Work item:
|
X.1384 (ex X.itssec-5)
|
Subject/title:
|
Security requirements and guidelines for vehicular edge computing
|
Status:
|
Approved on 2024-09-06 [Issued from previous study period]
|
Approval process:
|
TAP
|
Type of work item:
|
Recommendation
|
Version:
|
New
|
Equivalent number:
|
-
|
Timing:
|
-
|
Liaison:
|
CITS, SG16, ISO TC 204
|
Supporting members:
|
Korea (Republic of), ETRI, Hyundai Motors
|
Summary:
|
ITU-T Recommendation X.1384 (ex X.itssec-5) provides security requirements and guidelines for vehicular edge computing (VEC). VEC refers to a computing paradigm that deploys processing capability at network edge to distribute computing resources in a core cloud in ITS environments. VEC also provides more localized storage and application services to road users, thereby making it possible to achieve lower latency delays, faster response times, location awareness, high availability, and quality of service for streaming real-time applications, since the data processing is conducted closer to the vehicle.
VEC faces many security challenges and issues since it requires a faster service response time to end users. This Recommendation analyses threats and vulnerabilities identified of VEC and provides security requirements for VEC. Further, it also provides use cases for VEC services.
|
Comment:
|
-
|
Reference(s):
|
|
|
Historic references:
|
Contact(s):
|
|
ITU-T A.5 justification(s): |
|
|
|
First registration in the WP:
2017-10-16 18:15:53
|
Last update:
2024-09-13 13:13:41
|