‹#›
U.S. Department of Transportation
Research and Innovative Technology Administration
Triscallion_Black
Communications Security – Approach
§Implementing V2V/V2I will require communications security
§Key part of the prototype system for which experts were engaged to develop an approach
§V2V/V2I has unique characteristics that differ from traditional systems.  Major difference is that mission-critical systems typically do not use wireless.  Key communications security requirements are:
□Provide trusted messages between vehicles – trust is established through a user authentication process. These messages are not encrypted
□Secure messages between vehicles and certifying authority – messages are encrypted to prevent eavesdropping and tampering over the communication channel
□Ensure Anonymity - no personally identifiable information is contained in messages
□Allow for Scalability – needed to support over 250 million vehicles in the system