The widespread adoption of Cooperative, Connected, and Automated Mobility (CCAM) applications requires the implementation of stringent security mechanisms to minimize the surface of cyber attacks. Authentication is an effective process for validating user identity in vehicular networks. However, authentication alone is not enough to prevent dangerous attack situations. Existing security mechanisms are not able ...
Major maritime carriers are globally demanding improvements in the efficiency of port operations. Cargo carried by ships must be loaded and unloaded quickly with minimal stopover time in the port. This requirement mandates seaports to deploy cutting-edge technology to the port area so that logistic processes are increasingly efficient and reliable. In this scenario, the attack surface of such critical infrastru...