Encryption and authentication for V2X applications
The fundamental technology
for autonomous driving.
V2X (vehicle-to-everything) refers to the wireless technology that enables both direct and indirect communications from vehicles to vehicles (V2V), from vehicles to infrastructure (V2I), and from vehicles to pedestrians (V2P). V2X is the fundamental technology for Cooperative Intelligent Transport Systems (C-ITS) and a crucial enabler for safer and smarter autonomous driving (L3 and above). This technology is secured by AutoCrypt V2X.
AutoCrypt V2X consists of an SDK (software development kit) that can be embedded into the V2X connectivity units of vehicles (onboard units) and infrastructure (roadside units), ensuring that the basic safety messages (BSM) transmitted between these participants are safely encrypted and two-way authenticated.
The other component, AutoCrypt V2X-PKI (AutoCrypt SCMS), is a PKI-based authentication system with demonstrated tri-standard compatibility for the North American SCMS, European CCMS, and Chinese C-SCMS. It is built to support IEEE 1609.2, ETSI, GB/T, YD/T 3957-2021, and WP.29.
How It Works
Encryption and Digital Signature: Securing the BSMs Transmitted Between OBUs and RSUs.
AutoCrypt V2X utilizes its encryption library to secure V2X communications through message encryption, validity inspection, and data scanning.
Besides protecting the data through encryption, AutoCrypt SCMS confirms that every message can be trusted. This is done by verifying and signing the digital certificates of V2X participants using PKI-based authentication, guaranteeing that all entities are who they claim to be.
Between these two is AutoCrypt LCM (Local Certificate Manager), which stores and manages all user certificates verified and signed by AutoCrypt SCMS locally. This allows AutoCrypt V2X to excel in performance by reducing its computational load.
AutoCrypt V2X, Core Technologies
Learn how AUTOCRYPT’s technologies can advance vehicle security and ensure data integrity.
Provides the necessary forms, protocols, and algorithms for communication encryption
Supports a wide range of hardware security modules
Validates both sent and received messages by utilizing the encryption library
Extremely fast data throughput
Verifies the validity of digital signatures and stores them locally
Easily manages a great number of certificates