Entrust > Case Studies > Entrust Works with Microsec to Enhance V2X Communication Safety

Entrust Works with Microsec to Enhance V2X Communication Safety

Entrust Logo
Technology Category
  • Cybersecurity & Privacy - Identity & Authentication Management
Applicable Industries
  • Automotive
  • Transportation
Use Cases
  • Vehicle-to-Infrastructure
Services
  • Cybersecurity Services
The Challenge

With various types of vehicle-to-everything (V2X) communication have been developed to meet the different use cases and scenarios, the security underpinning these communications needs to be consistent and effective across the full spectrum of V2X communications.

Until recently, V2X communication has been based primarily on the ITS-G5 protocol, a dedicated short-range communication (DSRC) standard using WiFi signals. During the data exchange, each party or device needs to verify their permissions.

Challenges in sumary:

Commercial:

  1. Deploy the Cooperative Intelligent Transport Systems (C-ITS)
  2. Implement and offer secure, standardized solution for vehicle-to-everything (V2X) communication

Technical: 

  1. Secure creation and management of millions of digital certificates and keys
The Customer
About The Customer

IT security company

The Solution

Solution:

  1. Public key infrastructures (PKIs) are used to secure the environment by verifying the participants’ permissions with the use of certificates.
  2. Developing and offering the certificate authority solutions that would incorporate the necessary new attributes into the digital certificates required for V2X communications
  3. Entrust nShield HSMs are used to securely generate and store cryptographic keys. It also supports a formerly unprecedently high volume of cryptographic operations
Operational Impact

  • ECTL (European Certificate Trust List) Level 0+ registered SaaS solution, supported by Entrust HSMs (HSMs).

    Background:

    The European Union’s European Certificate Trust List (ECTL) currently has three levels of trust (L0/L1/L2) in its Trust List Manager:

    L0 – Just a simple CA certificate is required, with no protection mandated

    L1 – The CA and generated certificates need to be audit ready

    L2 – The CA is audited based on EU C-ITS certificate policy


  • License, hardware and know-how for on-premises implementations.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.