Skip to content

Network (N) and Transport Security Patterns

Pattern N1: Secure Backend Communications

Secures communication between ITS field devices (e.g., RSUs, OBUs) and backend services (e.g., TMCs, certificate servers, monitoring platforms) using strong encryption and mutual authentication. Depending on the underlying protocol, Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) is applied to protect data in transit. TLS 1.3 should be used for TCP-based interfaces (e.g., configuration commands, certificate provisioning), while DTLS is suited for UDP-based traffic such as low-latency telemetry or event reporting. All sessions must use certificates issued by a recognized PKI, and mutual authentication should be enforced to ensure trust on both ends of the connection.

Transport Security

This pattern ensures confidentiality, integrity, and authenticity of data flows across the ITS environment, and mitigates risk associated with spoofing, tampering, and unauthorized control of devices.

Key Components

Component Role
TLS 1.3 Stack Provides encryption and mutual authentication over TCP-based sessions
DTLS 1.3 Stack Supports secure, low-latency communication over UDP
PKI-issued Device Certificates Used to authenticate both ends of a session
Cipher Suite Configuration Enforces strong algorithms and disables outdated or insecure ciphers
Certificate Revocation Lists (CRLs) Ensures devices reject expired or revoked certificates

Example Use Cases

Scenario Behaviour Enforced
RSU sends telemetry over DTLS RSU establishes secure DTLS session with backend, encrypts payload, and authenticates server
Backend server configures field device Server initiates TLS 1.3 session with RSU, both authenticate using device certificates
OBU uploads misbehaviour report OBU uses DTLS to send a signed and encrypted report to backend with validated identity
Standard / Control Purpose
IEEE 1609.3 / 1609.2.1 Defines V2X networking and messaging protocols and certificate usage for ITS
ISO 21177 Secure session establishment between ITS stations
NIST SP 800-52 Rev. 2 Guidelines for TLS configuration and algorithm selection
NIST SP 800-53 Rev. 5 Cryptographic protection, mutual auth, integrity, and session security

Pattern N2: Secure Session Establishment Using ISO 21177

ITS stations frequently require persistent, authenticated communication sessions across trusted links. These sessions must be established in a standards-compliant manner to ensure confidentiality, authenticity, and resilience. ISO 21177 provides the formal specification for initiating, negotiating, and managing secure sessions between ITS stations. It defines how to authenticate peers using X.509 certificates, manage session lifetimes, and recover from abnormal session conditions.

During session establishment, each station must present a certificate issued by a trusted CA, validated against local policy and Certificate Trust Lists (CTLs). Sessions should be terminated or rejected if certificate validation fails (e.g., expired, revoked, untrusted root). The standard also defines session renegotiation procedures, enabling secure re-authentication when session conditions change.

ISO 21177 Session Security

ITS operators must ensure all deployed devices that support station-to-station communications implement ISO 21177, and procurement specifications should include support for the standard.

Implementation Context

Applies To OBUs, RSUs, Roadside and Central Systems using session-based communication
Used For Establishing and managing secure, persistent sessions over TCP/IP.
Dependencies Valid X.509 certificates, CTL availability, PKI integration, ISO 21177 compliance

Key Components

Component Role
ISO 21177 Session Protocol Negotiates session keys and verifies peer identity using digital certificates
X.509 Certificates Provide cryptographic identity for session authentication
Certificate Trust List Local list of trusted Root and Intermediate CAs for validating peers
Session Renegotiation Re-establishes trust and session keys periodically or upon failure

Example Use Cases

Scenario Behaviour Enforced
RSU-OBU Secure Session An RSU validates an OBU’s certificate and initiates a secure ISO 21177 session
Session Expiry Handling An RSU terminates and renegotiates a session when a certificate expires or is revoked
Backend-Controlled Session Policy A backend management system sets session duration and requires periodic renegotiation
Standard Purpose
ISO 21177 Defines secure session negotiation and management for ITS stations
IEEE 1609.2 Provides certificate structure and signing requirements
ISO 21217 Reference architecture for ITS station communication functions