This page contains a Flash digital edition of a book.

• Technical: what does it do and how will it do it?

• Operational: how will the technology work in the real world, today, tomor- row and into the future?

• Commercial: what will it cost and who will benefit?

• Policy: what rules are needed to provide guidance, to protect users and businesses, and who makes them?

WHY SECURITY IS ESSENTIAL Security is an assumption and an expectation for end users. Not meeting these could have very serious safety consequences, and could undermine public confidence. It essentially comes down to trust: how

to enable it, how to encourage it, and how to make sure it endures. That level of trust is going to become

a lot more important, and a lot harder to achieve for the connected and cooperative space. That trust

wouldn’t be very useful if it only extended to a few people, or to a few brands. It needs to be able to extend to whoever wants access, when they want it. It’s essentially asking systems – and

their users – to trust systems that are unknown to them, and to trust that these

each other, then people cannot trust the systems. Security and safety can no longer

be treated as separate concerns. It is becoming more and more important that safety and security considerations and provisions advance in unison. The

“Security is an assumption and an expectation for end users. Not meeting these could have very serious safety consequences, and could undermine public confidence”

systems can interoperate safely, securely, and reliably. To achieve what industry, govern-

ment and users envision – and expect – trust and interoperability need to be the default, not a choice. If the systems in the cooperative and connected environment cannot trust

solution to this challenge is, in effect, lev- eraged from the cryptographic (encryp- tion) technologies and management processes used in information communi- cations technologies (ICT). Security that provides protection for

communications, devices, and the over- all environment is a common need in any C-ITS deployment. As we move into a world where vehicles become com- puters on wheels, we need to establish new ways for ‘trust’ to be established between vehicles and all road users – not just drivers The provision of security extends

to multiple, overlapping challenges, such as the requirements for scalability, extensibility, multiple applications and users travelling across regions, a market of vehicles and devices sourced from around the globe, financial stability and operational sustainability.

THE SECURITY SOLUTION: COOPERATIVE CREDENTIAL MANAGEMENT SYSTEM (CCMS) The security solution for the connected, C-ITS environment that has emerged out of international collaboration is called a Cooperative Credential Man- agement System (CCMS). The concept of a CCMS is a central pillar to enable security across systems. A CCMS is both an institutional frame-

work and a piece of infrastructure, encom- passing human/management, electronic 29 CONNECTED AUSTRALIA SUPPLEMENT

Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52