Re: [ipwave] Review of https://tools.ietf.org/html/draft-ietf-ipwave-vehicular-networking-14

"Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com> Thu, 30 April 2020 18:23 UTC

Return-Path: <ncamwing@cisco.com>
X-Original-To: its@ietfa.amsl.com
Delivered-To: its@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB17D3A0ECE for <its@ietfa.amsl.com>; Thu, 30 Apr 2020 11:23:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.597
X-Spam-Level:
X-Spam-Status: No, score=-9.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=QUsPx8VS; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=LSkrhoYU
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JUyjrDINWEGS for <its@ietfa.amsl.com>; Thu, 30 Apr 2020 11:23:36 -0700 (PDT)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1EBF43A0ECB for <its@ietf.org>; Thu, 30 Apr 2020 11:23:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=54023; q=dns/txt; s=iport; t=1588271016; x=1589480616; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=ELUZ3h7H6UVvnD1lJ/Gr+DjVxvTgf1yNQqPsWY3V01E=; b=QUsPx8VSqc4D5PR7+KiggudPcCP3k8KEvew0j9rpbwVkJGa9o2wOCyWj 5ADLl6vt+MGlkz3GsL91k6WktHSKE/MK4Hl5IfxJO+6S5EY+hQN4yT1gS kQBeVdwMlR8Co0QatGuB5xoBBCACDqkDMQ+tHdbb/FAi4/3vwzbfdUWwz 0=;
IronPort-PHdr: 9a23:6neVgRWnnt99W7AnHeJGUIJzUIrV8LGuZFwc94YnhrRSc6+q45XlOgnF6O5wiEPSBNyHuf1BguvS9avnXD9I7ZWAtSUEd5pBH18AhN4NlgMtSMiCFQXgLfHsYiB7eaYKVFJs83yhd0QAHsH4ag7dp3Sz6XgZHRCsfQZwL/7+T4jVicn/3uuu+prVNgNPgjf1Yb57IBis6wvLscxDiop5IaF3wRzM8XY=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0D/AQA6Fqte/5FdJa1MEAEJGwEBAQEBAQEBBQEBARIBAQEDAwEBAYIHgSUvJC0FblgvKgqEGINGA40fJYl3jjuBQoEQA1AECwEBAQwBARgBCgoCBAEBgVCBPoE2AheCGSQ4EwIDAQELAQEFAQEBAgEFBG2FKgYmDIVxAQEBAQMBARAICR0BASwCAwYBDQICAQYCEQMBAiEBBgMCAgIUCwYLFAkIAgQOBSKDBAGBfk0DLgEOPJdEkGcCgTmIYXaBMoMAAQEFgTYChBcNC4IOCQWBM4JjiUEdGoIAgTgMEIFPfj6CHkkBAQEBAYEkCQEHAQoBOAkNCYJcM4ItkUWGF4d/gmqPOUoKgkaIFIV3hTeESB2DZpQHhSeEfIsThzuCFoJFjQmDdwIEAgQFAg4BAQWBPyoiKT1wcBU7KgGCPglHGA2KEoYMJAwXFRiDImqEKoVBAXQCNAIGAQcBAQMJfI0vAYEPAQE
X-IronPort-AV: E=Sophos;i="5.73,336,1583193600"; d="scan'208,217";a="506905255"
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 30 Apr 2020 18:23:33 +0000
Received: from XCH-ALN-002.cisco.com (xch-aln-002.cisco.com [173.36.7.12]) by rcdn-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 03UINX4t022755 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 30 Apr 2020 18:23:33 GMT
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by XCH-ALN-002.cisco.com (173.36.7.12) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 30 Apr 2020 13:23:32 -0500
Received: from xhs-aln-002.cisco.com (173.37.135.119) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 30 Apr 2020 13:23:32 -0500
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Thu, 30 Apr 2020 13:23:32 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Ql70UtUAUi/CCFy9Wgu3O5m+B0RJSwW1dahrvs3SKOPgG+D0EDUvRzSOvIsykwvK4gKhmv+p2TkHGwVpr+x2qNed16+0k/CgfKyz2Iyln/3NVzdyjnb065vTEPsqfxD3f7EmqMk8V7hmrD3qUSiY1VoQqzMdxZtiaizTkgIq2qJlMJwrF897QCoVsAOWHCPHTFbymYCChnXUqd3Kvv5yf2fE6HTkx52Galuj4dTugJ6hfcgZcjAOEst+eR7vz3beDQ0oMKk0rJitzjIHc/8hsnSTx/uPnMjNSGAm06PGqk/+5HCtyzYYr8b6ay/j1KeD+fuACN5bWSfWJ7LBhyNnkQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ELUZ3h7H6UVvnD1lJ/Gr+DjVxvTgf1yNQqPsWY3V01E=; b=F5xl0C+gw/JKIvsrRFSZfABbUhNU2TfBcJNjplNgH1xzJJyUDACrcHBC27s0k8uJDw/CG+GOokAwNuEJCWurVIjThLIB+XHS3nbdeBSlCdoDeKxm2Gj4iciZUpYZzK9VwcyiifZOJiP2wLsPoKzASqofLNAnmPRRlcayKCaXOMznRgSG+MDj7WOCjq0kWXItR0iuXeeRACQN2Ureoej2Z4fI7ynN5i1BrnExsm4Np4AffJ5sxmKKNeJM7nIPhUYZmtBDlSs5Q+HCsxBLTidejGye5kcbCLIWpFXbEMK+EstvgZXgKCB+swqCLPzt+CBhK3g5p4dXDly/tLWL7so8BQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ELUZ3h7H6UVvnD1lJ/Gr+DjVxvTgf1yNQqPsWY3V01E=; b=LSkrhoYUGiEASlLeREl3BMYyIoAEJpnsr5/cBHaR9NW7tDpDjnc847w0mryKpsrfnY+R1qM3OkClaMXoD8Ft8gYrrmfX5ASeqq59OqcUhZj/be3Qzx4ymeX0bMgF3Y2tpgUmGUrmCDHvyqNO6aZ9LklYlYeyO19WH/JK4Tg8z3c=
Received: from BY5PR11MB4070.namprd11.prod.outlook.com (2603:10b6:a03:181::16) by BY5PR11MB4022.namprd11.prod.outlook.com (2603:10b6:a03:18a::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2937.13; Thu, 30 Apr 2020 18:23:31 +0000
Received: from BY5PR11MB4070.namprd11.prod.outlook.com ([fe80::101e:db5b:b661:949]) by BY5PR11MB4070.namprd11.prod.outlook.com ([fe80::101e:db5b:b661:949%6]) with mapi id 15.20.2937.028; Thu, 30 Apr 2020 18:23:31 +0000
From: "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>
To: "Mr. Jaehoon Paul Jeong" <jaehoon.paul@gmail.com>, "Nancy Cam-Winget (ncamwing)" <ncamwing=40cisco.com@dmarc.ietf.org>
CC: skku-iotlab-members <skku-iotlab-members@googlegroups.com>, "its@ietf.org" <its@ietf.org>
Thread-Topic: [ipwave] Review of https://tools.ietf.org/html/draft-ietf-ipwave-vehicular-networking-14
Thread-Index: AQHWF3fun1nHGjsu4EusKb4mtuXjN6iDwMOAgA3T1wA=
Date: Thu, 30 Apr 2020 18:23:31 +0000
Message-ID: <4CA487F1-9A01-4874-B204-E297AFF1DFD0@cisco.com>
References: <7D0EF658-DC5D-4598-9685-6C810D1C5B54@cisco.com> <CAPK2DewU+5LX6-9MN=hsG05OhH=n8aE9TWOdMDyYF-HsEkU8uA@mail.gmail.com>
In-Reply-To: <CAPK2DewU+5LX6-9MN=hsG05OhH=n8aE9TWOdMDyYF-HsEkU8uA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.10.15.200413
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [73.162.233.180]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7bb56605-3983-4de5-ac67-08d7ed3395fd
x-ms-traffictypediagnostic: BY5PR11MB4022:|BY5PR11MB4022:
x-microsoft-antispam-prvs: <BY5PR11MB402208F8F7B5B814626667D5D6AA0@BY5PR11MB4022.namprd11.prod.outlook.com>
x-ms-exchange-transport-forked: True
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0389EDA07F
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4070.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(346002)(39860400002)(376002)(136003)(366004)(396003)(66446008)(30864003)(66476007)(5660300002)(76116006)(66574012)(66556008)(66946007)(71200400001)(478600001)(64756008)(2906002)(966005)(316002)(110136005)(86362001)(9326002)(26005)(36756003)(16799955002)(15188155005)(8676002)(6512007)(4326008)(6506007)(2616005)(33656002)(54906003)(8936002)(186003)(53546011)(6486002); DIR:OUT; SFP:1101;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: HTNzd5Kn6HoR6RaY04GYRwAASpTLZSuNAngSoFIN/+BR3O21BzUUE/mcqiwcIo6h6oi3k5fB6b/Wi3DWrgL00sgSrki+tUT+Wu82vHuCpUgA9RyfF5lw8AYJ8KZf50bYX8srXeboSGXELlFTqs0+n7L617A5gXacKLlkGg/Li5AiGUuxeJtFDAi0toDSDdHG0Jzt+rYW0FJHo3pz0oT6kzJUzCnhi0eguxCPmxXEWYbBcwG9mQw5DY1Ssrf6tQIAL7OphHUSeB5rWA7zmQ+EwNpcx3Bx4jTIsWkTdu1FoajKq3fnOgSqLpU/0JK5vDNTAY6egVeyTbypzCZ727e4vwKPL4J3GW/4lAPVOwKJcUGTzzmR/wdOBfWbOnqFcDFUiANJYfIJ9ZLvsunlTB6d8f5zZGH35STJvbTrsAeGTeErEJkwMR+EEUuhlckL8YgZviIBpHp9fcOGiecn5ZMyoP+si2itrV5/eBHNVGej3x3JNBBNwCky4qi1xsrXNVPuwiSVtmssH5fRXG/u9qV+ZA==
x-ms-exchange-antispam-messagedata: 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
Content-Type: multipart/alternative; boundary="_000_4CA487F19A014874B204E297AFF1DFD0ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 7bb56605-3983-4de5-ac67-08d7ed3395fd
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Apr 2020 18:23:31.0730 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: RdFjHlW+3G8+VW12gdscQUklGhGtFW6n/XQ4diWabVeWCBtrLTIHuweJVKyta+V/9XlzxMeumHEk9R/Gw/2fig==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR11MB4022
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.12, xch-aln-002.cisco.com
X-Outbound-Node: rcdn-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/its/jr17bj2YzvfJztxSXZv-KwvpYFs>
Subject: Re: [ipwave] Review of https://tools.ietf.org/html/draft-ietf-ipwave-vehicular-networking-14
X-BeenThere: its@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IPWAVE - IP Wireless Access in Vehicular Environments WG at IETF <its.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/its>, <mailto:its-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/its/>
List-Post: <mailto:its@ietf.org>
List-Help: <mailto:its-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/its>, <mailto:its-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Apr 2020 18:23:41 -0000

Hi Paul,
Happy to help if you have further questions.
Warm regards, Nancy

From: its <its-bounces@ietf.org> on behalf of "Mr. Jaehoon Paul Jeong" <jaehoon.paul@gmail.com>
Date: Tuesday, April 21, 2020 at 9:14 AM
To: "Nancy Cam-Winget (ncamwing)" <ncamwing=40cisco.com@dmarc.ietf.org>
Cc: skku-iotlab-members <skku-iotlab-members@googlegroups.com>, "Mr. Jaehoon Paul Jeong" <jaehoon.paul@gmail.com>, "its@ietf.org" <its@ietf.org>
Subject: Re: [ipwave] Review of https://tools.ietf.org/html/draft-ietf-ipwave-vehicular-networking-14

Hi Nancy,
I sincerely appreciate your super good comments.
Most of your comments seem to be useful to improve our IPWAVE PS draft.
I will try to reflect your comments and questions on the revision.

Thanks.

Best Regards,
Paul

On Tue, Apr 21, 2020 at 9:58 AM Nancy Cam-Winget (ncamwing) <ncamwing=40cisco.com@dmarc.ietf.org<mailto:40cisco.com@dmarc.ietf.org>> wrote:
Hi,
I have reviewed  https://tools.ietf.org/html/draft-ietf-ipwave-vehicular-networking-14 and have quite a few comments.
Most of them relate to whether this document is meant to lay out challenges of using current IPv6 standards+extensions
In vehicular networks only, or if requirements are to be listed.  The abstract and intro elude to requirements, but I didn’t
see these listed out or if they did, they were not placed in any consistent way….

Terminology:
V2D vs. V2P: it would be good to better classify the “device” as IoT device types are many similarly for “person”.  Of interest here, especially for security and privacy considerations, is a device a M2M device or is it one where one can expect to be driven by a human (e.g. mobile phone).  I am presuming it is the former as you have V2P and I’m not sure the intent is that the vehicle communicates directly to a human but rather to a device that is being controlled by a human.

There is a typo in “Edge Network (EN) : In” the “In” should be EN.

Section 3:
This sentence is awkward:
“Thus, the IPv6
   for these use cases should be extended for vehicular IPv6 such that
   the IPv6 can support the functions of the network layer protocol such
   as Vehicular Neighbor Discovery (VND), Vehicular Mobility Management
   (VMM), and Vehicular Security and Privacy (VSP) in vehicular
   networks.”
I think the intent is for this document to describe the motivation for why IPv6 and its protocols need to be extended  in order to support “vehicular networks”.  I would suggest reworking this paragraph and the next to something like:
“The use cases presented in this section serve as the description and motivation for the need to extend IPv6 and its protocols to facilitate ‘vehicular IPv6’. Section 5 summarizes the overall problem statement and IPv6 requirements.”

Section 3.1

•         “ navigation for driving safety” :  should that be “safely” or  “for providing driving safety plans”?

The 2nd paragraph of this section doesn’t provide a rationale for why IPv6 needs to support single-hop or multi-hop in a wireless medium.  The wireless hops are controlled at the link not MAC layer (e.g. IPv6).  There is more clarification or description that better highlights why IPv6 (as a dependency with the link layer?) is relevant.

  *   While these use cases are relevant, the descriptions merely describe the uses for the application layer signaling.  I presume that for efficiency and expediency (e.g. to deal with minimal latency), the services for establishing neighbors in a V2V topology it is best done at the IPv6 layer, vs. the 802.11p layer?  But that is not really well described or clarified other than “Since IP is widely used among various computing devices in the Internet, it is expected that the use cases in this section need to work on top of IPv6 as the network layer protocol.” In the beginning of this full section.  More motivation at the beginning of the section for why it has to be at IPv6 layer should help to address the neighbor discovery, but also a better description for why the security scope for these scenarios will help provide the reasoning for why security extensions in IPv6 are needed.

Section 3.2 and 3.3

•         Similar to Section 3.1 a better explanation for why the “multi-hop” is required at IPv6 vs. at the link layer.  Some mesh networks establish the hops at the link layer….then there’s RPL (RFC 6550) that speaks to constrained connected entities needing to establish connectivity..  Their motivation is clear, while I’m not sure RPL can be used “as is”, their motivations seem similar so would expect to see some rationale for why the vehicular space is different than those listed in RFC6550 to help motivate the need for further work.

Section 4.1
Is the Traffic Control Center “all of the Vehicular Cloud” or is it meant to be 1 application or service in the cloud?  They way it is depicted, it equated TCC = Vehicle cloud but the description in this section “…(TCC) is connected to the Vehicular Cloud for the management of IP-RSUs and vehicles in the road network” infers that it is an application in the cloud used to manage the connections between IP-RSUs and vehicles, is that correct?
Perhaps just use one of the terms (e.g. TCC) and define it as “TCC is a cloud application used to manage connections….”

Section 5

•         There should be a space between “abovementioned”

•         I might argue that timing constraints for a session between 2 vehicles or a moving vehicle to an IP-RSU would be in the same order of magnitude.  The presumption made, which should be made explicit, is that IP-RSU’s are geographically fixed and are not expected to move, where are vehicles are highly mobile.

•         I also believe the lifetime (or time-to-live) of a session should vary depending on the types of sessions being established, are there no considerations for these?

•         From the descriptions, I would tease out that the problem and challenges arise from: (1) highly mobile environments, to differentiate this from voice calls or cellular mobility, there are considerations to the packet delivery and to the session establishment  (2) the “units” (whether OBU or RSU) are highly constrained in cpu and memory (3) both the mobility and constrained environments should also bring in the considerations of the session lifetimes and key management used for these sessions.  If this is the case, I would prefer to see these requirements made more explicit.

•         But I am not seeing how these challenges provide a set of requirements.  A section that summarizes or turns these challenges to requirements would help; the alternative is to make these subsections crisper into the requirements needed to address the challenges or gaps presented in IPv6 of each section.
Section 5.1

•         I am not sure what requirements or challenges the use cases are faced with to warrant IPv6 neighbor discovery.  Given the requirements/challenges I listed in a previous bullet, by the time you get a IPv6 ND packet and process it, that particular entity may be out of reach.  So, I think the problem or challenge faced here is that for these use cases, what is required is for a mechanism/protocol that allows for these nodes to securely advertise themselves (at the IP layer) with globally unique IPv6 addresses. I might counter that vehicle speed and density may be irrelevant if the goal for this requirement is to be able to get enough of the identity of the node you may want to connect to.  Having the long prose description of the problems is OK (although much of this I believe is also already in RFC 8691), but it is hard to determine what is actually needed to fulfil these use cases.
Section 5.1.1

•         “wheh” should be “when”

•         Perhaps I’m being too literal, “…can have multiple links between pairs of vehicles with wireless communication range, as shown in Figure 4.”  I only see a single link between each vehicle pair?



Section 6

•         Should this section follow the style of the “here are the requirements” that are not met in IPv6 security based on the challenges described? Or should this be more to provide the set of potential attacks that need to be addressed when considering the requirements (e.g. IPv6 “vehicular” deployment scenarios)?  Neither come across strongly in this section.

•         2nd paragraph “ Vehicles and infrastructure must be authorized in order to participate in vehicular networking.” (e.g. must vs. need).  Also, I see authorized, what about authenticated?  The receiver must have assurances that the information is authentic, perhaps using privacy preserving techniques.

•         The last sentence of the paragraph needs to be qualified; that is, as this is the security considerations section, there needs to be at minimum examples (not necessarily exhaustive) of the types of attacks possible.

•         Do vehicular networks need to provide confidentiality?  For privacy reasons, I think this is a hard requirement?  But there are some IEEE 1609 messages that are not encrypted?

•         3rd paragraph is somewhat confusing, I think it is trying to state: “Strong security measures against lying nodes are required.  As nodes communicate information that can be used by safety applications, protections to ensure the communication is authentic, protected from forgery and originates from an authorized node.” The “authorized node” will require special considerations given the nature of the highly transient connections.  I would argue that just because it is a valid certificate, does not make a vehicle “good”, but perhaps you are trying to state that the assessment of what makes a “good” or “trusted” vehicle is outside the scope of this charter?  Or is this meant to be a segue to the next paragraph, though that paragraph refutes using “valid certs” only.

•         I disagree that an unauthenticated VIN number is not sufficient to identify a car (note that there are instances in which VINs have changed when a vehicle’s engine, for instance, gets replaced).  Tighter requirements should be imposed as to when it is a Vehicle vs. a user on a device.  The draft describes a Vehicle as having its own network so it would seem that each element in that network should be authenticated….there needs to be a better description of this in the security section.  When describing a “Vehicle” are you identifying that network? A particular component of that network? A particular application in the host of the vehicle?  Authentication is strong requirement, both at the message, transport and entity level; these need to be distinctly called out.

•         Is the paragraph on pseudonym trying to assert that “In order to propagate the notion of pseudonym, the IPv6 address must also be updated periodically?”  This is the first paragraph where there is mention of a “long-living transport-layer session”.  The document should make clear the types of connections and their expected lifetimes….especially as it relates to pseudonyms and the expectation that an infrastructure (mobility case) would have to cache and manage these.



Let me know if the comments need further elaboration or clarification.



Warm regards, Nancy


_______________________________________________
its mailing list
its@ietf.org<mailto:its@ietf.org>
https://www.ietf.org/mailman/listinfo/its


--
===========================
Mr. Jaehoon (Paul) Jeong, Ph.D.
Associate Professor
Department of Software
Sungkyunkwan University
Office: +82-31-299-4957
Email: jaehoon.paul@gmail.com<mailto:jaehoon.paul@gmail.com>, pauljeong@skku.edu<mailto:pauljeong@skku.edu>
Personal Homepage: http://iotlab.skku.edu/people-jaehoon-jeong.php<http://cpslab.skku.edu/people-jaehoon-jeong.php>