EU: Probe Data - Secure Wireless Internet (EU)
Description:
This solution is used within Australia and the E.U.. It combines standards associated with EU: Probe Data with those for I-M: Secure Wireless Internet (EU). The EU: Probe Data standards include upper-layer standards required to provide detailed probe data information from a vehicle. The I-M: Secure Wireless Internet (EU) standards include lower-layer standards that support secure communications between two entities, either or both of which may be mobile devices, but they must be stationary or only moving within wireless range of a single wireless access point (e.g., a parked car). Security is based on X.509 certificates. A non-mobile (if any) endpoint may connect to the service provider using any Internet connection method.Relevant Regions:
- Australia
- European Union
Comm Profile: I-M: Secure Wireless Internet (EU)
Comm Class: WAN - Wide Area Network
Standards in Profile:
Level | Standard |
---|---|
Access | Wireless Internet Alternatives (EU) |
Mgmt | Bundle: SNMPv3 MIB |
Security | Secure Session Alternatives |
TransNet | Internet Transport Alternatives |
TransNet | IP Alternatives |
Data Profile: EU: Probe Data
Standards in Profile:
Level | Standard |
---|---|
ITS Application Entity | Bundle: ISO Probe Data |
Solution Issues Severity: 6
The severity issue score calculation only includes issues associated with standards that are included by default.
Solution Issues:
Default | Severity | Name | Type | Description |
---|---|---|---|---|
True | Medium | Outdated security reference | Security Gap | The standard solution includes an outdated security reference. |
True | Medium | Secure data access not provided | Security Gap | The solution does not define rules on how the application entity authenticates requests to accept or provide data. |
False | Medium | Option not standardized | Standardization Gap | The option set includes at least one option that is not (yet) defined in a standard. |
False | Medium | Uncertainty about trust revocation mechanism | Security Gap | The mechanisms used to prevent bad actors from sending authorized messages is unproven. |
Solution to Triples
This solution is used on the following information flow triples:
Source | Flow | Destination |
---|---|---|
Vehicle | vehicle situation data | Transportation Information Center |