture
390(3)
7.5 Xcode
393(2)
7.6 Android
395(2)
7.7 iOS and Android in the Car
397(1)
7.8 Objective-C, Swift, and Java App Development
398(6)
7.8.1 Objective-C
398(5)
7.8.2 Swift
403(1)
7.8.3 Java
404(1)
7.9 A Ride-Sharing Example
404(27)
7.9.1 Core Use Cases
405(2)
7.9.2 00A
407(5)
7.9.3 Design
412(1)
7.9.4 The Ridematching Algorithm
413(2)
7.9.5 Using Google Maps
415(2)
7.9.6 A Code Walk Through
417(14)
7.10 Summary and Recommended Readings
431(2)
7.11 Exercises
433(2)
References and Further Readings
435(4)
8 Carsharing 439(22)
8.1 The Carsharing Concept
439(2)
8.2 Example car2go
441(1)
8.3 Use Cases and Requirement Analysis for Carsharing
442(4)
8.4 Hardware/Software Modifications for Carsharing
446(1)
8.5 Electric Vehicles and Carsharing
447(5)
8.6 Carsharing Activities by Other OEMs
452(1)
8.7 Cyber Attack Surfaces and Mitigation of Cyber Attacks
453(1)
8.8 Conclusion
454(1)
8.9 Exercises
455(2)
References and Further Reading
457(4)
9 Car Hailing and Ridesharing 461(24)
9.1 Introduction
461(2)
9.2 Ride-Hailing Companies and Taxi Aggregators
463(5)
9.3 Example Bangalore
468(4)
9.3.1 Cab Types and Prices
468(2)
9.3.2 Services
470(2)
9.4 Surge Prices
472(1)
9.5 Safety in Ridesharing
472(6)
9.5.1 Problem Background
473(1)
9.5.2 Initiatives to Increase Safety
474(2)
9.5.3 Reported Crime Incidents in Ridesharing
476(1)
9.5.4 Government Policies for Ridesharing Companies
477(1)
9.5.5 Legal Cases and Accusations
478(1)
9.6 Cyberattacks and Cybersecurity in Ridesharing
478(1)
9.7 Conclusion
479(1)
9.8 Exercises
479(1)
References and Further Reading
480(5)
10 Connected Parking and Automated Valet Parking 485(28)
10.1 Parking
486(1)
10.2 Connected Parking
487(5)
10.3 Parking Assistance
492(1)
10.4 Automated Valet Parking
493(3)
10.5 Cyber Threats
496(1)
10.6 Intrusion Detection and Prevention
497(6)
10.6.1 Types of Intrusion Detection Systems
497(1)
10.6.2 Attacks Against Connected Cars
498(2)
10.6.3 Artificial Neural Network-Based IDS Implementation
500(3)
10.7 Conclusion and Recommended Readings
503(1)
10.7.1 Cyber Threats and Cybersecurity
503(1)
10.7.2 Recommended Readings
504(1)
10.8 Exercises
504(3)
References and Further Reading
507(6)
11 Advanced Driver Assistance Systems and Autonomous Driving 513(68)
11.1 Advanced Driver Assistance Systems
514(4)
11.2 Lane Departure Warning, Lane Keep Assistance, Obstacle Detection, and Crossing Assistance
518(7)
11.2.1 Lane Keeping and Lane Change Assistance
518(5)
11.2.2 Crossing Assistance
523(2)
11.3 Image Processing and Image Analysis
525(24)
11.3.1 Computer Vision and Machine Vision
525(1)
11.3.2 Basic Principles of Image Processing
526(7)
11.3.3 Detection of Moving Objects
533(5)
11.3.4 Optical Flow Algorithm
538(4)
11.3.5 Implementation Using MATLAB
542(7)
11.4 Autonomous Driving
549(9)
11.5 Regulations, Public Acceptance, and Liability Issues
558(3)
11.5.1 Regulations and On-Road Approval
558(1)
11.5.2 Toward a Statutory Framework for Autonomous Driving
558(1)
11.5.3 Acceptance of Autonomous Driving and Ethical Difficulties
559(1)
11.5.4 Test on the Autobahn
560(1)
11.6 E/E Architectures and Middleware for Autonomous Driving
561(5)
11.7 Cybersecurity and Functional Safety
566(3)
11.8 Summary, Conclusion, and Recommended Readings
569(2)
11.8.1 Recommended Reading
570(1)
11.9 Exercises
571(1)
References and Further Readings
572(9)
12 Summary, Final Remarks, Outlook, and Further Reading 581(14)
12.1 Summary
581(2)
12.2 Final Remarks: Wind of Change
583(5)
12.2.1 Frugal Engineering
583(1)
12.2.2 Rise of Asian Markets
584(1)
12.2.3 E-Mobility
585(1)
12.2.4 Fuel Cells
585(1)
12.2.5 Connected Cars
585(1)
12.2.6 Shared Mobility
586(1)
12.2.7 Autonomous Driving
586(1)
12.2.8 Automotive Cybersecurity
587(1)
12.3 Outlook and Further Reading
588(3)
12.3.1 Outlook
588(2)
12.3.2 Further Reading
590(1)
References and Further Readings
591(4)
Glossary 595(28)
Index 623
Dietmar P. F. Möller is a Professor in the Institute of Applied Stochastics and Operations Research at Clausthal University of Technology (TUC), Germany; a Member of the Simulations Science Center (SWZ) Clausthal-Göttingen, Germany; an Adjunct Professor in the Department of Electrical and Computer Engineering at the University of Nebraska-Lincoln (UNL), USA; and an Adjunct Professor in the Department of Electrical and Computer Engineering at the University of Alabama in Huntsville (UAH), USA. He is also a member of the Board of the AMSC (Alabama Modeling and Simulation Council), USA. His other publications include the Springer titles Introduction to Transportation Analysis, Modeling and Simulation (2014) and Guide to Computing Fundamentals in Cyber-Physical Systems (2016). Roland E. Haas is the Founder and CEO of QSO-Technologies in Bangalore, India. He has more than 20 years of professional experience in senior techno-managerial, business innovation and business development assignments in Germany, USA, India and Japan with broad experience in automotive R&D, aerospace R&D, engineering & IT services, consulting and strategy. As an entrepreneur, he serves as a mentor for startups, a researcher and a book author. He is an honorary professor at the International Institute of Information Technology (IIIT-B) and an adjunct faculty member of the Indian Institute of Science (IISc). His teaching is in mechatronics, automotive electronics, car IT, automotive software technologies, information management and virtual product creation.