UC2_TC_21* Preconditions: Teleoperation system is running, vehicle is connected to a remote station. * Input conditions / steps: Connect to the transmission line as a man-in-the-middle (using network monitoring tool), try to delay information and interrupt normal working conditions * Expected results: transmission line data is encrypted, driving commands can not be read or modified by man-in-the-middlehttps://repo.valu3s.eu/use-cases/uc2-car-teleoperation/evaluation-scenarios/transmission-line-cybersecurity/uc2_r_13/uc2_tc_21https://repo.valu3s.eu/@@site-logo/logo_valu3s_green_transparent.png
UC2_TC_21
* Preconditions: Teleoperation system is running, vehicle is connected to a remote station. * Input conditions / steps: Connect to the transmission line as a man-in-the-middle (using network monitoring tool), try to delay information and interrupt normal working conditions * Expected results: transmission line data is encrypted, driving commands can not be read or modified by man-in-the-middle