Workshop #2 · 2011-09-27 · Communications View 4.4.4 – Core Routing Mobile DSRC Device DSRC...
Transcript of Workshop #2 · 2011-09-27 · Communications View 4.4.4 – Core Routing Mobile DSRC Device DSRC...
1 U.S. Department of Transportation Research and Innovative Technology Administration 1
Workshop #2
connected vehicle Core System Architecture/Requirements
September 20-22, 2011 San Jose, CA
Day 3
Systems Engineering Team
2 U.S. Department of Transportation Research and Innovative Technology Administration
Welcome to Day 3
3 U.S. Department of Transportation Research and Innovative Technology Administration
Agenda – Thursday 9/22
9:00 Welcome & Recap 9:30 Architecture, Communications Views
Discussion 10:15 Break 10:30 Architecture, Information Viewpoint Discussion 11:00 Core System Deployment Options 11:45 Lunch 1:00 Core System Risks (Barriers to Deployment) 1:45 Next Steps 2:30 Adjourn
4 U.S. Department of Transportation Research and Innovative Technology Administration
Core System provides services that… Enable data transfers between System Users □ Mobile □ Field □ Center Are in a secure, trusted environment □ Enabling trust between parties that have no direct
relationship □ Enabling secure data exchange between parties
that have no direct relationship □ Enabling the exchange of data between parties
that have data and parties that want data
5 U.S. Department of Transportation Research and Innovative Technology Administration
Core System in the context of the connected vehicle environment
Radio/Satellite Sources
Legend
Communications to/through Core
Communications enabled by Core
Communications independent of Core
Broadcast Communications
independent of Core
Center
Field
Mobile
External Support Systems
Core System
6 U.S. Department of Transportation Research and Innovative Technology Administration
Core System’s 8 Subsystems
Core System
Misbehavior Management
Network Services
Data Distribution
User Trust Management
User Permissions
Service Monitor
Core2Core
Time Sync
Center Users
Operators
Other Cores
Field Users
Mobile Users
External Support Systems
7 U.S. Department of Transportation Research and Innovative Technology Administration
Views that will describe the layered communications protocols
8 U.S. Department of Transportation Research and Innovative Technology Administration
Layered communications protocols between nodes Links are
traceable to interface requirements
Communications Communications Viewpoint
Protocol entities
Node
Link between nodes
Logical link between protocol entities
Software engineering object
Internet Protocols
DSRC Device
Service Router
9 U.S. Department of Transportation Research and Innovative Technology Administration
Mobile DSRC Device and Core Mobile Wide-Area Wireless User and Core Fixed Point Center/Field User and Core,
Core2Core Core Routing
Communications Views Defined Communications Viewpoint
10 U.S. Department of Transportation Research and Innovative Technology Administration
Communications View 4.4.1 – Mobile DSRC Device and Core
Description: □ 1st of 2 views showing how Mobile Users
can communicate with the Core □ Shows the intermediary steps to go from
Mobile to Core □ Based on 5.9 GHz DSRC using IEEE
1609.x, 802.11p standards
11 U.S. Department of Transportation Research and Innovative Technology Administration
Communications View 4.4.1 – Mobile DSRC Device and Core
□ Performance □ Interfaces □ Functionality □ Security □ Organization/
Resources □ Appropriateness
□ Feasibility □ Risks □ Evolvability □ Deployability
Considerations/Concerns Addressed:
12 U.S. Department of Transportation Research and Innovative Technology Administration
Communications View 4.4.1 – Mobile DSRC Device and Core
Mobile DSRC Device Core Access NodeDSRC Field Node
Wireless Medium
Local Area NetworkWide-Area
Network
Low Level WAN
Internet Protocols
Internet Protocols
Local Area Network
Local Area Network
Low Level LAN
Internet Protocols
IEEE 802.2IEEE 1609.4IEEE 802.11p
Internet Protocols
Application Mobile Component
IEEE 1609.3
Session Layer
Security
IEEE 802.2IEEE 1609.4
IEEE 802.11p
Application Field Component
Session Layer
Security Intrusion Detection
Session Layer
Security
Service Component Node
Low Level WAN
Intru
sion
-Pre
vent
ion
Core Decryptor
IEE
E 1
609.
2 Internet Protocols
IEEE 1609.3 IE
EE
160
9.2
Service Router
Acc
ess-
Hea
lth-P
erf A
ccess-Health-P
erf
Conn
Session Layer
Security
Session Layer
Security
Session Layer
Security
Session Layer
Security
System
-Log, Health-M
onitor
Low Level LAN
Internet Protocols
Session Layer
Security
System
-Log, Health-M
onitor
Core SEO
Session Layer
Security
Session Layer
Security
Low Level LAN
Internet Protocols
Low Level LAN
Internet Protocols
Low Level LAN
Internet Protocols
Session Layer
Security
Local AreaNetwork
Service Router
Low Level LAN
Internet Protocols
Session Layer
Security
Session Layer
Security
Low Level LAN
Internet Protocols
System
-Log, Health-M
onitor
Core Decryptor SEOs
13 U.S. Department of Transportation Research and Innovative Technology Administration
Communications View 4.4.1 – Mobile DSRC Device and Core
Mobile DSRC Device Core Access NodeDSRC Field Node
Wireless Medium Wide-Area Network
Low Level WAN
Internet Protocols
Internet Protocols
Low Level LAN
Internet Protocols
IEEE 802.2IEEE 1609.4
IEEE 802.11p
Internet Protocols
Application Mobile Component
IEEE 1609.3
Session Layer
Security
IEEE 802.2IEEE 1609.4IEEE 802.11p
Application Field Component
Session Layer
Security Intrusion Detection
Session Layer
Security
Low Level WAN
Intru
sion
-Pre
vent
ion
IEE
E 1
609.
2 Internet Protocols
IEEE 1609.3 IE
EE
160
9.2
Acc
ess-
Hea
lth-P
erf A
ccess-Health-P
erfConn
Session Layer
Security
Session Layer
Security
Session Layer
Security
Session Layer
Security
Session Layer
Security
Low Level LAN
Internet Protocols
Left Side
14 U.S. Department of Transportation Research and Innovative Technology Administration
Communications View 4.4.1 – Mobile DSRC Device and Core
Right Side
Core Access Node
Local Area Network
Internet Protocols
Local Area Network
Local Area Network
Low Level LAN
Internet Protocols
Session Layer
Security Intrusion Detection
Session Layer
Security
Service Component Node
Low Level WAN
Intru
sion
-Pre
vent
ion
Core DecryptorService Router
Acc
ess-
Hea
lth-P
erf A
ccess-Health-P
erf
Conn
System
-Log, Health-M
onitorLow Level
LAN
Internet Protocols
Session Layer
Security
System
-Log, Health-M
onitor
Core SEO
Session Layer
Security
Session Layer
Security
Low Level LAN
Internet Protocols
Low Level LAN
Internet Protocols
Low Level LAN
Internet Protocols
Session Layer
Security
Local AreaNetwork
Service Router
Low Level LAN
Internet Protocols
Session Layer
Security
Session Layer
Security
Low Level LAN
Internet Protocols
System
-Log, Health-M
onitor
Core Decryptor SEOs
15 U.S. Department of Transportation Research and Innovative Technology Administration
Enterprise Views □ Business Model Functional Views □ Core Decryption Connectivity Views □ High Level □ Core System
Functional Allocation Communications Views
□ Mobile Wide-Area Wireless User and Core
□ Fixed Point Center/Field User and Core, Core2Core
□ Core Routing
Communications View 4.4.1 – Mobile DSRC Device and Core Related Views:
16 U.S. Department of Transportation Research and Innovative Technology Administration
Communications View 4.4.2 – Mobile Wide-Area Wireless User and Core
Description: □ 2nd of 2 views showing how Mobile Users
can communicate with the Core □ Shows the intermediary steps to go from
Mobile to Core □ Based on WiFi, cellular, other wireless
communications
17 U.S. Department of Transportation Research and Innovative Technology Administration
Communications View 4.4.2 – Mobile Wide-Area Wireless User and Core
□ Performance □ Interfaces □ Functionality □ Security □ Organization/
Resources □ Appropriateness
□ Feasibility □ Risks □ Evolvability □ Deployability
Considerations/Concerns Addressed:
18 U.S. Department of Transportation Research and Innovative Technology Administration
Communications View 4.4.2 – Mobile Wide-Area Wireless User and Core
Application Mobile
Component
Wireless Medium Wide-Area Network
Low Level WAN
Session Layer
Security
Wide-Area Wireless Field Node
Mobile Wide-Area Wireless Device
Data Link / Physical
Internet Protocols
Data Link / Physical
Internet Protocols
Session Layer
Security
Internet Protocols
Session Layer
Security
Core Access Node
Local Area Network
Internet Protocols
Local Area Network
Local Area Network
Low Level LAN
Internet Protocols
Session Layer
Security Intrusion Detection
Session Layer
Security
Service Component Node
Low Level WAN
Intru
sion
-Pre
vent
ion
Core DecryptorService Router
Acc
ess-
Hea
lth-P
erf A
ccess-Health-P
erf
Conn
System
-Log, Health-M
onitor
Low Level LAN
Internet Protocols
Session Layer
Security
System
-Log, Health-M
onitorCore SEO
Session Layer
Security
Session Layer
Security
Low Level LAN
Internet Protocols
Low Level LAN
Internet Protocols
Low Level LAN
Internet Protocols
Session Layer
Security
Local AreaNetwork
Service Router
Low Level LAN
Internet Protocols
Session Layer
Security
Session Layer
Security
Low Level LAN
Internet Protocols
System
-Log, Health-M
onitor
Core Decryptor SEOs
19 U.S. Department of Transportation Research and Innovative Technology Administration
Communications View 4.4.2 – Mobile Wide-Area Wireless User and Core
Left Side
Application Mobile
Component
Wireless Medium Wide-Area Network
Low Level WAN
Session Layer
Security
Wide-Area Wireless Field Node
Mobile Wide-Area Wireless Device
Data Link / Physical
Internet Protocols
Data Link / Physical
Internet Protocols
Session Layer
Security
Internet Protocols
Session Layer
Security
Core Access Node
Internet Protocols
Low Level LAN
Internet Protocols
Session Layer
Security Intrusion Detection
Session Layer
Security
Low Level WAN
Intru
sion
-Pre
vent
ion
Acc
ess-
Hea
lth-P
erf A
ccess-Health-P
erf
Conn
Session Layer
Security
Low Level LAN
Internet Protocols
Right Side is same as DSRC view
20 U.S. Department of Transportation Research and Innovative Technology Administration
Enterprise Views □ Business Model Functional Views □ Core Decryption Connectivity Views □ High Level □ Core System
Functional Allocation Communications Views
□ Mobile DSRC User and Core
□ Fixed Point Center/Field User and Core, Core2Core
□ Core Routing
Communications View 4.4.2 – Mobile Wide-Area Wireless User and Core Related Views:
21 U.S. Department of Transportation Research and Innovative Technology Administration
Communications View 4.4.3 – Fixed Point Center/Field User and Core, Core2Core
Description: □ Shows how non-mobile systems (Field,
Center, External Support Systems, and other Cores) communicate with the Core
□ Wired connections through the Internet or private networks
□ May use wireless (see 4.4.2) □ Uses IP protocols
22 U.S. Department of Transportation Research and Innovative Technology Administration
Communications View 4.4.3 – Fixed Point Center/Field User and Core, Core2Core
□ Performance □ Interfaces □ Functionality □ Security □ Organization/
Resources □ Appropriateness
□ Feasibility □ Risks □ Evolvability □ Deployability
Considerations/Concerns Addressed:
23 U.S. Department of Transportation Research and Innovative Technology Administration
Communications View 4.4.3 – Fixed Point Center/Field User and Core, Core2Core
Fixed Device
Low Level WAN
Internet Protocols
Wide-Area Network
Session Layer
Security
Application Fixed
Component
Core Access Node
Local Area Network
Local Area Network
Local Area Network
Low Level LAN
Internet Protocols
Intrusion Detection
Session Layer
Security
Service Component NodeIn
trusi
on-P
reve
ntio
nCore DecryptorService Router
Acc
ess-
Hea
lth-P
erf A
ccess-Health-P
erf
Conn
System
-Log, Health-M
onitorLow Level
LAN
Internet Protocols
Session Layer
Security
System
-Log, Health-M
onitor
Core SEO
Session Layer
Security
Session Layer
Security
Low Level LAN
Internet Protocols
Low Level LAN
Internet Protocols
Low Level LAN
Internet Protocols
Session Layer
Security
Local AreaNetwork
Service Router
Low Level LAN
Internet Protocols
Session Layer
Security
Session Layer
Security
Low Level LAN
Internet Protocols
System
-Log, Health-M
onitor
Core Decryptor SEOs
Internet Protocols
Session Layer
Security
Low Level WAN
24 U.S. Department of Transportation Research and Innovative Technology Administration
Enterprise Views □ Business Model Functional Views □ Core Decryption Connectivity Views □ High Level □ Core System
Functional Allocation Communications Views
□ Mobile DSRC User and Core
□ Mobile Wide-Area Wireless User and Core
□ Core Routing
Communications View 4.4.4 – Core Routing Related Views:
25 U.S. Department of Transportation Research and Innovative Technology Administration
Communications View 4.4.4 – Core Routing
Description: □ Shows the communications involved when
the Core is used as a router when a private network is used to connect mobile, field, or center systems
□ Fixed devices connected to the Core by a private network can use the Core Access Node to provide connectivity between them
□ Could also provide connectivity for mobile users to a Center user
26 U.S. Department of Transportation Research and Innovative Technology Administration
Communications View 4.4.4 – Core Routing
□ Performance □ Interfaces □ Functionality □ Security □ Organization/
Resources □ Appropriateness
□ Feasibility □ Risks □ Evolvability □ Deployability
Considerations/Concerns Addressed:
27 U.S. Department of Transportation Research and Innovative Technology Administration
Communications View 4.4.4 – Core Routing
Mobile DSRC Device DSRC Field Node
Wireless Medium
Wide-Area NetworkPrivate Wide-Area Network
Low Level WAN
Internet Protocols
Internet Protocols
IEEE 802.2IEEE 1609.4IEEE 802.11p
Internet Protocols
Application Mobile Component
IEEE 1609.3
Session Layer
Security
IEEE 802.2IEEE 1609.4IEEE 802.11p
Application Field Component
Session Layer
Security
Low Level WAN
Intru
sion
-Pre
vent
ion
IEE
E 1
609.
2 Internet Protocols
IEEE 1609.3 IE
EE
160
9.2
Acc
ess-
Hea
lth-P
erf
Conn
Session Layer
Security
Session Layer
Security
Session Layer
Security
Session Layer
Security
Core Access Node
Low Level WAN
Internet Protocols
Session Layer
Security
Application Fixed
Component
Session Layer
Security
Low Level WAN
Internet Protocols
Fixed Device
Figure 4-25: Communications View – DSRC Mobile over Private Network
28 U.S. Department of Transportation Research and Innovative Technology Administration
Communications View 4.4.4 – Core Routing
Application Mobile
Component
Wireless Medium Private Wide-Area Network
Session Layer
Security
Wide-Area Wireless Field Node
Mobile Wide-Area Wireless Device
Data Link / Physical
Internet Protocols
Data Link / Physical
Internet Protocols
Session Layer
Security
Wide-Area Network
Intru
sion
-Pre
vent
ion
Acc
ess-
Hea
lth-P
erf
Conn
Core Access Node
Low Level WAN
Internet Protocols
Session Layer
Security
Application Fixed
Component
Session Layer
Security
Low Level WAN
Internet Protocols
Internet Protocols
Session Layer
Security
Low Level WAN
Low Level WAN
Internet Protocols
Session Layer
Security
Fixed Device
Figure 4-26: Communications View – Wide-Area Mobile over Private Network
29 U.S. Department of Transportation Research and Innovative Technology Administration
Communications View 4.4.4 – Core Routing
Fixed Device
Low Level WAN
Internet Protocols
Private Wide-Area Network
Session Layer
Security
Application Fixed
Component
Wide-Area Network
Intru
sion
-Pre
vent
ion
Acc
ess-
Hea
lth-P
erf
Conn
Core Access Node
Low Level WAN
Internet Protocols
Session Layer
Security
Application Fixed
Component
Session Layer
Security
Low Level WAN
Internet Protocols
Internet Protocols
Session Layer
Security
Low Level WAN
Fixed Device
Figure 4-27: Communications View – Fixed Device over Private Network
30 U.S. Department of Transportation Research and Innovative Technology Administration
Enterprise Views □ Business Model Functional Views □ Core Decryption □ Networking Connectivity Views □ High Level □ Core System
Functional Allocation
Communications Views □ Mobile DSRC User
and Core □ Mobile Wide-Area
Wireless User and Core
□ Fixed Point Center/Field User and Core, Core2Core
Communications View 4.4.4 – Core Routing Related Views:
31 U.S. Department of Transportation Research and Innovative Technology Administration
Views that will describe the data object structures and relationships
32 U.S. Department of Transportation Research and Innovative Technology Administration
Defines the Data objects: structure, relationships, metadata, and constraints Related to interface requirements,
referenced by the functional requirements
Information Information Viewpoint
Information Objects
“part-of” relationship
“aggregation” relationship
“Transformation” relationship
User Identification
33 U.S. Department of Transportation Research and Innovative Technology Administration
Top Level External Objects Top Level Internal Objects
Information Views Defined Information Viewpoint
34 U.S. Department of Transportation Research and Innovative Technology Administration
Information View 4.5.1 – Top Level External Objects
Description: □ Objects that are exchanged, sent, and
received over the Core System’s external interfaces
□ Includes objects between Cores □ Organized by the originating or
terminating subsystem □ External interfaces are candidates for
standardization
35 U.S. Department of Transportation Research and Innovative Technology Administration
Information View 4.5.1 – Top Level External Objects
□ Security □ Interfaces □ Appropriateness
Considerations/Concerns Addressed:
36 U.S. Department of Transportation Research and Innovative Technology Administration
Information View 4.5.1 – Top Level External Objects
External Objects
Network Services Objects
Data In
Data Out
User Permissions
ObjectsUser Identity and
Permission RequestApplication
Permission RequestService Status Query
Service Monitor Objects
Service Status
Performance Records
System User Status Registration
Misbehavior Management
Objects
System User Misbehavior
Report
Time Sync Objects
Time
Core2Core Objects
C2C Misbehavior Report
C2C Misbehavior Report
Core Service Status Query
Service Status for Cores
Core Service Status Query
Service Status for Cores
Core Status Registration
Other Core Takeover Request
Other Core Takeover Request
CRL Deltas
CRL Deltas
Complete CRL
Core Configuration Info
Complete CRL
Core Conflict Info
Core Conflict Info
Core Configuration Info
Restore Data
Backup Data
Data Request
Data Backup Request
Restore Data
Data Request
Backup Data
Data Backup Request
CRL
X.509 Certificate
X.509 CRL
Ext X.509 Cert Request
Credential Request
Credentials
Trust Management
Objects
Credential Referral
Misbehaving User ID
External CRL
CRL Request
User Identification
User Special Permissions
Data Distribution
Objects
Data Subscription Request
Data Provision Request
Data Acceptance Info
Other Core Acceptance Info
Field Node Configuration Information
Repackaged, Addressed Data
Provided Data
Direct Data Distribution Info
Geo-cast Message
Data Subscription Confirmation Info
Data Subscription Redirect Info
Core Status Registration
37 U.S. Department of Transportation Research and Innovative Technology Administration
Functional Views □ Top Level □ Data Distribution □ System Configuration □ User Configuration □ System Monitor and
Control □ Credentials
Distribution
□ Misbehavior Management
□ Core Decryption □ Networking □ Core Backup Information Views □ Top Level Internal
Objects
Information View 4.5.1 – Top Level External Objects Related Views:
38 U.S. Department of Transportation Research and Innovative Technology Administration
Information View 4.5.2 – Top Level Internal Objects
Description: □ Objects that are exchanged, accepted,
and sent between subsystems over the Core System’s internal interfaces
□ Organized by the originating or terminating subsystem
39 U.S. Department of Transportation Research and Innovative Technology Administration
Information View 4.5.2 – Top Level Internal Objects
□ Security □ Interfaces □ Appropriateness
Considerations/Concerns Addressed:
40 U.S. Department of Transportation Research and Innovative Technology Administration
Information View 4.5.2 – Top Level Internal Objects
Time Local Form
Permission
Core Status Registration
Locally Encrypted Message
Service Control Node Performance
Restore Data
Service Monitor Objects
Time Sync Objects
Permission
Locally Encrypted Message
Restore Data
Permission
Locally Encrypted Message
Restore Data
Network Services Objects
Time Local Form
Permission
Time Local Form
Geo-cast Info Changes
Locally Encrypted Message
Restore Data
Data Distribution
Objects
Misbehavior Management
Objects
Suspicious Data
Suspicious Geo-Cast
Time Local Form
Permission
SUID, function permission
Scope
Operator Permission
System User Permission
Internal Misbehavior Report
Decryption Error Message
Authenticity Error Message
Locally Encrypted Message
Intrusion Alert
Restore Data
User Permissions
Objects
Provider ID, function
Operator ID, function
Time Local Form
Operator ID, function
Operator ID, function
Operator ID, function
Operator ID, function
Operator ID, function
Operator ID, function
Operator ID, function
Core ID, function
System User ID, function
Operator ID, function
Operator ID Revoke function
System User ID, Revoke function
Certificate Owner ID
Permission Change Request
Cert Owner, App
User ID, Apps
Locally Encrypted Message
Restore Data
Trust Management
Objects
Time Local Form
Permission
CRL Deltas
Complete CRL
Misbehaving User ID
Cert Permission
App Permissions
Special App Permissions
User Apps
Remotely Encrypted Message
Remotely Encrypted Message
Remotely Encrypted Message
Remotely Encrypted Message
Remotely Encrypted Message
Remotely Encrypted Message
Remotely Encrypted Message
Restore Data
Core2Core Objects
Time Local Form
Core Distribution List
Detailed Service Status
Permission
Config Info for Other Cores
Core Config Info
Config Info for Other Cores
Core Config Info
Config Info for Other Cores
Core Config Info
Config Info for Other Cores
Core Config Info
Config Info for Other Cores
Core Config Info
Config Info for Other Cores
Core Config Info
Config Info for Other Cores
Core Config Info
CRL Deltas
Complete CRL
Locally Encrypted Message
Detailed Service Status
Data to be Backed Up
Data to be Backed Up
Data to be Backed Up
Data to be Backed Up
Data to be Backed Up
Data to be Backed Up
Data to be Backed Up
41 U.S. Department of Transportation Research and Innovative Technology Administration
Functional Views □ Top Level □ Data Distribution □ System Configuration □ User Configuration □ System Monitor and
Control □ Credentials
Distribution
□ Misbehavior Management
□ Core Decryption □ Networking □ Core Backup Information Views □ Top Level External
Objects
Information View 4.5.2 – Top Level Internal Objects Related Views:
42 U.S. Department of Transportation Research and Innovative Technology Administration
How will the Core be ‘rolled-out’
43 U.S. Department of Transportation Research and Innovative Technology Administration
Core System Deployment
Recall from Day 1’s background of the Core System □ Core System Needed ▪ Support diverse implementations ▪ Extensible, scalable over time
□ Support Diverse deployments ▪ Standalone ▪Collocated ▪Distributed
44 U.S. Department of Transportation Research and Innovative Technology Administration
Core System Deployment
Core System Architecture supports those goals: □ Enterprise Objects like Core Certification
Authority □ Interfaces like Core2Core □ Ability to vary how software is assigned to
nodes
45 U.S. Department of Transportation Research and Innovative Technology Administration
Deployment Considerations as multiple Cores are developed and fielded
45
46 U.S. Department of Transportation Research and Innovative Technology Administration
Core #1 provides all services for the area. Some areas provide DSRC communications to Core, resulting in different service delivery profiles.
Single Standalone Core
nG cellular
Core #1 Geographic Coverage Area
DSRC
47 U.S. Department of Transportation Research and Innovative Technology Administration
Core #2 provides all services for the area it covers, all by nG cellular. Core #1 provides
all services for the area it covers, some by nG, some by DSRC. Overlap requires
agreement, and Core #2 provides services in the overlap areas here.
Multi Core – One Dominant
nG cellular
Core #1 Geographic
Coverage Area
DSRC
Core #2 Geographic
Coverage Area
48 U.S. Department of Transportation Research and Innovative Technology Administration
Core #2 provides all services for the area it covers, all by nG, except for the shared area.
Core #1 provides all services for the area it covers, some by nG, some by DSRC.
Overlap requires agreement; Core #1 and Core #2 both provide services. Each service provided by only one Core, except for DSRC users that can get all services from Core #1.
Multi Core – Shared Dominance
nG cellular
Core #1 Geographic
Coverage Area
DSRC
Core #2 Geographic
Coverage Area
Shared Coverage
49 U.S. Department of Transportation Research and Innovative Technology Administration
Core #2 provides all services for the area it covers, all by nG, except for the shared area.
Core #1 provides all services for the area it covers, some by nG, some by DSRC.
Overlap requires agreement; Core #1 and Core #2 both provide services. Overlap area defaults to Core #2, except for DSRC users that go to Core #1. Users can override and access Core #1 with 3G if they wish
Multi Core – Peers
nG cellular
Core #1 Geographic
Coverage Area
DSRC
Core #2 Geographic
Coverage Area
Shared Coverage
50 U.S. Department of Transportation Research and Innovative Technology Administration
Core System Deployment Activities
1st Steps (take care of the higher risk items) □ Setup the Core Certification Authority to
establish: ▪Governance policies ▪Certification standards and procedures ▪ Security credentials (root CA)
□ Establish the External Support Systems (the CAs and RAs)
51 U.S. Department of Transportation Research and Innovative Technology Administration
Core System Deployment Activities
Incorporate Lessons from Test Bed, Safety/Certification Pilots Work with Standards organizations to
incorporate Core System interfaces into industry standards Begin to work with Deployers to establish
operating agreements What else?
52 U.S. Department of Transportation Research and Innovative Technology Administration
Discussion – Likely Deployers
Who is likely to deploy a Core System? □ States □ Locals □ 3rd Party Data Warehouse Providers □ System Integrator □ Auto Industry May affect how relationships are defined by
the Core Certification Authority
53 U.S. Department of Transportation Research and Innovative Technology Administration
Barriers to Deployment
54 U.S. Department of Transportation Research and Innovative Technology Administration
Risk to Success of the Core System
What may happen to prevent the Core System from succeeding – and to some extent, affect the overall connected vehicle environment Types of Risks □ Technically – Core System is
straightforward, using current technologies □ Institutional Issues always take longer □ Programmatic – cost/schedule Levels: individual Core, collectively
55 U.S. Department of Transportation Research and Innovative Technology Administration
Preliminary Risks to Success of the Core System Timely Deployment Relationships between Core Systems and
external Enterprises Role and Makeup of the Core Certification
Authority External Support System (ESS) for Security Operations and Maintenance of the Security
External Support System (ESS) □ More for the connected vehicle environment Security Management Data Provisioning/Ownership
56 U.S. Department of Transportation Research and Innovative Technology Administration
For Core System and related activities
57 U.S. Department of Transportation Research and Innovative Technology Administration
Core System Timeline
FCC allocates 5.9
GHz spectrum for
DSRC VII
Architecture developed based on
Day 1 Use Cases
Prototypes for V2V (safety applications) and V2I (public applications) developed based on
DSRC 5.9 GHz and tested in a POC test bed
New assumptions, new initiatives, new
timelines
SE Program initiated to re-
baseline Stakeholder workshops to
solicit user needs
Re-baselined Core System Concept of
Operations, Requirements, &
Architecture completed
We are here
2004 2010 2005 2009 2008 . . . 2006
User Needs System Requirements
& Architecture Aug/Sep 2010
Oct (draft) Jan (RevA) Apr (RevB/C) May (workshop)
June 2011 (Workshop) Sep (2nd Workshop)
Concept of Operations
58 U.S. Department of Transportation Research and Innovative Technology Administration
Next Steps System Engineering Team will finalize □ ConOps □ Requirements □ Architecture □ Risk □ Standards Recommendations DOT leading other activities where Core
System Contact Walt Fehr – 202-366-0278,
59 U.S. Department of Transportation Research and Innovative Technology Administration
Thank you all for your Time