Vehicle
to Vehicle
Infrastructure

Protecting the Highways of Tomorrow

The auto industry is on its way to put collision avoidance systems in every new vehicle. The cars of tomorrow will communicate with each other – privately and securely – to warn the driver and avoid impending collisions.

This new system uses Elliptic Curve Cryptography (ECC) to achieve the efficiency needed for the anonymous-but-authentic messages that will be sent in the billions daily. TrustPoint is helping to design and build this next generation safety system.

Large Scale Infrastructure

When fully deployed, the Vehicle to Vehicle security infrastructure will be the largest public key system ever deployed, by several orders of magnitude. TrustPoint’s expertise in large scale mobile applications will help ensure the design is robust and scalable.

Unique and Challenging Requirements

The Vehicle to Vehicle collision avoidance project has many specialized requirements that don’t exist in conventional PKIs. For example, one of the highest priorities is to ensure anonymity for the vehicle. That would be easy enough, but the vehicle must also send signed messages and it must be possible to revoke its certificates without breaking the anonymity requirement.

TrustPoint understands the special nature of such large scale systems and can develop custom solutions to them.

Intelligent Transportation Systems

V2V Communications enable lots of other applications that will improve the driving experience. As a part of a wider Intelligent Transportation System (ITS), V2V communications will help reduce road congestion, rerouting navigation systems automatically to minimize drive times and emissions. ITS can enable dynamic traffic management systems that will change settings to optimize travel depending on the weather, traffic conditions, and other factors.

Watch Vehicle-to-Vehicle Security in Action

Watch this three minute demonstration to see how the security protecting vehicle-to-vehicle communication assures drivers they are reacting to reliable information. When you have a split second to react, trust is the most important factor.

What is Your Big Project?

Tell us about your own large scale security application. TrustPoint has a record of innovations in security and we’d be happy to help you build something special.