FGVM-02 Architecture of Vehicle Multimedia Systems

FGVM-02 Architecture of Vehicle Multimedia Systems

International Telecommunication U n i o n ITU-T Technical Report TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (13 April 2021) Focus Group on Vehicular Multimedia (FG-VM) FGVM-02 Architecture of Vehicle Multimedia Systems - 2 - Acknowledgement This Technical Report was prepared under the leadership of Mr. Jun Li, Chair of ITU-T FG-VM (TIAA, China) and Yajun Kou, Chair of ITU-T FG-VM Working Group 2 (Global Fusion Media Technology and Development Co. Ltd, China). It is based on the contributions of numerous authors who participated in the Focus Group activities. Due credit is given to the following Focus Group participants: Srinivasagan Ayyappan, Yansong Guo (Great Wall Motors, Co, LTD, China); Yajun Kou, Jun Li (Global Fusion Media Technology and Development Co. Ltd, China); Koji Nakao (National Institute of Information and Communications Technology, Japan); Stiepan A. Kovac (QRCrypto SA; CEuniX.eu Project); Paolo Volpato, Francois Fischer (Huawei Technologies); Latif Ladid (IPv6 Forum); Jonas Walter (Technical University of Darmstadt Institute of Ergonomics & Human Factors); Gaëlle Martin-Cocher (InterDigital Canada, Lte, Canada); Prakash Ranganathan (University of North Dakota); Sébastien Ziegler, Anna Brékine, Cédric Crettaz (Mandat International); and Pradipta Biswas (Indian Institute of Science). Srinivasagan Ayyappan (Great Wall Motors, Co, LTD, China) served as the main Editor of this Technical Report. Stefano Polidori (Advisor), Mythili Menon (Project Officer), and Carolina Lima (Assistant) served as the FG-VM Secretariat. - 3 - CONTENTS Page 1 Scope ......................................................................................................................................... 8 2 References ................................................................................................................................. 8 3 Terms and definitions ............................................................................................................... 8 3.1 Terms defined elsewhere ............................................................................................ 8 3.2 Terms defined here ..................................................................................................... 8 4 Abbreviations and acronyms..................................................................................................... 8 5 Conventions ............................................................................................................................ 10 6 Background ............................................................................................................................. 10 7 VMS configuration ................................................................................................................. 10 7.1 VMS features ............................................................................................................ 10 7.2 Reference VMS features ........................................................................................... 10 7.3 VMS configuration ................................................................................................... 13 7.3.1 Deciding factors ........................................................................................... 13 8 Overall architecture of vehicular multimedia network ........................................................... 13 9 Network architecture for vehicular telematics connectivity services ..................................... 14 9.1 Defining factors ........................................................................................................ 14 9.1.1 Media entertainment ..................................................................................... 14 9.1.2 User access control ....................................................................................... 14 9.1.3 Captive portal ............................................................................................... 14 9.1.4 Bandwidth control ........................................................................................ 14 9.1.5 Local telecommunications regulations control ............................................. 15 9.1.6 Network access services ............................................................................... 15 9.1.7 Vehicle tracking ........................................................................................... 15 9.1.8 Centralized management .............................................................................. 15 9.2 Connected vehicle landscape .................................................................................... 15 9.2.1 Major components ........................................................................................ 15 9.2.2 Services provided by these components ....................................................... 15 9.3 Reference architecture for vehicular telematics connectivity services ..................... 16 9.3.1 Devices ......................................................................................................... 16 9.3.2 Access ........................................................................................................... 16 9.3.3 Service providers service delivery ............................................................... 17 9.3.4 Applications and application level service delivery ..................................... 17 9.3.5 OEM enterprise integration .......................................................................... 17 9.3.6 Third party services ...................................................................................... 17 9.3.7 Mobile network operators (MNOs) .............................................................. 17 - 4 - Page 10 VMS Architecture ................................................................................................................... 17 10.1 Definitions ................................................................................................................ 18 10.1.1 Core functions .............................................................................................. 18 10.1.2 VMS architecture deciding factors ............................................................... 18 10.1.3 Reference model of VMS architecture ......................................................... 19 11 Network architecture for vehicular multimedia streaming services ....................................... 20 11.1 Reference architecture of VMSP .............................................................................. 20 11.2 Reference protocol stack for convergence transmission .......................................... 22 11.3 Reference architecture of receivers .......................................................................... 23 11.4 Suggestions for the networking architecture ............................................................ 24 12 VMS Security.......................................................................................................................... 25 12.1 Overview ................................................................................................................... 25 12.2 Assumed threats to VMS and its ecosystem ............................................................. 25 12.2.1 Threats regarding vehicle multimedia service platform (VMSP) ................ 25 12.2.2 Threats to vehicles regarding their communication channels ...................... 26 12.2.3 Threats to vehicles regarding their update procedures ................................. 26 12.2.4 Threats to vehicles regarding their external connectivity and connections ................................................................................................... 27 12.3 Security capabilities based on identified threats ....................................................... 27 12.3.1 Identity and access management (IAM), authentication, authorization and transaction audit ............................................................... 27 12.3.2 Interface security .......................................................................................... 28 12.3.3 Network security .......................................................................................... 28 12.3.4 Operational security ..................................................................................... 28 12.3.5 Software and firmware updates .................................................................... 28 12.3.6 Application security ..................................................................................... 29 12.3.7 Incident management ................................................................................... 29 12.3.8 Cryptography ................................................................................................ 29 12.3.9 Hardware security ......................................................................................... 29 12.3.10 General security capabilities ........................................................................ 30 13 Personally identifiable information (PII) protection and privacy ........................................... 31 13.1 Information sources .................................................................................................. 32 13.2 Implementation of PII protection: General considerations ....................................... 32 13.3 Data visibility and transparency ..............................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    35 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us