Security guidelines for vehicle-to-everything (V2X) communication |
|
Recommendation ITU-T X.1372 provides security guidelines for vehicle-to-everything (V2X) communication systems. V2X is a generic term for the communication modes termed as vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), vehicle-to-nomadic devices (V2D) and vehicle-to-pedestrian (V2P) discussed in this Recommendation.
Significant developments have taken place over the past few years in the area of vehicular communication in the intelligent transportation system (ITS) environment. The V2X communication significantly improves road safety, decreases traffic congestion and increases convenience. However, V2X communication also makes relevant entities in the ITS environment vulnerable to various forms of cyber-attack.
To address this security problem, this Recommendation identifies threats in V2X communication environments and specifies security requirements for V2X communication to mitigate these threats. This Recommendation also provides description of possible implementation of V2X communication with security.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/14091 |
Series title: |
X series: Data networks, open system communications and security X.1300-X.1499: Secure applications and services (II) X.1370-X.1399: Intelligent transportation system (ITS) security |
Approval date: |
2020-03-26 |
Provisional name: | X.itssec-2 |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1372 (03/2020)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|