10.1.5.4: Support Connected Vehicle Mobile Communications

This process shall support communications with authenticated applications running in centers, on field equipment such as roadside equipment (RSE), vehicles, and other personal devices. This process represents the personal mobile-based processing to ensure that data to be transmitted include a verifiable timestamp, a verifiable geographic location of the sender's origin, and a digital signature. The information may also be encrypted to protect sensitive data content. Similarly, with incoming data, this process shall verify the legitimacy of incoming data in terms of their timestamp, sender's geographic location, and valid digital signature. This process shall interact with a Cooperative ITS Certificate Management System (CCMS) to provision, enroll and receive authentication certificates in order to communicate with other connected vehicle systems. This process shall send notices of misbehaving devices to the CCMS. Upon receipt of a Certificate Revocation List (CRL) from the CCMS this process shall no longer accept messages from those devices as authentic. This process shall send system monitoring data such as heartbeat messages, performance data, or alarms for certain criteria to functions within the Manage Connected Vehicle Infrastructure function. This process shall send information to the Object Registration and Discovery Service (ORDS) using its preconfigured cyber location to determine the cyber location of other connected vehicle applications/objects. This process shall store any information and security credentials retrieved from the ORDS for subsequent access. This process shall monitor the list of retrieved information for other connected vehicle applications/objects for the expiration of either the cyber location or the associated credentialing information. Upon expiration of either cyber location or the associated credentialing information for any "discovered" object, this process shall take appropriate actions to terminate active dialogs with the specific object.

This process is associated with the Personal Information Device physical object.

This process is associated with the following application objects:

This process is associated with the following data flows: