C OLLABORATIVE V2V S ECURITY R ESEARCH U PDATE ITS-JPO Public Workshop September 24, 2013 Mike Lukuc, NHTSA Research.

Slides:



Advertisements
Similar presentations
A Crash Course in Modern Crypto Tools Dan Boneh Stanford University.
Advertisements

1 V2V Safety Research for Heavy Commercial Vehicles 2013 ITS Connected Vehicle Public Meeting Arlington, VA September 24, 2013 Alrik L. Svenson National.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Connected Vehicles AASHTO Annual Meeting | October 17, 2013 | Denver, CO Mike Cammisa Director, Safety Association of Global Automakers.
G4 Apps The Impact of Connected Vehicles on Traffic Operations ISMA Traffic Expo October 1, 2014.
IntelliDrive Safety Workshop July 20, 2010 Alrik L. Svenson US Department of Transportation National Highway Traffic Safety Administration IntelliDrive.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
13 Sept 00 Token Interoperability and Portability Project status report John Hughes Montreal - 14 September 00.
The PKI Lab at Dartmouth. Dartmouth PKI Lab R&D to make PKI a practical component of a campus network Multi-campus collaboration sponsored by the Mellon.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CRASH IMMINENT SAFETY: A TIER 1 UNIVERSITY TRANSPORTATION CENTER PROFESSOR UMIT OZGUNER TRC INC. CHAIR ON INTELLIGENT TRANSPORTATION SYSTEMS DIRECTOR,
Security Management.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Practice EDI Administrator’s Workshop Pathology Messaging Implementation Programme (PMIP)
Real-World Problems of PKI Hierarchies Daniel Cvrček Department of Computer Science and Engineering, Brno University of Technology SPI Conference 2001,
IntelliDrive Policy and Institutional Issues Research Valerie Briggs Team Lead, Knowledge Transfer and Policy, ITS Joint Program Office, RITA May 4, 2010.
Safety Pilot Model Deployment Lessons Learned Connected Vehicle Public Meeting September 24, 2013 Kevin Gay USDOT / RITA.
SS28: Cooperative Systems II: Bits, Bytes, and Brakes Mike Schagrin US Department of Transportation ITS Joint Program Office International Harmonization.
Privacy Issues in Vehicular Ad Hoc Networks.
National VII Architecture – Data Perspective Michael Schagrin ITS Joint Program Office US Department of Transportation TRB 2008 Annual Meeting Session.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
Federal Aviation Administration Federal Aviation Administration 1 Presentation to: Name: Date: Federal Aviation Administration AMHS Security Security Sub-Group.
Safety support in the automotive industry Jacob Bangsgaard Director of External Affairs and Communications 1st Annual International Conference on ICTs.
Doc.: IEEE ae Submission Jan Kenney – Toyota/VSC3Slide 1 Case Study for reduced priority management frames – Vehicular Safety.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Configuring Directory Certificate Services Lesson 13.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Mike Schagrin US Department of Transportation ITS Joint Program Office IntelliDrive Safety Program Overview.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
I NTEGRATED L IGHT V EHICLE M ODEL D EPLOYMENT R ESEARCH P ROJECT U PDATE ITS-JPO Public Workshop September 24, 2013 Mike Lukuc, NHTSA Research.
FHWA Office of Operations Research and Development Executing the Vehicle-to-Infrastructure Research Program: Enabling Technology September 25, 2013 Deborah.
September 25, 2013 Greg Davis FHWA Office of Safety Research, Development and Test Overview of V2I Safety Applications.
C OLLABORATIVE V2V S ECURITY R ESEARCH U PDATE ITS-JPO Public Workshop September 24, 2013 Mike Lukuc, NHTSA Research.
DSRC Coexistence Date: Authors: November 2013 April 2009
A Vehicle Manufacturer’s Perspective on VII Christopher Wilson ITS Oregon- Feb 1, 2005 Christopher Wilson.
Driver-Vehicle Interface Design Principles Chris Monk September 24, 2013.
1 National Highway Traffic Safety Administration An Overview of NHTSAs Vehicle Safety Research Priorities Nathaniel Beuse Associate Administrator, Vehicle.
The Business of V2X Connectivity June 5, 2013 Telematics Update Detroit TRACK 4: V2X & The Autonomous Car Track – Sapphire Ballroom Steven H. Bayless,
I NTEGRATED L IGHT V EHICLE M ODEL D EPLOYMENT R ESEARCH P ROJECT U PDATE ITS-JPO Public Workshop September 24, 2013 Mike Lukuc, NHTSA Research.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
DSRC C OMMUNICATIONS S CALABILITY R ESEARCH U PDATE ITS-JPO Public Workshop September 24, 2013 Mike Lukuc, NHTSA Research.
Screening activities Mike E. Farrell James E. Bartlett and Ghislaine C.Y. Gillessen Munich, January 2014.
Eyal Hamo Berry Shnaider בס " ד 1.
T.Russell Shields, Co-Chair, Collaboration on ITS Communication Standards Martin Adolph, Programme Coordinator, ITU ITU activities on secure vehicle software.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
Security and privacy for a connected vehicle environment
JRA3 Introduction Åke Edlund EGEE Security Head
Rootkit Detection and Mitigation
Cryptography and Network Security
Chapter 15 Key Management
Authentication Applications
THE STEPS TO MANAGE THE GRID
Adaptable safety and security in v2x systems
SAE DSRC Technical Committee work and outlook
Ottawa AV Innovation ‘201’
Standardization activities in ITU:
Systems Design Chapter 6.
NGV SG Use Cases (Next Generation V2X Study Group)
Presentation transcript:

C OLLABORATIVE V2V S ECURITY R ESEARCH U PDATE ITS-JPO Public Workshop September 24, 2013 Mike Lukuc, NHTSA Research

2September 2013 This is US Government work and may be copied or distributed without permission Overview This presentation provides an overview of collaborative V2V security research performed over the past year in the following areas: 1.Security Credential Management System (SCMS) Design (7 OEMs) 2.Misbehavior Detection (8 OEMs) 3.Over-the-Air Security Credential Management (8 OEMs)

3September 2013 This is US Government work and may be copied or distributed without permission Motivation for V2V Security V2V safety applications can alert the driver and help prevent crashes by issuing different safety warnings, e.g.: Forward Collision Warning (FCW) Intersection Movement Assist (IMA) Electronic Emergency Brake Light (EEBL) Basic Safety Messages (BSM) broadcast over-the-air (OTA) include information on current position, velocity, heading, etc. In cooperative safety systems, the received BSMs must have integrity and authentication Current design solution: Digital signature of BSM (ECDSA-256) for integrity and authentication BSM includes digital certificate issued by a Public-Key-Infrastructure (PKI), the SCMS for chain of trust No encryption of BSMs, as they are useful for everyone in the vicinity (including non-safety applications)

4September 2013 This is US Government work and may be copied or distributed without permission High Level Requirements Privacy (OEM privacy goals) Prevent SCMS from collecting information that could identify a person or motor vehicle, directly or indirectly (PII) Prevent trip tracking by outsiders: frequent change in pseudonym certificates (short term certificates) Prevent trip tracking by SCMS insiders: separation of duties and information such that trip tracking is only possible by a collusion of several SCMS components Trustworthy messages Incoming messages must be verifiable Certificate revocation needs to be integrated to mitigate misbehavior

5September 2013 This is US Government work and may be copied or distributed without permission High Level SCMS Technical Structure Main Operations: 1.Device Initialization 2.Certificate Provisioning 3.Misbehavior Detection and Revocation

6September 2013 This is US Government work and may be copied or distributed without permission Design Optimization and Cost Analysis of Connected Vehicle Security System (CAMP V2V-Vehicle Communication Security Studies Project under a Cooperative Agreement with USDOT) Period of Performance: April 3, 2013 – January 3, 2014 Activities: Define reference security model and baseline OBE requirements Develop cost model for the SCMS (underway) Perform cost analysis on reference security model (underway) Analyze potential simplifications to the SCMS (underway) Perform connectivity cost analysis, consider epidemic distribution (underway) Perform sensitivity analysis (Not Started) Provide design recommendations for V2V Security System (underway) Identify technical solutions for linking enrollment certificates to batches of devices to aid defect investigations (outside of SCMS) Primary Deliverables to USDOT : Cost model V2V Security Design Recommendations Report

7September 2013 This is US Government work and may be copied or distributed without permission Assumptions for Reference Security Model Starting point for the assessment: Full deployment model of SCMS Separation: 26 organizations running non-central components Registration Authority Pseudonym Certificate Authority Enrollment Certificate Authority Device Configuration Manager 20 certificates / week, 3 years’ worth (500 kB) Daily CRL distribution, CRL size limited to 400 kB Full CRLs (no delta CRL) Epidemic Distribution First-hand seeders get CRLs through, for example, dealer RSEs or satellite distribution

8September 2013 This is US Government work and may be copied or distributed without permission Cost Model Overview Step 1a: Determine number of cert. provisioning / year Step 1b: Determine number of certificates / year Step 2: List out all possible crypto operations Step 3: Partition crypto ops: HSMs and GP-CPUs Step 4: Use safety-margin factors and Moore’s law Step 5: Calculate number of HSMs and servers Step 6: Calculate total costs for crypto ops Step 7: Compile database operations Step 8: Price database operations Step 9: Add operational and other general costs

9September 2013 This is US Government work and may be copied or distributed without permission Expert Reviews of the SCMS Design Ongoing detailed technical reviews from security experts as part of this project, including: Scott Vanstone (CertiCom / TrustPoint / University of Waterloo) Stephen Farrell (Tolerant Networks / IETF Security Area Director) No major concerns have been identified Minor technical design improvements Improvements to presentation of information in the CAMP VSC3 SCMS document

10September 2013 This is US Government work and may be copied or distributed without permission Next steps – CAMP (CAMP V2V-Vehicle Communication Security Studies Project) Complete Cost Model Complete cost analysis for reference model Start sensitivity analysis Potential future Activities (2014) (CAMP V2V-Vehicle Communication Security Studies Project) Assess cost estimations using a security supplier’s design implementation Preliminary assessment of applicability of the SCMS for V2I/I2V Proof-of-concept backend implementation, testing with OBEs Simulations and testing for CRL dissemination using epidemic distribution

11September 2013 This is US Government work and may be copied or distributed without permission Misbehavior Reporting and Detection Researching both Local and Global MBD Exploring detection schemes (one or more) which could potentially be suitable for initial deployment Considering communication protocol and/or data elements Specific activities to include: Analyzing attack models from former projects Identifying potential Global MBD approaches Aligning Local and Global MBD approaches Defining report formats to support potential approaches Performing simulations of promising approaches Coordination between various research teams Misbehavior Detection (MBD) Research (CAMP V2V-Interoperability Project)

12September 2013 This is US Government work and may be copied or distributed without permission Model Deployment Over-the-Air Security Credential Management Testing (CAMP V2V-Model Deployment Project) Sixteen integrated light vehicles performed over-the-air security credential management during Phase 2 of the Safety Pilot Model Deployment Forty-seven vehicles used short term certificates preloaded on USB drives (same as in Phase 1) Further detail will be provided in the Safety Pilot Model Deployment Integrated Light Vehicle Presentation this afternoon

13September 2013 This is US Government work and may be copied or distributed without permission For questions, please contact: Mike Lukuc NHTSA Research

14September 2013 This is US Government work and may be copied or distributed without permission BACK-UP SLIDES

15September 2013 This is US Government work and may be copied or distributed without permission SCMS – Initial Deployment Model Full SCMS Structure

16September 2013 This is US Government work and may be copied or distributed without permission SCMS - Full Deployment Model Full SCMS Structure