Download as PDF
Entrust > Case Studies > Entrust Works with Microsec to Enhance V2X Communication Safety
Entrust Logo

Entrust Works with Microsec to Enhance V2X Communication Safety

Technology Category
  • Cybersecurity & Privacy - Identity & Authentication Management
Applicable Industries
  • Automotive
  • Transportation
Use Cases
  • Vehicle-to-Infrastructure
Services
  • Cybersecurity Services
The Challenge

With various types of vehicle-to-everything (V2X) communication have been developed to meet the different use cases and scenarios, the security underpinning these communications needs to be consistent and effective across the full spectrum of V2X communications.

Until recently, V2X communication has been based primarily on the ITS-G5 protocol, a dedicated short-range communication (DSRC) standard using WiFi signals. During the data exchange, each party or device needs to verify their permissions.

Challenges in sumary:

Commercial:

  1. Deploy the Cooperative Intelligent Transport Systems (C-ITS)
  2. Implement and offer secure, standardized solution for vehicle-to-everything (V2X) communication

Technical: 

  1. Secure creation and management of millions of digital certificates and keys
About The Customer

IT security company

The Customer

Microsec

The Solution

Solution:

  1. Public key infrastructures (PKIs) are used to secure the environment by verifying the participants’ permissions with the use of certificates.
  2. Developing and offering the certificate authority solutions that would incorporate the necessary new attributes into the digital certificates required for V2X communications
  3. Entrust nShield HSMs are used to securely generate and store cryptographic keys. It also supports a formerly unprecedently high volume of cryptographic operations
Operational Impact

  • ECTL (European Certificate Trust List) Level 0+ registered SaaS solution, supported by Entrust HSMs (HSMs).

    Background:

    The European Union’s European Certificate Trust List (ECTL) currently has three levels of trust (L0/L1/L2) in its Trust List Manager:

    L0 – Just a simple CA certificate is required, with no protection mandated

    L1 – The CA and generated certificates need to be audit ready

    L2 – The CA is audited based on EU C-ITS certificate policy


  • License, hardware and know-how for on-premises implementations.

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Invalid email address
Yes, i want to receive the IoT ONE Insights - Newsletter.
Go to Action

Thank you for your message!
We will contact you soon.