Standard

IEEE 3130-2024

Published

Corrigenda and amendments are sold separately. VAT will be charged at the prevailing rate.

Language
Services

Abstract

New IEEE Standard - Active. The main assets and threats targeting operating systems used in connected vehicles are identified. The security requirements of the operating systems to support the core security functions in connected vehicles are defined. A set of test methods is established to evaluate the security of operating systems in connected vehicles.

Document information

  • Standard from IEEE
  • Published:
  • Document type: IS
  • Publisher IEEE
  • Distributor IEEE
  • ICS 35.240.60
  • Technical Committee IEEE Vehicular Technology Society / Intelligent Transportation Systems

Product Relations

  • Refers: ISO/IEC 11770-2, IT Security techniques--Key management---Part 2: Mechanisms using symmetric techniques.
  • Refers: ISO/IEC 18033-2, Information technology--Security techniques--Encryption algorithms--Part 2: Asymmetric ciphers.
  • Refers: ISO/IEC 18033-1, Information security--Encryption algorithms--Part 1: General.
  • Refers: ISO/IEC 14888-1, Information technology--Security techniques--Digital signatures with appendix--Part 1: General.
  • Refers: ISO/IEC 18033-3, Information technology--Security techniques--Encryption algorithms--Part 3: Block ciphers.
  • Refers: ISO/IEC 10118-1, Information technology--Security techniques--Hash-functions--Part 1: General.
  • Refers: ISO/IEC 11770-3, IT Security techniques--Key management--Part 3: Mechanisms using asymmetric techniques.