Support Connected Vehicle Center Communications

This process shall support communications with authenticated applications running in other centers, on field equipment such as roadside equipment (RSE), vehicles, and personal devices. This process represents the center-based processing to ensure that data to be transmitted include a verifiable timestamp, a verifiable geographic location of the sender's origin, and a digital signature. The information may also be encrypted to protect sensitive data content. Similarly, with incoming data, this process shall verify the legitimacy of incoming data in terms of their timestamp, sender's geographic location, and valid digital signature. This process shall interact with a Cooperative ITS Certificate Management System (CCMS) to provision, enroll and receive authentication certificates in order to communicate with other connected vehicle systems. This process shall send notices of misbehaving devices to the CCMS. Upon receipt of a Certificate Revocation List (CRL) from the CCMS this process shall no longer accept messages from those devices as authentic. This process shall receive time from an external Network Time Server to use to provide accurate timestamps for connected vehicle application data to be stored or transmitted to other processes. When available this process shall also use inputs of a local form of time expressed in universal time coordinated (UTC) format from a Connected Vehicle Support Service in order to synchronize time based data distribution with other connected vehicle functions. This process shall send information to the Object Registration and Discovery Service (ORDS) using its preconfigured cyber location to determine the cyber location of other connected vehicle applications/objects. This process shall store any information and security credentials retrieved from the ORDS for subsequent access. This process shall monitor the list of retrieved information for other connected vehicle applications/objects for the expiration of either the cyber location or the associated credentialing information. Upon expiration of either cyber location or the associated credentialing information for any "discovered" object, this process shall take appropriate actions to terminate active dialogs with the specific object.

This process is associated with the Center physical object.

This process is associated with the following application objects:

This process is associated with the following data flows: