Notes
Slide Show
Outline
1
 
2
 
3
Interoperable Communication:
SAE J2735 Message Set
  • Periodic safety message broadcast (10 times per second)
  • Event-driven safety message broadcast (immediate on event occurrence)


4
Why we need security
  • The receiver of a message is not able to determine, without additional mechanisms, whether


    • a message originates from a trustworthy and legitimate device, and whether


    • the message was modified between sender and receiver.
5
What is a PKI?
6
  V2V Security Communications
7
Initial Deployment Model
8
Full Deployment Model
9
Connectivity Requirements
For Different Penetration Levels and Attack Rates
10
Summary of Highest Risk Levels for Privacy and Tracking Attacks
11
 
12
Assessment of Wireless Technology for Vehicle/Device Communication with Security Credential Management System (SCMS)
  • Main Discussion Topics
  • Long-term technical stability
  • Ability to support alternatives to user-paid subscriptions
  • Technical capabilities to support privacy goals


  • Discussions with Industry Participants
  • Cellular Carriers
  • Wireless Device Manufacturers
  • Wireless Technology Developers
  • Satellite Radio Operators
  • IEEE 802.22 Working Group
13
"Preliminary Conclusions"
  • Preliminary Conclusions


  • Long Term Evolution (LTE) is integrating previously diverse technology developments and is expected to continue on an evolutionary development path within a 5-10 year horizon


  • Cellular network management systems are becoming more flexible in terms of support for non-traditional billing arrangements


  • Satellite Radio may offer better-than-expected capabilities for Certificate Revocation List (CRL) distribution to vehicles
14
SCMS Design