BS EN 15509:2014
$215.11
Electronic fee collection. Interoperability application profile for DSRC
Published By | Publication Date | Number of Pages |
BSI | 2014 | 74 |
The scope for this European Standard is limited to:
-
payment method: Central account based on EFC-DSRC;
-
physical systems: OBU, RSE and the DSRC interface between them (all functions and information flows related to these parts);
-
DSRC-link requirements;
-
EFC transactions over the DSRC interface;
-
data elements to be used by OBU and RSE used in EFC-DSRC transactions;
-
security mechanisms for OBU and RSE used in EFC-DSRC transactions.
The scope of this European Standard is illustrated in Figure 1.
[Image removed.]
It is outside the scope of this European Standard to define:
-
contractual and procedural interoperability requirements (including issues related to a Memorandum of Understanding, MoU);
-
conformance procedures and test specification (this is provided in a separate set of standards);
-
setting-up of operating organizations (e.g. toll charger, toll service provider, trusted third party, etc.);
-
legal issues;
-
other payment methods in DSRC-based EFC (e.g. on-board accounts using integrated circuit cards);
-
other basic technologies (e.g. GNSS/CN or video registration based EFC). However, this European Standard may be used for defining the DSRC-EFC parts for the use in applications that implement a mix of different technologies;
-
non-EFC transactions over the DSRC interface (e.g. CCC and LAC communication, which is defined in other standards);
-
other interfaces or functions in EFC-systems than those specified above (i.e. information flows and data exchange between operators or personalization, initialization and customization of the OBU).
Some of these issues are subject to separate standards prepared by CEN/TC 278, ISO/TC 204 or ETSI ERM.
Figure 2 shows the scope of this European Standard from a DSRC-stack perspective.
[Image removed.]
PDF Catalog
PDF Pages | PDF Title |
---|---|
3 | Electronic fee collection โ Interoperability application profile for DSRC |
7 | Foreword |
9 | Introduction |
11 | 1 Scope Figure 1 โ Scope for this European Standard (within the box delimited with a dotted line) |
12 | Figure 2 โ Relationship between this European Standard and DSRC-stack elements |
13 | 2 Normative references 3 Terms and definitions |
16 | 4 Symbols and abbreviations |
18 | 5 Conformance 5.1 General 5.2 Base standards |
19 | Figure 3 โ Relationship and references between base standards and EN 15509 5.3 Main contents of an EFC-DSRC-IAP |
20 | 5.4 Conformance requirements 5.5 Conformation notification 5.6 Conformance evaluation and testing 5.7 Multiple IAPs 6 Requirements for EFC-DSRC-IAP 1 6.1 OBU requirements 6.1.1 General 6.1.2 DSRC requirements |
21 | 6.1.3 DSRC L7 and EFC functions Table 1 โ Overview of DSRC L7 and EFC functions 6.1.4 Data requirements Table 2 โ Overview of the OBU EFC application data |
23 | 6.1.5 Security requirements 6.1.5.1 General 6.1.5.2 Security level 0 requirements Table 3 โ Overview of the OBU security related data |
24 | 6.1.5.3 Security level 1 requirements Table 4 โ OBU security related data for handling of Access Credentials 6.1.6 Transaction requirements 6.2 RSE requirements 6.2.1 General 6.2.2 DSRC requirements 6.2.3 DSRC L7 and EFC functions |
25 | Table 5 โ Overview of DSRC L7 and EFC functions 6.2.4 Data requirements 6.2.5 Security requirements 6.2.5.1 General 6.2.5.2 Security level 0 requirements 6.2.5.3 Security level 1 requirements |
26 | 6.2.6 Transaction requirements |
27 | Annex A (normative) Data specification Table A.1 โ Application related data (defined in EN 12834) |
28 | Table A.2 โ Vehicle data (defined in EN ISO 14906) |
29 | Table A.3 โ Equipment data (defined in EN ISO 14906) |
30 | Table A.4 โAuthentication keys, access keys and security related data |
31 | Annex B (normative) Security calculations B.1 General B.2 Attribute authenticator B.2.1 General |
32 | Figure B.1 โ Illustration of calculation of an authenticator, where โ denotes the XOR operation B.2.2 Authenticator using the attribute Payment Means |
33 | Table B.1 โ Content of M used as input to generate the authenticator of the PaymentMeans attribute |
34 | Figure B.2 โ Computation of the PaymentMeans authenticator where โ denotes the XOR operation B.3 Access Credentials B.3.1 General B.3.2 The principle of Access Credentials Figure B.3 โ The principle of access control to the OBU data |
35 | B.3.3 Calculation of Access Credentials Figure B.4 โ Calculation of Access Credentials |
36 | B.4 Key derivation B.4.1 General B.4.2 Calculation of derived Authentication Key B.4.3 Calculation of the Access Key |
37 | B.5 Transaction Counter |
38 | Annex C (normative) Implementation conformance statement proforma C.1 General C.2 Guidance for completing the ICS proforma C.2.1 Purposes and structure C.2.2 Abbreviations and conventions C.2.2.1 General C.2.2.2 Item column C.2.2.3 Item description column |
39 | C.2.2.4 Status column C.2.2.5 Reference column C.2.2.6 Support column C.2.2.7 Values allowed column |
40 | C.2.2.8 Values supported column C.2.2.9 References to items C.2.2.10 Prerequisite line C.3 Instructions for completing the ICS proforma C.4 ICS proforma for OBU C.4.1 Identification implementation C.4.1.1 Identification of OBU supplier Table C.1 โ Identification of OBU supplier form |
41 | C.4.1.2 Identification of OBU Table C.2 โ Identification of OBU form C.4.2 Identification of the standard C.4.3 Global statement of conformance C.4.4 ICS proforma for OBU Table C.3 โ Security level Table C.4 โ DSRC requirements |
42 | Table C.5 โ DSRC L7 and EFC functions Table C.6 โ Data requirements |
43 | Table C.7 โ Security requirements Table C.8 โ Security requirements Table C.9 โ Transaction requirements C.4.5 Profile requirements list for OBU C.4.5.1 General |
44 | C.4.5.2 Profile requirements list (profile RL) C.4.5.3 Reference column: C.4.5.4 Data link layer Table C.10 โ LLC Service Modes Table C.11 โ ACn command functionality Table C.12 โ MAC Control field values Table C.13 โ ACn protocol procedures |
45 | C.4.5.5 Application layer Table C.14 โ T-Kernel Procedures Table C.15 โ T-Kernel PDUs Table C.16 โ Received Get-Request Parameters Table C.17 โ Transmitted Get-Response Parameters Table C.18 โ Received Set-Request Parameters |
46 | Table C.19 โ Transmitted Set-Response Parameters Table C.20 โ Received Action-Request Parameters Table C.21 โ Transmitted Action-Response Parameters Table C.22 โ Received Event-Report-Request Parameters Table C.23 โ Valid frames Table C.24 โ Allowed frames |
47 | C.5 ICS proforma for RSE C.5.1 Identification implementation C.5.1.1 Identification of RSE supplier Table C.25 โ Identification of RSE supplier form C.5.1.2 Identification of RSE Table C.26 โ Identification of RSE form C.5.2 Identification of the standard C.5.3 Global statement of conformance C.5.4 ICS proforma for RSE Table C.27 โ Security level |
48 | Table C.28 โ DSRC requirements Table C.29 โ L7 and EFC functions |
49 | Table C.30 โ Data requirements Table C.31 โ Security requirements |
50 | Table C.32 โ Security requirements Table C.33 โ Transaction requirements C.5.5 Profile requirements list for RSE C.5.5.1 General C.5.5.2 Profile requirements list (profile RL) C.5.5.3 Reference column C.5.5.4 Data link layer Table C.34 โ LLC Service Modes |
51 | Table C.35 โ ACn command functionality Table C.36 โ MAC Control field values Table C.37 โ ACn protocol procedures C.5.5.5 Application layer Table C.38 โ T-Kernel Procedures Table C.39 โ T-Kernel PDUs |
52 | Table C.40 โ Transmitted Get-Request Parameters Table C.41 โ Received Get-Response Parameters Table C.42 โ Transmitted Set-Request Parameters Table C.43 โ Received Set-Response Parameters Table C.44 โ Transmitted Action-Request Parameters Table C.45 โ Received Action-Response Parameters Table C.46 โ Transmitted Event-Report-Request Parameters |
53 | Table C.47 โ Allowed frames Table C.48 โ Valid frames |
54 | Annex D (informative) IAP taxonomy and numbering D.1 General D.2 Contents of an Interoperable Application Profile (IAP) |
55 | D.3 IAP referencing and numbering D.3.1 IAP numbering D.3.2 Security levels numbering D.3.3 Numbering and referencing examples |
56 | Annex E (informative) Security computation examples E.1 General E.2 Computation of Attribute Authenticator |
57 | E.3 Computation of Access Credentials E.4 Key derivation E.4.1 Authenticator Key |
58 | E.4.2 Access Credentials Key |
59 | Annex F (informative) Security Considerations |
60 | Annex G (informative) Interlayer management G.1 General G.2 RSE Inter Layer Management guidelines G.3 OBU Inter Layer Management guidelines G.4 State Transition Tables |
61 | Table G.1 โ Identification of downlink frames used in transition table Table G.2 โ Identification of uplink frames used in transition table Table G.3 โ Events not from reception of frames |
62 | Table G.4 โ State transition table |
66 | Annex H (informative) Mounting guidelines for the OBU H.1 General H.2 OBU mounting position |
67 | Figure H.1 โ OBU active angle (vertically) for car Figure H.2 โ OBU active angle (vertically) for truck |
68 | Figure H.3 โ OBU active angle (vertically) for bus |
69 | Annex I (informative) Use of this standard for the EETS I.1 General I.2 Overall relationship between European standardization and the EETS I.3 European standardisation work supporting the EETS |
70 | I.4 Correspondence between this standard and the EETS Table I.1 โ Correspondence between this European Standard and Decision 2009/750/EC “on the definition of the European Electronic Toll Service and its technical elements” harmonizing 2004/52/EC |
71 | Bibliography |