In previous work, we investigated possibilities of an architecture for the functional distributionof a vehicle-to-x (V2X) system on two devices with different capabilities. One of the devices is an in-vehicle onboard unit (OBU), the other a personal portable device (PPD), such as asmartphone or tablet PC. We developed three different concepts to split workload between the devices, and investigated them regarding overall performance and flexibility. This work complements previous work with an in-depth security analysis. Security of V2Xsystems is challenging, especially in case parts of the system are not part of the physically reasonably well protected in-vehicle network domain. The security analysis unveils advantagesand disadvantages of the three concepts. Based on the analysis, this work discusses how V2X security can be realized in the two-device setup, providing maximum security with minimum impact on the system performance. The conclusions summarize which level of security can be reached with each of the three approaches.
«
In previous work, we investigated possibilities of an architecture for the functional distributionof a vehicle-to-x (V2X) system on two devices with different capabilities. One of the devices is an in-vehicle onboard unit (OBU), the other a personal portable device (PPD), such as asmartphone or tablet PC. We developed three different concepts to split workload between the devices, and investigated them regarding overall performance and flexibility. This work complements previous work with an in-...
»