workshop #2 · 2011-09-27 · communications view 4.4.4 – core routing mobile dsrc device dsrc...

Post on 08-Jul-2020

0 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

1 U.S. Department of Transportation Research and Innovative Technology Administration 1

Workshop #2

connected vehicle Core System Architecture/Requirements

September 20-22, 2011 San Jose, CA

Day 3

Systems Engineering Team

2 U.S. Department of Transportation Research and Innovative Technology Administration

Welcome to Day 3

3 U.S. Department of Transportation Research and Innovative Technology Administration

Agenda – Thursday 9/22

9:00 Welcome & Recap 9:30 Architecture, Communications Views

Discussion 10:15 Break 10:30 Architecture, Information Viewpoint Discussion 11:00 Core System Deployment Options 11:45 Lunch 1:00 Core System Risks (Barriers to Deployment) 1:45 Next Steps 2:30 Adjourn

4 U.S. Department of Transportation Research and Innovative Technology Administration

Core System provides services that… Enable data transfers between System Users □ Mobile □ Field □ Center Are in a secure, trusted environment □ Enabling trust between parties that have no direct

relationship □ Enabling secure data exchange between parties

that have no direct relationship □ Enabling the exchange of data between parties

that have data and parties that want data

5 U.S. Department of Transportation Research and Innovative Technology Administration

Core System in the context of the connected vehicle environment

Radio/Satellite Sources

Legend

Communications to/through Core

Communications enabled by Core

Communications independent of Core

Broadcast Communications

independent of Core

Center

Field

Mobile

External Support Systems

Core System

6 U.S. Department of Transportation Research and Innovative Technology Administration

Core System’s 8 Subsystems

Core System

Misbehavior Management

Network Services

Data Distribution

User Trust Management

User Permissions

Service Monitor

Core2Core

Time Sync

Center Users

Operators

Other Cores

Field Users

Mobile Users

External Support Systems

7 U.S. Department of Transportation Research and Innovative Technology Administration

Views that will describe the layered communications protocols

8 U.S. Department of Transportation Research and Innovative Technology Administration

Layered communications protocols between nodes Links are

traceable to interface requirements

Communications Communications Viewpoint

Protocol entities

Node

Link between nodes

Logical link between protocol entities

Software engineering object

Internet Protocols

DSRC Device

Service Router

9 U.S. Department of Transportation Research and Innovative Technology Administration

Mobile DSRC Device and Core Mobile Wide-Area Wireless User and Core Fixed Point Center/Field User and Core,

Core2Core Core Routing

Communications Views Defined Communications Viewpoint

10 U.S. Department of Transportation Research and Innovative Technology Administration

Communications View 4.4.1 – Mobile DSRC Device and Core

Description: □ 1st of 2 views showing how Mobile Users

can communicate with the Core □ Shows the intermediary steps to go from

Mobile to Core □ Based on 5.9 GHz DSRC using IEEE

1609.x, 802.11p standards

11 U.S. Department of Transportation Research and Innovative Technology Administration

Communications View 4.4.1 – Mobile DSRC Device and Core

□ Performance □ Interfaces □ Functionality □ Security □ Organization/

Resources □ Appropriateness

□ Feasibility □ Risks □ Evolvability □ Deployability

Considerations/Concerns Addressed:

12 U.S. Department of Transportation Research and Innovative Technology Administration

Communications View 4.4.1 – Mobile DSRC Device and Core

Mobile DSRC Device Core Access NodeDSRC Field Node

Wireless Medium

Local Area NetworkWide-Area

Network

Low Level WAN

Internet Protocols

Internet Protocols

Local Area Network

Local Area Network

Low Level LAN

Internet Protocols

IEEE 802.2IEEE 1609.4IEEE 802.11p

Internet Protocols

Application Mobile Component

IEEE 1609.3

Session Layer

Security

IEEE 802.2IEEE 1609.4

IEEE 802.11p

Application Field Component

Session Layer

Security Intrusion Detection

Session Layer

Security

Service Component Node

Low Level WAN

Intru

sion

-Pre

vent

ion

Core Decryptor

IEE

E 1

609.

2 Internet Protocols

IEEE 1609.3 IE

EE

160

9.2

Service Router

Acc

ess-

Hea

lth-P

erf A

ccess-Health-P

erf

Conn

Session Layer

Security

Session Layer

Security

Session Layer

Security

Session Layer

Security

System

-Log, Health-M

onitor

Low Level LAN

Internet Protocols

Session Layer

Security

System

-Log, Health-M

onitor

Core SEO

Session Layer

Security

Session Layer

Security

Low Level LAN

Internet Protocols

Low Level LAN

Internet Protocols

Low Level LAN

Internet Protocols

Session Layer

Security

Local AreaNetwork

Service Router

Low Level LAN

Internet Protocols

Session Layer

Security

Session Layer

Security

Low Level LAN

Internet Protocols

System

-Log, Health-M

onitor

Core Decryptor SEOs

13 U.S. Department of Transportation Research and Innovative Technology Administration

Communications View 4.4.1 – Mobile DSRC Device and Core

Mobile DSRC Device Core Access NodeDSRC Field Node

Wireless Medium Wide-Area Network

Low Level WAN

Internet Protocols

Internet Protocols

Low Level LAN

Internet Protocols

IEEE 802.2IEEE 1609.4

IEEE 802.11p

Internet Protocols

Application Mobile Component

IEEE 1609.3

Session Layer

Security

IEEE 802.2IEEE 1609.4IEEE 802.11p

Application Field Component

Session Layer

Security Intrusion Detection

Session Layer

Security

Low Level WAN

Intru

sion

-Pre

vent

ion

IEE

E 1

609.

2 Internet Protocols

IEEE 1609.3 IE

EE

160

9.2

Acc

ess-

Hea

lth-P

erf A

ccess-Health-P

erfConn

Session Layer

Security

Session Layer

Security

Session Layer

Security

Session Layer

Security

Session Layer

Security

Low Level LAN

Internet Protocols

Left Side

14 U.S. Department of Transportation Research and Innovative Technology Administration

Communications View 4.4.1 – Mobile DSRC Device and Core

Right Side

Core Access Node

Local Area Network

Internet Protocols

Local Area Network

Local Area Network

Low Level LAN

Internet Protocols

Session Layer

Security Intrusion Detection

Session Layer

Security

Service Component Node

Low Level WAN

Intru

sion

-Pre

vent

ion

Core DecryptorService Router

Acc

ess-

Hea

lth-P

erf A

ccess-Health-P

erf

Conn

System

-Log, Health-M

onitorLow Level

LAN

Internet Protocols

Session Layer

Security

System

-Log, Health-M

onitor

Core SEO

Session Layer

Security

Session Layer

Security

Low Level LAN

Internet Protocols

Low Level LAN

Internet Protocols

Low Level LAN

Internet Protocols

Session Layer

Security

Local AreaNetwork

Service Router

Low Level LAN

Internet Protocols

Session Layer

Security

Session Layer

Security

Low Level LAN

Internet Protocols

System

-Log, Health-M

onitor

Core Decryptor SEOs

15 U.S. Department of Transportation Research and Innovative Technology Administration

Enterprise Views □ Business Model Functional Views □ Core Decryption Connectivity Views □ High Level □ Core System

Functional Allocation Communications Views

□ Mobile Wide-Area Wireless User and Core

□ Fixed Point Center/Field User and Core, Core2Core

□ Core Routing

Communications View 4.4.1 – Mobile DSRC Device and Core Related Views:

16 U.S. Department of Transportation Research and Innovative Technology Administration

Communications View 4.4.2 – Mobile Wide-Area Wireless User and Core

Description: □ 2nd of 2 views showing how Mobile Users

can communicate with the Core □ Shows the intermediary steps to go from

Mobile to Core □ Based on WiFi, cellular, other wireless

communications

17 U.S. Department of Transportation Research and Innovative Technology Administration

Communications View 4.4.2 – Mobile Wide-Area Wireless User and Core

□ Performance □ Interfaces □ Functionality □ Security □ Organization/

Resources □ Appropriateness

□ Feasibility □ Risks □ Evolvability □ Deployability

Considerations/Concerns Addressed:

18 U.S. Department of Transportation Research and Innovative Technology Administration

Communications View 4.4.2 – Mobile Wide-Area Wireless User and Core

Application Mobile

Component

Wireless Medium Wide-Area Network

Low Level WAN

Session Layer

Security

Wide-Area Wireless Field Node

Mobile Wide-Area Wireless Device

Data Link / Physical

Internet Protocols

Data Link / Physical

Internet Protocols

Session Layer

Security

Internet Protocols

Session Layer

Security

Core Access Node

Local Area Network

Internet Protocols

Local Area Network

Local Area Network

Low Level LAN

Internet Protocols

Session Layer

Security Intrusion Detection

Session Layer

Security

Service Component Node

Low Level WAN

Intru

sion

-Pre

vent

ion

Core DecryptorService Router

Acc

ess-

Hea

lth-P

erf A

ccess-Health-P

erf

Conn

System

-Log, Health-M

onitor

Low Level LAN

Internet Protocols

Session Layer

Security

System

-Log, Health-M

onitorCore SEO

Session Layer

Security

Session Layer

Security

Low Level LAN

Internet Protocols

Low Level LAN

Internet Protocols

Low Level LAN

Internet Protocols

Session Layer

Security

Local AreaNetwork

Service Router

Low Level LAN

Internet Protocols

Session Layer

Security

Session Layer

Security

Low Level LAN

Internet Protocols

System

-Log, Health-M

onitor

Core Decryptor SEOs

19 U.S. Department of Transportation Research and Innovative Technology Administration

Communications View 4.4.2 – Mobile Wide-Area Wireless User and Core

Left Side

Application Mobile

Component

Wireless Medium Wide-Area Network

Low Level WAN

Session Layer

Security

Wide-Area Wireless Field Node

Mobile Wide-Area Wireless Device

Data Link / Physical

Internet Protocols

Data Link / Physical

Internet Protocols

Session Layer

Security

Internet Protocols

Session Layer

Security

Core Access Node

Internet Protocols

Low Level LAN

Internet Protocols

Session Layer

Security Intrusion Detection

Session Layer

Security

Low Level WAN

Intru

sion

-Pre

vent

ion

Acc

ess-

Hea

lth-P

erf A

ccess-Health-P

erf

Conn

Session Layer

Security

Low Level LAN

Internet Protocols

Right Side is same as DSRC view

20 U.S. Department of Transportation Research and Innovative Technology Administration

Enterprise Views □ Business Model Functional Views □ Core Decryption Connectivity Views □ High Level □ Core System

Functional Allocation Communications Views

□ Mobile DSRC User and Core

□ Fixed Point Center/Field User and Core, Core2Core

□ Core Routing

Communications View 4.4.2 – Mobile Wide-Area Wireless User and Core Related Views:

21 U.S. Department of Transportation Research and Innovative Technology Administration

Communications View 4.4.3 – Fixed Point Center/Field User and Core, Core2Core

Description: □ Shows how non-mobile systems (Field,

Center, External Support Systems, and other Cores) communicate with the Core

□ Wired connections through the Internet or private networks

□ May use wireless (see 4.4.2) □ Uses IP protocols

22 U.S. Department of Transportation Research and Innovative Technology Administration

Communications View 4.4.3 – Fixed Point Center/Field User and Core, Core2Core

□ Performance □ Interfaces □ Functionality □ Security □ Organization/

Resources □ Appropriateness

□ Feasibility □ Risks □ Evolvability □ Deployability

Considerations/Concerns Addressed:

23 U.S. Department of Transportation Research and Innovative Technology Administration

Communications View 4.4.3 – Fixed Point Center/Field User and Core, Core2Core

Fixed Device

Low Level WAN

Internet Protocols

Wide-Area Network

Session Layer

Security

Application Fixed

Component

Core Access Node

Local Area Network

Local Area Network

Local Area Network

Low Level LAN

Internet Protocols

Intrusion Detection

Session Layer

Security

Service Component NodeIn

trusi

on-P

reve

ntio

nCore DecryptorService Router

Acc

ess-

Hea

lth-P

erf A

ccess-Health-P

erf

Conn

System

-Log, Health-M

onitorLow Level

LAN

Internet Protocols

Session Layer

Security

System

-Log, Health-M

onitor

Core SEO

Session Layer

Security

Session Layer

Security

Low Level LAN

Internet Protocols

Low Level LAN

Internet Protocols

Low Level LAN

Internet Protocols

Session Layer

Security

Local AreaNetwork

Service Router

Low Level LAN

Internet Protocols

Session Layer

Security

Session Layer

Security

Low Level LAN

Internet Protocols

System

-Log, Health-M

onitor

Core Decryptor SEOs

Internet Protocols

Session Layer

Security

Low Level WAN

24 U.S. Department of Transportation Research and Innovative Technology Administration

Enterprise Views □ Business Model Functional Views □ Core Decryption Connectivity Views □ High Level □ Core System

Functional Allocation Communications Views

□ Mobile DSRC User and Core

□ Mobile Wide-Area Wireless User and Core

□ Core Routing

Communications View 4.4.4 – Core Routing Related Views:

25 U.S. Department of Transportation Research and Innovative Technology Administration

Communications View 4.4.4 – Core Routing

Description: □ Shows the communications involved when

the Core is used as a router when a private network is used to connect mobile, field, or center systems

□ Fixed devices connected to the Core by a private network can use the Core Access Node to provide connectivity between them

□ Could also provide connectivity for mobile users to a Center user

26 U.S. Department of Transportation Research and Innovative Technology Administration

Communications View 4.4.4 – Core Routing

□ Performance □ Interfaces □ Functionality □ Security □ Organization/

Resources □ Appropriateness

□ Feasibility □ Risks □ Evolvability □ Deployability

Considerations/Concerns Addressed:

27 U.S. Department of Transportation Research and Innovative Technology Administration

Communications View 4.4.4 – Core Routing

Mobile DSRC Device DSRC Field Node

Wireless Medium

Wide-Area NetworkPrivate Wide-Area Network

Low Level WAN

Internet Protocols

Internet Protocols

IEEE 802.2IEEE 1609.4IEEE 802.11p

Internet Protocols

Application Mobile Component

IEEE 1609.3

Session Layer

Security

IEEE 802.2IEEE 1609.4IEEE 802.11p

Application Field Component

Session Layer

Security

Low Level WAN

Intru

sion

-Pre

vent

ion

IEE

E 1

609.

2 Internet Protocols

IEEE 1609.3 IE

EE

160

9.2

Acc

ess-

Hea

lth-P

erf

Conn

Session Layer

Security

Session Layer

Security

Session Layer

Security

Session Layer

Security

Core Access Node

Low Level WAN

Internet Protocols

Session Layer

Security

Application Fixed

Component

Session Layer

Security

Low Level WAN

Internet Protocols

Fixed Device

Figure 4-25: Communications View – DSRC Mobile over Private Network

28 U.S. Department of Transportation Research and Innovative Technology Administration

Communications View 4.4.4 – Core Routing

Application Mobile

Component

Wireless Medium Private Wide-Area Network

Session Layer

Security

Wide-Area Wireless Field Node

Mobile Wide-Area Wireless Device

Data Link / Physical

Internet Protocols

Data Link / Physical

Internet Protocols

Session Layer

Security

Wide-Area Network

Intru

sion

-Pre

vent

ion

Acc

ess-

Hea

lth-P

erf

Conn

Core Access Node

Low Level WAN

Internet Protocols

Session Layer

Security

Application Fixed

Component

Session Layer

Security

Low Level WAN

Internet Protocols

Internet Protocols

Session Layer

Security

Low Level WAN

Low Level WAN

Internet Protocols

Session Layer

Security

Fixed Device

Figure 4-26: Communications View – Wide-Area Mobile over Private Network

29 U.S. Department of Transportation Research and Innovative Technology Administration

Communications View 4.4.4 – Core Routing

Fixed Device

Low Level WAN

Internet Protocols

Private Wide-Area Network

Session Layer

Security

Application Fixed

Component

Wide-Area Network

Intru

sion

-Pre

vent

ion

Acc

ess-

Hea

lth-P

erf

Conn

Core Access Node

Low Level WAN

Internet Protocols

Session Layer

Security

Application Fixed

Component

Session Layer

Security

Low Level WAN

Internet Protocols

Internet Protocols

Session Layer

Security

Low Level WAN

Fixed Device

Figure 4-27: Communications View – Fixed Device over Private Network

30 U.S. Department of Transportation Research and Innovative Technology Administration

Enterprise Views □ Business Model Functional Views □ Core Decryption □ Networking Connectivity Views □ High Level □ Core System

Functional Allocation

Communications Views □ Mobile DSRC User

and Core □ Mobile Wide-Area

Wireless User and Core

□ Fixed Point Center/Field User and Core, Core2Core

Communications View 4.4.4 – Core Routing Related Views:

31 U.S. Department of Transportation Research and Innovative Technology Administration

Views that will describe the data object structures and relationships

32 U.S. Department of Transportation Research and Innovative Technology Administration

Defines the Data objects: structure, relationships, metadata, and constraints Related to interface requirements,

referenced by the functional requirements

Information Information Viewpoint

Information Objects

“part-of” relationship

“aggregation” relationship

“Transformation” relationship

User Identification

33 U.S. Department of Transportation Research and Innovative Technology Administration

Top Level External Objects Top Level Internal Objects

Information Views Defined Information Viewpoint

34 U.S. Department of Transportation Research and Innovative Technology Administration

Information View 4.5.1 – Top Level External Objects

Description: □ Objects that are exchanged, sent, and

received over the Core System’s external interfaces

□ Includes objects between Cores □ Organized by the originating or

terminating subsystem □ External interfaces are candidates for

standardization

35 U.S. Department of Transportation Research and Innovative Technology Administration

Information View 4.5.1 – Top Level External Objects

□ Security □ Interfaces □ Appropriateness

Considerations/Concerns Addressed:

36 U.S. Department of Transportation Research and Innovative Technology Administration

Information View 4.5.1 – Top Level External Objects

External Objects

Network Services Objects

Data In

Data Out

User Permissions

ObjectsUser Identity and

Permission RequestApplication

Permission RequestService Status Query

Service Monitor Objects

Service Status

Performance Records

System User Status Registration

Misbehavior Management

Objects

System User Misbehavior

Report

Time Sync Objects

Time

Core2Core Objects

C2C Misbehavior Report

C2C Misbehavior Report

Core Service Status Query

Service Status for Cores

Core Service Status Query

Service Status for Cores

Core Status Registration

Other Core Takeover Request

Other Core Takeover Request

CRL Deltas

CRL Deltas

Complete CRL

Core Configuration Info

Complete CRL

Core Conflict Info

Core Conflict Info

Core Configuration Info

Restore Data

Backup Data

Data Request

Data Backup Request

Restore Data

Data Request

Backup Data

Data Backup Request

CRL

X.509 Certificate

X.509 CRL

Ext X.509 Cert Request

Credential Request

Credentials

Trust Management

Objects

Credential Referral

Misbehaving User ID

External CRL

CRL Request

User Identification

User Special Permissions

Data Distribution

Objects

Data Subscription Request

Data Provision Request

Data Acceptance Info

Other Core Acceptance Info

Field Node Configuration Information

Repackaged, Addressed Data

Provided Data

Direct Data Distribution Info

Geo-cast Message

Data Subscription Confirmation Info

Data Subscription Redirect Info

Core Status Registration

37 U.S. Department of Transportation Research and Innovative Technology Administration

Functional Views □ Top Level □ Data Distribution □ System Configuration □ User Configuration □ System Monitor and

Control □ Credentials

Distribution

□ Misbehavior Management

□ Core Decryption □ Networking □ Core Backup Information Views □ Top Level Internal

Objects

Information View 4.5.1 – Top Level External Objects Related Views:

38 U.S. Department of Transportation Research and Innovative Technology Administration

Information View 4.5.2 – Top Level Internal Objects

Description: □ Objects that are exchanged, accepted,

and sent between subsystems over the Core System’s internal interfaces

□ Organized by the originating or terminating subsystem

39 U.S. Department of Transportation Research and Innovative Technology Administration

Information View 4.5.2 – Top Level Internal Objects

□ Security □ Interfaces □ Appropriateness

Considerations/Concerns Addressed:

40 U.S. Department of Transportation Research and Innovative Technology Administration

Information View 4.5.2 – Top Level Internal Objects

Time Local Form

Permission

Core Status Registration

Locally Encrypted Message

Service Control Node Performance

Restore Data

Service Monitor Objects

Time Sync Objects

Permission

Locally Encrypted Message

Restore Data

Permission

Locally Encrypted Message

Restore Data

Network Services Objects

Time Local Form

Permission

Time Local Form

Geo-cast Info Changes

Locally Encrypted Message

Restore Data

Data Distribution

Objects

Misbehavior Management

Objects

Suspicious Data

Suspicious Geo-Cast

Time Local Form

Permission

SUID, function permission

Scope

Operator Permission

System User Permission

Internal Misbehavior Report

Decryption Error Message

Authenticity Error Message

Locally Encrypted Message

Intrusion Alert

Restore Data

User Permissions

Objects

Provider ID, function

Operator ID, function

Time Local Form

Operator ID, function

Operator ID, function

Operator ID, function

Operator ID, function

Operator ID, function

Operator ID, function

Operator ID, function

Core ID, function

System User ID, function

Operator ID, function

Operator ID Revoke function

System User ID, Revoke function

Certificate Owner ID

Permission Change Request

Cert Owner, App

User ID, Apps

Locally Encrypted Message

Restore Data

Trust Management

Objects

Time Local Form

Permission

CRL Deltas

Complete CRL

Misbehaving User ID

Cert Permission

App Permissions

Special App Permissions

User Apps

Remotely Encrypted Message

Remotely Encrypted Message

Remotely Encrypted Message

Remotely Encrypted Message

Remotely Encrypted Message

Remotely Encrypted Message

Remotely Encrypted Message

Restore Data

Core2Core Objects

Time Local Form

Core Distribution List

Detailed Service Status

Permission

Config Info for Other Cores

Core Config Info

Config Info for Other Cores

Core Config Info

Config Info for Other Cores

Core Config Info

Config Info for Other Cores

Core Config Info

Config Info for Other Cores

Core Config Info

Config Info for Other Cores

Core Config Info

Config Info for Other Cores

Core Config Info

CRL Deltas

Complete CRL

Locally Encrypted Message

Detailed Service Status

Data to be Backed Up

Data to be Backed Up

Data to be Backed Up

Data to be Backed Up

Data to be Backed Up

Data to be Backed Up

Data to be Backed Up

41 U.S. Department of Transportation Research and Innovative Technology Administration

Functional Views □ Top Level □ Data Distribution □ System Configuration □ User Configuration □ System Monitor and

Control □ Credentials

Distribution

□ Misbehavior Management

□ Core Decryption □ Networking □ Core Backup Information Views □ Top Level External

Objects

Information View 4.5.2 – Top Level Internal Objects Related Views:

42 U.S. Department of Transportation Research and Innovative Technology Administration

How will the Core be ‘rolled-out’

43 U.S. Department of Transportation Research and Innovative Technology Administration

Core System Deployment

Recall from Day 1’s background of the Core System □ Core System Needed ▪ Support diverse implementations ▪ Extensible, scalable over time

□ Support Diverse deployments ▪ Standalone ▪Collocated ▪Distributed

44 U.S. Department of Transportation Research and Innovative Technology Administration

Core System Deployment

Core System Architecture supports those goals: □ Enterprise Objects like Core Certification

Authority □ Interfaces like Core2Core □ Ability to vary how software is assigned to

nodes

45 U.S. Department of Transportation Research and Innovative Technology Administration

Deployment Considerations as multiple Cores are developed and fielded

45

46 U.S. Department of Transportation Research and Innovative Technology Administration

Core #1 provides all services for the area. Some areas provide DSRC communications to Core, resulting in different service delivery profiles.

Single Standalone Core

nG cellular

Core #1 Geographic Coverage Area

DSRC

47 U.S. Department of Transportation Research and Innovative Technology Administration

Core #2 provides all services for the area it covers, all by nG cellular. Core #1 provides

all services for the area it covers, some by nG, some by DSRC. Overlap requires

agreement, and Core #2 provides services in the overlap areas here.

Multi Core – One Dominant

nG cellular

Core #1 Geographic

Coverage Area

DSRC

Core #2 Geographic

Coverage Area

48 U.S. Department of Transportation Research and Innovative Technology Administration

Core #2 provides all services for the area it covers, all by nG, except for the shared area.

Core #1 provides all services for the area it covers, some by nG, some by DSRC.

Overlap requires agreement; Core #1 and Core #2 both provide services. Each service provided by only one Core, except for DSRC users that can get all services from Core #1.

Multi Core – Shared Dominance

nG cellular

Core #1 Geographic

Coverage Area

DSRC

Core #2 Geographic

Coverage Area

Shared Coverage

49 U.S. Department of Transportation Research and Innovative Technology Administration

Core #2 provides all services for the area it covers, all by nG, except for the shared area.

Core #1 provides all services for the area it covers, some by nG, some by DSRC.

Overlap requires agreement; Core #1 and Core #2 both provide services. Overlap area defaults to Core #2, except for DSRC users that go to Core #1. Users can override and access Core #1 with 3G if they wish

Multi Core – Peers

nG cellular

Core #1 Geographic

Coverage Area

DSRC

Core #2 Geographic

Coverage Area

Shared Coverage

50 U.S. Department of Transportation Research and Innovative Technology Administration

Core System Deployment Activities

1st Steps (take care of the higher risk items) □ Setup the Core Certification Authority to

establish: ▪Governance policies ▪Certification standards and procedures ▪ Security credentials (root CA)

□ Establish the External Support Systems (the CAs and RAs)

51 U.S. Department of Transportation Research and Innovative Technology Administration

Core System Deployment Activities

Incorporate Lessons from Test Bed, Safety/Certification Pilots Work with Standards organizations to

incorporate Core System interfaces into industry standards Begin to work with Deployers to establish

operating agreements What else?

52 U.S. Department of Transportation Research and Innovative Technology Administration

Discussion – Likely Deployers

Who is likely to deploy a Core System? □ States □ Locals □ 3rd Party Data Warehouse Providers □ System Integrator □ Auto Industry May affect how relationships are defined by

the Core Certification Authority

53 U.S. Department of Transportation Research and Innovative Technology Administration

Barriers to Deployment

54 U.S. Department of Transportation Research and Innovative Technology Administration

Risk to Success of the Core System

What may happen to prevent the Core System from succeeding – and to some extent, affect the overall connected vehicle environment Types of Risks □ Technically – Core System is

straightforward, using current technologies □ Institutional Issues always take longer □ Programmatic – cost/schedule Levels: individual Core, collectively

55 U.S. Department of Transportation Research and Innovative Technology Administration

Preliminary Risks to Success of the Core System Timely Deployment Relationships between Core Systems and

external Enterprises Role and Makeup of the Core Certification

Authority External Support System (ESS) for Security Operations and Maintenance of the Security

External Support System (ESS) □ More for the connected vehicle environment Security Management Data Provisioning/Ownership

56 U.S. Department of Transportation Research and Innovative Technology Administration

For Core System and related activities

57 U.S. Department of Transportation Research and Innovative Technology Administration

Core System Timeline

FCC allocates 5.9

GHz spectrum for

DSRC VII

Architecture developed based on

Day 1 Use Cases

Prototypes for V2V (safety applications) and V2I (public applications) developed based on

DSRC 5.9 GHz and tested in a POC test bed

New assumptions, new initiatives, new

timelines

SE Program initiated to re-

baseline Stakeholder workshops to

solicit user needs

Re-baselined Core System Concept of

Operations, Requirements, &

Architecture completed

We are here

2004 2010 2005 2009 2008 . . . 2006

User Needs System Requirements

& Architecture Aug/Sep 2010

Oct (draft) Jan (RevA) Apr (RevB/C) May (workshop)

June 2011 (Workshop) Sep (2nd Workshop)

Concept of Operations

58 U.S. Department of Transportation Research and Innovative Technology Administration

Next Steps System Engineering Team will finalize □ ConOps □ Requirements □ Architecture □ Risk □ Standards Recommendations DOT leading other activities where Core

System Contact Walt Fehr – 202-366-0278,

walt.fehr@dot.gov

59 U.S. Department of Transportation Research and Innovative Technology Administration

Thank you all for your Time

top related