C-ITS ITS-S Security microservice
As part of TeskaLabs's research activities, we are working toward a more flexible, contemporaneous method to deploy the software security component (specifically C-ITS Security) into the vehicle software ecosystem (ITS-S). The current best practice in the industry is that the cybersecurity component is integrated into the vehicle application software as a library. However, this approach brings with it many limitations, such as narrow software compatibility. The deployment is highly inflexible and so it is often omitted due to its complexity.
Project Meili was part of the UK Government and its partners Zenzic and Innovate UK 1.2 million British pounds programme to develop a cohesive understanding of the challenges and potential solutions to addressing digital resilience and cyber security within Connected and Automated Mobility.
The outcome of our research strongly suggests that by using Linux container technology, the C-ITS ITS-S Security component can be distributed as a stand-alone microservice, which simplifies the integration significantly. Microservices are a software development technique that arranges an application as a collection of loosely coupled components. In the microservices architecture, components are fine-grained, and the protocols are lightweight. The C-ITS ITS-S Security microservice offers a simple-to-use API for car application equipment. It is a unique approach that brings the latest software procedures to the automotive software and security environment.
We plan to offer the C-ITS ITS-S Security microservice to automotive and smart infrastructure players as a plug-and-play security technology that is out-of-the-box compliant with C-ITS Security standards.
C-ITS ITS-S Security microservice was developed and tested on IDAPT devices from AppPlus + IDIADA and with Crypta Labs HSM chip Cicada.
Are you interested in security for connected vehicles? Visit this page
Most Recent Articles
- A beginner-friendly intro to the Correlator for effective cybersecurity detection
- Inotify in ASAB Library
- From State Machine to Stateless Microservice
- Entangled ways of product development in the area of cybersecurity #3 - LogMan.io
- Entangled ways of product development in the area of cybersecurity #2 - BitSwan
You Might Be Interested in Reading These Articles
TeskaLabs delivers C-ITS PKI for C-Roads in Greece
We are proud to announce that, TeskaLabs recently launched a cybersecurity solution – known as PKI – as a service for C-Roads pilot in Greece.
Published on January 15, 2022
The 8th version of the European Certificate Trust List (ECTL) for C-ITS has been released
The Joint Research Centre of the European Commision (EC JRC) released the eight edition of the European Certificate Trust List (ECTL) used in Cooperative Intelligent Transport Systems (C-ITS). L0 ECTL v8 contains five new Root CA certificates and one re-keyed Root CA certificate. Three out of five newly inserted Root Certificates are installations that run on the TeskaLabs SeaCat PKI software for C-ITS.
press
automotive
c-its
v2x
security
Published on September 16, 2021
Who is Responsible for Securing the Connected Car?
The automotive industry recently witnessed several cases of cyber-hacking that made driving connected cars dangerous if not impossible. Companies like Jeep, Volkswagen, and Tesla all have recently dealt with cases of hackers taking over cars and stopping them while the cars were in use as well as stealing customers' Social Security numbers, financial details, and other sensitive information.
Published on April 04, 2017