SAFESPOT SP2 Meeting September 14 th and 15 th 2006 Rome 1 Integrated Project Co-operative Systems for Road Safety “Smart Vehicles on Smart Roads” Tamas.

Slides:



Advertisements
Similar presentations
Vehicle-infrastructure integration: creating co-operative mobility systems and services Hearing EU Parliament, 22 January 2009 Hermann Meyer, CEO.
Advertisements

Page 1 Cooperative Systems Progress The European Commission Viewpoint 6th AASHTO International Day Stockholm, 21 September 2009 Juhani Jääskeläinen Head.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Knut Evensen Connected Vehicle Summit 29 September 2010
Ruhr University Bochum Cryptography in Heavily Constraint Environments Christof Paar EUROBITS Center for IT Security COmmunication SecuritY (COSY) Group.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
Secure Vehicle Communication 1 Secure Vehicular Communications Workshop Lausanne. February 1st/2nd 2006 Hosted by EFPL Antonio Kung SEVECOM Project Co-ordinator.
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
DOCUMENT #:GSC15-PLEN-37 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:Plenary 6.6 Networked Vehicle Chaesub Lee and Yushi.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Stork is an EU co-funded project INFSO-ICT-PSP STORK PRESENTATION STORK Presentation Lithuania March 2010.
Secure Vehicle Communication 1 TRA May 2008 SeVeCom : Secure Vehicle Communication Antonio Kung Coordinator Trialog 25 rue du Général Foy
Traffic Incident Management – a Strategic Focus Inspector Peter Baird National Adviser: Policy and Legislation: Road Policing.
“”Capacity and services to road users” Task descriptions Paul van der Kroon, Paris November 2005.
Co-operative Systems for Road Safety “Smart Vehicles on Smart Roads”
Gzim Ocakoglu European Commission, DG MOVE World Bank Transport Knowledge and Learning Program on Intelligent Transportation Systems (ITS), 24/06/2010.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
EB Workshop on eSafety Conclusions. 2 How do you interpret the CEDR vision with regards to your national approach? Basically in line with national strategy.
USDOT, RITA RITA: Oversight of USDOT’s R&D programs  University Transportation Centers $100M  UTC Consortia $80M  UTC Multimodal R&D $40M  Intelligent.
EB Workshop on eSafety Objective: Come to a shared vision/interest w.r.t. common position in the eSafety process.
ITS Program Update Moving Towards Implementation of Wireless Connectivity in Surface Transportation Talking Freight Webinar January 19, 2011.
Commercial Motor Vehicle Connectivity V2I Communications & Safety Pilot Participation Cem Hatipoglu, PhD Transportation Specialist, FMCSA, Technology Division.
Roadnet Vehicular Ad-Hoc Network System September 19, 2011 Andrew Crossman - CS
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
The Fully Networked Car Geneva, 4-5 March Ubiquitous connectivity to improve urban mobility Hermann Meyer ERTICO.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
SAFESPOT Project Kick off Meeting February 16 th and 17 th 2006 Rome 1 Integrated Project Co-operative Systems for Road Safety “Smart Vehicles on Smart.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Piemonte Workshop 1 11 September 2006 Paolo Salieri European Commission DG ENTR-H4 Security research in FP7.
SAFESPOT Project Kick off Meeting February 16 th and 17 th 2006 Rome 1 Integrated Project Co-operative Systems for Road Safety “Smart Vehicles on Smart.
ENISA efforts for securing European Internet Infrastructure
ITS What are the ITS applications? To increase the safety and capacity of existing facilities How much is ITS? When to deploy ITS? Intelligent Transportation.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
International Telecommunication Union The Fully Networked Car Geneva, 4-5 March 2009 Safety & Security Bernard Dugerdil Freescale Semiconductor.
ECOGEM Cooperative Advanced Driver Assistance System for Green Cars Burak ONUR Project Coordinator R&D Support Executive
Research on the Connected Car Hans-J. Reumerman Philips Technology Research Laboratories Aachen Connectivity Systems Application Industry relations Technology.
IIWG - 1 Intelligent Infrastructure Working Group Paul van der Kroon.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
SF- SP1 – Plenary Meeting June 14 th and 15 th Santorini 1 Integrated Project Co-operative Systems for Road Safety “Smart Vehicles on Smart Roads”
A Vehicle Manufacturer’s Perspective on VII Christopher Wilson ITS Oregon- Feb 1, 2005 Christopher Wilson.
New Services in Mobility: C-ITS
Azam Supervisor : Prof. Raj Jain
Volvo Technology Corporation
B. RAMMAMURTHY Connected Vehicle Technology 6/6/2014 cse651 1.
SAFESPOT Project Kick off Meeting February 16 th and 17 th 2006 Rome 1 Integrated Project Co-operative Systems for Road Safety “Smart Vehicles on Smart.
International Telecommunication Union The Fully Networked Car Geneva, 3-4 March 2010 Technical session 3: ITS-Networking, architecture and protocols Summary.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Transport Research Arena Ljubljana 2008 Strategic Session 9:2 "Integrated Transport Safety" Cooperative systems for a safe and efficient mobility SMART.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
The NIST Special Publications for Security Management By: Waylon Coulter.
Eyal Hamo Berry Shnaider בס " ד 1.
Internet of Things. Creating Our Future Together.
ETSI TC ITS Status on Standardization Martin ARNDT ETSI ESP © ETSI All rights reserved M2M Market and Technology Opportunities
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
O2 “eSafety” – status report Risto Kulmala Leiden 2 February 2007.
Financial Sector Cybersecurity R&D Priorities The Members of the FSSCC R&D Committee November 2014.
ASSET - Automotive Software cyber SEcuriTy
Connected and Autonomous Vehicle Cybersecurity Controller Area Network
Neopay Practical Guides #2 PSD2 (Should I be worried?)
How technology and data can bring needed improvements to air quality and the environment Dr Dave Williams 8th November 2018.
Security Mechanisms Network Security.
Presentation transcript:

SAFESPOT SP2 Meeting September 14 th and 15 th 2006 Rome 1 Integrated Project Co-operative Systems for Road Safety “Smart Vehicles on Smart Roads” Tamas Lovas & Arpad Barsi Budapest University of Technology and Economics SAFESPOTSAFESPOT

SAFESPOT SP2 Meeting September 14 th and 15 th 2006 Rome 2 About SEVECOM  SeVeCom (Secure Vehicular Communication) is an EU-funded project that focuses on providing a full definition and implementation of security requirements for vehicular communications.   Last meeting: September 4-5. Budapest

SAFESPOT SP2 Meeting September 14 th and 15 th 2006 Rome 3 Sevecom missions and objectives  Identification of the variety of threats: attacker's model and potential vulnerabilities; in particular, study of attacks against the radio channel and transferred data, but also against the vehicle itself through internal attacks, e.g., against TCU (Telematics Control Unit), ECU (Electronic Control Unit) and the internal control bus.  Specification of an architecture and of security mechanisms which provide the right level of protection. It will address issues such as the apparent contradiction between liability and privacy, or the extent to which a vehicle can check the consistency of claims made by other vehicles. The following topics will be fully addressed : Key and identity management, Secure communication protocols (including secure routing), Tamper proof device and decision on crypto- system, Privacy. The following topics will be investigated in preparation of further work: Intrusion Detection, Data consistency, Secure positioning, Secure user interface.  The definition of cryptographic primitives which take into account the specific operational environment. The challenge is to address (1) the variety of threats, (2) the sporadic connectivity created by moving vehicles and the resulting real-time constraints, (3) the low-cost requirements of embedded systems in vehicles. These primitives will be adaptations of existing cryptosystems to the VC environment.

SAFESPOT SP2 Meeting September 14 th and 15 th 2006 Rome 4 Sevecom consortium

SAFESPOT SP2 Meeting September 14 th and 15 th 2006 Rome 5 Sevecom Budapest meeting  The participating groups are:  Sevecom,  CVIS,  SafeSpot,  Coopers,  COMeSafety,  Prime,  GST,  C2C.  The main objective of the workshop is to assess the impact of security on the architecture of V2V/V2I communication.

SAFESPOT SP2 Meeting September 14 th and 15 th 2006 Rome 6 From the Agenda…  Session on eSafety Architecture, chaired by Amer Aijaz (VW / COMeSafety)  FRAME ITS Architecture, Peter Jesty (Peter Jesty Consulting Ltd / Frame ITS)  CVIS vVewpoint, (Technolution / CVIS)  SafeSpot viewpoint, Achim Brakemeier (DaimlerChrysler / SafeSpot)  Coopers viewpoint  Discussion, chaired by Amer Aijaz (VW / COMeSafety)  FRAME ITS starting point to a high-level architecture?  Agreement on a common design pattern architecture?  Short term architecture decisions? Technology dependent architecture decisions?  Session on Security Architecture, chaired by Laurent Bousis (Philips / Sevecom)  Principles for Secure Communication  GST Approach, D. DeCock (KU Lueven / GST)  Principles for Identity Management and Privacy  PRIME Approach, Susan Hohenberger (IBM Zurich / PRIME)  Secure Vehicular Communication Architecture, Panos Papadimitratos (EPFL / Sevecom)

SAFESPOT SP2 Meeting September 14 th and 15 th 2006 Rome 7 From the presentations…  FRAME (Peter Jetsy)  EU ITS architecture; user needs and functions (no security, no physical viewpoint!)  Detecting errors between the system design and requirement definition phase (70% of errors are requirement errors!)  High level architecture is technology independent!  CVIS-COOPERS-SAFESPOT-OTHER ITS projects: EU ITS architecture (saving cost, decreasing redundancy etc.)  CVIS  mobile network for transportation (handheld unit - traffic service centers – in vehicle units – roadside units)  3 domains: VI – VV – in vehicle  COOPERS  Vehicle communication with road infrastructure  COOPERS, SAFESPOT, CVIS will use FRAME as starting point  COOPERS and CVIS use FRAME  SAFESPOT and CVIS have common architecture

SAFESPOT SP2 Meeting September 14 th and 15 th 2006 Rome 8 Expectations/Outcome  Objective of the meeting:  Bring closer the architecture-designers and security people  Mission accomplished:  Security people got an overview about the architectures of the particular projects  The project members recognized what problems have to the security people deal with  Next steps:  Insert the security architecture into the system architecture  The system architectures are different in the projects -> the security architecture has to be abstracted  Issues relevant to V2I  Presentations will be uploaded