Work item:
|
X.ivkm-sec
|
Subject/title:
|
Security requirements and guidelines for the in-vehicle key management
|
Status:
|
Under study
|
Approval process:
|
TAP
|
Type of work item:
|
Recommendation
|
Version:
|
New
|
Equivalent number:
|
-
|
Timing:
|
2027-04 (Medium priority)
|
Liaison:
|
-
|
Supporting members:
|
-
|
Summary:
|
Connected autonomous vehicles (CAVs) are increasingly evolving into SDVs, and numerous software systems are being integrated into vehicles. The more software is introduced into vehicles, the more risk of cyberattacks escalates. Therefore, appropriate security measures are necessary to safeguard vehicles from cyberattacks. These security measures are primarily implemented based on cryptographic techniques, and key management is one of the critical aspects of cryptographic systems.
Compared to traditional IT environments, in-vehicle environments prioritize real-time performance, lack guaranteed external connectivity, are constrained by limited computing power, and rely on specialized network protocols. Because of these differences and characteristics, security standards and guidelines developed for conventional IT environments cannot be directly adopted to the in-vehicle environment, and the security requirements and guidelines for the in-vehicle key management are necessary. To that end, this Recommendation mainly specifies security requirements and guidelines for in-vehicle key management that reflect the unique characteristics of in-vehicle environments.
|
Comment:
|
-
|
Reference(s):
|
|
|
Historic references:
|
Contact(s):
|
|
ITU-T A.5 justification(s): |
|
|
|
First registration in the WP:
2025-04-16 17:35:50
|
Last update:
2025-04-22 18:10:16
|