Shopping Cart

No products in the cart.

BSI PD CEN ISO/TR 21186-3:2021

$215.11

Cooperative intelligent transport systems (C-ITS). Guidelines on the usage of standards – Security

Published By Publication Date Number of Pages
BSI 2021 136
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This document provides guidelines on security applicable in Intelligent Transport Systems (ITS) related to communications and data access.

In particular, this document provides analyses and best practice content for secure ITS connectivity using ISO/TS 21177.

This document analyses and identifies issues related to application security, access control, device security and PKI for a secure ITS ecosystem.

PDF Catalog

PDF Pages PDF Title
2 undefined
7 Foreword
8 Introduction
11 1 Scope
2 Normative references
3 Terms and definitions
12 4 Symbols and abbreviated terms
14 5 Security in C-ITS
5.1 General
5.2 Security design process for C-ITS applications
15 5.3 Communications security mechanisms in C-ITS
17 5.4 Source authentication and access control mechanisms
20 5.5 Certificate authorities and certification processes
21 5.6 Introduction to the rest of this document
22 6 Security analysis and controls for an IDX device
6.1 Background
6.2 IDX device concept
6.2.1 General
24 6.2.2 System architecture and device
26 6.2.3 Threat modelling data scenarios and examples
29 6.2.4 Assumed device functions and activities
32 6.3 Device assets
34 6.4 Threats
6.4.1 General
35 6.4.2 Threat modelling process
6.4.3 Threat categories and actor motivations
37 6.4.4 Scenario comparison of threats
39 6.5 Security objectives
6.5.1 Summary and comparison by scenario
41 6.5.2 Analysis
42 6.6 SFR and rationales
49 6.7 Comparison to other common criteria PPs
6.7.1 General
6.7.2 Summary and analysis of gaps
6.7.3 Gap analysis with Car2Car HSM PP
51 6.7.4 Gap analysis against V-ITS base PP
55 6.7.5 Gap analysis against V-ITS Comms Module PP
7 ISO/TS 21177 access control implementation guidance
7.1 General
56 7.2 High level architecture and access scenario
57 7.3 Application protocol architecture and ISO/TS 21177 integration
7.3.1 General
7.3.2 Example protocol architecture
59 7.3.3 Protocol integration strategy
60 7.4 Access control policy structure
61 7.5 Access control approach
64 7.6 Access control use cases and sequence diagrams
7.6.1 General
7.6.2 Define an access policy
68 7.6.3 Load an access control policy
72 7.6.4 Configure TLS
74 7.6.5 Start a secure TLS session
77 7.6.6 Secure access-controlled resource discovery
83 7.6.7 Server controls access to UGP service based on role
87 8 C-ITS CP security requirements gaps and needs
8.1 General
88 8.2 Overview of European C-ITS CP
89 8.3 PKI threat categories and mitigations
100 8.4 European C-ITS CP changes to support news C-ITS applications
8.4.1 General
8.4.2 CP Section 1.6.1
101 8.4.3 CP Section 1.6.2
8.4.4 CP Section 6.1.5.2
102 8.4.5 CP Section 4.1.2.4
103 Annex A (informative) Scenario threats
117 Annex B (informative) Scenario security objectives to security functional requirements mapping
119 Annex C (informative) Informative proposal for improvements of TS 21177:2019: CRL request
126 Annex D (informative) Informative proposal for complements to TS 21177:2019: Ownership and access policy
130 Annex E (informative) Informative proposal for improvements of TS 21177:2019: Errata, additional rationale material, and session persistence across certificate expiry
134 Bibliography
BSI PD CEN ISO/TR 21186-3:2021
$215.11