Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere        
 4     Abbreviations and acronyms             
 5     Conventions             
 6     Data lifecycle in V2X communication             
        6.1     Data lifecycle
        6.2     Threat analysis            
 7     Categorized data in V2X communications     
        7.1     Data identification based on V2X communication scenarios     
        7.2     Data categorization   
        7.3     Data security levels    
 8     Security requirements          
        8.1     Security requirement level      
        8.2     Basic security requirements    
        8.3     Intermediate security requirements    
        8.4     Advanced security requirements          
Bibliography