C OLLABORATIVE V2V S ECURITY R ESEARCH U PDATE ITS-JPO Public Workshop September 24, 2013 Mike Lukuc, NHTSA Research.

Slides:



Advertisements
Similar presentations
1 V2V Safety Research for Heavy Commercial Vehicles 2013 ITS Connected Vehicle Public Meeting Arlington, VA September 24, 2013 Alrik L. Svenson National.
Advertisements

PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
<<Date>><<SDLC Phase>>
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Connected Vehicles AASHTO Annual Meeting | October 17, 2013 | Denver, CO Mike Cammisa Director, Safety Association of Global Automakers.
IntelliDrive Safety Workshop July 20, 2010 Alrik L. Svenson US Department of Transportation National Highway Traffic Safety Administration IntelliDrive.
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
The PKI Lab at Dartmouth. Dartmouth PKI Lab R&D to make PKI a practical component of a campus network Multi-campus collaboration sponsored by the Mellon.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CRASH IMMINENT SAFETY: A TIER 1 UNIVERSITY TRANSPORTATION CENTER PROFESSOR UMIT OZGUNER TRC INC. CHAIR ON INTELLIGENT TRANSPORTATION SYSTEMS DIRECTOR,
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Solution Overview for NIPDEC- CDAP July 15, 2005.
Functional Model Workstream 1: Functional Element Development.
Real-World Problems of PKI Hierarchies Daniel Cvrček Department of Computer Science and Engineering, Brno University of Technology SPI Conference 2001,
IntelliDrive Policy and Institutional Issues Research Valerie Briggs Team Lead, Knowledge Transfer and Policy, ITS Joint Program Office, RITA May 4, 2010.
Safety Pilot Model Deployment Lessons Learned Connected Vehicle Public Meeting September 24, 2013 Kevin Gay USDOT / RITA.
SS28: Cooperative Systems II: Bits, Bytes, and Brakes Mike Schagrin US Department of Transportation ITS Joint Program Office International Harmonization.
Privacy Issues in Vehicular Ad Hoc Networks.
National VII Architecture – Data Perspective Michael Schagrin ITS Joint Program Office US Department of Transportation TRB 2008 Annual Meeting Session.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
Federal Aviation Administration Federal Aviation Administration 1 Presentation to: Name: Date: Federal Aviation Administration AMHS Security Security Sub-Group.
Safety support in the automotive industry Jacob Bangsgaard Director of External Affairs and Communications 1st Annual International Conference on ICTs.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Configuring Directory Certificate Services Lesson 13.
Mike Schagrin US Department of Transportation ITS Joint Program Office IntelliDrive Safety Program Overview.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
I NTEGRATED L IGHT V EHICLE M ODEL D EPLOYMENT R ESEARCH P ROJECT U PDATE ITS-JPO Public Workshop September 24, 2013 Mike Lukuc, NHTSA Research.
IntelliDrive SM Vehicle Safety Communications Working Toward V2V Deployment John Harding July 20, 2010.
FHWA Office of Operations Research and Development Executing the Vehicle-to-Infrastructure Research Program: Enabling Technology September 25, 2013 Deborah.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
September 25, 2013 Greg Davis FHWA Office of Safety Research, Development and Test Overview of V2I Safety Applications.
PAWS: Security Considerations Yizhuang WU, Yang CUI PAWS WG
Jackie Voss Manager, Global Standards Development ATIS All-IP Transition Initiatives September 30, 2015.
DSRC Coexistence Date: Authors: November 2013 April 2009
C OLLABORATIVE V2V S ECURITY R ESEARCH U PDATE ITS-JPO Public Workshop September 24, 2013 Mike Lukuc, NHTSA Research.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Driver-Vehicle Interface Design Principles Chris Monk September 24, 2013.
1 National Highway Traffic Safety Administration An Overview of NHTSAs Vehicle Safety Research Priorities Nathaniel Beuse Associate Administrator, Vehicle.
I NTEGRATED L IGHT V EHICLE M ODEL D EPLOYMENT R ESEARCH P ROJECT U PDATE ITS-JPO Public Workshop September 24, 2013 Mike Lukuc, NHTSA Research.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
DSRC C OMMUNICATIONS S CALABILITY R ESEARCH U PDATE ITS-JPO Public Workshop September 24, 2013 Mike Lukuc, NHTSA Research.
Screening activities Mike E. Farrell James E. Bartlett and Ghislaine C.Y. Gillessen Munich, January 2014.
Eyal Hamo Berry Shnaider בס " ד 1.
T.Russell Shields, Co-Chair, Collaboration on ITS Communication Standards Martin Adolph, Programme Coordinator, ITU ITU activities on secure vehicle software.
ITS: The Next Generation Shelley Row Director Intelligent Transportation Systems Joint Program Office Research and Innovative Technology Administration,
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
INDIGO Outreach and Exploitation process Peter Solagna, Matthew Viljoen EGI.eu.
Secure Software Update Over-the-Air for Ground Vehicles Specification and Prototype André Weimerskirch, Brian Anderson This work is sponsored by DHS Cybersecurity.
Presented by Edith Ngai MPhil Term 3 Presentation
Security and privacy for a connected vehicle environment
JRA3 Introduction Åke Edlund EGEE Security Head
Cryptography and Network Security
Authentication Applications
Adaptable safety and security in v2x systems
SAE DSRC Technical Committee work and outlook
Ottawa AV Innovation ‘201’
Standardization activities in ITU:
Systems Design Chapter 6.
AMI Security Roadmap April 13, 2007.
“Real World” METEOR Implementation Issues
DSRC Coexistence Date: Authors: November 2013 April 2009
Presentation transcript:

C OLLABORATIVE V2V S ECURITY R ESEARCH U PDATE ITS-JPO Public Workshop September 24, 2013 Mike Lukuc, NHTSA Research

2September 2013 Overview This presentation provides an overview of collaborative V2V security research performed over the past year in the following areas: Security Credential Management System (SCMS) Design (7 OEMs) Misbehavior Detection (8 OEMs) Over-the-Air Security Credential Management (8 OEMs)

3September 2013 Motivation for V2V Security V2V safety applications can alert the driver and help prevent crashes by issuing different safety warnings, e.g.: Forward Collision Warning (FCW) Intersection Movement Assist (IMA) Electronic Emergency Brake Light (EEBL) Basic Safety Messages (BSM) broadcast over-the-air (OTA) include information on current position, velocity, heading, etc. In cooperative safety systems, the received BSMs must have integrity and authentication Current design solution: Digital signature of BSM (ECDSA-256) for integrity and authentication BSM includes digital certificate issued by a Public-Key-Infrastructure (PKI), the SCMS for chain of trust No encryption of BSMs, as they are useful for everyone in the vicinity (including non-safety applications)

4September 2013 High Level Requirements Privacy (OEM privacy goals) Prevent SCMS from collecting Personally Identifiable Information (PII) Prevent trip tracking by outsiders: frequent change in pseudonym certificates (short term certificates) Prevent trip tracking by SCMS insiders: separation of duties and information such that trip tracking is only possible by a collusion of several SCMS components Trustworthy messages Incoming messages must be verifiable Certificate revocation needs to be integrated to mitigate misbehavior

5September 2013 High Level SCMS Technical Structure Main Operations: 1.Device Initialization 2.Certificate Provisioning 3.Misbehavior Detection and Revocation

6September 2013 Design Optimization and Cost Analysis of Connected Vehicle Security System (CAMP V2V-Vehicle Communication Security Studies Project) Period of Performance: April 3, 2013 – January 3, 2014 Activities: Define reference security model and baseline OBE requirements Develop cost model for the SCMS (underway) Perform cost analysis on reference security model (underway) Analyze potential simplifications to the SCMS (underway) Perform connectivity cost analysis, consider epidemic distribution (underway) Perform sensitivity analysis (Not Started) Provide design recommendations for V2V Security System (underway) Identify technical solutions for linking enrollment certificates to batches of devices to aid defect investigations (outside of SCMS) Provide response to USDOT PKI memo Primary Deliverables to USDOT : Cost model V2V Security Design Recommendations Report

7September 2013 Assumptions for Reference Security Model Starting point for the assessment: Full deployment model Separation: 26 organizations running non-central components Registration Authority Pseudonym Certificate Authority Enrollment Certificate Authority Device Configuration Manager 20 certificates / week, 3 years’ worth (500 kB) Daily CRL distribution, CRL size limited to 400 kB. Full CRLs (no delta CRL) Epidemic Distribution First-hand seeders get CRLs through, for example, dealer RSEs or satellite distribution

8September 2013 Cost Model Overview Step 1a: Determine number of cert. provisioning / year Step 1b: Determine number of certificates / year Step 2: List out all possible crypto operations Step 3: Partition crypto ops: HSMs and GP-CPUs Step 4: Use safety-margin factors and Moore’s law Step 5: Calculate number of HSMs and servers Step 6: Calculate total costs for crypto ops Step 7: Compile database operations Step 8: Price database operations Step 9: Add selected costs which are provided from USDOT

9September 2013 Expert Reviews of the SCMS Design Ongoing detailed technical reviews from security experts including: Scott Vanstone (CertiCom / TrustPoint / University of Waterloo) Stephen Farrell (Tolerant Networks / IETF Security Area Director) No major concerns have been identified Minor technical design improvements Improvements to presentation of information in the SCMS document

10September 2013 Next steps – CAMP (CAMP V2V-Vehicle Communication Security Studies Project) Complete Cost Model Complete cost analysis for reference model Start sensitivity analysis Potential future Activities (2014) (CAMP V2V-Vehicle Communication Security Studies Project) Assess cost estimations using a security supplier’s design implementation Preliminary assessment of applicability of the SCMS for V2I/I2V Proof-of-concept backend implementation, testing with OBEs Simulations and testing for CRL dissemination using epidemic distribution

11September 2013 Misbehavior Reporting and Detection Researching both Local and Global MBD Exploring one or more detection schemes that could potentially be suitable for initial deployment Considering communication protocol and/or data elements Specific activities to include: Analyzing attack models from former projects Identifying potential Global MBD approaches Aligning Local and Global MBD approaches Defining report formats to support potential approaches Performing simulations of promising approaches Coordination between various research teams Misbehavior Detection (MBD) Research (CAMP V2V-Interoperability Project)

12September 2013 Model Deployment Over-the-Air Security Credential Management Testing (CAMP V2V-Model Deployment Project) Sixteen integrated light vehicles performed over-the-air security credential management during Phase 2 of the Safety Pilot Model Deployment Forty-seven vehicles used short term certificates preloaded on USB drives (same as in Phase 1) Further detail will be provided in the Safety Pilot Model Deployment Integrated Light Vehicle Presentation this afternoon

13September 2013 Planned Future Activities - USDOT Third party assessment of V2V security design Risk/Privacy assessment of overall V2V system Implementation of large scale test-bed security system based upon finalized CAMP’s SCMS design Implementation and testing of prototype Local and Global MBD and Revocation solutions

14September 2013 For questions, please contact: Mike Lukuc NHTSA Research