Security and Privacy for ITS and C-ITS

  • Scott W. Cadzow


Intelligent Transport Systems (ITS), and the specialised subset of them represented by Cooperative ITS (C-ITS), are part of the wider machine-to-machine communications, and software driven world. The aims of ITS and C-ITS are multifold but for the purposes of this book are mainly in improving safety of transport users and their transport modes. The chapter that follows covers some of the basics of security, including the contrast with safety and privacy, the role of privacy protection in the ITS context, and a review of the cryptographic countermeasures recommended for C-ITS using the certificate and signature schemes defined in IEEE 1609.2.


VANET Security Privacy 1609.2 Pseudonym Integrity Trust Authenticity Authority Confidentiality Pseudonymity Algorithms Cryptography Certification Verification Validation Cryptanalysis Attack models Defence strategy ETSI Standardisation 



The work reflected in this chapter has been supported by the i-SCOPE project, and by each of the SUNSHINE and i-locate projects and has incorporated some of the findings from the i-tour project.


The project has received funding from the European Community, and it has been co-funded by the CIP-ICT Policy Support Programme as part of the Competitiveness and Innovation Framework Programme by the European Community, contract number 297284. The author is solely responsible for it and that it does not represent the opinion of the Community and that the Community is not responsible for any use that might be made of information contained therein.


This project is partially funded under the ICT Policy Support Programme (ICT PSP) as part of the Competitiveness and Innovation Framework Programme by the European Community


The project has received funding from the European Community under contract number 621040


  1. 1.
    ETSI TS 102 165-1: Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 1: Method and proforma for Threat, Risk, Vulnerability AnalysisGoogle Scholar
  2. 2.
    Article 29 of Directive 95/46/EC Working group Opinion 13/2011 on Geolocation services on smart mobile devices, Adopted on 16 May 2011Google Scholar
  3. 3.
    ISO 3779: Road vehicles - Vehicle identification number (VIN) - Content and structureGoogle Scholar
  4. 4.
    ETSI TR 102 893: Intelligent Transport Systems (ITS); Security; Threat, Vulnerability and Risk Analysis (TVRA)Google Scholar
  5. 5.
    ETSI TS 102 940: Intelligent Transport Systems (ITS); Security; ITS communications security architecture and security managementGoogle Scholar
  6. 6.
    ETSI TS 102 941: Intelligent Transport Systems (ITS); Security; Trust and Privacy ManagementGoogle Scholar
  7. 7.
    ETSI TS 102 942: Intelligent Transport Systems (ITS); Security; Access ControlGoogle Scholar
  8. 8.
    ETSI TS 102 943: Intelligent Transport Systems (ITS); Security; Confidentiality servicesGoogle Scholar
  9. 9.
    ETSI TS 103 097: Intelligent Transport Systems (ITS); Security; Security header and certificate formatsGoogle Scholar
  10. 10.
    IEEE STANDARD 1609.2-2013 IEEE Standard for Wireless Access in Vehicular Environments Security Services for Applications and Management MessagesGoogle Scholar
  11. 11.
    ISO 21217:2014: Intelligent transport systems Communications access for land mobiles (CALM) ArchitectureGoogle Scholar
  12. 12.
    ETSI EN 302 665: Intelligent Transport Systems (ITS); Communications ArchitectureGoogle Scholar
  13. 13.
    ITU-T Recommendation X.509: Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworksGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Cadzow Communications Consulting LtdSawbridgeworthUK

Personalised recommendations