Intelligent transport systems — Cooperative ITS — Part 4: Minimum system requirements and behaviour for core systems

The scope of ISO/TR 17427-4:2015 is, as an informative document, to identify potential critical minimum system requirements and behaviour for core systems issues that C-ITS service provision may face or introduce, to consider strategies for how to identify, control, limit or mitigate such issues. The objective of this Technical Report is to raise awareness of and consideration of such issues and to give pointers, where appropriate, to subject areas and, where available, to existing standards deliverables that provide specifications for all or some of these aspects. This Technical Report does not provide specifications for solutions of these issues.

Systèmes intelligents de transport — Systèmes intelligents de transport coopératifs — Partie 4: Exigences minimales du système et comportement des systèmes principaux

General Information

Status
Published
Publication Date
21-Oct-2015
Current Stage
6060 - International Standard published
Start Date
22-Oct-2015
Completion Date
13-Dec-2025
Ref Project

Relations

Technical report
ISO/TR 17427-4:2015 - Intelligent transport systems -- Cooperative ITS
English language
41 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)


TECHNICAL ISO/TR
REPORT 17427-4
First edition
2015-11-01
Intelligent transport systems —
Cooperative ITS —
Part 4:
Minimum system requirements and
behaviour for core systems
Systèmes intelligents de transport — Systèmes intelligents de
transport coopératifs —
Partie 4: Exigences minimales du système et comportement des
systèmes principaux
Reference number
©
ISO 2015
© ISO 2015, Published in Switzerland
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Ch. de Blandonnet 8 • CP 401
CH-1214 Vernier, Geneva, Switzerland
Tel. +41 22 749 01 11
Fax +41 22 749 09 47
copyright@iso.org
www.iso.org
ii © ISO 2015 – All rights reserved

Contents Page
Foreword .iv
Introduction .vi
1 Scope . 1
2 Terms and definitions . 1
3 Abbreviated terms . 5
4 How to use this Technical Report . 7
4.1 Acknowledgements . 7
4.2 Guidance . 7
4.3 Stakeholders . 7
5 C-ITS and ‘minimum system requirements and behaviour for core systems’ .8
5.1 Overview . 8
5.2 Subsystem features of the ‘Core System’ .11
5.2.1 Core2Core subsystem .11
5.2.2 Data distribution subsystem .12
5.2.3 Misbehaviour management subsystem.13
5.2.4 Network services subsystem .13
5.2.5 System service monitor subsystem .13
5.2.6 Time synchronization subsystem .14
5.2.7 User permissions subsystem .14
5.2.8 User trust management subsystem .14
6 What are the key minimum system requirements and behaviour for core systems issues 15
6.1 Core system requirements .15
6.2 Core System subsystem functional requirements .19
6.2.1 Core to Core subsystem requirements .19
6.2.2 Data distribution subsystem requirements .23
6.2.3 Data provision request .24
6.2.4 Geo-casts .24
6.2.5 Field node configuration .24
6.2.6 Misbehaviour subsystem requirements .25
6.2.7 Networking services subsystem requirements .25
6.2.8 Network protocol .26
6.2.9 System service monitoring subsystem requirements.26
6.2.10 Time synchronization subsystem requirements .27
6.2.11 State/Mode/Status requirements .28
6.2.12 External interface requirements .28
6.2.13 User permission subsystem requirements .28
6.2.14 User trust management requirements .29
6.2.15 System performance subsystem requirements .31
6.2.16 System interface subsystem requirements .31
6.3 Core system - other requirements .31
6.3.1 Physical security .31
6.3.2 Environmental features .31
6.3.3 Backup power .32
6.3.4 Maintainability .32
6.3.5 Constraints .32
7 Internet-based communications standards .32
8 Internal interfaces .39
9 5,9 GHz security credential requirements .40
Bibliography .41
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation on the meaning of ISO specific terms and expressions related to conformity
assessment, as well as information about ISO’s adherence to the WTO principles in the Technical
Barriers to Trade (TBT) see the following URL: Foreword - Supplementary information
The committee responsible for this document is ISO/TC 204, Intelligent transport systems.
ISO 17427 consists of the following parts, under the general title Intelligent transport systems —
Cooperative ITS:
— Part 2: Framework Overview [Technical Report]
— Part 3: Concept of operations (ConOps) for ‘core’ systems [Technical Report]
— Part 4: Minimum system requirements and behaviour for core systems [Technical Report]
— Part 6: ‘Core system’ risk assessment methodology [Technical Report]
— Part 7: Privacy aspects [Technical Report]
— Part 8: Liability aspects [Technical Report]
— Part 9: Compliance and enforcement aspects [Technical Report]
— Part 10: Driver distraction and information display [Technical Report]
The following parts are under preparation:
— Part 1: Roles and responsibilities in the context of co-operative ITS architecture(s)
— Part 5: Common approaches to security [Technical Report]
— Part 11: Compliance and enforcement aspects [Technical Report]
— Part 12: Release processes [Technical Report]
— Part 13: Use case test cases [Technical Report]
— Part 14: Maintenance requirements and processes [Technical Report]
iv © ISO 2015 – All rights reserved

This Technical Report provides an informative ‘minimum system requirements and behaviour for
core systems’ for Cooperative Intelligent Transport Systems (C-ITS). It is intended to be used alongside
ISO 17427-1, ISO/TR 17465-1 and other parts of ISO 17465, and ISO 21217. Detailed specifications for
the application context will be provided by other ISO, CEN and SAE deliverables, and communications
specifications will be provided by ISO, IEEE and ETSI.
Introduction
Intelligent transport systems (ITS) are transport systems in which advanced information, communication,
sensor and control technologies, including the Internet, are applied to increase safety, sustainability,
efficiency, and comfort.
A distinguishing feature of ‘ITS’ is its communication with outside entities.
Some ITS systems operate autonomously, for example, ‘adaptive cruise control’ uses radar/lidar and/or
video to characterize the behaviour of the vehicle in front and adjust its vehicle speed accordingly. Some
ITS systems are informative, for example, ‘variable message signs’ at the roadside or transmitted into
the vehicle, provide information and advice to the driver. Some ITS systems are semi-autonomous in
that they are largely autonomous but rely on ‘static’ or ‘broadcast’ data, for example, GNSS (2.22) based
‘SatNav’ systems operate autonomously within a vehicle but are dependent on receiving data broadcast
from satellites in order to calculate the location of the vehicle.
Cooperative Intelligent transport systems (C-ITS) are a group of ITS technologies where service provision
is enabled by, or enhanced by, the use of ‘live’, present situation related, dynamic data/information from
other entities of similar functionality [for example, from one vehicle to other vehicle(s)], and/or between
different elements of the transport network, including vehicles and infrastructure [for example,
from the vehicle to an infrastructure managed system or from an infrastructure managed system to
vehicle(s)]. Effectively, these systems allow vehicles to ‘talk’ to each other and to the infrastructure.
These systems have significant potential to improve the transport network.
A distinguishing feature of ‘C-ITS’ is that data is used across application/service boundaries.
This Technical Report is a ‘living document’ and as our experience with C-ITS develops, it is intended that
it will be updated from time to time, as and when we see opportunities to improve this Technical Report.
vi © ISO 2015 – All rights reserved

TECHNICAL REPORT ISO/TR 17427-4:2015(E)
Intelligent transport systems — Cooperative ITS —
Part 4:
Minimum system requirements and behaviour for core
systems
1 Scope
The scope of this Technical Report is, as an informative document, to identify potential critical
minimum system requirements and behaviour for core systems issues that C-ITS service provision may
face or introduce, to consider strategies for how to identify, control, limit or mitigate such issues. The
objective of this Technical Report is to raise awareness of and consideration of such issues and to give
pointers, where appropriate, to subject areas and, where available, to existing standards deliverables
that provide specifications for all or some of these aspects. This Technical Report does not provide
specifications for solutions of these issues.
2 Terms and definitions
2.1
anonymity
lacking individuality, distinction, and recognizability within message exchanges
2.2
anonymous certificates
certificate which contains a pseudonym of the system user instead of their real identity in the subject
of the certificate and thus preventing other system service recipients from identifying the certificate
owner when the certificate is used to sign or encrypt a message in the connected vehicle/highway
system (C-ITS, connected vehicle)
Note 1 to entry: The real identity of the anonymous certificates can be traced by authorized system operators by
using the services of a registration authority and/or certification authority.
2.3
application
‘app’
software application
2.4
application service
service provided, for example, by a service provider accessing data from the IVS within the vehicle
in the case of C-ITS, via a wireless communications network, or provided on-board the vehicle as the
result of software (and potentially also hardware and firmware) installed by a service provider or to a
service provider’s instruction
2.5
authenticity
property of being of undisputed origin and not a copy, authenticated, and having the origin supported
by unquestionable evidence
Note 1 to entry: Something that has had its authenticity confirmed could be described as “authenticated” or
“verified”.
2.6
authorization
process of determining what types of activities or access are permitted on a network
Note 1 to entry: This is usually used in the context of authentication: once you have authenticated a user, they
may be authorized to have access to a specific service.
2.7
bad actor
role played by a user or another system that provides false or misleading data, operates in such a fashion
as to impede other service recipients, and/or operates outside of its authorized scope
2.8
C-ITS
Cooperative ITS
group of ITS technologies where service provision is enabled, or enhanced by, the use of ‘live’, present
situation related, data/information from other entities of similar functionality [(for example, from one
vehicle to other vehicle(s)], and/or between different elements of the transport network, including
vehicles and infrastructure (for example from the vehicle to an infrastructure managed system or from
an infrastructure managed system to vehicle(s)
2.9
catalogue
repository used by the ‘Data Distribution subsystem’ for maintaining data publishers information
including the type of data they are transmitting, frequency of that data, address, data source, etc.
2.10
centre
entity that provides application, management, administrative, and support functions from a fixed
location (the terms “back office” and “centre” are used interchangeably)
Note 1 to entry: Centre is, traditionally, a transportation-focused term, evoking management centres to support
transportation needs, while back office generally refers to commercial applications; from the perspective of this
Technical Report, these are considered the same.
2.11
core services
set of functions within the ‘Core System’ subsystems that interact with system service recipients
2.12
core system personnel
staff that operate and maintain the ‘Core System’
Note 1 to entry: In addition to network managers and operations personnel, ‘Core System’ personnel includes the
administrators, operators, maintainers, developers, deployers and testers.
2.13
coverage area
geographic jurisdiction within which a ‘Core System’ provides core services (2.11)
2.14
data provision
act of providing data to a core system
2.15
delta
updates
records
data that is new since the last block of data that was downloaded
2 © ISO 2015 – All rights reserved

2.16
digital certificate
electronic “identification card” that establishes user credentials when doing business or other transactions
Note 1 to entry: This is issued by a certification authority: contains name, a serial number, expiration dates, a
copy of the certificate holder’s public key (2.40) (used for encrypting messages and digital signatures), and the
digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real.
Note 2 to entry: From the SysAdmin, Audit, Network, Security Institute - www.sans.org
2.17
environment
circumstances, objects, and conditions that surround a system to be built
Note 1 to entry: It includes technical, political, commercial, cultural, organizational, and physical influences, as
well as standards and policies that govern what a system shall do or how it will do it.
2.18
error message
message that indicates issues with cross-jurisdictional compatibility, scope coverage service or
service availability
2.19
facility
building or group of buildings with access restrictions housing a ‘Core System’
2.20
functionality
capabilities of the various computational, user interfaces, input, output, data management, and other
features provided by a product
2.21
geo-cast
delivery of a message to a group of network destinations identified by their geographic locations
2.22
global navigation satellite system
GNSS
comprises several networks of satellites that transmit radio signals containing time and distance data
that can be picked up by a receiver, allowing the user to identify the location of its receiver anywhere
around the globe
EXAMPLE GPS, GLONASS, Galileo.
2.23
integrity
internal consistency or lack of corruption in electronic data
EXAMPLE A system that is secure, complete and conforming to an acceptable conduct without being
vulnerable and corruptible.
2.24
intelligent transport systems
ITS
transport systems in which advanced information, communication, sensor and control technologies,
including the Internet, are applied to increase safety, sustainability, efficiency, and comfort
2.25
link
locus of relations among nodes
Note 1 to entry: It provides interconnections between nodes for communication and coordination; may be
implemented by a wired connection or with some radio frequency (RF) or optical communications media; links
implement the primary function of transporting data; links connect to nodes at a port (2.38).
2.26
maintainability
keep in an existing operational state preserved from failure or decline of services (with minimum
repair, efficiency, or validity)
2.27
misbehaviour
act of providing false or misleading data, operating in such a fashion as to impede other service
recipients, or to operate outside of their authorized scope
Note 1 to entry: This includes suspicious behaviour as in wrong message types or frequencies, invalid logins and
unauthorized access, or incorrect signed or encrypted messages, etc., either purposeful or unintended.
2.28
misbehaviour information
misbehaviour (2.27) reports from system service recipients, as well as other improper system user acts,
such as sending wrong message types, invalid logins, unauthorized access, incorrectly signed messages
and other inappropriate system user behaviour
2.29
misbehaviour report
information from a system user identifying suspicious behaviour from another system user that can be
characterized as misbehaviour (2.27)
2.30
mobile
vehicle types (private/personal, trucks, transit, emergency, commercial, maintenance, and construction
vehicles) as well as non-vehicle-based platforms including portable personal devices (smartphones,
PDAs, tablets, etc.) used by travellers (vehicle operators, passengers, cyclists, pedestrians, etc.) to
provide and receive transportation information
2.31
mode
phase within a state (degraded mode occurs automatically due to certain conditions), such as, when
in operational state (2.33), there is an automatic transition to degraded mode because of a detected
hardware failure
Note 1 to entry: Modes are normal, degraded, restricted and degraded/restricted.
2.32
node
physical hardware engineering object that is a run-time computational resource and generally has at
least memory and processing capability
Note 1 to entry: Run-time software engineering objects reside on nodes; node has some well-understood, possibly
rapidly moving, location [a node may be composed of two or more (sub) nodes].
2.33
operational state
all activities during the normal conduct of operations and also needs to be able to handle support for
services from other ‘Cores Systems’ including fail-over and/or degraded services
4 © ISO 2015 – All rights reserved

2.34
operator
day-to-day providers of the ‘Core System’ that monitor the health of the system components, adjust
parameters to improve performance, and collect and report statistics of the overall system
2.35
parsing
analysing (a string, text or data) into logical syntactic components
2.36
permission
authorization (2.6) granted to do something (to the ‘Core System’), permissions are granted to system
service recipients and operators (2.34) determining what actions they are allowed to take when
interacting with the ‘Core System’
2.37
physical security
safeguards to deny access to unauthorized personnel (including attackers or even accidental intruders)
from physically accessing a building, facility (2.19), resource, or stored information (this can include
simply a locked door, badge access controls, or armed security guards)
2.38
port
physical element of a node (2.32) where a link (2.25) is connected; nodes may have one or more ports;each
port may connect to one or more physical ports on (sub) nodes that are contained within the node
2.39
private network
network belonging to a person, company or organization that uses a public network (usually the
Internet) to connect its remote sites or service recipients together
2.40
public key
cryptographic key that can be obtained and used by anyone to encrypt messages intended for a
particular recipient, such that the encrypted messages can be deciphered only by using a second key
that is known only to the recipient (the private key)
2.41
registry
repository for maintaining data requester’s information including the type of data they are subscribing
to, their address, etc.
2.42
states
distinct system setting in which the same user input will produce different results than it would in
other settings
Note 1 to entry: The ‘Core System’ as a whole is always in one state [a state is typically commanded or placed in
that state by an operator (2.34); states are installation, operational, maintenance, training, and standby].
3 Abbreviated terms
C-ITS cooperative intelligent transport systems, cooperative ITS
ITS intelligent transport systems (2.24)
IVS in-vehicle system (2.6)
TR technical report
ANSI American National Standards Institute
CA certification authority
CALM Communications Access for Land Mobile Standards
CAMP Crash Avoidance Metrics Partnership
ConOps concept of operations
CRL certification revocation lists
CVIS Cooperative Vehicle Infrastructure System (Project)
DNS domain name system
EC European Commission
ESS external support system
ETSI European Telecommunications Standards Institute
FCC Federal Communications Commission
GHz gigahertz
IEEE Institute for Electrical and Electronics Engineers
IETF Internet Engineering Task Force
IP Internet protocol
LTE long term evolution
NIST National Institute of Standards and Technology
PKI public key infrastructure
PKIX public key infrastructure based on X.509 certificates
RA registration authority
RFC request for comments
RITA Research and Innovative Technology Administration
RSE roadside equipment
SAP service access point
SyRS system requirements specification
USDOT US Department of Transportation
UTC coordinated universal time
VII vehicle infrastructure integration
6 © ISO 2015 – All rights reserved

4 How to use this Technical Report
4.1 Acknowledgements
Inspiration for the technical content identification and consideration of this Technical Report has been
largely obtained from various documents generated and publicized by US DoT RITA, especially “‘Core
System’ Requirements Specification (SyRS)”.
Conceptual input from the EC project CVIS is also acknowledged.
Contribution from the Australian National Transport Commission, Cooperative Intelligent Transport
Systems Policy Paper (A Report prepared by: National Transport Commission) ISBN: 978-1-921604-47-
8) is also acknowledged.
See Bibliography for further details of contributions.
4.2 Guidance
This Technical Report is designed to provide guidance and a direction for considering the issues
concerning minimum system requirements and behaviour for core systems associated with the
deployment of C-ITS service provision. It does not purport to be a list of all potential minimum system
requirements and behaviour for core systems factors, which will vary according to the scope of the core
system being provided, the regime of the jurisdiction, the location of the instantiation and to the form
of the instantiation, nor does it provide definitive specification. Rather, this Technical Report discusses
and raises awareness of the major minimum system requirements and behaviour for core systems
issues to be considered and provides guidance in the context of future and instantiation specific
deployments of C-ITS core systems.
This document should be read in conjunction with, and in most cases, following consideration of
the following:
— ISO 17427-1, Intelligent transport systems — Cooperative ITS — Part 1: Roles and responsibilities in the
context of co-operative ITS architecture(s);
— ISO/TR 17427-2, Intelligent transport systems — Cooperative ITS — Part 2: Framework Overview;
— ISO/TR 17427-3, Intelligent transport systems — Cooperative ITS — Part 3: Concept of operations
(ConOps) for ‘core’ systems.
These documents, as their titles imply, identify the principal actor groups and their roles and
responsibilities in C-ITS service provision, overview for such systems, and describe the concept of
operations for core systems supporting C-ITS service provision. Frequent reference to these documents
and their provisions will be made, but largely not re-described, so familiarity with those documents
is a precursor to comprehension and understanding of this Technical Report. The objective of this
Technical Report is, within the context of ISO 17427-1, ISO/TR 17427-2, and ISO/TR 17427-3, to identify
the minimum system capabilities and behaviour implicitly required to provide ‘Core System’ service
provision and support to participating actors.
4.3 Stakeholders
The term “stakeholder” may be somewhat overused but generally refers to any individual or
organization that is affected by the activities of a business process or, in this case, a system being
developed. They may have a direct or indirect interest in the activity and their level of participation may
vary. The term here includes public agencies, private organizations or the travelling public (end service
recipients) with a vested interest, or a “stake” in one or more aspect of the connected vehicle/highway
system environment (2.17) and the ‘Core System’. ‘Core System’ stakeholders span the breadth of the
transportation environment including the following:
— transportation service recipients, e.g. private vehicle drivers, public safety vehicle operators (2.24),
commercial vehicle operators, passengers, cyclists and pedestrians;
— transportation operators, e.g. traffic managers, transit managers, fleet managers, toll operators,
road maintenance and construction;
— public safety organizations, e.g. incident and emergency management, including fire, police and
medical support;
— information service providers, e.g. data and information providers for transportation-related data,
including traffic, weather and convenience applications;
— application service (2.4) providers;
— environmental managers, including emissions and air quality monitors;
— original equipment vehicle manufacturers (OEMs);
— in-vehicle device manufacturers;
— communications providers, including cellular network operators;
— jurisdiction regulatory and research agencies;
— ‘Core System’ owners.
For a summary of the actors associated with C-ITS and its core roles and responsibilities, see ISO 17427-1.
5 C-ITS and ‘minimum system requirements and behaviour for core systems’
5.1 Overview
For a summary of the roles and relationships associated with C-ITS and its core systems, see ISO 17427-1.
ISO 17427-1 envisions the combination of applications, services and systems necessary to provide
safety, mobility and environmental benefits through the exchange of data between mobile (2.30) and
fixed transportation service recipients. It consists of the following:
— applications that provide functionality (2.20) to realize safety, mobility and environmental benefits;
— communications that facilitate data exchange;
— core systems, which provide the functionality needed to enable data exchange between and among
mobile and fixed transportation service recipients;
— support systems, including security credentials certificate and registration authorities, that allow
devices and systems to establish trust relationships.
The main mission of any ‘Core System’ is to enable safety, mobility and communications-based
applications for both mobile and non-mobile service recipients.
It is not the principle role of the‘Core System’ to provide end user application services. Such services
may be provided by the same computing and communications equipment but are, and need to be, kept
separate from the ‘Core System’.
The scope of the ‘Core System’ includes those enabling technologies and services that will, in turn,
provide the foundation for applications. The ‘Core System’ works in conjunction with ‘External Support
Systems’ (ESS) like a ‘Certificate Authority’ (CA) for wireless communications security. The system
boundary for the ‘Core System’ is not defined in terms of devices or agencies or vendors but by the
open, standardized interface specifications that govern the behaviour of all interactions between ‘Core
System’ service recipients.
8 © ISO 2015 – All rights reserved

The ‘Core System’ supports a distributed, diverse set of applications. These applications use both
wireless and wireline communications to provide the following:
— wireless communications with and between mobile elements including vehicles (of all types),
pedestrians, cyclists, and other transportation service recipients;
— wireless communications between mobile elements and field infrastructure;
— wireless and wireline communications between mobile elements, field infrastructure, and back
office/centres (2.10).
This may provide support and security management for ITS specific wireless communications,
such as 5,9 GHz, but may also provide gateway and/or SAP access/management to public wireless
communications such as 4G/LTE/3G/2G (E_UTRAN/UMTS/GSM) or mobile wireless broadband, WiFi
and even satellite telecommunications.
The operational environment in which the ‘Core System’ exists may vary from a single jurisdiction-
wide monolithic system to a heterogeneous community of systems run by multiple agencies at different
levels of complexity and various locations. The potential number of scenarios involving transport-
related system service recipients is unlimited but all will involve some sort of wireless communication.
Applications may be deployed in complex configurations supporting a major metropolitan area or a
minimal configuration to support a set of isolated rural road warning systems.
As ‘Core Systems’ are deployed, some may include just the essential functions to support a particular
local area and rely on an interface to another ‘Core System’ to provide additional services. For instance,
one ‘Core System’ could include the necessary hardware and software to manage a subset of the
subsystems for their local area and rely on a connection to another ‘Core Systems’ subsystems for
additional services.
The ‘Core System’ will not necessarily require a control centre with large video screens or employ a
large number of operators. A ‘Core System’ can function in an office or data centre environment as long
as there is access to a network that enables communications between system service recipients and
the ‘Core System’. A ‘Core System’ also does not necessarily imply a system provided by a single central
mainframe computer and ‘Core System’ functionality may indeed be provided by a number of networked
computers. However, the core ‘system’ is a single cohesive ‘system’ and there needs to be a clear line of
management and control.
See ISO/TR 17427-3 for more detailed discussion and detail of these aspects. See ISO 17427-1 for detail
or ‘roles and responsibilities’.
A critical factor driving the conceptual view of the ‘Core System’ and the entire connected
vehicle/highway system environment is the level of trustworthiness between communicating parties. A
complicating factor is the need to maintain the privacy of participants, but not necessarily exclusively
through anonymous communication. A ‘Core System’ should normally work on the principle of ’privacy
by design’ wherever possible, planning anonymity (2.1) into most trusted exchanges of data, using
the jurisdictions privacy principles guidelines, and balancing privacy against security and safety (see
ISO/TR 17427-7).
While the ‘Core System’ is being planned for ‘privacy by design’, it is also providing a foundation
from which to leverage alternative and multiple communications methods. Prioritization will have
to be made between time critical safety applications, non-time critical safety applications, and non-
safety applications. Most of these alternatives are typically available on the market today and the
levels of anonymity and privacy inherent to these systems are typically governed by agreements
between communication providers and consumers. So while, within the ’Core System’, privacy is
not compromised for an individual, what happens between that individual and their communication
provider (e.g. 3G service provider) may very well compromise privacy. Some application providers may
require personal information in order to function which would require the application user to opt-in to
use that application.
A ‘Core System’ to support C-ITS service provision may be designed and implemented in some cases
as a nationally deployed and managed system but in other cases, will likely be deployed locally and
regionally and it shall be able to grow organically to support the changing needs of its user base.
Deployments may be managed regionally but will need to follow International Standards to ensure that
the essential capabilities are compatible no matter where the deployments are established.
Within the connected vehicle/highway system environment, the ‘Core System’ concept distinguishes
communications mechanisms from data exchange and from the services needed to facilitate the data
exchange. The ‘Core System’ supports the connected vehicle/highway system environment by being
responsible for providing the services needed to facilitate the data exchanges. The contents of the data
exchange are determined by applications unless the data exchange is used as part of the facilitation
process between the user and the ‘Core System’.
The ‘Core System’ provides the functionality required to support safety, mobility, and environmental
applications. This same functionality may enable commercial applications but that is not a driving factor,
rather, a side benefit. The primary function of the ‘Core System’ is the facilitation of communications
between service recipients, some of which shall also be secure. The ‘Core System’ may also provide data
distribution and network support services depending on the needs of the ‘Core System’ deployment.
The ‘Core System’ exists in an environment where it facilitates interactions between vehicles, field
infrastructure and back office service recipients, as described in ISO 17427-1.
Figure 1 — ‘Core system’ boundary diagram (ISO 17427-1 – working draft)
In Figure 1, the service recipients, devices, and software applications are outside of the ‘Core System’
but the ‘Core System’ is still responsible for facilitating their security which is achieved according to
10 © ISO 2015 – All rights reserved

the needs of the application. Some ITS systems can utilize security from the communications network
over which their wireless communication is made, which provides adequate security for the provision
of their service, and others can control their data so it is only provided to a legitimate source, indeed,
some data may not be sensitive to misuse. But most data in the C-ITS context has some sensitivity and
therefore will have to be effected within layers of security and some C-ITS communications will have
to be effected within the high levels of security that ISO 21217 calls a ‘Bounded Secure Management
Domain’ (2.2). (See ISO 21217).
This is chiefly achieved by providing digital certificate (2.16)-based mechanisms to ensure trust
between service recipients. The ‘Core System’ therefore has an intimate relationship with the
‘Certification Authority’ and there could be logic that the two aspects have common management to
ensure consistency.
The ‘Core System’ also provides networking services to facilitate communications, though it does not
comprise the communications network. The following are not part of the ‘Core System’:
— mobile service recipients (e.g. vehicle devices, pedestrian smartphones) – any user device;
— roadside equipment (RSE) – both public and commercial fixed devices;
— transportation management centres (TMC) and other public or private back office or centres.
It is also important to note that the ‘Core System’ is not meant to mandate or change existing
transportation equipment, technology or transportation centres. The ‘Core System’ provides
mechanisms for efficiently collecting and distributing transportation data but does not necessarily
replace existing systems, though it is likely that many existing data collection mechanisms will be made
obsolete by its data collection and distribution function.
For further detail of these relationships and description of the subsystems, see ISO 17427-1.
While ISO 17427-1 provides the high level relationships in a C-ITS system and ISO/TR 17427-3 provides
a C-ITS ‘Core System’ ‘concept of operations’, the specific role of a ‘Core System’ carries with it additional
responsibilities, which need to be managed by defined subsystem, such as the following:
—  Core2Core subsystem (see 5.2.1);
—  Data distribution subsystem (see 5.2.2);
—  Misbehaviour management subsystem (see 5.2.3);
—  Network services subsystem (see 5.2.4);
—  System service monitor subsystem (see 5.2.5);
—  Time synchronization subsystem (see 5.2.6);
—  User permissions subsystem (see 5.2.7);
—  User trust management subsystem (see 5.2.8).
5.2 Subsystem features of the ‘Core System’
5.2.1 Core2Core subsystem
In most, but not all, paradigms, the system will need to operate/co-operate with adjacent and/or
parallel ‘Core Systems’. See 5.1 and ISO/TR 17427-3.
This implies a requirement for a ‘Core2Core subsystem’. The Core2Core subsystem needs to interface
with other ‘Core Systems’, declaring its jurisdictional scope, offered services, and services it desires
from other ‘Core Systems’. The Core2Core subsystem will then need to maintain a knowledge base
of data and services available among other ‘Core Systems’. In this way, the ‘Core System’ can act as a
ISO/TR 17427
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...