TeskaLabs at the ETSI 7th CMS Plugtest
It is my great pleasure to announce that TeskaLabs successfully participated at the ETSI 7th CMS Plugtest at Sophia Antipolis, France, from 4th to 7th November 2019.
In general, ETSI (European Telecommunications Standardization Institute) Plugtests serve telecommunication device vendors to test and debug their vehicle-to-anything (V2X) implementations. This edition of the Plugtests event focused on testing ITS Security features to support the industry in their C-ITS deployments. The scope of the plugtest was to test the interoperability of new versions of ETSI technical standards TS 103 097 v1.3.1 and TS 102 941 v1.3.1, validate of the European trust domain concept (ECTL) and test the conformance of secured ITS-S and PKI implementations.
TeskaLabs participated in the plugtest as the representative of two organizations: as a representative of O2 Czech Republic and as a partner of a British company Crypta Labs and Applus+ IDIADA.
O2 Czech Republic a.s. is a leader of the consortium that works on C-Roads in the Czech Republic. The C-Roads is a joint initiative of the European Member States and road operators. C-Roads is a technological platform that allows road vehicles to communicate with other cars, traffic signals, roadside infrastructure as well as with other road users. We operate the central cyber security for C-Roads Czech Republic using our product SeaCat PKI.
More info is here.
Crypta Labs is our partner in the field of cyber security. Crypta Labs is dedicated to ensuring that the security of devices to which we entrust our lives cannot be compromised. Mobile Security Module is future-proofing the cyber-security of the Internet of Things. We work together with Crypta Labs on many exiting projects (also) within the automotive and intelligent transport system (ITS) domains.
I also need to mention another partner, that helped us a lot to succeed in the plugtest: Applus+ IDIADA. Applus+ IDIADA offers design, testing, engineering, and homologation services to the automotive industry worldwide. We use their exceptional multi-purpose On-Board Unit (OBU) development tool IDAPT.
It was a very long and very productive week for all participants. ETSI people received tons of valuable feedback on their standards, and I recon that it will result in the new update. On the other hand, the plugtest showed that C-ITS security is maturing, and it is ready for productional deployments. Representatives from the Joint Research Centre of the European Commission, who also participated in the plugtest, validated a concept of ECTL (European Certificate Trust List). Since this was the first time, where ECTL concept was so extensively tested, several areas have been highlighted as "improvements needed," and a lot of feedback has been provided. All participating vendors - including us - validated and fine-tuned their implementations. It was, indeed, a massive step for everybody involved.
For us, TeskaLabs, we confirmed that a SeaCat PKI is a robust and mature product that can be compared with PKIs from big companies and established players. We offer a modern and flexible alternative, which allows customers to build more with less.
Are you interested in security for connected vehicles? Visit this page
You Might Be Interested in Reading These Articles
Autonomous vehicles are still working their way into the modern automotive marketplace. However, they are growing more common each year. Many agree, this is an innovative change, and it’s estimated that there will be more autonomous vehicles on the road in the coming years.
Published on July 15, 2019
TeskaLabs with a great pleasure announces that we succeeded in the public tender with our product SeaCat as a supplier of cybersecurity for a C-Roads platform in the Czech Republic.
Published on August 21, 2018
The automotive industry recently witnessed several cases of cyber-hacking that made driving connected cars dangerous if not impossible. Companies like Jeep, Volkswagen, and Tesla all have recently dealt with cases of hackers taking over cars and stopping them while the cars were in use as well as stealing customers' Social Security numbers, financial details, and other sensitive information.
Published on April 04, 2017