4Can a V2V security solution for a mandated system with no reliance on public funding be identified that:
–Meets the technical requirements,
–Meets the policy goals to an acceptable degree, and
–Has a viable business case
–
ØFor
communication networks, further study will consider:
–Cellular
–DSRC
–Other potential networks that are
identified
–Potential combinations of two or more
networks
ØAnd other policy issues, such as governance, privacy,
liability, etc.