KYTC Cooperative ITS Credentials Management System

Status: Planned

Description

The 'Cooperative ITS Credentials Management System' (CCMS) is a high–level aggregate representation of the interconnected systems that enable trusted communications between mobile devices and other mobile devices, roadside devices, and centers and protect data they handle from unauthorized access. Representing the different interconnected systems that make up a Public Key Infrastructure (PKI), this physical object represents an end user view of the credentials management system with focus on the exchanges between the CCMS and user devices that support the secure distribution, use, and revocation of trust credentials.

Stakeholders

StakeholderRoleRole Status
Kentucky Transportation CabinetOwnsPlanned

Physical Objects

Cooperative ITS Credentials Management System

Functional Objects

Functional ObjectDescriptionUser Defined
CCMS Authorization'CCMS Authorization' components provide authorization credentials (e.g., pseudonym certificates) to end entities. The end entity applies for and obtains authorization credentials, enabling the end entity to enter the "Operational" state. This function rFalse
CCMS Enrollment'CCMS Enrollment' components provide enrollment credentials to end entities. The end entity applies for and obtains enrollment credentials that can be used to communicate with other CCMS components, entering the "Unauthorized" state. CCMS Enrollment comFalse
CCMS Misbehavior Reporting and Action'CCMS Misbehavior Reporting and Action' components process misbehavior reports from end entities. Misbehavior reports are analyzed and investigated if warranted. Investigated misbehavior reports are correlated with end entities and systemic issues are iFalse
CCMS Provisioning'CCMS Provisioning' components provide the end entity with material that allows it to enter the 'Unenrolled' state. This consists of root certificates and the crypto material that allows it to communicate securely with the Enrollment components. This fuFalse
CCMS Revocation'CCMS Revocation' components generate the internal blacklist and Certificate Revocation List (CRL) and distribute them to other CCMS components and end entities. Once placed on the CRL, an end entity is in the Unauthorized state. Once placed on the blacFalse
ITS Management Support'ITS Management Support' provides management of the ITS Object. This includes management of regulatory information and policies, management of application processes, management of communication system configuration and update management, communications inFalse
ITS Security Support'ITS Security Support' provides communications and system security functions to the ITS Object, including privacy protection functions. It may include firewall, intrusion management, authentication, authorization, profile management, identity management, False

Physical Standards

Document NumberTitleDescription
ISO 21217Intelligent transport systems –– Communications access for land mobiles (CALM) –– ArchitectureISO 21217 describes the communications reference architecture of nodes called "ITS station units" designed for deployment in ITS communication networks. While it describes a number of ITS station elements, whether or not a particular element is implemented in an ITS station unit depends on the specific communication requirements of the implementation. It also describes the various communication modes for peer–to–peer communications over various networks between ITS communication nodes. These nodes may be ITS station units as described in the document or any other reachable nodes. ISO 21217 specifies the minimum set of normative requirements for a physical instantiation of the ITS station based on the principles of a bounded secured managed domain.
NIST FIPS PUB 140–2Security Requirements for Cryptographic ModulesThis Federal Information Processing Standard (140–2) specifies the security requirements that will be satisfied by a cryptographic module, providing four increasing, qualitative levels intended to cover a wide range of potential applications and environments. The areas covered, related to the secure design and implementation of a cryptographic module, include specification; ports and interfaces; roles, services, and authentication; finite state model; physical security; operational environment; cryptographic key management; electromagnetic interference/electromagnetic compatibility (EMI/EMC); self–tests; design assurance; and mitigation of other attacks.

Interfaces To

(View Context Diagram)

City and County Connected Vehicle Roadside Equipment
City and County CV Authorizing Center
City and County Fire/EMS Vehicles
City and County Maintenance Operations
City and County Maintenance Vehicles
City and County Police/Sheriffs Vehicles
City and County Traffic Control Center
Commercial Vehicles and Barges
Connected/Automated Vehicles
CVG Airport Connected Vehicle Roadside Equipment
CVG Airport CV Authorizing Center
CVG Emergency Response Vehicles
CVG Operations Center
KSP Troop Vehicles
KYTC Certification System
KYTC CV Authorizing Center
KYTC District 6 Maintenance Garages
KYTC District 6 Maintenance Vehicles
KYTC SAFE Patrol
KYTC Traffic Signal Control System
Local Transit Vehicles
ODOT / KYTC Connected Vehicle Roadside Equipment
Other City and County Maintenance Dispatch Facilities
Other City and County Maintenance Vehicles
Other City and County Traffic Control Centers
Other Public Safety Vehicles
RAMP Transit Vehicles
TANK Transit Vehicles
Traveler Information Devices
TRIMARC (KYTC)
TRIMARC Freeway Service Patrol (KYTC)
Privacy Policy | Terms of Use & Accessibility