US: NTCIP Roadside Unit - SNMPv3/TLS

Description

This solution is used within the U.S.. It combines standards associated with US: NTCIP Roadside Unit with those for I–F: SNMPv3/TLS. The US: NTCIP Roadside Unit standards include upper–layer standards required to implement center–to–field roadside unit communications. The I–F: SNMPv3/TLS standards include lower–layer standards that support secure center–to–field and field–to–field communications using simple network management protocol (SNMPv3); implementations are strongly encouraged to use the TLS for SNMP security option for this solution to ensure adequate security.

Includes Standards

LevelDocNumFullNameDescription
MgmtNTCIP 1201NTCIP Global Object (GO) DefinitionsThis standard defines SNMP objects (data elements) used by a wide range of field devices like time and versioning information.
MgmtIETF RFC 3411An Architecture for Describing Simple Network Management Protocol (SNMP) Management FrameworksThis standard (RFC) defines the basic architecture for SNMPv3 and includes the definition of information objects for managing the SNMP entity's architecture.
MgmtIETF RFC 3412Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)This standard (RFC) contains a MIB that assists in managing the message processing and dispatching subsystem of an SNMP entity.
MgmtIETF RFC 3413Simple Network Management Protocol (SNMP) ApplicationsThis standard (RFC) includes MIBs that allow for the configuration and management of remote Targets, Notifications, and Proxys.
MgmtIETF RFC 3414User–based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)This standard (RFC) contains a MIB that assists in configuring and managing the user–based security model.
MgmtIETF RFC 3415View–based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)This standard (RFC) contains a MIB that supports the configuration and management of the View–based access control model of SNMP.
MgmtIETF RFC 3416Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP)This standard (RFC) defines the message structure and protocol operations used by SNMPv3.
MgmtIETF RFC 3418Management Information Base (MIB) for the Simple Network Management Protocol (SNMP)This standard (RFC) defines the MIB to configure and manage an SNMP entity.
MgmtIETF RFC 4293Management Information Base for the Internet Protocol (IP)This standard (RFC) defines the MIB that manages an IP entity.
SecurityIETF RFC 6353Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP)This standard (RFC) defines how to use the TLS authentication service to provide authentication within the access control mechanism of SNMP.
ITS Application EntityNTCIP 1218National Transportation Communications for ITS Protocol – Object Definitions for Roadside Units (RSUs)This standard defines SNMP objects (data elements) for monitoring and efficiently controlling roadside units.
FacilitiesNTCIP 1218National Transportation Communications for ITS Protocol – Object Definitions for Roadside Units (RSUs)This standard defines SNMP objects (data elements) for monitoring and efficiently controlling roadside units.
FacilitiesIETF RFC 3411An Architecture for Describing Simple Network Management Protocol (SNMP) Management FrameworksThis standard (RFC) defines the basic architecture for SNMPv3 and includes the definition of information objects for managing the SNMP entity's architecture.
FacilitiesIETF RFC 3412Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)This standard (RFC) contains a MIB that assists in managing the message processing and dispatching subsystem of an SNMP entity.
FacilitiesIETF RFC 3413Simple Network Management Protocol (SNMP) ApplicationsThis standard (RFC) includes MIBs that allow for the configuration and management of remote Targets, Notifications, and Proxys.
FacilitiesIETF RFC 3414User–based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)This standard (RFC) contains a MIB that assists in configuring and managing the user–based security model.
FacilitiesIETF RFC 3415View–based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)This standard (RFC) contains a MIB that supports the configuration and management of the View–based access control model of SNMP.
FacilitiesIETF RFC 3416Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP)This standard (RFC) defines the message structure and protocol operations used by SNMPv3.
TransNetIETF RFC 2460Internet Protocol, Version 6 (IPv6) SpecificationThis standard (RFC) specifies version 6 of the Internet Protocol (IPv6), also sometimes referred to as IP Next Generation or IPng.
TransNetIETF RFC 4291IP Version 6 Addressing ArchitectureThis standard (RFC) defines the addressing architecture of the IP Version 6 (IPv6) protocol. It includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.
TransNetIETF RFC 4443Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) SpecificationThis standard (RFC) defines the control messages to manage IPv6.
TransNetIETF RFC 793Transmission Control ProtocolThis standard (RFC) defines the main connection–oriented Transport Layer protocol used on Internet–based networks.
AccessNTCIP 2104NTCIP SP–EthernetThis standard defines the Access Layer for center–to–field communications where the local connection is some variant of Ethernet.

Readiness: High–Moderate

Readiness Description

One significant or possibly a couple minor issues. For existing deployments, the chosen solution likely has identified security or management issues not addressed by the communications solution. Deployers should consider additional security measures, such as communications link and physical security as part of these solutions. They should also review the management issues to see if they are relevant to their deployment and would require mitigation. For new deployments, the deployment efforts should consider a path to addressing these issues as a part of their design activities. The solution does not by itself provide a fully secure implementation without additional work.

Issues

IssueSeverityDescriptionAssociated StandardAssociated Triple
Data not fully defined (medium)MediumSome of the data elements for this information flow are not fully defined.(None)City of Cuyahoga Falls Maintenance Dispatch=>equipment control commands=>County and City Connected Vehicles Roadside Equipment
Data not fully defined (medium)MediumSome of the data elements for this information flow are not fully defined.(None)ODOT ATMS=>equipment control commands=>ODOT Connected Vehicles Roadside Equipment
Data not fully defined (medium)MediumSome of the data elements for this information flow are not fully defined.(None)ODOT Traffic Signal Control System=>equipment control commands=>ODOT Connected Vehicles Roadside Equipment
Data not fully defined (medium)MediumSome of the data elements for this information flow are not fully defined.(None)OTIC Central Dispatch=>equipment control commands=>OTIC Connected Vehicles Roadside Equipment
Data not fully defined (medium)MediumSome of the data elements for this information flow are not fully defined.(None)Other Municipalities Maintenance Dispatch=>equipment control commands=>County and City Connected Vehicles Roadside Equipment
Data not fully defined (medium)MediumSome of the data elements for this information flow are not fully defined.(None)Summit County Maintenance Dispatch=>equipment control commands=>County and City Connected Vehicles Roadside Equipment
Data not fully defined (medium)MediumSome of the data elements for this information flow are not fully defined.(None)City of Stow Maintenance Dispatch=>equipment control commands=>County and City Connected Vehicles Roadside Equipment
Data not fully defined (medium)MediumSome of the data elements for this information flow are not fully defined.(None)City of Green Maintenance Dispatch=>equipment control commands=>County and City Connected Vehicles Roadside Equipment
Data not fully defined (medium)MediumSome of the data elements for this information flow are not fully defined.(None)City of Akron Maintenance Dispatch=>equipment control commands=>County and City Connected Vehicles Roadside Equipment
Data not fully defined (medium)MediumSome of the data elements for this information flow are not fully defined.(None)Portage County Maintenance Dispatch=>equipment control commands=>County and City Connected Vehicles Roadside Equipment
Data not fully defined (medium)MediumSome of the data elements for this information flow are not fully defined.(None)City of Hudson Maintenance Dispatch=>equipment control commands=>County and City Connected Vehicles Roadside Equipment
Data not fully defined (medium)MediumSome of the data elements for this information flow are not fully defined.(None)City of Twinsburg Maintenance Dispatch=>equipment control commands=>County and City Connected Vehicles Roadside Equipment
Data not fully defined (medium)MediumSome of the data elements for this information flow are not fully defined.(None)City of Barberton Maintenance Dispatch=>equipment control commands=>County and City Connected Vehicles Roadside Equipment
Data not fully defined (medium)MediumSome of the data elements for this information flow are not fully defined.(None)City of Kent Maintenance Dispatch=>equipment control commands=>County and City Connected Vehicles Roadside Equipment
Out of date (medium)MediumThe standard includes normative references to other standards that have been subject to significant changes that can impact interoperability or security of systems and the industry has not specified if and how these updates should be implemented for deployments of this standard.IETF RFC 6353 TLS for SNMP(All)
Still under developmentMediumA draft of the standard has been developed by the working group, but it was still under development at the time this analysis was performed.NTCIP RSUs(All)
Use TLS for SNMP OptionLowThe standard allows for multiple security mechanisms. The only defined mechanism that meets the requirements for C–ITS is the one based on TLS.(None)(All)

Supports Interfaces

SourceDestinationFlow
Akron–Canton Airport Connected Vehicle Roadside EquipmentAkron–Canton Airport CV Service Monitoring SystemsRSE status
City of Akron Maintenance DispatchCounty and City Connected Vehicles Roadside Equipmentequipment control commands
City of Barberton Maintenance DispatchCounty and City Connected Vehicles Roadside Equipmentequipment control commands
City of Cuyahoga Falls Maintenance DispatchCounty and City Connected Vehicles Roadside Equipmentequipment control commands
City of Green Maintenance DispatchCounty and City Connected Vehicles Roadside Equipmentequipment control commands
City of Hudson Maintenance DispatchCounty and City Connected Vehicles Roadside Equipmentequipment control commands
City of Kent Maintenance DispatchCounty and City Connected Vehicles Roadside Equipmentequipment control commands
City of Stow Maintenance DispatchCounty and City Connected Vehicles Roadside Equipmentequipment control commands
City of Twinsburg Maintenance DispatchCounty and City Connected Vehicles Roadside Equipmentequipment control commands
County and City Connected Vehicles Roadside EquipmentCounty and City CV Service Monitoring SystemsRSE status
ODOT ATMSODOT Connected Vehicles Roadside Equipmentequipment control commands
ODOT Connected Vehicles Roadside EquipmentOhio CV Service Monitor SystemRSE status
ODOT Traffic Signal Control SystemODOT Connected Vehicles Roadside Equipmentequipment control commands
Other Municipalities Maintenance DispatchCounty and City Connected Vehicles Roadside Equipmentequipment control commands
OTIC Central DispatchOTIC Connected Vehicles Roadside Equipmentequipment control commands
OTIC Connected Vehicles Roadside EquipmentOTIC CV Service Monitoring SystemRSE status
Portage County Maintenance DispatchCounty and City Connected Vehicles Roadside Equipmentequipment control commands
Summit County Maintenance DispatchCounty and City Connected Vehicles Roadside Equipmentequipment control commands