13.11.2014 Views

PRE-DRIVE C2X Deliverable D0.3 Final report_20100929.pdf

PRE-DRIVE C2X Deliverable D0.3 Final report_20100929.pdf

PRE-DRIVE C2X Deliverable D0.3 Final report_20100929.pdf

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Final</strong> Report <strong>PRE</strong>-<strong>DRIVE</strong> <strong>C2X</strong> 29.9.2010<br />

encapsulate their functionality as services with well-defined interfaces (i.e., vehicle<br />

applications and vehicle-to-business communication, see Figure 16).<br />

Figure 16: Vehicle-to-Business Communication Integration View<br />

Furthermore, the security view of the architecture described all relevant technical<br />

aspects of providing trustworthy and privacy preserving ITS communications, with<br />

major focus on ITS-G5A safety communications. These were:<br />

<br />

<br />

<br />

<br />

<br />

Secure communication<br />

Identity management<br />

In-vehicle security<br />

Privacy<br />

Administrative processes<br />

Secure communication deals with security related to the actual communication<br />

process. Security services can be used on any layer of the communication stack<br />

and will be provided through a layer-independent interface that creates generic<br />

secure messages. They can be configured to be insecure, signed or encrypted, and<br />

to also include mobility data that need particular protection for ITS-G5A safety use<br />

cases.<br />

The remaining technical aspects build on the generic secure message format.<br />

Identity management described how identities and keys for their use in secure<br />

<strong>Deliverable</strong> <strong>D0.3</strong> Version 1.0 27<br />

<strong>Final</strong> Report

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!