Secure Vehicle Communication 1 TRA2008 24 May 2008 SeVeCom : Secure Vehicle Communication Antonio Kung Coordinator Trialog 25 rue du Général Foy 75008.

Slides:



Advertisements
Similar presentations
Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Advertisements

Field Operational Tests in 7FP Fabrizio Minarini Head of Sector DG INFSO - ICT for transport.
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Vehicle-infrastructure integration: creating co-operative mobility systems and services Hearing EU Parliament, 22 January 2009 Hermann Meyer, CEO.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
1 Voice over Internet Protocol (VoIP) Security Affects on the IP Network Architecture Conference ICS – Wireless Group Meeting Tempe, Arizona.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
Group #1: Protocols for Wireless Mobile Environments.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Cooperative protocols for wireless vehicular communication
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
FIT3105 Smart card based authentication and identity management Lecture 4.
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Secure Vehicle Communication 1 Secure Vehicular Communications Workshop Lausanne. February 1st/2nd 2006 Hosted by EFPL Antonio Kung SEVECOM Project Co-ordinator.
InVANET(Intelligent Vehicular Ad Hoc Network
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Applied Cryptography for Network Security
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
Wireless Sensor Network Security Anuj Nagar CS 590.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Developments in Transportation System Networks November 2009.
Co-operative Systems for Road Safety “Smart Vehicles on Smart Roads”
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
IntelliDrive Policy and Institutional Issues Research Valerie Briggs Team Lead, Knowledge Transfer and Policy, ITS Joint Program Office, RITA May 4, 2010.
Privacy Issues in Vehicular Ad Hoc Networks.
Envisioned Role for NTI Concerning ITS Deployment in Egypt by Dr. Mahmoud EL-HADIDI Professor of Telecommunications at Cairo U & Consultant at NTI 3 rd.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Safety support in the automotive industry Jacob Bangsgaard Director of External Affairs and Communications 1st Annual International Conference on ICTs.
USDOT, RITA RITA: Oversight of USDOT’s R&D programs  University Transportation Centers $100M  UTC Consortia $80M  UTC Multimodal R&D $40M  Intelligent.
WAVE: A Tutorial Roberto A. Uzcátegui Guillermo Acosta-Marum IEEE Communications Magazine,May Presenter – Renato Iida.
Proposal for device identification PAR. Scope Unique per-device identifiers (DevID) Method or methods for authenticating that device is bound to that.
Mike Schagrin US Department of Transportation ITS Joint Program Office IntelliDrive Safety Program Overview.
The Fully Networked Car Geneva, 4-5 March Ubiquitous connectivity to improve urban mobility Hermann Meyer ERTICO.
A Security Architecture Concept for Vehicular Network Nodes 蔡嘉翔 許閔傑.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
SAFESPOT SP2 Meeting September 14 th and 15 th 2006 Rome 1 Integrated Project Co-operative Systems for Road Safety “Smart Vehicles on Smart Roads” Tamas.
IntelliDrive SM Vehicle Safety Communications Working Toward V2V Deployment John Harding July 20, 2010.
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
SAFESPOT Project Kick off Meeting February 16 th and 17 th 2006 Rome 1 Integrated Project Co-operative Systems for Road Safety “Smart Vehicles on Smart.
International Telecommunication Union The Fully Networked Car Geneva, 4-5 March 2009 Safety & Security Bernard Dugerdil Freescale Semiconductor.
Research on the Connected Car Hans-J. Reumerman Philips Technology Research Laboratories Aachen Connectivity Systems Application Industry relations Technology.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
A Vehicle Manufacturer’s Perspective on VII Christopher Wilson ITS Oregon- Feb 1, 2005 Christopher Wilson.
Volvo Technology Corporation
Doc.: IEEE /0361r0 Submission Hyun Seo Oh, ETRI March 2008 Slide 1 March 2008 Slide 1 WAVE Enhancement Technologies Date: Authors:
Transport Research Arena Ljubljana 2008 Strategic Session 9:2 "Integrated Transport Safety" Cooperative systems for a safe and efficient mobility SMART.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
IS3220 Information Technology Infrastructure Security
Eyal Hamo Berry Shnaider בס " ד 1.
ETSI TC ITS Status on Standardization Martin ARNDT ETSI ESP © ETSI All rights reserved M2M Market and Technology Opportunities
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Security of the Internet of Things: perspectives and challenges
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
Presented by Edith Ngai MPhil Term 3 Presentation
VANET.
Transmission of IPv6 Packets over IEEE OCB Networks
VANET.
PLUG-N-HARVEST ID: H2020-EU
WAVE Enhancement Technologies
Developing Vehicular Data Cloud Services in the IoT Environment
Presentation transcript:

Secure Vehicle Communication 1 TRA May 2008 SeVeCom : Secure Vehicle Communication Antonio Kung Coordinator Trialog 25 rue du Général Foy Paris, France

2TRA May 2008 Outline Rationale Sevecom Initiative Baseline Architecture for Security and Privacy Other Working Groups

3TRA May 2008 Vehicle Communication (VC) VC promises safer roads, … more efficient driving, Warning: Accident at (x,y) Warning: Accident at (x,y) ! Traffic Update: Congestion at (x,y) TOC RSU ! Congestion Warning: At (x,y), use alt. route !

4TRA May 2008 Vehicle Communication (VC) … more services (infotainment), MP3-Download Text message: We'll stop at next roadhouse … and easier maintenance. Malfunction Notification: Arriving in 10 minuten, need ignition plug Software Update RSU Car Manuf.

5TRA May 2008 Sounds good BUT …

6TRA May 2008 Security and Privacy??? Safer roads? More efficient driving? Warning: Accident at (x,y) TOC RSU Traffic Update: Congestion at (x,y) Congestion Warning: At (x,y), use alt. route ! ! ! ! !

7TRA May 2008 Security and Privacy??? More fun, but for whom? Position Beacon Text message from silver car: You're an idiot! … and a lot more … Your new ignition-control-software RSU Location Tracking

8TRA May 2008 SE-cure VE-hicle COM-munication Mission: future-proof solution to the problem of V2V/V2I security Partners Trialog (Coordinator) DaimlerChrysler Centro Ricerche Fiat Bosch KU Leuven Ecole Polytechnique Fédéral de Lausanne University of Ulm Budapest University of Technology and Economics

9TRA May 2008 IndustryEuropean Institutions Security SEVECOM COMeSafety PRIME liaison-peer review SecurIST liaison C2C-CC Security WG Standards eSafety Forum Security WG Article 29 Data protection WG Policies eGovernment Modinis-IDM liaison, terminology eSafety SafeSpot CVIS Coopers GST GST-SEC SEVECOM is a Transversal Project

10TRA May 2008 Research topics Investigation work Secure user interface A8 Investigation work Secure positioning A7 Fully addressed Privacy A6 Investigation work Mulfunction detection and Data consistency A5 Investigation work Vehicle Intrusion A4 Fully addressed Tamper proof device and decision on cryptosystem A3 Fully addressed Secure communication protocols (inc. secure routing) A2 Fully addressed Key and identity management A1 Scope of work Topic

11TRA May 2008 Security Baseline Architecture Objectives Focus on communication Baseline Privacy Enhancing Technology (PET) Future dynamic deployment of stronger PETs Analogy: switching from 8 to 10 digit telephone numbers Baseline solution design approach Standardized cryptographic primitives Easy-to-implement Low overhead Adaptable protection

12TRA May 2008 Security Baseline Architecture (cont’d) Challenges High rate broadcast communication VANET-only (e.g., safety) and TCP/IP communication Safety Applications IPv6 TCP / UDP C2C-CC Position Based Routing IEEE p MAC and PHY C2C-CC MAC Wave Short Message Protocol (WSMP) General Applications IEEE

13TRA May 2008 Security Baseline Architecture (cont’d) Basic ideas Wireless Communication Module Central Processing Module Unique Identity Credentials and Cryptographic Keys Abstract view of a vehicle Long-term identity Public key crypto EC-DSA, RSA Certificates

14TRA May 2008 Building Blocks in Baseline Architecture Gateway/Firewall Intrusion Detection Attestation Secure Beaconing Secure Geocast Secure Georouting Identity Management Trust Management Pseudonym Application Pseudonym Management Key/Certificate Storage Secure Time Base Protected Functions Hardware Security ModuleIdentification & Trust Management Module In car Security Module Secure Communication Module Privacy Management Module

15TRA May 2008 Deployment Trust Management Infrastructure Secure Communication Module Service Infrastructure Secure Communication Module Identification & Trust Management Module Security & Policy Manager Hardware Security Module Communication Stack V2I Applications Communication Stack V2I/V2I Applications In-car Security Module Privacy Management Module Secure Communication Module Identification & Trust Management Module Hardware Security Module Vehicle systems Security & Policy Manager Vehicle RSU Backbone network Direct Communication (Cellular, Physical) Wireless Medium

16TRA May 2008 Requirements Authentication, Integrity, Non-repudiation, Access control, Confidentiality Availability Privacy Liability identification Sevecom Privacy focus

17TRA May 2008 Sevecom Privacy focus V2V / V2I communication should not make it easier to identify or track vehicles should conform to future privacy directives Lack of privacy control will prevent deployment Active safety applications require knowledge on activities of nearby vehicles, not their identity Similar requirements to electronic payment  Privacy-enhancement mechanisms that use resolvable pseudonyms

18TRA May 2008 Sevecom Privacy focus V2VStorage Internet Eavesdropping Case V2V Protection Focus

19TRA May 2008 Basic ideas (cont’d) Pseudonym: Remove all identifying information from certificate Equip vehicles with multiple pseudonyms Alternate among pseudonyms over time (and space) Sign message with the private key corresponding to pseudonym Append current pseudonym to signed message Security Baseline Architecture (cont’d) PSNYM_1 PSNYM_2 PSNYM_3 PSNYM_1 PSNYM_2PSNYM_1 PSNYM_2 PSNYM_3

20TRA May 2008 Security Baseline Architecture (cont’d) System setup PSNYM_1, …, PSNYM_k Authority X Long-term Identification Vehicle V Authority A Pseudonym Provider

21TRA May 2008 Security Working Groups C2C Security Working Group Dr H.J Voegel, BMW COMeSafety IST project Dr T.Kosch, BMW eSafety forum Security WG Antonio Kung, Trialog Prof. Ruland, Siegen U. Recommendations In-vehicle Communication, Telematics and Co-operative systems Workshop on security and privacy issues Brussels, 27 May 2008 White Paper Baseline Architecture Impact of Security to eSafety Architecture

Secure Vehicle Communication 22 TRA May 2008 Thank You