UC2_TC_22* Preconditions: Teleoperation system is running, vehicle is connected to a remote station. * Input conditions / steps: Connect to the camera stream as a man-in-the-middle (using network monitoring tool), try to send data and change camera stream * Expected results: camera stream data is encrypted, can not be modified by man-in-the-middlehttps://repo.valu3s.eu/use-cases/uc2-car-teleoperation/evaluation-scenarios/transmission-line-cybersecurity/uc2_r_13/uc2_tc_22https://repo.valu3s.eu/@@site-logo/logo_valu3s_green_transparent.png
UC2_TC_22
* Preconditions: Teleoperation system is running, vehicle is connected to a remote station. * Input conditions / steps: Connect to the camera stream as a man-in-the-middle (using network monitoring tool), try to send data and change camera stream * Expected results: camera stream data is encrypted, can not be modified by man-in-the-middle