Rec. ITU-T X.1374 (10/2020) Security requirements for external interfaces and devices with vehicle access capability
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 External interfaces and devices with vehicle access capability to a vehicle
7 Security threats on external interfaces and devices
     7.1 General
     7.2 Threats to confidentiality
     7.3 Threats to integrity
     7.4 Threats to availability
     7.5 Threats to non-repudiation
     7.6 Threats to authenticity
     7.7 Threats to accountability
     7.8 Threats to authorization
8 General security requirements for external interfaces and external devices
     8.1 Hardware-assisted security
          8.1.1 Secure CPU
          8.1.2 Secure storage
          8.1.3 Crypto hardware acceleration
     8.2 Secure communication
     8.3 Secure functions
          8.3.1 Security access
          8.3.2 Secure flash
          8.3.3 Secure boot
          8.3.4 Secure debug
     8.4 Protection against hardware tampering
9 Security requirements for external devices with wireless communication capability
     9.1 Bluetooth interface
          9.1.1 Bluetooth basic rate / enhanced data rate (BR/EDR)
          9.1.2 Bluetooth low energy (LE)
          9.1.3 Unused service and profile
     9.2 Cellular interface
          9.2.1 Secure communication
          9.2.2 Application layer security
     9.3 Wi-Fi interface
          9.3.1 Security protocol
          9.3.2 SSID and password
          9.3.3 Connection range management
10 Security requirements for external devices of remote key-less entry
     10.1 Reverse engineering prevention
          10.1.1 Key extraction prevention
          10.1.2 One time programmable
     10.2 Secure communication
          10.2.1 Mutual authentication and channel encryption
          10.2.2 Replay attack prevention
          10.2.3 Limitation of radio signal intensity
     10.3 Secure key registration procedure
11 Security requirements for external devices of charging systems in an EV
12 Use cases of security measures for external devices and interfaces in a vehicle
     12.1 Use case 1: Smart key and external interface
     12.2 Use case 2: Charging device and external interface
     12.3 Use case 3: Wireless communication device and external interface
     12.4 Use case 4: External devices connected to OBD-II port and external interface
Appendix I  Information on Bluetooth specification
Appendix II  Information on cellular communication specification
Bibliography