C-ITS PKI as a Service
In many respects, todays's motor vehicles function as connected devices. And with this in consideration, joint EU initiatives have broadened the impact of Cooperative Intelligent Transport Systems (C-ITS) to include more expanded connections, including road infrastructure. This enhanced connectivity is expected to show significant improvements to road safety and traffic efficiency.
Meanwhile, it must be noted that the deployment of C-ITS on the part of governments, municipalities, smart infrastructures and automotive players is a costly endeavour. One of the most significant deterents to the adoption of C-ITS security is the implementation cost of the mandatory security component - Public Key Infrastructure (PKI).
The investment consists of hardware procurement costs, such as servers and the hardware security module (HSM). Additionally, the price includes a software license for the PKI, security experts, training, and maintenance costs. A specific example is the public tender executed by the European Commission during 2019, which concerned C-ITS "EU Root Certification Authority". The winning bid was approximately 1 million EUR for construction and 400,000 EUR for operation annually, depending on the number of connected C-ITS stations (vehicles and road infrastructure units). This puts C-ITS systems into the arena of significant public investment, and thus out of reach for smaller bodies who are still interested in C-ITS in general, and C-ITS security in particular.
Our view, supported by market research, is that there is a substantial market for more accessible forms of C-ITS security systems. Furthermore, investments in this market area will innately improve the overall cybersecurity of car-to-car and car-to-infrastructure communication.
As part of our UK research project called Meili, in cooperation with our partners AppPlus + IDIADA and CryptaLabs, we have developed C-ITS PKI as a Service. Project Meili was part of the UK Government and its partners Zenzic and InnovateUK 1.2 million British pounds to develop a cohesive understanding of the challenges and potential solutions to addressing digital resilience and cyber security within Connected and Automated Mobility.
Unique PKI as a Service delivery is going to aid rapid adoption of C-ITS without the costly initial investment, and without the need to build and operate central PKI.
For getting early access to PKI as a Service, please visit https://teskalabs.com/products/seacat-pki and subscribe.
For more information about Meili project's results visit https://zenzic.io/cybersecurity/
Are you interested in security for connected vehicles? Visit this page
Most Recent Articles
- From State Machine to Stateless Microservice
- Entangled ways of product development in the area of cybersecurity #3 - LogMan.io
- Entangled ways of product development in the area of cybersecurity #2 - BitSwan
- Entangled ways of product development in the area of cybersecurity #1 - Asynchronous or parallel?
- State machine miracle
You Might Be Interested in Reading These Articles
TeskaLabs is proud to announce the availability of EV Charging Station security demonstrator. This is a result of our research project. The Meili project was part of the UK Government and its partners Zenzic and InnovateUK £1.2 million programme to develop a cohesive understanding of the challenges and potential solutions to addressing digital resilience and cyber security within Connected and Automated Mobility.
Published on July 15, 2020
After a succesfull ETSI C-ITS Security plugtest at November 2019, TeskaLabs participated also at the ETSI 1st C-V2X Plugtest at DEKRA Testing & Certification Malaga Location, Spain, from 2nd to 6th December 2019. C-V2X is a new standard of how vehicles communicates among each other using a cellular network.
Published on December 15, 2019
The automotive industry recently witnessed several cases of cyber-hacking that made driving connected cars dangerous if not impossible. Companies like Jeep, Volkswagen, and Tesla all have recently dealt with cases of hackers taking over cars and stopping them while the cars were in use as well as stealing customers' Social Security numbers, financial details, and other sensitive information.
Published on April 04, 2017