§Implementing V2V/V2I will require communications
security
§Key part of the prototype system for which experts were
engaged to develop an approach
§V2V/V2I has unique characteristics that differ from
traditional systems. Major difference is that mission-critical systems typically
do not use wireless. Key communications security requirements are:
□Provide
trusted messages between vehicles –
trust is established through a user authentication process. These messages are not encrypted
□Secure
messages between vehicles and certifying authority – messages are encrypted to prevent eavesdropping and tampering over
the communication channel
□Ensure
Anonymity - no personally
identifiable information is contained in messages
□Allow for Scalability – needed to support over 250 million vehicles in the
system