Across
- 2. ability to encrypt sensitive data and provide robust defences against attacks.
- 4. servers manage vehicle authentication and store results on the blockchain for quick re-authentication by edge nodes.
- 5. cryptographic techniques for mutual authentication support local re-authentication when vehicles switch between edge nodes.
- 6. Metric detects deviations from normal behaviour but may generate false positives.
- 8. Protocol (AVTP) packets within Automotive Ethernet networks.
- 10. is specifically designed to detect replay attacks on AVTP streams.
Down
- 1. labelled dataset of benign and malicious packets by simulating client-server behaviour.
- 3. Secure decentralized communication system for CAVs.
- 7. model employs reset and update gates to manage memory connections, using an attention mechanism to enhance detection accuracy.
- 9. Attack detection methods are classified into infrastructure-less.
