ESCRYPT (Bosch) Case Studies Escrypt | V2X: Hybrid Communication, Homogeneous IT Security
Edit This Case Study Record

Escrypt | V2X: Hybrid Communication, Homogeneous IT Security

Escrypt | V2X: Hybrid Communication, Homogeneous IT Security
Product Development
Autonomous Transport Systems

Mobility promises us a future of connected driving: an increase in driving safety and road safety, autonomous driving, better traffic flow, less harm to the environment, and enhanced public and goods transportation.  However, this future is one, from a technical standpoint, very hard to realize.  The current transmission of data between vehicles is, currently, not fast enough to ensure safety amoungst autonomous vehicles.

Read More


Read More

The key to making this future a reality is the cooperative intelligent transportation system (C-ITS), which enables vehicles to exchange information with other vehicles and with traffic infrastructure in real time. This is known as V2X (Vehicle-to-everything) communication. Up to now, V2X communication has been based primarily on ITS-G5, a dedicated short-range communication (DSRC) standard. This means that the exchange of data between vehicles and roadside equipment happens through direct WLAN communication.

Read More
Cutting Edge (technology has been on the market for < 2 years)
Read More
[Data Management - Data Security]
Hybrid communication for vehicles is a sensible and useful development for connected driving. It paves the way for integrating more systems, road users, and services into V2X data exchange. At the same time, IT security is and will remain a necessary and fundamental condition for V2X. Establishing an intelligent concept means consistent, homogeneous, and efficient IT security across the various V2X communications channels and standards. To ensure data protection for the entities communicating via the V2X network, each V2X message receives a signature before it is encrypted. This way, even within a hybrid communication network, security for V2X data exchange fulfills all requirements: data integrity, sender authenticity, sender authorization, replay detection, confidentiality, privacy protection, reliability, and revocation of trust.
Download PDF Version
test test