UC2_R_13

Data tamper detection
13
During data transfer, the data can not be modified or counterfeited. Attempts to modify data need to be detected.
Cybersecurity
Requirement Test Cases
VALU3S Framework
Contents
UC2_TC_21

* Preconditions: Teleoperation system is running, vehicle is connected to a remote station. * Input conditions / steps: Connect to the transmission line as a man-in-the-middle (using network monitoring tool), try to delay information and interrupt normal working conditions * Expected results: transmission line data is encrypted, driving commands can not be read or modified by man-in-the-middle

UC2_TC_22

* Preconditions: Teleoperation system is running, vehicle is connected to a remote station. * Input conditions / steps: Connect to the camera stream as a man-in-the-middle (using network monitoring tool), try to send data and change camera stream * Expected results: camera stream data is encrypted, can not be modified by man-in-the-middle