EU: SIRI - Secure Internet (ITS)
Description:
This solution is used within the E.U.. It combines standards associated with EU: SIRI with those for I-I: Secure Internet (ITS). The EU: SIRI standards include upper-layer standards required to implement C2C information flows for real-time public transport information. The I-I: Secure Internet (ITS) standards include lower-layer standards that support secure communications between ITS equipment using X.509 or IEEE 1609.2 security certificates.Relevant Regions:
- European Union
Comm Profile: I-I: Secure Internet (ITS)
Comm Class: WAN - Wide Area Network
Standards in Profile:
Level | Standard |
---|---|
Access | Internet Subnet Alternatives |
Mgmt | Bundle: SNMPv3 MIB |
Security | Secure Session Alternatives |
TransNet | Internet Transport Alternatives |
TransNet | IP Alternatives |
Data Profile: EU: SIRI
Standards in Profile:
Level | Standard |
---|---|
Facilities | CEN 15531-2 PublicTrans - SIRI Communications |
ITS Application Entity | CEN 12896-4: Transmodel Operations monitoring and control |
ITS Application Entity | CEN 12896-6: Transmodel Passenger Information |
ITS Application Entity | CEN 15213-4 After-theft systems - long range comms |
ITS Application Entity | CEN 15531-3 PublicTrans - SIRI Functional interfaces |
ITS Application Entity | CEN 15531-5 PublicTrans - SIRI Situation Xchange |
Solution Issues Severity: 3
The severity issue score calculation only includes issues associated with standards that are included by default.
Solution Issues:
Default | Severity | Name | Type | Description |
---|---|---|---|---|
True | Medium | Secure data access not provided | Security Gap | The solution does not define rules on how the application entity authenticates requests to accept or provide data. |
False | Medium | Option not standardized | Standardization Gap | The option set includes at least one option that is not (yet) defined in a standard. |
False | Medium | Uncertainty about trust revocation mechanism | Security Gap | The mechanisms used to prevent bad actors from sending authorized messages is unproven. |
Solution to Triples
This solution is used on the following information flow triples: