This page contains a Flash digital edition of a book.

and physical elements – it is ‘cyberphysi- cal.’ Like any piece of infrastructure, its development needs to be approached as a long-term investment: the product of careful policy, planning and considera- tion as to its capability and longevity, and the organisational elements necessary to operate and maintain it. The CCMS allows both government

policy and commercial applications to be implemented. It ensures that the C-ITS environment is secure by managing pri- vacy, access, prioritisation and cyberse- curity, and is a foundation on which the day-to-day use of, and benefits associ- ated with, C-ITS can be realised.

THE CHALLENGE AHEAD The connected and cooperative shift will blur the boundaries of what has been previously easy to identify as the trans- port sector. This means that new entities may be

exposed to threats and vulnerabilities from technologies and entities not found in the traditional automotive world. For security, we can actually draw on

existing solutions found in the ICT sphere. This makes the task of providing security easier on the one hand, because existing practices, strategies and standards can be leveraged for C-ITS. On the other hand, adapting these

existing resources for the automotive world is a significant challenge. Resources need to be adapted or created anew where they cannot be adopted directly; common goals can be difficult to establish between traditional and non-traditional

stakeholders (between, for example, between telecommunications organisa- tions and car manufacturers); and new or modified roles and responsibilities can be difficult to implement from a policy- making perspective.

STRIKING THE RIGHT BALANCE Security has as much to do with reimag- ining, and getting the most out of, our

approval, and so on – will need both to deliver the level of confidence sought by governments and users, while also aiding developers and manufacturers. Striking the right balance ensures

that security is a conduit to the global market, where international acceptance and availability can be achieved with minimal changes. Security is one of the fundamental ways different regions establish and

“The provision of security extends to multiple, overlapping challenges, such as the requirements for scalability, extensibility, multiple applications and users travelling across regions”

transport network, as with preparing for changes that are rapidly approaching. The broad goals of security are really

two sides of the same coin. It needs to both protect against threats that can deny, degrade, disrupt or destroy techni- cal, organisational, commercial, privacy and safety services, settings and assur- ances; and enable public purpose and commercial outcomes to be realised. The security environment in Australia

and overseas continues to develop, but one of the key things that is emerging is how security will be one of the key driv- ers for promoting change and innovation, and for driving uptake and availability. Compliance assurance – which may take the form of certification, type


communicate their trust in each other’s systems and devices. This is essential for establishing a commercially sustainable global market for C-ITS.

AN INVITATION FOR DISCUSSION TCA recognises that security will affect all stakeholders. In the cooperative and connected environment, whether they are drivers, passengers, cyclists or pedes- trians, everyone will be an end user. Cities, roads and transport networks

are, above all, made for people, and they depend on governments and industry to get it right. TCA has prepared a discussion paper

titled Towards a National Vision for a Secure, Connected Future Through C-ITS. It is publically available and TCA are inviting all stakeholders to contribute to the issues that it raises. The discussion paper is intended to

inform, provoke discussion and contrib- ute to the development of a national vision for C-ITS. ●

 Sean McQueen is Strategic Analyst and Policy Officer for Transport Certification Australia To view the TCA Discussion Paper visit

Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52