Type: Support

Groups:
  • Communications
Related Resources:
  • Vehicle Safety Communications Applications (VSC-A) Final Report, Final, 9/1/2011
  • Core System Concept of Operations (ConOps), Final revE, 10/24/2011
  • J2735 Systems Engineering Version, Draft Candidate Std, 12/15/2012
  • Harmonization Task Group #1 Service and Security Management to Support safety and sustainability applications: Current Status of Security Standards, Draft, 8/29/2012
Diagrams are based on the most recently available application concepts that the CVRIA team has access to, and do not necessarily reflect prototypes or other in-development activities.

Communications Support

Communications Support applications provide the protocol layers to allow communications between connected devices. These communications applications operate in conjunction with the Security and Credentials Management applications to provide effective and secure communications between connected devices.

Enterprise

This is one way this application may be realized, but not the only way. There are other ways to build a given application and accomplish a stated objective.
The enterprise diagram can be viewed in SVG or PNG format and the current format is SVG.

Enterprise diagrams have not been developed for this application yet.


Display Legend in SVG or PNG

Includes Enterprise Objects:

Enterprise Object Description

Includes Resources:

Resource Description

Includes Roles:

Role Description

Includes Coordination:

Coordination Type Description

Functional

Includes Processes:

Level Name Type Allocated to Application Object
10.1.5.1 Support Connected Vehicle Center Communications Pspec - Center Communications Support
- Center Trust Management
10.1.5.2 Support Connected Vehicle Field Communications Pspec - RSE Communications Support
- RSE Trust Management
10.1.5.3 Support Connected Vehicle Vehicle Communications Pspec - Vehicle Communications Support
- Vehicle Trust Management
10.1.5.4 Support Connected Vehicle Mobile Communications Pspec - Personal Communications Support
- Personal Trust Management
10.1.5.5 Provide Center Misbehavior Detection Pspec - Center Trust Management
10.1.5.6 Provide Field Misbehavior Detection Pspec - RSE Trust Management
10.1.5.7 Provide Vehicle Misbehavior Detection Pspec - Vehicle Trust Management
10.1.5.8 Provide Mobile Misbehavior Detection Pspec - Personal Trust Management

Includes Data Flows:

Source Pspec Data Flow Destination Pspec
Provide Center Misbehavior Detection center_misbehavior_action Support Connected Vehicle Center Communications
Provide Field Misbehavior Detection roadside_misbehavior_action Support Connected Vehicle Field Communications
Provide Mobile Misbehavior Detection personal_misbehavior_action Support Connected Vehicle Mobile Communications
Provide Vehicle Misbehavior Detection vehicle_misbehavior_action Support Connected Vehicle Vehicle Communications
Support Connected Vehicle Center Communications center_misbehavior_suspect Provide Center Misbehavior Detection
Support Connected Vehicle Center Communications center_roadside_connected_vehicle_data Support Connected Vehicle Field Communications
Support Connected Vehicle Center Communications center_personal_connected_vehicle_data Support Connected Vehicle Mobile Communications
Support Connected Vehicle Center Communications center_vehicle_connected_vehicle_data Support Connected Vehicle Vehicle Communications
Support Connected Vehicle Field Communications roadside_misbehavior_suspect Provide Field Misbehavior Detection
Support Connected Vehicle Field Communications roadside_center_connected_vehicle_data Support Connected Vehicle Center Communications
Support Connected Vehicle Field Communications roadside_personal_connected_vehicle_data Support Connected Vehicle Mobile Communications
Support Connected Vehicle Field Communications roadside_vehicle_connected_vehicle_data Support Connected Vehicle Vehicle Communications
Support Connected Vehicle Mobile Communications personal_misbehavior_suspect Provide Mobile Misbehavior Detection
Support Connected Vehicle Mobile Communications personal_center_connected_vehicle_data Support Connected Vehicle Center Communications
Support Connected Vehicle Mobile Communications personal_roadside_connected_vehicle_data Support Connected Vehicle Field Communications
Support Connected Vehicle Mobile Communications personal_vehicle_connected_vehicle_data Support Connected Vehicle Vehicle Communications
Support Connected Vehicle Vehicle Communications vehicle_misbehavior_suspect Provide Vehicle Misbehavior Detection
Support Connected Vehicle Vehicle Communications vehicle_center_connected_vehicle_data Support Connected Vehicle Center Communications
Support Connected Vehicle Vehicle Communications vehicle_roadside_connected_vehicle_data Support Connected Vehicle Field Communications
Support Connected Vehicle Vehicle Communications vehicle_personal_connected_vehicle_data Support Connected Vehicle Mobile Communications

Physical

This is one way this application may be realized, but not the only way. There are other ways to build a given application and accomplish a stated objective.
The physical diagram can be viewed in SVG or PNG format and the current format is SVG.
SVG Diagram
PNG Diagram


Display Legend in SVG or PNG

Includes Physical Objects:

Physical Object Class Description
Center Center This general physical object is used to model general functions and core capabilities that may be supported by any center included in CVRIA.
Other Centers Center "Other Centers" represents any operational center that participates in a regional transportation system. This object is used in CVRIA to model common functionality and interfaces that may be supported by any transportation center, such as the general capability to exchange data with another regional center.
Personal Information Device Traveler The "Personal Information Device" provides the capability for travelers to receive formatted traveler information wherever they are. Capabilities include traveler information, trip planning, and route guidance. It provides travelers with the capability to receive route planning from the infrastructure at home, at work, or en route using personal devices that may be linked with connected vehicle on-board equipment.
Remote Vehicle OBEs Vehicle "Remote Vehicle OBEs" represents other connected vehicles that are communicating with the host vehicle. In CVRIA, this object provides a source and destination for information transfers between connected vehicles. The host vehicle on-board equipment, represented by the Vehicle OBE physical object, sends information to, and receives information from the Remote Vehicle OBEs to model all connected vehicle V2V communications in CVRIA.
Roadside Equipment Field "Roadside Equipment" (RSE) represents the Connected Vehicle roadside devices that are used to send messages to, and receive messages from, nearby vehicles using Dedicated Short Range Communications (DSRC). Communications with adjacent ITS Roadway Equipment (see the separate object) and back office centers that monitor and control the RSE are also supported. This device operates from a fixed position and may be permanently deployed or a portable device that is located temporarily in the vicinity of a traffic incident, road construction, or a special event. It includes a processor, data storage, and communications capabilities that support secure communications with passing vehicles, other roadside equipment, and centers that provide back office support.
Security and Credentials Management System Support The "Security and Credentials Management System" is a high-level aggregate representation of the interconnected systems that enable trusted communications between mobile devices and other mobile devices, roadside devices, and centers and protect data they handle from unauthorized access. This physical object will be implemented as an interconnected system of support applications that enable the secure distribution, use, and revocation of trust credentials.
Vehicle OBE Vehicle The Vehicle On-Board Equipment (OBE) provides the vehicle-based processing, storage, and communications functions necessary to support connected vehicle operations. The radio(s) supporting V2V and V2I communications are a key component of the Vehicle OBE. This communication platform is augmented with processing and data storage capability that supports the connected vehicle applications.

Four different types of implementations are represented by the Vehicle OBE:
1. Vehicle Awareness Device – This is an aftermarket electronic device, installed in a vehicle without connection to vehicle systems, that is only capable of sending the basic safety message over short range communications. Vehicle awareness devices do not generate warnings.
2. Aftermarket Device – This is an aftermarket electronic device, installed in a vehicle, and capable of sending and receiving messages over a wireless communications link. The self-contained device includes GPS, runs connected vehicle applications, and includes an integrated driver interface that issues audible or visual warnings, alerts, and guidance to the driver of the vehicle.
3. Retrofit Device – This is an electronic device installed in vehicles by an authorized service provider, at a service facility after the vehicle has completed the manufacturing process (retrofit). This type of device provides two-way communications and is connected to a vehicle databus to integrate the device with other on-board systems. Depending on implementation, the device may include an integrated driver interface and GPS or integrate with modules on the vehicle bus that provide these services. Depending on implementation, it may support all of the connected vehicle applications identified in CVRIA.
4. Integrated System – This is a system of one or more electronic devices integrated into vehicles during vehicle production. The Integrated System is connected to proprietary data busses to share information with other on-board systems. The Integrated System may include many control modules and may be configured to support all of the connected vehicle applications identified in CVRIA.

In retrofit and integrated implementations, the Vehicle OBE interfaces to other on-board systems through a vehicle bus (e.g., CAN). Represented in CVRIA as the Vehicle Platform, this interface provides access to on-board sensors, monitoring and control systems, and information systems that support connected vehicle applications. The vehicle bus may also be the source for GPS location and time and the access point for the vehicle's driver-vehicle interface. Self-contained devices include an integrated GPS and driver interface that supports direct visual, audible, or haptic interaction with the driver.

In CVRIA, the Vehicle OBE includes the functions and interfaces that support connected vehicle applications for passenger cars and trucks. Many of these applications (e.g., V2V Safety applications) apply to all vehicle types including personal automobiles, commercial vehicles, emergency vehicles, transit vehicles, and maintenance vehicles. In CVRIA, the Vehicle OBE is used to model the common interfaces and functions that apply to all of these vehicle types.

Includes Application Objects:

Application Object Description Physical Object
Center Communications Support "Center Communications Support" supports secure, reliable communications with other connected devices. It provides the communications functions that add a timestamp, the message origin, and a digital signature in outbound messages and processes, verifies, and authenticates the same fields in inbound messages. It also encrypts (outbound) and decrypts (inbound) sensitive data. Center
Center Trust Management "Center Trust Management" manages the certificates and associated keys that are used to sign, encrypt, decrypt, and authenticate messages. It communicates with the Security and Credentials Management System to maintain a current, valid set of security certificates and identifies, logs, and reports events that may indicate a threat to the Connected Vehicle Environment security. Center
Personal Communications Support "Personal Communications Support" supports secure, reliable communications with other connected devices. It provides the communications functions that add a timestamp, the message origin, and a digital signature in outbound messages and processes, verifies, and authenticates the same fields in inbound messages. It also encrypts (outbound) and decrypts (inbound) sensitive data. Personal Information Device
Personal Trust Management "Personal Trust Management" manages the certificates and associated keys that are used to sign, encrypt, decrypt, and authenticate messages. It communicates with the Security and Credentials Management System to maintain a current, valid set of security certificates and identifies, logs, and reports events that may indicate a threat to the Connected Vehicle Environment security. Personal Information Device
RSE Communications Support "RSE Communications Support" supports secure, reliable communications with other connected devices. It provides the communications functions that add a timestamp, the message origin, and a digital signature in outbound messages and processes, verifies, and authenticates the same fields in inbound messages. It also encrypts (outbound) and decrypts (inbound) sensitive data. Roadside Equipment
RSE Trust Management "RSE Trust Management" manages the certificates and associated keys that are used to sign, encrypt, decrypt, and authenticate messages. It communicates with the Security and Credentials Management System to maintain a current, valid set of security certificates and keys and identifies, logs, and reports events that may indicate a threat to Connected Vehicle Environment security. Roadside Equipment
Vehicle Communications Support "Vehicle Communications Support" supports secure, reliable communications with other connected devices. It provides the communications functions that add a timestamp, the message origin, and a digital signature in outbound messages and processes, verifies, and authenticates the same fields in inbound messages. It also encrypts (outbound) and decrypts (inbound) sensitive data. Vehicle OBE
Vehicle Trust Management "Vehicle Trust Management" manages the certificates and associated keys that are used to sign, encrypt, decrypt, and authenticate messages. It communicates with the Security and Credentials Management System to maintain a current, valid set of security certificates and identifies, logs, and reports events that may indicate a threat to the Connected Vehicle Environment security. Vehicle OBE

Includes Information Flows:

Information Flow Description
connected vehicle data This flow represents any secure data exchange within the Connected Vehicle Environment. It defines the common data fields that are shared by all secure messages, including a verifiable timestamp, a verifiable geographic location of the sender's origin, and a digital signature. The information may also be encrypted to protect sensitive data content.
misbehavior report Notification of potential security issues encountered in processing messages, including message authentication failures.
security credential revocations A list of security credentials that have been revoked.
security credentials Cryptographic keys and associated data that supports secure communications.

Requirements

Need Requirement
N4.001 Applications need to protect data they handle from unauthorized access. This is required to support applications that exchange sensitive information, such as personally identifying or financial information, which if intercepted could compromise the privacy or financial records of the user. 4.001 Applications that function by exchanging data between entities shall be able to exchange encrypted data between those entities.
N4.002 Applications need to establish trust between entities that operate components of the application. Such trust relationships are necessary so that applications can be assured that entities are who they say they are, and therefore trust the source and data it receives. 4.002 Applications shall verify that, for each entity on which an application component is installed, that entity is trusted by the provider of the application.
4.003 Applications shall be able to digitally sign all messages sent between entities.
4.004 Applications shall be able to verify the digital signature of received messages.
4.005 Digital signatures used to ensure trust shall be generated independently of the application sending the message to be signed.
N4.003 Applications need to revoke the trust relationship they have between entities when necessary. A trusted entity may operate in a fashion that indicates it should no longer be trusted, in which case applications must have a way of revoking that trust. 4.006 Applications shall identify entities that provide messages to the application that are improperly formatted.
4.007 Applications shall identify entities that provide messages to the application that are logically inconsistent.
4.008 Applications shall revoke personal trust (trust by the application) when a repeated pattern of messages from a given entity falls outside of the applications tolerances.
4.009 Applications shall be able to report suspicious behavior to third party authentication providers.
4.010 Applications shall be able to accept messages from the third party authentication provider that identifies entities unworthy of trust.
4.011 Applications shall be able to revoke trust between itself and an entity if that entity is identified by the third party authentication provider as untrustworthy.
N4.004 All participants in the Connected Vehicle Environment need to operate on a common time base. Coordination of time between the entities that operate applications as well as those providing Core services prevents internal errors and enables time-sensitive interactions between application components. 4.012 All applications shall use the same time source as the basis for timing.
N4.043 Every DSRC message need to be constructed in such a way as to make replay attacks impractical, in order to minimize the number of such attacks. 4.107 Every DSRC message shall include the verifiable geographic location of the sender's origin.
4.108 Every DSRC message shall include a verifiable timestamp.
4.111 Every DSRC message shall include a verifiable timestamp.
N4.044 Every V2V DSRC message needs to be non-repudiatable in origin; that is, that the originator cannot deny having sent the message. This is so that when a received message invokes actions on the receiver it may be necessary to show that the behavior was in response to a specific transmitted message. Similarly messages may be received that indicate misbehavior of the transmitting vehicle or its equipment that will give rise to a misbehavior report. Non-repudiation of origin ensures that the originator of information cannot successfully deny having sent the information. 4.109 Every DSRC message shall include a digital signature.
4.110 Digital signatures shall be unique to the user of the signature.
N4.046 V2V DSRC messages need to use pseudonyms to help protect user's privacy. 4.114 Any identifier used in a DSRC message shall be based on a random seed (not the user's identity).
N4.047 DSRC messages need to be able to be relayed from one DSRC device to another, so that in areas where no direct access to infrastructure (DSRC or otherwise) is available, an emergency DSRC message may eventually be relayed to infrastructure. 4.115 DSRC messages shall be constructed in such a way so as to be relay-able.