Secure software update capability for intelligent transportation system communication devices |
|
As intelligent transportation system (ITS) technologies improve, it has become common for vehicles to communicate with other entities such as other vehicles, vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. Since electric devices inside a vehicle such as electronic control units (ECUs), and electric toll collections (ETCs), system and car navigation systems are becoming more sophisticated. As a result, software modules inside those electric devices need to be appropriately updated for the purpose of bug fixing, and for performance and security improvements to avoid crucial accidents.
In order to fulfil the above requirement, Recommendation ITU-T X.1373 provides secure software update procedures between software update server and vehicles with appropriate security controls. This Recommendation can be practically utilized by car manufactures and ITS-related industries as a set of standard capabilities for best practices.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/13197 |
Series title: |
X series: Data networks, open system communications and security X.1300-X.1499: Secure applications and services (II) X.1370-X.1399: Intelligent transportation system (ITS) security |
Approval date: |
2017-03-30 |
Provisional name: | X.itssec-1 |
Approval process: | TAP |
Status: |
Superseded |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
[7 related work items in progress]
|
|
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|