Vehicle to Vehicle Credentials

While Security Innovation’s expertise isn’t limited to any specific platform or technology, we do have deep experience and specialization in automotive and embedded security.

Involvement in Intelligent Transportation System

Security Innovation works within the key sectors of Intelligent Transportation Systems, from standards bodies to chip designers to on board equipment manufacturers, infrastructure providers and vehicle manufacturers.

As an active and influential practitioner in this field, and as members of organizations such as ITS America, OmniAir, Car2Car Communications Consortium and ETSI, we have a deep understanding of the technical specifications and interoperability required to provide highly secure platforms for Vehicle-to-Vehicle and Vehicle-to-Infrastructure solution providers.

Additional involvement in Intelligent Transportation:

Security Innovation Credentials

About 1609 IEEE protocol

The IEEE 1609 standards for Wireless Access in Vehicular Environments were created as part of the Connected Vehicle system, a multi-year US Department of Transportation program for improving safety-of-life systems for automobiles, allowing vehicles to communicate and warn each other of hazards on the road at all speeds. See for more details. 

V2V Technical Paper

A security credential management system for V2V communications PDF

Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte

We present a security credential management system for vehicle-to-vehicle communications, which has been developed under a Cooperative Agreement with the US Department of Transportation. This system is currently being finalized, and it is the leading candidate design for the V2V security backend design in the US, subject to review by the US Department of Transportation and other stakeholders. It issues digital certificates to participating vehicles for establishing trust among them, which is necessary for safety applications based on vehicle-to-vehicle communications. It supports four main use cases, namely, bootstrapping, certificate provisioning, misbehavior reporting and revocation. The main design goal is to provide both security and privacy to the largest extent reasonable and possible. To achieve the latter, vehicles are issued pseudonym certificates, and the provisioning of those certificates is divided among multiple organizations. One of the main challenges is to facilitate efficient revocation while providing privacy against attacks from insiders.