Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
| Ç¥ÁعøÈ£ | TTAK.KO-12.0432 | ±¸Ç¥ÁعøÈ£ | |
|---|---|---|---|
| Á¦°³Á¤ÀÏ | 2025-12-05 | ÃÑÆäÀÌÁö | 22 |
| ÇѱÛÇ¥Áظí | C-ITS ¼ºñ½º¸¦ À§ÇÑ V2X Åë½Å º¸¾È ½ÃÇè Áöħ | ||
| ¿µ¹®Ç¥Áظí | V2X Communication Security Test Guidelines for C-ITS Services | ||
| Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØ¿¡¼´Â C-ITS ¼ºñ½º Á¦°øÀ» À§ÇÑ V2X Åë½Å¿¡ ´ëÇØ ¼³¸íÇϰí, V2X Åë½Å ½Ã¿¡ ¹ß»ýÇÒ ¼ö ÀÖ´Â »çÀ̹ö º¸¾È À§Çù¿¡ ´ëÇØ ¼³¸íÇÑ´Ù. ±×¸®°í V2X Åë½Å ȯ°æ¿¡¼ º¸¾È¼º Çâ»óÀ» À§ÇØ IEEE 1609.2 ±â¹Ý ÀÎÁõ¼ °ËÁõ ±â´É°ú ±â¹Ð¼ºÀ» À§ÇÑ ¸Þ½ÃÁö ¾ÏÈ£È ±â´É, OBU ¸Þ¸ð¸®³» ÀúÀåµÈ Áß¿ä µ¥ÀÌÅÍ¿¡ ´ëÇÑ ¹«°á¼º °ËÁõ ±â´É, ¼ºñ½º °ÅºÎ(DoS, Denial of Service) °ø°Ý ¹æ¾î ±â´É µî¿¡ ´ëÇÑ º¸¾È¼º Æò°¡ ¹æ¹ý°ú ±âÁØÀ» Ç¥ÁØÈÇÑ´Ù. | ||
| ¿µ¹®³»¿ë¿ä¾à | This standard describes V2X communication for providing C-ITS services and addresses potential cybersecurity threats that may arise during V2X communication. It also standardizes security evaluation methods and criteria for functions enhancing security in the V2X communication environment, including certificate verification based on IEEE 1609.2, message encryption for confidentiality, integrity verification for critical data stored in OBU memory, and DoS attack defense capabilities. | ||
| ±¹Á¦Ç¥ÁØ | |||
| °ü·ÃÆÄÀÏ |
| ||





