Rec. ITU-T X.1372 (03/2020) Security guidelines for vehicle-to-everything (V2X) communication systems Summary History FOREWORD Table of Contents 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 V2X communication 6.1 Overview 6.2 V2V communication 6.3 V2I communication 6.4 V2D communication 7 Identified threats 7.1 Threats to confidentiality 7.2 Threats to integrity 7.3 Threats to availability 7.4 Threats to non-repudiation 7.5 Threats to authenticity 7.6 Threats to accountability 7.7 Threats to authorization 8 Security requirements 8.1 Confidentiality 8.2 Integrity 8.3 Availability 8.4 Non-repudiation 8.5 Authenticity 8.6 Accountability 8.7 Authorization 8.8 Applicability of V2X security requirements 9 Implementation of V2X communication with security 9.1 Cryptography for entity authentication and message confidentiality 9.2 Message confidentiality for emergency road safety warning 9.3 Entity authentication for vehicle platooning 9.4 Vehicular PKI Appendix I Reference models for vehicular communication I.1 ITU-T framework of networked vehicle services and applications using NGN I.2 ITU-T Architecture and functional entities of vehicle gateway platforms Appendix II Reference models for vehicular PKI Bibliography