Security and privacy for a connected vehicle environment CAMP PI: CSI Detroit. No camping CAMP: Crash Avoidance VSC5: 7 OEMs within Security and privacy for a connected vehicle environment Benedikt Brecht, Principal Investigator, Crash Avoidance Metrics Partners (CAMP)
Vehicles and infrastructure exchanging unmanaged messages What is V2X? Vehicles and infrastructure exchanging unmanaged messages Vehicle 2 Vehicle and Vehicle 2 Infrastructure Communication V2V system can alert the driver (thus help prevent crashes) by issuing different safety warnings Messages include information on current position, velocity, etc. Photo Source: U.S. DOT
Do Not Pass Warning - Sensors can hardly detect incoming vehicles Photo Source: Continental
Left Turn Assist No detection outside of line of sight Photo Source: Cadillac
Traffic Light Assistant Show time to green Show time to red Photo Source: Audi/jalopnik.com
establish trust Being able to verify information Messages received over the air: integrity and authentication required One wrong message and customer’s trust is lost (No second chance) Photo Source: Núria i JC via Flickr
ensure privacy Standard IT Technology for first two requirements Nobody shall be able to track vehicles by using this technology Prevent SCMS from collecting Personally Identifiable Information (PII) Prevent trip tracking by outsiders Prevent trip tracking by SCMS insiders Privacy by design Photo Source: Independent.co.uk
V2X SCMS Architecture
Misbehavior Detection This is obvious misbehavior ;-) Misbehaving / attacking units need to be removed Misbehavior Detection on application level Photo Source: Brittni Gee Photography via Flickr
Misbehavior detection – proximity plausibility One example of misbehavior detection Photo Source: Kris LoCascio via Flickr
“Linkage values” used to identify certificates during misbehavior detection Photo Source: something-familiar.com
Penalty / device revocation Device should no longer be trusted - MA revokes certificates via Certificate Revocation List (CRL) Pseudonym and Enrollment cert revocation CRL distributed to vehicles and to be checked regularly in verification process of incoming BSMs Photo Source: Andy Devlin/NHLI via Getty Images
Photo Source: Benedikt Brecht
USDOT CV pilots awarded 2015: http://www.its.dot.gov/pilots/ Sources: Elector-based Root Management System to Manage a Public Key Infrastructure: http://priorart.ip.com/IPCOM/000245336 A security credential management system for V2V communications, Dec 2013 http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6737583 Vehicle Safety Communications Security Studies: Technical Design of the Security Credential Management System, July 2013 Security Credential Management System Design, April 2012 http://www.its.dot.gov/meetings/pdf/Security_Design20120413.pdf USDOT CV pilots awarded 2015: http://www.its.dot.gov/pilots/ USDOT Smart City Challenge: https://www.transportation.gov/smartcity IEEE 1609: https://standards.ieee.org/develop/wg/1609_WG.html IEEE 802.11p: http://standards.ieee.org/getieee802/download/802.11-2012.pdf SAE J2945/1: http://standards.sae.org/j2945/1_201603/ Photo Source: Wikimedia Commons/Jean-Pol GRANDMONT
@CodeFried Photo Source: Free for Commercial Use via Flickr