C-ITS ITS-S Security microservice
As part of TeskaLabs's research activities, we are working toward a more flexible, contemporaneous method to deploy the software security component (specifically C-ITS Security) into the vehicle software ecosystem (ITS-S). The current best practice in the industry is that the cybersecurity component is integrated into the vehicle application software as a library. However, this approach brings with it many limitations, such as narrow software compatibility. The deployment is highly inflexible and so it is often omitted due to its complexity.
Project Meili was part of the UK Government and its partners Zenzic and Innovate UK 1.2 million British pounds programme to develop a cohesive understanding of the challenges and potential solutions to addressing digital resilience and cyber security within Connected and Automated Mobility.
The outcome of our research strongly suggests that by using Linux container technology, the C-ITS ITS-S Security component can be distributed as a stand-alone microservice, which simplifies the integration significantly. Microservices are a software development technique that arranges an application as a collection of loosely coupled components. In the microservices architecture, components are fine-grained, and the protocols are lightweight. The C-ITS ITS-S Security microservice offers a simple-to-use API for car application equipment. It is a unique approach that brings the latest software procedures to the automotive software and security environment.
We plan to offer the C-ITS ITS-S Security microservice to automotive and smart infrastructure players as a plug-and-play security technology that is out-of-the-box compliant with C-ITS Security standards.
C-ITS ITS-S Security microservice was developed and tested on IDAPT devices from AppPlus + IDIADA and with Crypta Labs HSM chip Cicada.
Are you interested in security for connected vehicles? Visit this page
Most Recent Articles
- From State Machine to Stateless Microservice
- Entangled ways of product development in the area of cybersecurity #3 - LogMan.io
- Entangled ways of product development in the area of cybersecurity #2 - BitSwan
- Entangled ways of product development in the area of cybersecurity #1 - Asynchronous or parallel?
- State machine miracle
You Might Be Interested in Reading These Articles

Who is Responsible for Securing the Connected Car?
The automotive industry recently witnessed several cases of cyber-hacking that made driving connected cars dangerous if not impossible. Companies like Jeep, Volkswagen, and Tesla all have recently dealt with cases of hackers taking over cars and stopping them while the cars were in use as well as stealing customers' Social Security numbers, financial details, and other sensitive information.
Published on April 04, 2017

Crypta Labs, IDIADA UK and TeskaLabs won the CAV cyber security competition
Zenzic announces consortium of Crypta Labs, IDIADA UK and TeskaLabs as winners of share of £1.2 million award for self-driving vehicle cyber security feasibility studies. The competition is part of the government’s £100 million CAM Testbed UK Fund, supporting the Future of Mobility Grand Challenge.
Published on January 27, 2020

Making Automated Mobility Safe
Autonomous vehicles are still working their way into the modern automotive marketplace. However, they are growing more common each year. Many agree, this is an innovative change, and it’s estimated that there will be more autonomous vehicles on the road in the coming years.
Published on July 15, 2019