USDOT Research and Innovative Technology Administration
ITS Joint Program Office
January 14, 2014
Connected Vehicle Communications Security in the
Michigan 2014 Project
In transportation-related applications, we understand that:
Applications are satisfied by the exchange of small amounts of data.
Operators of vehicles want to remain anonymous.
Vehicles move all over the country.
In the Southeast Michigan 2014 Project, we want to:
Assure trust in data exchanged,
Protect the confidentiality of certain data exchanged, and
Protect the anonymity and privacy of individuals while
Operating a Multi-Application, Multi-Industry, Multi-Medium Environment.
The state of a key element of the system at a specific time
Defining the data flow and evolution
Time and Place Context to Data and Information
Data Flow and Evolution, Independent of Medium
Common Cryptographic Processes to Assure Trust and Protect Ownership
Example: Southeast Michigan 2014, Physical View
Communication Security Concept
Common cryptographic processes
Independent of medium
Information Flow Definitions