• Shopping Cart
    There are no items in your cart

IEEE DRAFT 1609.2 : 0

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

WIRELESS ACCESS IN VEHICULAR ENVIRONMENTS - SECURITY SERVICES FOR APPLICATIONS AND MANAGEMENT MESSAGES

Available format(s)

Hardcopy , PDF

Superseded date

06-07-2006

Superseded by

IEEE 1609.2-2013

Language(s)

English

Introduction
1 Overview
  1.1 Introduction
  1.2 Scope
  1.3 Purpose
  1.4 Document organization
  1.5 Document conventions
2 Normative references
3 Definitions, abbreviations and acronyms
  3.1 Definitions
  3.2 Abbreviations and Acronyms
  3.3 Terminology, applications, implementations, and the
       security manager
4 Presentation language
  4.1 General
  4.2 Notation conventions
  4.3 Basic block size
  4.4 Numbers
  4.5 Fixed-length vectors
  4.6 Variable-length vectors
  4.7 The opaque and opaqueExtLength type
  4.8 Enumerated type
  4.9 Constructed types
  4.10 The case statement
  4.11 The extern statement
  4.12 Flags
5 Secured Messages
  5.1 General
  5.2 The SecuredMessage type
  5.3 The SignedMessage, ToBeSignedMessage, and MessageFlags types
  5.4 The SignedWSM and ToBeSignedWSM types
  5.5 The PublicKey, PKAlgorithm, and SymmAlgorithm types
  5.6 The ECPublicKey type
  5.7 The CertID8 and CertID10 type
  5.8 The ApplicationID and FullySpecifiedAppID types
  5.9 The Time64 and Time32 types
  5.10 The SignerInfo type
  5.11 The Signature type
  5.12 The ECDSASignature type
  5.13 The EncryptedMessage, EncryptedContentInfo, and
       RecipientInfo types
  5.14 The ECIESNISTp256EncryptedKey and AESCCMCiphertext types
  5.15 The WAVECertificate, ToBeSignedWAVECertificate,
       CertSpecificData, SubjectType and CRLSeries types
  5.16 The WAVECRL, ToBeSignedCRL, CRLType, and IDAndDate types
  5.17 The WAVECertificateRequest and WAVECertificateResponse
       types
  5.18 The GeographicRegion and RegionType types
  5.19 The 2DLocation and 3DLocationAndConfidence types
  5.20 Certificate Scopes
6 Other Secured Message Formats
7 Secure message processing
  7.1 Caches and stores
  7.2 Signed messages
  7.3 Processing Encrypted Messages
  7.4 Processing Signed and Encrypted Messages
8 Specific Uses of Secured Messages
  8.1 Secured WSAs
  8.2 Secured WSMs
  8.3 Security Manager
  8.4 Certificate requests
  8.5 Fragmented messages
Annex A (Normative) Protocol Implementation Conformance
        Statement (PICS) proforma
      A.1 General
      A.2 Abbreviations and special symbols
      A.3 Instructions for completing the PICS proforma
      A.4 PICS proforma-IEEE Std 1609.2
Annex B (Normative) Summary of message formats
Annex C (Informative) Examples of message structures
      C.1 General
      C.2 CA certificate
      C.3 OBU signing certificate
      C.4 RSU signing and encryption certificate
      C.5 Signed Message
      C.6 SignedWSM
      C.7 Encrypted Message
Annex D (Informative) General description
      D.1 Introduction
      D.2 WAVE system
      D.3 Communications security overview
Annex E (Informative) Additional Security Considerations
      E.1 OBUs
      E.2 Root Certificates
      E.3 Public safety vehicles
      E.4 RSUs
      E.5 Other Considerations
Annex F (Informative) Threat model
      F.1 Attacker Taxonomy
      F.2 Heartbeat
      F.3 Tolling
      F.4 General Internet Access
      F.5 Roadside E-Commerce
Annex G (Informative) Bandwidth Considerations and
        Opportunities for Optimization
      G.1 Overview
      G.2 Geographic Scope Identifiers
      G.3 Application Identifiers
      G.4 Use of the certificate_digest SignerInfo type
Annex H (Informative) Copyright Statement for Clause 4
Annex I (Informative) Bibliography

Describes secure message formats, and the processing of those secure messages, within the DSRC/WAVE system. It covers methods for securing WAVE management messages and application messages, with the exception of vehicle-originating safety messages. It also describes administrative functions necessary to support the core security functions.

DocumentType
Draft
Pages
106
PublisherName
Institute of Electrical & Electronics Engineers
Status
Superseded
SupersededBy

FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
FIPS PUB 180 : 2002 SECURE HASH STANDARD

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.