The successful adoption of V2X communication relies on establishing trust among users and stakeholders, with its security protocols ensuring confidentiality, integrity, authenticity, and non-repudiation of information exchanged among vehicles, infrastructure, pedestrians, and networks. Compromised security in V2X systems not only endangers information receivers but also erodes confidence in the technology, hindering its adoption. V2X, vital for safety critical applications like collision avoidance, demands robust security measures to prevent malicious manipulation. As vehicles share sensitive data, protecting traffic participants’ privacy through encryption and access control is imperative, necessitating encryption, anonymity techniques, and access controls. Integrating V2X into automated vehicles requires a systematic approach, factoring in security architecture, application categories, and practical limitations. Existing standards, like the European C-ITS security scheme, should be considered. It is important to emphasize that V2X security should not be treated as an isolated component but rather as an integral part of the overall cybersecurity assurance of an AD vehicle. It should be seamlessly integrated into the broader cybersecurity framework to ensure comprehensive protection.
Main Question
Can the integrated V2X communication technology provide secured wireless communication channels to various vehicle applications or ADFs?
Sub-Questions
- Have general security requirements on the V2X communication technology integrated in the AD vehicle been taken?
- Do those security requirements have a full coverage of common security objectives such as confidentiality, integrity, availability and non-repudiation (NIST FIPS 199, 2004)?
- Is privacy protection considered by the security requirements? Are there security measures for ensuring privacy protection?
- Is V2X communication as part of ADFs designed, implemented and integrated with systemacial consideration of security within an infrastructure allowing mutual trust?
- Are available C-ITS security standards applicable for the development of V2X communication technology and ADFs considered?
- Are there specific requirements on availability of information security infrastructure, e.g., Public Key Infrastructure?
- Do security technology modules exist within the vehicle that can be based on and developed further to implement V2X security?
- Is existing computing hardware capable of carrying out the mathematical security algorithms without severely impacting the performance of ADFs and/or in-vehicle system?