| Work item: | X.cov-sec | 
                                
                                    | Subject/title: | Security guidelines for countermeasures against covert channels in connected vehicles | 
                                
                                    | Status: | Under study | 
                                
                                    | Approval process: | TAP | 
                                
                                    | Type of work item: | Recommendation | 
                                
                                    | Version: | New | 
                                
                                    | Equivalent number: | - | 
                                
                                    | Timing: | 2027-04 (Medium priority) | 
                                
                                    | Liaison: | ISO/TC 22, ITU-T SG21, ITU CITS | 
                                
                                    | Supporting members: | Korea (Republic of), ETRI, Hyundai Motor Company | 
                                
                                    | Summary: | Connected vehicles use V2X (vehicle-to-everything) communication to share information with other vehicles and a lot of devices such as smartphones, navigation systems, roadside units, etc. In this environment, a hidden communication channel can be established over networks to distribute secret data in a way that violates security policy, which is called a “covert channel”.
Since these covert channels use the existing system resources that are not designed to carry data, conventional network security systems such as a firewall, IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) cannot detect the existence of the covert channel.
To address these security problems, this Recommendation provides a security threat analysis and specifies security requirements for countermeasures against the covert channels in connected vehicles. Furthermore, this Recommendation provides guidance on the countermeasures to fulfill the security requirements. | 
                                
                                    | Comment: | - | 
                                
                                    | Reference(s): |  | 
                                     | Historic references: | 
                                    | Contact(s): |  | 
                                
                                    | 
                                            | ITU-T A.5 justification(s): |  
                                                |   |  |  | 
                                
                                    | First registration in the WP:
                                        2025-04-16 17:22:38 | 
                                
                                    | Last update:
                                        2025-08-12 19:23:54 |