§The parts of the system are
controlled by a federation of equals
□Private industry;
government at all levels.
□An appropriate level of
trust is essential: All communications will be signed using a common cryptographic
process.
□Rights of ownership
(privacy) are protected.
□The receiving party of a
communication will be responsible for determining the authenticity of any
message.
□An entity trusted by all
will establish the root secret that all cryptographic security credentials will be
based on.
§Security
solution fits the communication needs
□Small data exchanges;
rapid exchanges; short, intermittent connections.
□Devices share situation
information (BSM’s, SPaT, etc.) in broadcasts with no expectation of a
response.
□Any response to
broadcast information, or point-to-point interactions that cause a result to occur in a
device (such as a driver alert or file update) will be initiated by the most vulnerable party to
the interaction: Onboard equipment will
initiate interactions with roadside equipment. Roadside equipment will initiate
interactions with Internet-based equipment. (NO push from the Internet)
§
§
§