Skip to content

C-ITS

Stadtverkehr mit Autos, die durch digitale Netzwerksymbole verbunden sind.

Your C-ITS solution tested for safety

The car world of tomorrow will be characterised by vehicles that communicate with each other as well as with the roadside infrastructure and other road users. Cooperative Intelligent Transport Systems (C-ITS) and Car2X communication already represent the future of intelligent vehicle networking today. The centrepiece: trustworthy and, above all, secure information and communication technology.

We support you on your way to an IT-secure C-ITS solution: from testing to successful certification in accordance with the security requirements of the European Commission.

Request a customised quote now

Target group for certification for providers of C-ITS solutions

Our offer is aimed at a wide range of organisations that already offer or would like to offer C-ITS solutions:

  • Manufacturers of C-ITS stations (e.g. vehicles, infrastructure elements)
  • Operators and developers of C-ITS components and platforms
  • Institutions in the field of road safety and infrastructure
  • Companies seeking certification of their Root CA, EA or AA
  • Public and private organisations that are or would like to become part of the C-ITS trust model

The advantages of certification at a glance

  • Objective proof of fulfilment of European IT requirements
  • Proof that your security measures are targeted, effective and sustainable
  • Identification & elimination of vulnerabilities and reduction of IT risks
  • Gaining the trust of customers & partners
  • Continuous improvement of the IT security of your C-ITS solution
  • Successful auditing is a prerequisite for the Root CA to be included in the European Certificate Trust List (ECTL)

Your path to becoming a certified provider for C-ITS

Our services support you along the entire process - modular or holistic:

Workshops

  • For targeted preparation for C-ITS certification.

Conception & preparation

  • Conformity assessment of technical infrastructures when setting up a public key infrastructure (PKI).
  • Evaluation of existing security procedures and categorisation of the current security level.

Testing & conformity assessment

As an "Accredited PKI Auditor", we audit Root CAs, Enrolment Authorities (EA) and Authorisation Authorities (AA) in accordance with the Certificate Policy (CP) and thus Annex 3 of the Delegated Act (DA).

  • Root CA: The Root CA is the root certification authority that forms the trust anchor for the EA and AA and authorises the EA or AA to issue certificates below the Root CA.
  • Enrolment Authority (EA): The EA authenticates the C-ITS stations and enables them to access ITS communication (in the direction of the AA). For this purpose, the C-ITS station authorises the enrolment credential (EC), which the EA sends to the C-ITS station after successful authentication.
  • Authorisation Authority (AA): The AA issues binding proof to the C-ITS Station that certain ITS services may be used. For this purpose, the C-ITS station authorises the Authorisation Ticket (AT), which the AA sends to the C-ITS station on the basis of the trust in the EA.

Classification in the C-ITS trust model:

Root CA, EA and AA are categorised in the "C-ITS trust model". This represents a system that is responsible for the trust between the C-ITS stations. It is a Public Key Infrastructure (PKI) consisting of Root CAs, the C-ITS Point Of Contact (CPOC), the Trust List Manager (TLM), Enrolment Authorities (EAs), Authorisation Authorities (AAs) and a secure network.

Certification & re-certification

Review of processes and documentation in accordance with the requirements of the EU Commission (Delegated Act).

Evaluation & certification of your C-ITS stations and crypto modules according to Common Criteria and relevant protection profiles.

C-ITS-Stationen: Bewertung und Zertifizierung nach Common Criteria

Everything from a single source: In addition to these services, we also offer you the required evaluation and certification of C-ITS stations and crypto modules in accordance with the Common Criteria and the relevant protection profiles. C-ITS stations include fixed (e.g. road signs) or mobile entities (e.g. cars) in road traffic, which are created by the relevant manufacturers.

Get in touch now

FAQ – Frequently asked questions about Cooperative Intelligent Transport Systems

C-ITS stands for "Cooperative Intelligent Transport Systems" - networked systems in road transport that exchange information in real time.

C-ITS services are essentially based on communication technologies that enable them to communicate with vehicles, roadside infrastructure or other road users in a pseudonymised manner. By having your C-ITS solution tested or certified, you can objectively prove that this communication and the underlying exchange of information fulfil the security requirements of the European Commission.

The Delegated Act supplementing Directive 2010/40/EU, which was published by the EU Commission in May 2024, forms the basis for testing and certification. This contains concrete specifications for the provision of C-ITS solutions and thus describes the minimum legal requirements for the interoperability of C-ITS.

The delegated regulation is not yet binding. Therefore, with C-ITS certification, you can play a decisive pioneering role and actively contribute to making the connected road transport of the future (IT) safer.

Not at the moment. But the delegated regulation of the EU sets binding standards - with your certification, you are taking on a pioneering role.

As the central trust element, the European Certificate Trust List (ECTL) contains all trustworthy root CA certificates that are activated and managed by the central Trust List Manager (TLM). The ECTL acts as an access point for secure, interoperable communication between millions of vehicles and infrastructure elements, as only root CAs with ECTL-listed certificates are recognised as trustworthy by all C-ITS stations. Without inclusion in the ECTL, the Root CA cannot participate in the European C-ITS system.

An EU regulation supplementing Directive 2010/40/EU, which defines minimum requirements for C-ITS interoperability and safety.

We certify both technical components (C-ITS stations, crypto modules) and organisational instances (e.g. root CA, EA, AA).

The relevant protection profiles define the requirements for C-ITS stations and crypto modules.

Why are we a strong partner for you

Expertise

Our experienced experts have already successfully implemented more than 500 PKI projects of various sizes, some of them transnational.

Industry experience

Thanks to our many years of experience in a wide variety of sectors, we are able to serve companies in a wide range of industries.

International experts

Around the globe: We support you both nationally and internationally. Our global network of experts is at your side for all IT security issues.

Independence

Our experts are not subject to any conflicts of interest, as they are not beholden to any product providers, system integrators, shareholders, interest groups or government agencies.

Sie haben Fragen? Wir helfen gerne!

Additional services

Hand stempelt Dokument, daneben schwebende Symbole von Dokumenten mit Häkchen.

Electronic seals

Become a qualified trust service provider (VDA) for electronic seals: We support you in planning your service(s), carry out tests according to eIDAS & ETSI and accompany you on your way to conformity assessment.
Read more
Hände tippen auf Laptop, umgeben von schwebenden Dokumentensymbolen.

Remote signatures & remote seals

A trustworthy environment is the be-all and end-all when creating electronic remote signatures. To prove this objectively and be officially listed as a VDA, you must fulfil the requirements of the eIDAS Regulation.
Read more

Website authentication

Are you in the process of setting up or developing a qualified trust service for the creation of website certificates and would like to demonstrate compliance with the requirements of the eIDAS Regulation? Then you've come to the right (IT) address!
Read more