Ensures that ITS devices generate and store private/public key pairs securely on the device itself. This pattern supports device authentication, message integrity, and data confidentiality by embedding trust at the hardware level. Generating keys locally eliminates the need to transmit private keys, reducing exposure risk. It also enables strong binding between the cryptographic identity and the physical device. This pattern is foundational to maintaining trust in message authentication, certificate provisioning, and secure communication in V2X environments.
ITS devices are configured to generate and store cryptographic key pairs used for digital signatures. These keys enable message receivers to validate the identity of the sender and confirm the integrity of the message content. Key generation should occur on the device to reduce the risk of key exposure. Each key pair includes a private key, which must be kept secure, and a public key, which can be shared freely.
Do not allow the private key to be exported from the device. If compromised, it can be used to impersonate the device in any V2X transaction. The public key, in contrast, is designed for distribution and is shared through digital certificates issued by a Public Key Infrastructure (PKI). Other devices and services use the public key to authenticate signed messages or encrypt data sent to the device.
Used in Roadside Units (RSUs), Onboard Units (OBUs), and trusted backend components that participate in V2X messaging, session establishment, or certificate-based authentication. Commonly implemented during device onboarding or factory initialization.
Defines a baseline approach to configuring ITS devices securely prior to deployment. This pattern reduces the attack surface by disabling non-essential features, enforcing secure administrative access, and applying controls that ensure only trusted software is allowed to run. It also supports long-term operational security through auditability and revalidation of configuration state.
Used during manufacturing, onboarding, and field installation of devices such as RSUs, OBUs, controllers, and gateways. Also relevant during firmware updates, re-imaging, or maintenance activities.
Configuration templates should be defined per device class and reviewed as part of the cybersecurity risk management process.
Device vendors should provide verifiable documentation of supported hardening controls.
Operators should validate configuration status prior to device activation using tools or procedures compatible with the deployment model (e.g., CLI, SNMPv3, RESTCONF, NETCONF, vendor interface).
Devices should support secure remote management using mutually authenticated sessions (e.g., TLS 1.3 with client certificates).
Secure boot status and configuration integrity should be remotely verifiable where possible.
Ensures that ITS devices are equipped with hardware-based protections that detect and respond to unauthorized physical access or environmental anomalies. Tamper detection mechanisms should trigger protective actions, such as logging the event or securely erasing keys if physical compromise is suspected. Tamper resistance ensures trust in devices even when they are deployed in unmonitored or high-risk locations.
Applies to all field-deployed ITS components, including OBUs, RSUs, and controllers that store cryptographic credentials. Especially relevant for devices installed in physically accessible environments where physical security cannot be assumed.
This pattern defines how ITS Station Operators configure and enforce local policies that determine which messages, devices, and applications are permitted to interact with an ITS Station. Access control is implemented through policy-based filtering of message attributes, certificate fields, and interface traffic to ensure only authorized services can be invoked.
By evaluating each connection or message against locally defined rules, including PSIDs/ ITS-AIDs, SSPs, and certificate validity, this pattern prevents unauthorized or malformed data from reaching higher-layer functions. Access controls may also block or limit device interactions based on network origin, time of day, or operational roles.
This pattern applies at the edge of the ITS Station, where local enforcement decisions are made before messages or connections are processed further. ITS Station Operators configure access policies during provisioning and maintain them throughout the lifecycle of the station. These policies are enforced within the device firmware or trusted software, ideally supported by vendor-provided tools and validation routines
This pattern enables ITS deployments to identify unusual system behaviour that may indicate a cyberattack, policy violation, or device malfunction. Anomalies are detected through local inspection of message content, system states, or operational patterns, and are logged in structured, tamper-resistant formats. Logs are either stored locally or forwarded to a backend system for centralized analysis and response coordination.
This pattern applies across ITS devices, particularly OBUs, RSUs, and backend services that enforce security policies or observe message flows. Detection logic can include policy-based filters, plausibility checks, or statistical anomaly thresholds. Devices must log key security events locally and support export via secure interfaces to backend monitoring systems.
Backends must aggregate logs from multiple sources, correlate behaviour across time and geography, and prioritize events that warrant operational response. Operators should implement log retention, access control, and validation practices aligned with regional privacy and audit requirements.
Note: This Pattern is separate from the local misbehaviour detection pattern, which focuses on identification of misbehaving vehicles and infrastructure. Pattern E2 is important for basic security event detection, such as malware detection, unauthorized access, etc.
Provides guidance on log management, analysis, and retention.
Pattern E6: Software Integrity Verification and Secure Boot¶
Software integrity verification and secure boot prevent unauthorized or modified code from executing on ITS Stations. These mechanisms enforce a chain of trust from device startup through operational runtime by validating that all software and firmware components originate from trusted sources and remain unaltered.
Secure boot verifies digital signatures on firmware and software images at each boot stage. If signatures are missing or invalid, the boot process is halted or redirected to a safe recovery state. This process ensures that only authorized, vendor-approved software runs on field-deployed devices such as RSUs, OBUs, and roadside controllers.
ITS Station Operators must verify that vendors support secure boot and signed software updates. Devices must include hardware or firmware-based enforcement mechanisms (e.g., ROM-anchored keys, TPMs, or secure elements) and validate signatures using trusted certificate chains. Software distribution pipelines must be secured to prevent insertion or modification of signed packages.