Entrust Case Studies Entrust Works with Microsec to Enhance V2X Communication Safety
Edit This Case Study Record
Entrust Logo

Entrust Works with Microsec to Enhance V2X Communication Safety

Entrust
Entrust Works with Microsec to Enhance V2X Communication Safety - Entrust Industrial IoT Case Study
Cybersecurity & Privacy - Identity & Authentication Management
Automotive
Transportation
Vehicle-to-Infrastructure
Cybersecurity Services

With various types of vehicle-to-everything (V2X) communication have been developed to meet the different use cases and scenarios, the security underpinning these communications needs to be consistent and effective across the full spectrum of V2X communications.

Until recently, V2X communication has been based primarily on the ITS-G5 protocol, a dedicated short-range communication (DSRC) standard using WiFi signals. During the data exchange, each party or device needs to verify their permissions.

Challenges in sumary:

Commercial:

  1. Deploy the Cooperative Intelligent Transport Systems (C-ITS)
  2. Implement and offer secure, standardized solution for vehicle-to-everything (V2X) communication

Technical: 

  1. Secure creation and management of millions of digital certificates and keys
Read More

IT security company

Read More

Microsec

Read More

Solution:

  1. Public key infrastructures (PKIs) are used to secure the environment by verifying the participants’ permissions with the use of certificates.
  2. Developing and offering the certificate authority solutions that would incorporate the necessary new attributes into the digital certificates required for V2X communications
  3. Entrust nShield HSMs are used to securely generate and store cryptographic keys. It also supports a formerly unprecedently high volume of cryptographic operations
Read More

ECTL (European Certificate Trust List) Level 0+ registered SaaS solution, supported by Entrust HSMs (HSMs).

Background:

The European Union’s European Certificate Trust List (ECTL) currently has three levels of trust (L0/L1/L2) in its Trust List Manager:

L0 – Just a simple CA certificate is required, with no protection mandated

L1 – The CA and generated certificates need to be audit ready

L2 – The CA is audited based on EU C-ITS certificate policy

License, hardware and know-how for on-premises implementations.

Download PDF Version
test test