Chapter 13
Vehicular Edge Computing Security
CONTENTS
13.2 Vehicular Edge Computing Overview
13.2.1 VEC Architecture and Provided Services
13.2.2 Enabling Technologies: 5G, SDN, NFV, AI, Blockchain
13.3 Security Threats and Analysis of Potential Security Challenges
13.3.1 Access Control and Trust Management
13.3.3 Decentralized Computation
13.3.4 Intrusion and Anomaly Detection
Get Secure Edge Computing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.