C-ITS PKI as a Service
In many respects, todays's motor vehicles function as connected devices. And with this in consideration, joint EU initiatives have broadened the impact of Cooperative Intelligent Transport Systems (C-ITS) to include more expanded connections, including road infrastructure. This enhanced connectivity is expected to show significant improvements to road safety and traffic efficiency.
Meanwhile, it must be noted that the deployment of C-ITS on the part of governments, municipalities, smart infrastructures and automotive players is a costly endeavour. One of the most significant deterents to the adoption of C-ITS security is the implementation cost of the mandatory security component - Public Key Infrastructure (PKI).
The investment consists of hardware procurement costs, such as servers and the hardware security module (HSM). Additionally, the price includes a software license for the PKI, security experts, training, and maintenance costs. A specific example is the public tender executed by the European Commission during 2019, which concerned C-ITS "EU Root Certification Authority". The winning bid was approximately 1 million EUR for construction and 400,000 EUR for operation annually, depending on the number of connected C-ITS stations (vehicles and road infrastructure units). This puts C-ITS systems into the arena of significant public investment, and thus out of reach for smaller bodies who are still interested in C-ITS in general, and C-ITS security in particular.
Our view, supported by market research, is that there is a substantial market for more accessible forms of C-ITS security systems. Furthermore, investments in this market area will innately improve the overall cybersecurity of car-to-car and car-to-infrastructure communication.
As part of our UK research project called Meili, in cooperation with our partners AppPlus + IDIADA and CryptaLabs, we have developed C-ITS PKI as a Service. Project Meili was part of the UK Government and its partners Zenzic and InnovateUK 1.2 million British pounds to develop a cohesive understanding of the challenges and potential solutions to addressing digital resilience and cyber security within Connected and Automated Mobility.
Unique PKI as a Service delivery is going to aid rapid adoption of C-ITS without the costly initial investment, and without the need to build and operate central PKI.
For getting early access to PKI as a Service, please visit https://teskalabs.com/products/seacat-pki and subscribe.
For more information about Meili project's results visit https://zenzic.io/cybersecurity/
Are you interested in security for connected vehicles? Visit this page
Most Recent Articles
- A beginner-friendly intro to the Correlator for effective cybersecurity detection
- Inotify in ASAB Library
- From State Machine to Stateless Microservice
- Entangled ways of product development in the area of cybersecurity #3 - LogMan.io
- Entangled ways of product development in the area of cybersecurity #2 - BitSwan
You Might Be Interested in Reading These Articles
SeaCat PKI is now Generally Available
We are proud to announce the public launch of our latest product, the SeaCat PKI. SeaCat PKI is a state-of-the-art microservice that provides central cyber security certificate and key management for IoT, connected devices, and mobile applications.
Published on January 15, 2020
Crypta Labs, IDIADA UK and TeskaLabs won the CAV cyber security competition
Zenzic announces consortium of Crypta Labs, IDIADA UK and TeskaLabs as winners of share of £1.2 million award for self-driving vehicle cyber security feasibility studies. The competition is part of the government’s £100 million CAM Testbed UK Fund, supporting the Future of Mobility Grand Challenge.
Published on January 27, 2020
C-ITS ITS-S Security microservice
As part of TeskaLabs‘s research activities, we are working toward a more flexible, contemporaneous method to deploy the software security component (specifically C-ITS Security) into the vehicle software ecosystem (ITS-S). The current best practice in the industry is that the cybersecurity component is integrated into the vehicle application software as a library. However, this approach brings with it many limitations, such as narrow software compatibility. The deployment is highly inflexible and so it is often omitted due to its complexity.
Published on June 15, 2020