Recommendation ITU-T H.551 (01/2022) Architecture of vehicular multimedia systems
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Background
7 VMS features and configurations
     7.1 VMS features
     7.2 VMS configurations
          7.2.1 Deciding factors
     7.3 List of VMS features
8 VMS architecture
     8.1 VMS functions
     8.2 Deciding factors of VMS architecture
     8.3 Reference model of VMS architecture
          8.3.1 Applications
          8.3.2 Application framework
          8.3.3 Operating system (OS) framework
          8.3.4 OS
          8.3.5 Hypervisor and virtualization
          8.3.6 Device drivers and peripherals
          8.3.7 Hardware
          8.3.8 Cloud data
9 VMS multimedia applications
     9.1 VMSP reference model
     9.2 Reference protocol stack for convergence transmission
     9.3 Reference receiver model
10 VMS security
11 Personally identifiable information (PII) protection and privacy
Annex A  VMS security
     A.1 Overview
     A.2 Assumed threats to VMS and its ecosystem
          A.2.1 Threats regarding vehicular multimedia service platform (VMSP)
          A.2.2 Threats to vehicles regarding their communication channels
          A.2.3 Threats to vehicles regarding their update procedures
          A.2.4 Threats to vehicles regarding their external connectivity and connections
     A.3 Security capabilities based on identified threats
          A.3.1 Identity and access management (IAM), authentication, authorization and transaction audit
          A.3.2 Interface security
          A.3.3 Network security
          A.3.4 Operational security
          A.3.5 Software and firmware updates
          A.3.6 Application security
          A.3.7 Incident management
          A.3.8 Cryptography
          A.3.9 Hardware security
          A.3.10 General security capabilities
Annex B  Personally identifiable information (PII) protection and privacy
     B.1 Information sources
     B.2 Implementation of PII protection: General considerations
     B.3 Data visibility and transparency
          B.3.1 Privacy-by-default
     B.4 Data accuracy and data integrity
     B.5 Confidentiality
          B.5.1 Confidentiality impact levels
          B.5.2 Confidentiality protection
     B.6 Data anonymization
     B.7 Data availability
Bibliography
<\pre>