Rec. ITU-T X.1372 (03/2020) Security guidelines for vehicle-to-everything (V2X) communication systems
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 V2X communication
     6.1 Overview
     6.2 V2V communication
     6.3 V2I communication
     6.4 V2D communication
7 Identified threats
     7.1 Threats to confidentiality
     7.2 Threats to integrity
     7.3 Threats to availability
     7.4 Threats to non-repudiation
     7.5 Threats to authenticity
     7.6 Threats to accountability
     7.7 Threats to authorization
8 Security requirements
     8.1 Confidentiality
     8.2 Integrity
     8.3 Availability
     8.4 Non-repudiation
     8.5 Authenticity
     8.6 Accountability
     8.7 Authorization
     8.8 Applicability of V2X security requirements
9 Implementation of V2X communication with security
     9.1 Cryptography for entity authentication and message confidentiality
     9.2 Message confidentiality for emergency road safety warning
     9.3 Entity authentication for vehicle platooning
     9.4 Vehicular PKI
Appendix I  Reference models for vehicular communication
     I.1 ITU-T framework of networked vehicle services and applications using NGN
     I.2 ITU-T Architecture and functional entities of vehicle gateway platforms
Appendix II  Reference models for vehicular PKI
Bibliography