In order to participate in this service package, each physical object should meet or exceed the following security levels.
In order to participate in this service package, each information flow triple should meet or exceed the following security levels.
| Information Flow Security |
| Source |
Destination |
Information Flow |
Confidentiality |
Integrity |
Availability |
| Basis |
Basis |
Basis |
| Basic Vehicle |
Vehicle |
driver input information |
Moderate |
High |
High |
| Internal vehicle flow that if reverse engineered could enable third party vehicle control. Largely a competitive question, could be set LOW if manufacturer and operator are not concerned with this type of compromise. |
Includes vehicle control commands, which must be timely and accurate to support safe vehicle operation. |
Includes vehicle control commands, which must be timely and accurate to support safe vehicle operation. |
| Basic Vehicle |
Vehicle |
host vehicle status |
Low |
Moderate |
High |
| Unlikely that this includes any information that could be used against the originator. |
This can be MODERATE or HIGH, depending on the application: This is used later on to determine whether a vehicle is likely going to violate a red light or infringe a work zone. This needs to be correct in order for the application to work correctly. |
Since this monitors the health and safety of the vehicle and that information is eventually reported to the driver, it should be available at all times as it directly affects vehicle and operator safety. |
| Connected Vehicle Roadside Equipment |
Vehicle |
detected unequipped vehicles and VRUs |
Not Applicable |
High |
Moderate |
| This data is intended to be shared with all nearby vehicles, traffic control devices and vulnerable road users; it is essentially public. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. If manipulated or incorrect, a crash may occur; though vehicles able to use this data also have sensory capabilities, this flow will often contain data describing objects/vehicles/VRUs that are obscured and not observable by on-board sensors. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. This data enable collision avoidance actions that are impractical without it, as vehicles able to use this data to sense-by-proxy other vehicles/VRUs/obstacles that are obscured by on-board sensors. Considered MODERATE and not HIGH only because the lack of availability reverts to existing operations and does not actively make safety worse. |
| Connected Vehicle Roadside Equipment |
Vehicle |
intersection geometry |
Low |
High |
Moderate |
| Map data intended for general use by any C-ITS component than needs it. No information here includes PII or anything else that, if viewed by someone other than the participant, would lead to harm. |
Map data is used for a host of application purposes. This widespread use means that any corruption in the data has a widespread and far reaching effect. |
Occasional outages of this flow will delay updates and lead to a loss of accurate function of some applications. Depending on the application this could be HIGH. |
| Connected Vehicle Roadside Equipment |
Vehicle |
intersection status |
Not Applicable |
High |
Moderate |
| This data is intended for all vehicles in the immediate area of the sender. |
If this is compromised, the Vehicle OBE will receive messages that are inconsistent with what the traffic signals are displaying. This could lead to confusion and reduce the ability of the application to provide value. |
If this is down, the Vehicle OBE doesn’t get the information it needs to stay in synch with the actual signal state, reducing or eliminating the value add from having this application. We assume that the Vehicle OBE will detect a lack of availability and choose not to send out-of-date information, so a failure of availability cannot have worse consequences than a failure of integrity which we have previously assessed at MEDIUM. |
| Connected Vehicle Roadside Equipment |
Vehicle |
merge order commands |
Not Applicable |
High |
Moderate |
| By design this needs to be readable by vehicles in a given area. |
Since this flow directs action between moving vehicles, and alteration of data contents would have a safety impact. |
If this flow cannot be satisfied then vehicle movements will be compromised, limiting traffic flow. Could be LOW or MODERATE, depending on the operational environment. |
| Connected Vehicle Roadside Equipment |
Vehicle |
potential conflict in progress |
Not Applicable |
High |
Moderate |
| Typically this information should be distributed to all that might be impacted, and so in a given area should be directly observable. |
Direct safety impact, so must be correct or negative impact on safety and mobility. |
Ideally this flow is always availalble, but given practical constraints that is impractical, and this flow is also an overlap with other safety-driving functions. |
| Connected Vehicle Roadside Equipment |
Vehicle |
vehicle maneuver coordination |
Low |
High |
Low |
| Data contained within this flow is intended to alert other nearby vehicles to a desired or impending movement by the source vehicle. The data does include identifiers indicating the sending vehicle, which needs to be recognized and protected as appropriate. It may be impractical to encrypt this data to meet performance requirements, and in any event no more than one vehicle would be identified and only in the field environment, so mass collection of this information would be difficult. |
This flow is core to automated vehicle merge and lane change operations; flaws in the data could result in a crash, and so integrity should be ensured to the highest practical level. |
L4/5 ADS will operate more smoothly if this flow works, but as the vehicle fleet will include L0 vehicles for the foreseeable future, any ADS must use other methods to ensure safe operation anyway. May be MODERATE in ADS-dedicated facilities. |
| Driver |
Vehicle |
driver input |
Moderate |
High |
High |
| Data included in this flow may include origin and destination information, which should be protected from other's viewing as it may compromise the driver's privacy. |
Commands from from the driver to the vehicle must be correct or the vehicle may behave in an unpredictable and possibly unsafe manner |
Commands must always be able to be given or the driver has no control. |
| Emergency Vehicle OBE |
Vehicle |
vehicle maneuver coordination |
Low |
High |
Low |
| Data contained within this flow is intended to alert other nearby vehicles to a desired or impending movement by the source vehicle. The data does include identifiers indicating the sending vehicle, which needs to be recognized and protected as appropriate. It may be impractical to encrypt this data to meet performance requirements, and in any event no more than one vehicle would be identified and only in the field environment, so mass collection of this information would be difficult. |
This flow is core to automated vehicle merge and lane change operations; flaws in the data could result in a crash, and so integrity should be ensured to the highest practical level. |
L4/5 ADS will operate more smoothly if this flow works, but as the vehicle fleet will include L0 vehicles for the foreseeable future, any ADS must use other methods to ensure safe operation anyway. May be MODERATE in ADS-dedicated facilities. |
| ITS Roadway Equipment |
Connected Vehicle Roadside Equipment |
detected unequipped vehicles and VRUs |
Moderate |
High |
Moderate |
| This data is intended to be shared with all nearby vehicles, traffic control devices and vulnerable road users; it is essentially public. However, all communications between field infrastructure should be protected from viewing to prevent attackers from analyzing traffic and developing attack methods. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. If manipulated or incorrect, a crash may occur; though vehicles able to use this data also have sensory capabilities, this flow will often contain data describing objects/vehicles/VRUs that are obscured and not observable by on-board sensors. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. This data enable collision avoidance actions that are impractical without it, as vehicles able to use this data to sense-by-proxy other vehicles/VRUs/obstacles that are obscured by on-board sensors. Considered MODERATE and not HIGH only because the lack of availability reverts to existing operations and does not actively make safety worse. |
| ITS Roadway Equipment |
Multi-Access Edge Computing |
detected unequipped vehicles and VRUs |
Moderate |
High |
Moderate |
| This data is intended to be shared with all nearby vehicles, traffic control devices and vulnerable road users; it is essentially public. However, all communications between field infrastructure should be protected from viewing to prevent attackers from analyzing traffic and developing attack methods. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. If manipulated or incorrect, a crash may occur; though vehicles able to use this data also have sensory capabilities, this flow will often contain data describing objects/vehicles/VRUs that are obscured and not observable by on-board sensors. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. This data enable collision avoidance actions that are impractical without it, as vehicles able to use this data to sense-by-proxy other vehicles/VRUs/obstacles that are obscured by on-board sensors. Considered MODERATE and not HIGH only because the lack of availability reverts to existing operations and does not actively make safety worse. |
| Multi-Access Edge Computing |
Vehicle |
detected unequipped vehicles and VRUs |
Not Applicable |
High |
Moderate |
| This data is intended to be shared with all nearby vehicles, traffic control devices and vulnerable road users; it is essentially public. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. If manipulated or incorrect, a crash may occur; though vehicles able to use this data also have sensory capabilities, this flow will often contain data describing objects/vehicles/VRUs that are obscured and not observable by on-board sensors. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. This data enable collision avoidance actions that are impractical without it, as vehicles able to use this data to sense-by-proxy other vehicles/VRUs/obstacles that are obscured by on-board sensors. Considered MODERATE and not HIGH only because the lack of availability reverts to existing operations and does not actively make safety worse. |
| Multi-Access Edge Computing |
Vehicle |
intersection geometry |
Low |
High |
Moderate |
| Map data intended for general use by any C-ITS component than needs it. No information here includes PII or anything else that, if viewed by someone other than the participant, would lead to harm. |
Map data is used for a host of application purposes. This widespread use means that any corruption in the data has a widespread and far reaching effect. |
Occasional outages of this flow will delay updates and lead to a loss of accurate function of some applications. Depending on the application this could be HIGH. |
| Multi-Access Edge Computing |
Vehicle |
intersection status |
Not Applicable |
High |
Moderate |
| This data is distributed using a variety of mechanisms, some of which are localized broadcast; it is desireable that all potential users get this information. |
If this flow is not accurate or delivered in a timely fashion then a large variety of mobility and safety services that depend on it will not work properly. |
If this flow is not accurate or delivered in a timely fashion then a large variety of mobility and safety services that depend on it will not work properly. |
| Multi-Access Edge Computing |
Vehicle |
merge order commands |
Not Applicable |
High |
Moderate |
| By design this needs to be readable by vehicles in a given area. |
Since this flow directs action between moving vehicles, and alteration of data contents would have a safety impact. |
If this flow cannot be satisfied then vehicle movements will be compromised, limiting traffic flow. Could be LOW or MODERATE, depending on the operational environment. |
| Multi-Access Edge Computing |
Vehicle |
potential conflict in progress |
Not Applicable |
High |
Moderate |
| Typically this information should be distributed to all that might be impacted, and so in a given area should be directly observable. |
Direct safety impact, so must be correct or negative impact on safety and mobility. |
Ideally this flow is always availalble, but given practical constraints that is impractical, and this flow is also an overlap with other safety-driving functions. |
| Multi-Access Edge Computing |
Vehicle |
vehicle maneuver coordination |
Low |
High |
Low |
| Data contained within this flow is intended to alert other nearby vehicles to a desired or impending movement by the source vehicle. The data does include identifiers indicating the sending vehicle, which needs to be recognized and protected as appropriate. It may be impractical to encrypt this data to meet performance requirements, and in any event no more than one vehicle would be identified and only in the field environment, so mass collection of this information would be difficult. |
This flow is core to automated vehicle merge and lane change operations; flaws in the data could result in a crash, and so integrity should be ensured to the highest practical level. |
L4/5 ADS will operate more smoothly if this flow works, but as the vehicle fleet will include L0 vehicles for the foreseeable future, any ADS must use other methods to ensure safe operation anyway. May be MODERATE in ADS-dedicated facilities. |
| Other Vehicles |
Vehicle |
detected obstacles |
Not Applicable |
High |
Moderate |
| This data is intended to be shared with all nearby vehicles, traffic control devices and vulnerable road users; it is essentially public. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. If manipulated or incorrect, a crash may occur; though vehicles able to use this data also have sensory capabilities, this flow will often contain data describing objects/vehicles/VRUs that are obscured and not observable by on-board sensors. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. This data enable collision avoidance actions that are impractical without it, as vehicles able to use this data to sense-by-proxy other vehicles/VRUs/obstacles that are obscured by on-board sensors. Considered MODERATE and not HIGH only because the lack of availability reverts to existing operations and does not actively make safety worse. |
| Other Vehicles |
Vehicle |
detected unequipped vehicles and VRUs |
Not Applicable |
High |
Moderate |
| This data is intended to be shared with all nearby vehicles, traffic control devices and vulnerable road users; it is essentially public. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. If manipulated or incorrect, a crash may occur; though vehicles able to use this data also have sensory capabilities, this flow will often contain data describing objects/vehicles/VRUs that are obscured and not observable by on-board sensors. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. This data enable collision avoidance actions that are impractical without it, as vehicles able to use this data to sense-by-proxy other vehicles/VRUs/obstacles that are obscured by on-board sensors. Considered MODERATE and not HIGH only because the lack of availability reverts to existing operations and does not actively make safety worse. |
| Other Vehicles |
Vehicle |
vehicle location and motion |
Not Applicable |
High |
Moderate |
| This data is intentionally transmitted to everyone via a broadcast. Much of its information content can also be determined via other visual indicators |
BSM info needs to be accurate and should not be tampered with |
BSM must be broadcast regularly to make data available for other vehicle OBEs, but availability cannot be guaranteed over a wireless medium |
| Other Vehicles |
Vehicle |
vehicle maneuver coordination |
Low |
High |
Low |
| Data contained within this flow is intended to alert other nearby vehicles to a desired or impending movement by the source vehicle. The data does include identifiers indicating the sending vehicle, which needs to be recognized and protected as appropriate. It may be impractical to encrypt this data to meet performance requirements, and in any event no more than one vehicle would be identified and only in the field environment, so mass collection of this information would be difficult. |
This flow is core to automated vehicle merge and lane change operations; flaws in the data could result in a crash, and so integrity should be ensured to the highest practical level. |
L4/5 ADS will operate more smoothly if this flow works, but as the vehicle fleet will include L0 vehicles for the foreseeable future, any ADS must use other methods to ensure safe operation anyway. May be MODERATE in ADS-dedicated facilities. |
| Other Vehicles |
Vehicle |
vehicle path prediction |
Not Applicable |
High |
Moderate |
| This data is intentionally transmitted to other vehicles operating in a cluster. |
Vehicle path data is critical to the performance of a group of vehicles in a vehicle cluster scenario. Incorrect data here could trigger a severe accident scenario. |
Some vehicle cluster scenarios cannot function without this flow. Worst case is that some vehicles will drop from the platoon however, which while significant to mobility does not have a direct severe consequence. |
| Other Vehicles |
Vehicle |
vehicle profile |
Low |
High |
Moderate |
| Includes no PII and probably includes information that could be observed, so no need for obfuscation. |
Vehicle profile data is critical to the performance of a group of vehicles in a vehicle cluster scenario. Incorrect data here could trigger a severe accident scenario. |
This flow enables various services; if the flow is not available the vehicle may not be able to use those services, and also may be charged incorrectly. |
| Potential Obstacles |
Vehicle |
physical presence |
|
|
|
|
|
|
| Vehicle |
Basic Vehicle |
driver update information |
Low |
Moderate |
Moderate |
| This information is all presented to the vehicle operator. Encrypting this information may make it harder to reverse engineer vehicle systems, and may defeat criminal tracking tools when the vehicle has already been compromised. Unless those scenarios are of concern to the operator or manufacturer, this can safely be set LOW. |
Any information presented to the operator of a vehicle should be both accurate and timely. By definition this includes safety information, but given that the driver has other means of learning about most threats, it seems difficult to justify HIGH. If HIGH is warranted, it should apply to both availability and integrity. |
Any information presented to the operator of a vehicle should be both accurate and timely. By definition this includes safety information, but given that the driver has other means of learning about most threats, it seems difficult to justify HIGH. If HIGH is warranted, it should apply to both availability and integrity. |
| Vehicle |
Basic Vehicle |
vehicle control |
Moderate |
High |
High |
| Internal vehicle flow that if reverse engineered could enable third party vehicle control. Largely a competitive question, could be set LOW if manufacturer and operator are not concerned with this type of compromise. |
Includes vehicle control commands, which must be timely and accurate to support safe vehicle operation. |
Includes vehicle control commands, which must be timely and accurate to support safe vehicle operation. |
| Vehicle |
Connected Vehicle Roadside Equipment |
detected obstacles |
Not Applicable |
High |
Moderate |
| This data is intended to be shared with all nearby vehicles, traffic control devices and vulnerable road users; it is essentially public. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. If manipulated or incorrect, a crash may occur; though vehicles able to use this data also have sensory capabilities, this flow will often contain data describing objects/vehicles/VRUs that are obscured and not observable by on-board sensors. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. This data enable collision avoidance actions that are impractical without it, as vehicles able to use this data to sense-by-proxy other vehicles/VRUs/obstacles that are obscured by on-board sensors. Considered MODERATE and not HIGH only because the lack of availability reverts to existing operations and does not actively make safety worse. |
| Vehicle |
Connected Vehicle Roadside Equipment |
detected unequipped vehicles and VRUs |
Not Applicable |
High |
Moderate |
| This data is intended to be shared with all nearby vehicles, traffic control devices and vulnerable road users; it is essentially public. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. If manipulated or incorrect, a crash may occur; though vehicles able to use this data also have sensory capabilities, this flow will often contain data describing objects/vehicles/VRUs that are obscured and not observable by on-board sensors. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. This data enable collision avoidance actions that are impractical without it, as vehicles able to use this data to sense-by-proxy other vehicles/VRUs/obstacles that are obscured by on-board sensors. Considered MODERATE and not HIGH only because the lack of availability reverts to existing operations and does not actively make safety worse. |
| Vehicle |
Connected Vehicle Roadside Equipment |
vehicle control event |
Low |
Moderate |
Moderate |
| This data is intentionally transmitted to everyone via a broadcast. It can also be determined via other visual indicators. |
This message is an indication of a potential hazard and should not be easy to forge. False messages here may lead to confusion that causes a traffic accident. |
This message is an indication of a potential hazard. If it isn’t received it increases the risk to other road users. If a vehicle is infringing on an intersection, it must report this. |
| Vehicle |
Connected Vehicle Roadside Equipment |
vehicle location and motion |
Not Applicable |
High |
Moderate |
| This data is intentionally transmitted to everyone via a broadcast. Much of its information content can also be determined via other visual indicators |
Incorrect information could lead to the system not operating properly. If the system does not properly know where the vehicle is, it cannot make an accurate decision about whether there is going to be a pedestrian in the crosswalk that the vehicle is approaching. This can have a safety impact.; DISC: NYC believes this to be MODERATE |
This data is required for the system to operate properly. If this data is not available, the system cannot give accurate warning information. |
| Vehicle |
Connected Vehicle Roadside Equipment |
vehicle path prediction |
Not Applicable |
High |
Moderate |
| This data is intentionally transmitted to other vehicles operating in a cluster. |
Path prediction is intended for collision avoidance applications, which have high integrity requirements to avoid potentially catastrophic consequences. |
Path prediction is intended for collision avoidance applications, which ideally would have HIGH availability requirements, but given the constraints of the wireless medium are reduced to MODERATE. |
| Vehicle |
Connected Vehicle Roadside Equipment |
vehicle profile |
Low |
High |
Moderate |
| Includes no PII and probably includes information that could be observed, so no need for obfuscation. |
As this information will be used to determine the vehicle's ability to access services or be charged usage fees, it must be correct and not easily forgeable. |
This flow enables various services; if the flow is not available the vehicle may not be able to use those services, and also may be charged incorrectly. |
| Vehicle |
Driver |
driver updates |
Not Applicable |
Moderate |
Moderate |
| This data is informing the driver about the safety of a nearby area. It should not contain anything sensitive, and does not matter if another person can observe it. |
This is the information that is presented to the driver. If they receive incorrect information, they may act in an unsafe manner. However, there are other indicators that would alert them to any hazards, such as an oncoming vehicle or crossing safety lights. |
If this information is not made available to the driver, then the system has not operated correctly. |
| Vehicle |
Multi-Access Edge Computing |
detected obstacles |
Not Applicable |
High |
Moderate |
| This data is intended to be shared with all nearby vehicles, traffic control devices and vulnerable road users; it is essentially public. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. If manipulated or incorrect, a crash may occur; though vehicles able to use this data also have sensory capabilities, this flow will often contain data describing objects/vehicles/VRUs that are obscured and not observable by on-board sensors. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. This data enable collision avoidance actions that are impractical without it, as vehicles able to use this data to sense-by-proxy other vehicles/VRUs/obstacles that are obscured by on-board sensors. Considered MODERATE and not HIGH only because the lack of availability reverts to existing operations and does not actively make safety worse. |
| Vehicle |
Multi-Access Edge Computing |
detected unequipped vehicles and VRUs |
Not Applicable |
High |
Moderate |
| This data is intended to be shared with all nearby vehicles, traffic control devices and vulnerable road users; it is essentially public. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. If manipulated or incorrect, a crash may occur; though vehicles able to use this data also have sensory capabilities, this flow will often contain data describing objects/vehicles/VRUs that are obscured and not observable by on-board sensors. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. This data enable collision avoidance actions that are impractical without it, as vehicles able to use this data to sense-by-proxy other vehicles/VRUs/obstacles that are obscured by on-board sensors. Considered MODERATE and not HIGH only because the lack of availability reverts to existing operations and does not actively make safety worse. |
| Vehicle |
Multi-Access Edge Computing |
vehicle control event |
Low |
Moderate |
Moderate |
| This data is intentionally transmitted to everyone via a broadcast. It can also be determined via other visual indicators. |
BSM info needs to be accurate and should not be tampered with, suggesting HIGH. From NYC: Integrity would need to be high if there were no mitigations against bad data in incoming BSMs. In fact, there are two mitigations: plausibility checking, and misbehavior reporting plus revocation. Taking these into account the security requirements are met by requiring an integrity level of MODERATE on these information flows. RES: Sided with NYC due to mitigation documentation. |
BSM must be broadcast regularly to make data available for other vehicle OBEs, but cannot guarantee wireless communication |
| Vehicle |
Multi-Access Edge Computing |
vehicle location and motion |
Not Applicable |
High |
Moderate |
| This data is intentionally transmitted to everyone via a broadcast. Much of its information content can also be determined via other visual indicators |
Incorrect information could lead to the system not operating properly. If the system does not properly know where the vehicle is, it cannot make an accurate decision about whether there is going to be a pedestrian in the crosswalk that the vehicle is approaching. This can have a safety impact. |
This data is required for the system to operate properly. If this data is not available, the system cannot give accurate warning information. |
| Vehicle |
Multi-Access Edge Computing |
vehicle path prediction |
Not Applicable |
High |
Moderate |
| This data is intentionally transmitted to other vehicles operating in a cluster. |
Path prediction is intended for collision avoidance applications, which have high integrity requirements to avoid potentially catastrophic consequences. |
Path prediction is intended for collision avoidance applications, which ideally would have HIGH availability requirements, but given the constraints of the wireless medium are reduced to MODERATE. |
| Vehicle |
Multi-Access Edge Computing |
vehicle profile |
Low |
High |
Moderate |
| Includes no PII and probably includes information that could be observed, so no need for obfuscation. |
As this information will be used to determine the vehicle's ability to access services or be charged usage fees, it must be correct and not easily forgeable. |
This flow enables various services; if the flow is not available the vehicle may not be able to use those services, and also may be charged incorrectly. |
| Vehicle |
Other Vehicles |
detected obstacles |
Not Applicable |
High |
Moderate |
| This data is intended to be shared with all nearby vehicles, traffic control devices and vulnerable road users; it is essentially public. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. If manipulated or incorrect, a crash may occur; though vehicles able to use this data also have sensory capabilities, this flow will often contain data describing objects/vehicles/VRUs that are obscured and not observable by on-board sensors. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. This data enable collision avoidance actions that are impractical without it, as vehicles able to use this data to sense-by-proxy other vehicles/VRUs/obstacles that are obscured by on-board sensors. Considered MODERATE and not HIGH only because the lack of availability reverts to existing operations and does not actively make safety worse. |
| Vehicle |
Other Vehicles |
detected unequipped vehicles and VRUs |
Not Applicable |
High |
Moderate |
| This data is intended to be shared with all nearby vehicles, traffic control devices and vulnerable road users; it is essentially public. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. If manipulated or incorrect, a crash may occur; though vehicles able to use this data also have sensory capabilities, this flow will often contain data describing objects/vehicles/VRUs that are obscured and not observable by on-board sensors. |
This data may be used as input to vehicle situational awareness and thus trigger crash-avoidance actions. This data enable collision avoidance actions that are impractical without it, as vehicles able to use this data to sense-by-proxy other vehicles/VRUs/obstacles that are obscured by on-board sensors. Considered MODERATE and not HIGH only because the lack of availability reverts to existing operations and does not actively make safety worse. |
| Vehicle |
Other Vehicles |
vehicle location and motion |
Not Applicable |
High |
Moderate |
| This data is intentionally transmitted to everyone via a broadcast. Much of its information content can also be determined via other visual indicators |
BSM info needs to be accurate and should not be tampered with |
BSM must be broadcast regularly to make data available for other vehicle OBEs, but availability cannot be guaranteed over a wireless medium |
| Vehicle |
Other Vehicles |
vehicle maneuver coordination |
Low |
High |
Low |
| Data contained within this flow is intended to alert other nearby vehicles to a desired or impending movement by the source vehicle. The data does include identifiers indicating the sending vehicle, which needs to be recognized and protected as appropriate. It may be impractical to encrypt this data to meet performance requirements, and in any event no more than one vehicle would be identified and only in the field environment, so mass collection of this information would be difficult. |
This flow is core to automated vehicle merge and lane change operations; flaws in the data could result in a crash, and so integrity should be ensured to the highest practical level. |
L4/5 ADS will operate more smoothly if this flow works, but as the vehicle fleet will include L0 vehicles for the foreseeable future, any ADS must use other methods to ensure safe operation anyway. May be MODERATE in ADS-dedicated facilities. |
| Vehicle |
Other Vehicles |
vehicle path prediction |
Not Applicable |
High |
Moderate |
| This data is intentionally transmitted to other vehicles operating in a cluster. |
Vehicle path data is critical to the performance of a group of vehicles in a vehicle cluster scenario. Incorrect data here could trigger a severe accident scenario. |
Some vehicle cluster scenarios cannot function without this flow. Worst case is that some vehicles will drop from the platoon however, which while significant to mobility does not have a direct severe consequence. |
| Vehicle |
Other Vehicles |
vehicle profile |
Low |
High |
Moderate |
| Includes no PII and probably includes information that could be observed, so no need for obfuscation. |
Vehicle profile data is critical to the performance of a group of vehicles in a vehicle cluster scenario. Incorrect data here could trigger a severe accident scenario. |
This flow enables various services; if the flow is not available the vehicle may not be able to use those services, and also may be charged incorrectly. |
| Vehicle Characteristics |
ITS Roadway Equipment |
vehicle characteristics |
|
|
|
|
|
|
| Vehicle Characteristics |
Vehicle |
vehicle characteristics |
|
|
|
|
|
|
| Vulnerable Road Users |
Vehicle |
vulnerable road user presence |
|
|
|
|
|
|