C-ITS ITS-S Security microservice
As part of TeskaLabs's research activities, we are working toward a more flexible, contemporaneous method to deploy the software security component (specifically C-ITS Security) into the vehicle software ecosystem (ITS-S). The current best practice in the industry is that the cybersecurity component is integrated into the vehicle application software as a library. However, this approach brings with it many limitations, such as narrow software compatibility. The deployment is highly inflexible and so it is often omitted due to its complexity.
Project Meili was part of the UK Government and its partners Zenzic and Innovate UK 1.2 million British pounds programme to develop a cohesive understanding of the challenges and potential solutions to addressing digital resilience and cyber security within Connected and Automated Mobility.
The outcome of our research strongly suggests that by using Linux container technology, the C-ITS ITS-S Security component can be distributed as a stand-alone microservice, which simplifies the integration significantly. Microservices are a software development technique that arranges an application as a collection of loosely coupled components. In the microservices architecture, components are fine-grained, and the protocols are lightweight. The C-ITS ITS-S Security microservice offers a simple-to-use API for car application equipment. It is a unique approach that brings the latest software procedures to the automotive software and security environment.
We plan to offer the C-ITS ITS-S Security microservice to automotive and smart infrastructure players as a plug-and-play security technology that is out-of-the-box compliant with C-ITS Security standards.
C-ITS ITS-S Security microservice was developed and tested on IDAPT devices from AppPlus + IDIADA and with Crypta Labs HSM chip Cicada.
Are you interested in security for connected vehicles? Visit this page
Most Recent Articles
- A beginner-friendly intro to the Correlator for effective cybersecurity detection
- Inotify in ASAB Library
- From State Machine to Stateless Microservice
- Entangled ways of product development in the area of cybersecurity #3 - LogMan.io
- Entangled ways of product development in the area of cybersecurity #2 - BitSwan
You Might Be Interested in Reading These Articles
C-ITS PKI as a Service
In many respects, todays’s motor vehicles function as connected devices. And with this in consideration, joint EU initiatives have broadened the impact of Cooperative Intelligent Transport Systéms (C-ITS) to include more expanded connections, including road infrastructure. This enhanced connectivity is expected to show significant improvements to road safety and traffic efficiency.
Published on May 14, 2020
TeskaLabs at the ETSI 7th CMS Plugtest validating C-ITS security
It is our great pleasure to announce that TeskaLabs successfully participated at the ETSI 7th CMS Plugtest at Sophia Antipolis, France, from 4th to 7th November 2019. This V2X plugtest was focused on testing C-ITS cyber security, interoperability and a validation of the European trust domain.
Published on November 15, 2019
Who is Responsible for Securing the Connected Car?
The automotive industry recently witnessed several cases of cyber-hacking that made driving connected cars dangerous if not impossible. Companies like Jeep, Volkswagen, and Tesla all have recently dealt with cases of hackers taking over cars and stopping them while the cars were in use as well as stealing customers' Social Security numbers, financial details, and other sensitive information.
Published on April 04, 2017