Recommendation ITU-T H.551 (01/2022) Architecture of vehicular multimedia systems Summary History FOREWORD Table of Contents 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Background 7 VMS features and configurations 7.1 VMS features 7.2 VMS configurations 7.2.1 Deciding factors 7.3 List of VMS features 8 VMS architecture 8.1 VMS functions 8.2 Deciding factors of VMS architecture 8.3 Reference model of VMS architecture 8.3.1 Applications 8.3.2 Application framework 8.3.3 Operating system (OS) framework 8.3.4 OS 8.3.5 Hypervisor and virtualization 8.3.6 Device drivers and peripherals 8.3.7 Hardware 8.3.8 Cloud data 9 VMS multimedia applications 9.1 VMSP reference model 9.2 Reference protocol stack for convergence transmission 9.3 Reference receiver model 10 VMS security 11 Personally identifiable information (PII) protection and privacy Annex A VMS security A.1 Overview A.2 Assumed threats to VMS and its ecosystem A.2.1 Threats regarding vehicular multimedia service platform (VMSP) A.2.2 Threats to vehicles regarding their communication channels A.2.3 Threats to vehicles regarding their update procedures A.2.4 Threats to vehicles regarding their external connectivity and connections A.3 Security capabilities based on identified threats A.3.1 Identity and access management (IAM), authentication, authorization and transaction audit A.3.2 Interface security A.3.3 Network security A.3.4 Operational security A.3.5 Software and firmware updates A.3.6 Application security A.3.7 Incident management A.3.8 Cryptography A.3.9 Hardware security A.3.10 General security capabilities Annex B Personally identifiable information (PII) protection and privacy B.1 Information sources B.2 Implementation of PII protection: General considerations B.3 Data visibility and transparency B.3.1 Privacy-by-default B.4 Data accuracy and data integrity B.5 Confidentiality B.5.1 Confidentiality impact levels B.5.2 Confidentiality protection B.6 Data anonymization B.7 Data availability Bibliography <\pre>