UC2_TC_20* Preconditions: Teleoperation system is running, vehicle is connected to a remote station. * Input conditions / steps: Connect to the transmission line as a man-in-the-middle (using network monitoring tool), try to obtain driving commands * Expected results: transmission line data is encrypted, driving commands can not be read or modified by man-in-the-middlehttps://repo.valu3s.eu/use-cases/uc2-car-teleoperation/evaluation-scenarios/transmission-line-cybersecurity/uc2_r_12/uc2_tc_20https://repo.valu3s.eu/@@site-logo/logo_valu3s_green_transparent.png
UC2_TC_20
* Preconditions: Teleoperation system is running, vehicle is connected to a remote station. * Input conditions / steps: Connect to the transmission line as a man-in-the-middle (using network monitoring tool), try to obtain driving commands * Expected results: transmission line data is encrypted, driving commands can not be read or modified by man-in-the-middle