Securing Electric Mobility

¡ Elsevier
āĻ‡āĻŦā§āĻ•
250
āĻĒā§ƒāĻˇā§āĻ āĻž
āĻ¯ā§‹āĻ—ā§āĻ¯
āĻ•āĻŋāĻ¤āĻžāĻĒāĻ–āĻ¨ ā§§ āĻ¨ā§ąā§‡āĻŽā§āĻŦā§°, ā§¨ā§Ļā§¨ā§ĢāĻ¤ āĻ‰āĻĒāĻ˛āĻŦā§āĻ§ āĻš'āĻŦāĨ¤ āĻāĻ‡āĻ–āĻ¨ āĻŽā§āĻ•ā§āĻ¤āĻŋāĻĒā§ā§°āĻžāĻĒā§āĻ¤ āĻ¨ā§‹āĻšā§‹ā§ąāĻžāĻ˛ā§ˆāĻ•ā§‡ āĻ†āĻĒā§āĻ¨āĻŋ āĻĒāĻ‡āĻšāĻž āĻ­ā§°āĻŋāĻŦ āĻ¨āĻžāĻ˛āĻžāĻ—ā§‡āĨ¤

āĻāĻ‡ āĻ‡āĻŦā§āĻ•āĻ–āĻ¨ā§° āĻŦāĻŋāĻˇā§Ÿā§‡

Electric vehicles (EVs) continue to capture a growing share of the smart car market across the globe. Like most new technologies, e-mobility comes with a learning curve. Securing Electric Mobility provides readers with in-demand knowledge relating to the dynamically evolving intersection between information & communication technology and vehicle engineering.The edited volume offers in-depth understanding of the distinct features of EV cybersecurity. It opens with a description of the fundamental elements of EVs, their interconnectedness, their cyber-physical characteristics and resulting vulnerabilities. It then dissects the digital threat landscape to increase awareness of all possible risks posed by cyberattacks on electric vehicles, and from there it systematically covers data management, regulatory frameworks, existing solutions and emerging cybersecurity protocols and methodologies that are enhanced by blockchain, artificial intelligence, Internet-of-Things integration, machine learning, and real-time monitoring systems. The value of this thorough overview is strengthened further through the inclusion of real-word case studies, which prove the effectiveness of the adopted approaches to safeguard vehicle control systems, owners' personal data, and the broader cyber-physical network and related equipment.This book proves to be a cardinal, state-of-the-art resource for academia and industry alike as it encourages further transformative, interdisciplinary investigations into the security-assurance complexities that guide EVs' resilience evolution. - Offers insights into unique cybersecurity problems associated with the era of electric vehicles. - Outlines best practices for the vital protection of charging infrastructure, which is an oftentimes-disregarded facet of EV cybersecurity. - Includes case studies that encapsulate implementation opportunities, lessons learnt from challenges arisen in this context, and evaluation of the practical solutions adopted.

āĻ˛āĻŋāĻ–āĻ•ā§° āĻŦāĻŋāĻˇāĻ¯āĻŧā§‡

Dr. Aparna Kumari is an Assistant Professor in the Dept. of Computer Science and Engineering at the Institute of Technology, Nirma University, India. She was listed among the top 2% most influential researchers globally by Stanford University in 2021, 2022, and 2023 and was also awarded the Shri Pralhad P Chhabria Award – Runner Up for Best Female Professional (Early Career) in 2023. Her research interests include smart grid technologies, blockchain, Artificial Intelligence, quantum computing, electric vehicles, virtual and augmented reality, cybersecurity, and IoT. She is currently serving as a reviewer for the IEEE Internet of Things Journal, Multimedia Tools and Applications (Springer), Sensors (MDPI), the Journal of Information Security and Applications (Elsevier), and IEEE Network. She is a member of the Program/Technical Committee on UPCON2020, IC4S-2021, IC4S-2022, and EPTL2022, as well as of IEEE Women in Engineering.

āĻĒāĻĸāĻŧāĻžā§° āĻ¨āĻŋāĻ°ā§āĻĻā§‡āĻļāĻžā§ąāĻ˛ā§€

āĻ¸ā§āĻŽāĻžā§°ā§āĻŸāĻĢ’āĻ¨ āĻ†ā§°ā§ āĻŸā§‡āĻŦāĻ˛ā§‡āĻŸ
Android āĻ†ā§°ā§ iPad/iPhoneā§° āĻŦāĻžāĻŦā§‡ Google Play Books āĻāĻĒāĻŸā§‹ āĻ‡āĻ¨āĻˇā§āĻŸāĻ˛ āĻ•ā§°āĻ•āĨ¤ āĻ‡ āĻ¸ā§āĻŦāĻ¯āĻŧāĻ‚āĻ•ā§āĻ°āĻŋāĻ¯āĻŧāĻ­āĻžā§ąā§‡ āĻ†āĻĒā§‹āĻ¨āĻžā§° āĻāĻ•āĻžāĻ‰āĻŖā§āĻŸā§° āĻ¸ā§ˆāĻ¤ā§‡ āĻ›āĻŋāĻ‚āĻ• āĻšāĻ¯āĻŧ āĻ†ā§°ā§ āĻ†āĻĒā§āĻ¨āĻŋ āĻ¯'āĻ¤ā§‡ āĻ¨āĻžāĻĨāĻžāĻ•āĻ• āĻ¤'āĻ¤ā§‡āĻ‡ āĻ•ā§‹āĻ¨ā§‹ āĻ…āĻĄāĻŋāĻ…'āĻŦā§āĻ• āĻ…āĻ¨āĻ˛āĻžāĻ‡āĻ¨ āĻŦāĻž āĻ…āĻĢāĻ˛āĻžāĻ‡āĻ¨āĻ¤ āĻļā§āĻ¨āĻŋāĻŦāĻ˛ā§ˆ āĻ¸ā§āĻŦāĻŋāĻ§āĻž āĻĻāĻŋāĻ¯āĻŧā§‡āĨ¤
āĻ˛ā§‡āĻĒāĻŸāĻĒ āĻ†ā§°ā§ āĻ•āĻŽā§āĻĒāĻŋāĻ‰āĻŸāĻžā§°
āĻ†āĻĒā§āĻ¨āĻŋ āĻ•āĻŽā§āĻĒāĻŋāĻ‰āĻŸāĻžā§°ā§° ā§ąā§‡āĻŦ āĻŦā§āĻ°āĻžāĻ‰āĻœāĻžā§° āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻ•ā§°āĻŋ Google PlayāĻ¤ āĻ•āĻŋāĻ¨āĻž āĻ…āĻĄāĻŋāĻ…'āĻŦā§āĻ•āĻ¸āĻŽā§‚āĻš āĻļā§āĻ¨āĻŋāĻŦ āĻĒāĻžā§°ā§‡āĨ¤
āĻ‡-ā§°ā§€āĻĄāĻžā§° āĻ†ā§°ā§ āĻ…āĻ¨ā§āĻ¯ āĻĄāĻŋāĻ­āĻžāĻ‡āĻš
Kobo eReadersā§° āĻĻā§°ā§‡ āĻ‡-āĻšāĻŋā§ŸāĻžāĻāĻšā§€ā§° āĻĄāĻŋāĻ­āĻžāĻ‡āĻšāĻ¸āĻŽā§‚āĻšāĻ¤ āĻĒā§āĻŋāĻŦāĻ˛ā§ˆ, āĻ†āĻĒā§āĻ¨āĻŋ āĻāĻŸāĻž āĻĢāĻžāĻ‡āĻ˛ āĻĄāĻžāĻ‰āĻ¨āĻ˛â€™āĻĄ āĻ•ā§°āĻŋ āĻ¸ā§‡āĻ‡āĻŸā§‹ āĻ†āĻĒā§‹āĻ¨āĻžā§° āĻĄāĻŋāĻ­āĻžāĻ‡āĻšāĻ˛ā§ˆ āĻ¸ā§āĻĨāĻžāĻ¨āĻžāĻ¨ā§āĻ¤ā§°āĻŖ āĻ•ā§°āĻŋāĻŦ āĻ˛āĻžāĻ—āĻŋāĻŦāĨ¤ āĻ¸āĻŽā§°ā§āĻĨāĻŋāĻ¤ āĻ‡-ā§°āĻŋāĻĄāĻžā§°āĻ˛ā§ˆ āĻĢāĻžāĻ‡āĻ˛āĻŸā§‹ āĻ•ā§‡āĻ¨ā§‡āĻ•ā§ˆ āĻ¸ā§āĻĨāĻžāĻ¨āĻžāĻ¨ā§āĻ¤ā§° āĻ•ā§°āĻŋāĻŦ āĻœāĻžāĻ¨āĻŋāĻŦāĻ˛ā§ˆ āĻ¸āĻšāĻžāĻ¯āĻŧ āĻ•ā§‡āĻ¨ā§āĻĻā§ā§°āĻ¤ āĻĨāĻ•āĻž āĻ¸āĻŦāĻŋāĻļā§‡āĻˇ āĻ¨āĻŋā§°ā§āĻĻā§‡āĻļāĻžā§ąāĻ˛ā§€ āĻšāĻžāĻ“āĻ•āĨ¤