Shopping Cart

No products in the cart.

BS EN 15509:2014

$215.11

Electronic fee collection. Interoperability application profile for DSRC

Published By Publication Date Number of Pages
BSI 2014 74
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weโ€™re here to assist you 24/7.
Email:[email protected]

The scope for this European Standard is limited to:

  • payment method: Central account based on EFC-DSRC;

  • physical systems: OBU, RSE and the DSRC interface between them (all functions and information flows related to these parts);

  • DSRC-link requirements;

  • EFC transactions over the DSRC interface;

  • data elements to be used by OBU and RSE used in EFC-DSRC transactions;

  • security mechanisms for OBU and RSE used in EFC-DSRC transactions.

The scope of this European Standard is illustrated in Figure 1.

[Image removed.]

It is outside the scope of this European Standard to define:

  • contractual and procedural interoperability requirements (including issues related to a Memorandum of Understanding, MoU);

  • conformance procedures and test specification (this is provided in a separate set of standards);

  • setting-up of operating organizations (e.g. toll charger, toll service provider, trusted third party, etc.);

  • legal issues;

  • other payment methods in DSRC-based EFC (e.g. on-board accounts using integrated circuit cards);

  • other basic technologies (e.g. GNSS/CN or video registration based EFC). However, this European Standard may be used for defining the DSRC-EFC parts for the use in applications that implement a mix of different technologies;

  • non-EFC transactions over the DSRC interface (e.g. CCC and LAC communication, which is defined in other standards);

  • other interfaces or functions in EFC-systems than those specified above (i.e. information flows and data exchange between operators or personalization, initialization and customization of the OBU).

Some of these issues are subject to separate standards prepared by CEN/TC 278, ISO/TC 204 or ETSI ERM.

Figure 2 shows the scope of this European Standard from a DSRC-stack perspective.

[Image removed.]

PDF Catalog

PDF Pages PDF Title
3 Electronic fee collection โ€” Interoperability application profile for DSRC
7 Foreword
9 Introduction
11 1 Scope
Figure 1 โ€” Scope for this European Standard (within the box delimited with a dotted line)
12 Figure 2 โ€” Relationship between this European Standard and DSRC-stack elements
13 2 Normative references
3 Terms and definitions
16 4 Symbols and abbreviations
18 5 Conformance
5.1 General
5.2 Base standards
19 Figure 3 โ€” Relationship and references between base standards and EN 15509
5.3 Main contents of an EFC-DSRC-IAP
20 5.4 Conformance requirements
5.5 Conformation notification
5.6 Conformance evaluation and testing
5.7 Multiple IAPs
6 Requirements for EFC-DSRC-IAP 1
6.1 OBU requirements
6.1.1 General
6.1.2 DSRC requirements
21 6.1.3 DSRC L7 and EFC functions
Table 1 โ€” Overview of DSRC L7 and EFC functions
6.1.4 Data requirements
Table 2 โ€” Overview of the OBU EFC application data
23 6.1.5 Security requirements
6.1.5.1 General
6.1.5.2 Security level 0 requirements
Table 3 โ€” Overview of the OBU security related data
24 6.1.5.3 Security level 1 requirements
Table 4 โ€” OBU security related data for handling of Access Credentials
6.1.6 Transaction requirements
6.2 RSE requirements
6.2.1 General
6.2.2 DSRC requirements
6.2.3 DSRC L7 and EFC functions
25 Table 5 โ€” Overview of DSRC L7 and EFC functions
6.2.4 Data requirements
6.2.5 Security requirements
6.2.5.1 General
6.2.5.2 Security level 0 requirements
6.2.5.3 Security level 1 requirements
26 6.2.6 Transaction requirements
27 Annex A (normative) Data specification
Table A.1 โ€” Application related data (defined in EN 12834)
28 Table A.2 โ€” Vehicle data (defined in EN ISO 14906)
29 Table A.3 โ€” Equipment data (defined in EN ISO 14906)
30 Table A.4 โ€”Authentication keys, access keys and security related data
31 Annex B (normative) Security calculations
B.1 General
B.2 Attribute authenticator
B.2.1 General
32 Figure B.1 โ€” Illustration of calculation of an authenticator, where โŠ• denotes the XOR operation
B.2.2 Authenticator using the attribute Payment Means
33 Table B.1 โ€” Content of M used as input to generate the authenticator of the PaymentMeans attribute
34 Figure B.2 โ€” Computation of the PaymentMeans authenticator where โŠ• denotes the XOR operation
B.3 Access Credentials
B.3.1 General
B.3.2 The principle of Access Credentials
Figure B.3 โ€” The principle of access control to the OBU data
35 B.3.3 Calculation of Access Credentials
Figure B.4 โ€” Calculation of Access Credentials
36 B.4 Key derivation
B.4.1 General
B.4.2 Calculation of derived Authentication Key
B.4.3 Calculation of the Access Key
37 B.5 Transaction Counter
38 Annex C (normative) Implementation conformance statement proforma
C.1 General
C.2 Guidance for completing the ICS proforma
C.2.1 Purposes and structure
C.2.2 Abbreviations and conventions
C.2.2.1 General
C.2.2.2 Item column
C.2.2.3 Item description column
39 C.2.2.4 Status column
C.2.2.5 Reference column
C.2.2.6 Support column
C.2.2.7 Values allowed column
40 C.2.2.8 Values supported column
C.2.2.9 References to items
C.2.2.10 Prerequisite line
C.3 Instructions for completing the ICS proforma
C.4 ICS proforma for OBU
C.4.1 Identification implementation
C.4.1.1 Identification of OBU supplier
Table C.1 โ€” Identification of OBU supplier form
41 C.4.1.2 Identification of OBU
Table C.2 โ€” Identification of OBU form
C.4.2 Identification of the standard
C.4.3 Global statement of conformance
C.4.4 ICS proforma for OBU
Table C.3 โ€” Security level
Table C.4 โ€” DSRC requirements
42 Table C.5 โ€” DSRC L7 and EFC functions
Table C.6 โ€” Data requirements
43 Table C.7 โ€“ Security requirements
Table C.8 โ€“ Security requirements
Table C.9 โ€“ Transaction requirements
C.4.5 Profile requirements list for OBU
C.4.5.1 General
44 C.4.5.2 Profile requirements list (profile RL)
C.4.5.3 Reference column:
C.4.5.4 Data link layer
Table C.10 โ€” LLC Service Modes
Table C.11 โ€” ACn command functionality
Table C.12 โ€” MAC Control field values
Table C.13 โ€” ACn protocol procedures
45 C.4.5.5 Application layer
Table C.14 โ€” T-Kernel Procedures
Table C.15 โ€” T-Kernel PDUs
Table C.16 โ€” Received Get-Request Parameters
Table C.17 โ€” Transmitted Get-Response Parameters
Table C.18 โ€” Received Set-Request Parameters
46 Table C.19 โ€” Transmitted Set-Response Parameters
Table C.20 โ€” Received Action-Request Parameters
Table C.21 โ€” Transmitted Action-Response Parameters
Table C.22 โ€” Received Event-Report-Request Parameters
Table C.23 โ€” Valid frames
Table C.24 โ€” Allowed frames
47 C.5 ICS proforma for RSE
C.5.1 Identification implementation
C.5.1.1 Identification of RSE supplier
Table C.25 โ€” Identification of RSE supplier form
C.5.1.2 Identification of RSE
Table C.26 โ€” Identification of RSE form
C.5.2 Identification of the standard
C.5.3 Global statement of conformance
C.5.4 ICS proforma for RSE
Table C.27 โ€” Security level
48 Table C.28 โ€” DSRC requirements
Table C.29 โ€” L7 and EFC functions
49 Table C.30 โ€” Data requirements
Table C.31 โ€” Security requirements
50 Table C.32 โ€” Security requirements
Table C.33 โ€” Transaction requirements
C.5.5 Profile requirements list for RSE
C.5.5.1 General
C.5.5.2 Profile requirements list (profile RL)
C.5.5.3 Reference column
C.5.5.4 Data link layer
Table C.34 โ€” LLC Service Modes
51 Table C.35 โ€” ACn command functionality
Table C.36 โ€” MAC Control field values
Table C.37 โ€” ACn protocol procedures
C.5.5.5 Application layer
Table C.38 โ€” T-Kernel Procedures
Table C.39 โ€” T-Kernel PDUs
52 Table C.40 โ€” Transmitted Get-Request Parameters
Table C.41 โ€” Received Get-Response Parameters
Table C.42 โ€” Transmitted Set-Request Parameters
Table C.43 โ€” Received Set-Response Parameters
Table C.44 โ€” Transmitted Action-Request Parameters
Table C.45 โ€” Received Action-Response Parameters
Table C.46 โ€” Transmitted Event-Report-Request Parameters
53 Table C.47 โ€” Allowed frames
Table C.48 โ€” Valid frames
54 Annex D (informative) IAP taxonomy and numbering
D.1 General
D.2 Contents of an Interoperable Application Profile (IAP)
55 D.3 IAP referencing and numbering
D.3.1 IAP numbering
D.3.2 Security levels numbering
D.3.3 Numbering and referencing examples
56 Annex E (informative) Security computation examples
E.1 General
E.2 Computation of Attribute Authenticator
57 E.3 Computation of Access Credentials
E.4 Key derivation
E.4.1 Authenticator Key
58 E.4.2 Access Credentials Key
59 Annex F (informative) Security Considerations
60 Annex G (informative) Interlayer management
G.1 General
G.2 RSE Inter Layer Management guidelines
G.3 OBU Inter Layer Management guidelines
G.4 State Transition Tables
61 Table G.1 โ€” Identification of downlink frames used in transition table
Table G.2 โ€” Identification of uplink frames used in transition table
Table G.3 โ€” Events not from reception of frames
62 Table G.4 โ€” State transition table
66 Annex H (informative) Mounting guidelines for the OBU
H.1 General
H.2 OBU mounting position
67 Figure H.1 โ€” OBU active angle (vertically) for car
Figure H.2 โ€” OBU active angle (vertically) for truck
68 Figure H.3 โ€” OBU active angle (vertically) for bus
69 Annex I (informative) Use of this standard for the EETS
I.1 General
I.2 Overall relationship between European standardization and the EETS
I.3 European standardisation work supporting the EETS
70 I.4 Correspondence between this standard and the EETS
Table I.1 โ€” Correspondence between this European Standard and Decision 2009/750/EC “on the definition of the European Electronic Toll Service and its technical elements” harmonizing 2004/52/EC
71 Bibliography
BS EN 15509:2014
$215.11