Please enable JavaScript.
Coggle requires JavaScript to display documents.
Secuirty in V2X - Coggle Diagram
Secuirty in V2X
End-To-End Security
Motivation
Vehicles will need to have different types of communication technologies particularly V2V and V2R direct communication (e.g., ITS G5/C-V2X) and V2N cellular communicationt echnolgies (4G/5G)
Security in Hybrid Vehicular Communication based on ITS-G5, LTE-V, and Mobile Edge Computing
4 different communication channels
1) via ITS-G5
2)via C-V2X on PC5 for autonomous non-operator managed" and "operator managed"
3) Using C-V2X via Uu inteface
4) via cell tower using MEC
Key threats: 1) denial of transmission and reception, 2) modification and deletion of i nformation, 3) masquerade of a station, and 4) acquisition of personal information
Requirements
Must: 1) data integrity 2) sender authentication and authorsiation, 3) replay protectly 4) availability
For some use cases 5) confidentiality, 6) accountability
Must: (Data) integrity
- Message/data integrity has to be ensured to detect manipulations on message made by attackers.
- System and software integrity has to be ensured in order to protect keys, certificates, and configurations agains manipulations
Must: Authentication and authorisation
of senders shall be ensured to allow only trusted systems to participate activity in C-ITS communications. The provision of authentications and authorization shall be revocable to exclude systems from C-ITS if necessary.
-
-
-
Should: Confidentiality
Confidentiality of V2X message content is required if a C-ITS service shall only be used by selected authorized stations. Sensitive data such as symmetric and private keys in trasition and at rest shall not be exposed to external entities. Credentials for cellular network access shall reside on the Unviersal Integrated-Circuite Card (UICC)
Privacy protection
Privacity protection is required in order to prevent ITS-internal or externa entities to collect personal identifying information. Neither a network operator nor security infrastructure operator shall be able to l ink a pseudonymous identifier of a C-ITS sation to its long-term ID. Furthermore it shall not be possible to link different pseudonyms to the same owner. Attacker shall not be able to track a vehicle by collectiving v2X messages from the wirless radio.
Detection of malicious station behavior shall be considred in order to achieve trust and confidence in V2X messages on top of cryptographic authenticiation measures.
-
-