Automotive cybersecurity Set II

12345678910
Across
  1. 2. ability to encrypt sensitive data and provide robust defences against attacks.
  2. 4. servers manage vehicle authentication and store results on the blockchain for quick re-authentication by edge nodes.
  3. 5. cryptographic techniques for mutual authentication support local re-authentication when vehicles switch between edge nodes.
  4. 6. Metric detects deviations from normal behaviour but may generate false positives.
  5. 8. Protocol (AVTP) packets within Automotive Ethernet networks.
  6. 10. is specifically designed to detect replay attacks on AVTP streams.
Down
  1. 1. labelled dataset of benign and malicious packets by simulating client-server behaviour.
  2. 3. Secure decentralized communication system for CAVs.
  3. 7. model employs reset and update gates to manage memory connections, using an attention mechanism to enhance detection accuracy.
  4. 9. Attack detection methods are classified into infrastructure-less.