§Determine if V2V (and V2I/V2X)
is feasible to implement
□Security Needs
▪Functional Requirements
▪Physical/Technical
Requirements
▪Operational & Organizational
Requirements
▪Financial Sustainability and
Responsibility
□Challenges – unique
–
▪Potentially mandatory systems
▪Trip anonymity
▪Scalability, etc.