1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
4 Abbreviations and acronyms
5 Conventions
6 Data lifecycle in V2X communication
6.1 Data lifecycle
6.2 Threat analysis
7 Categorized data in V2X communications
7.1 Data identification based on V2X communication scenarios
7.2 Data categorization
7.3 Data security levels
8 Security requirements
8.1 Security requirement level
8.2 Basic security requirements
8.3 Intermediate security requirements
8.4 Advanced security requirements
Bibliography