Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network and security trends in connected cars

Similar presentations


Presentation on theme: "Network and security trends in connected cars"— Presentation transcript:

1 Network and security trends in connected cars
Alexios Lekidis

2 Why automotive security is challenging?
Related to safety Complexity of in-vehicle networks

3 Overview of in-vehicle architectures
Threat landscape Suggested security mechanisms

4 Overview of in-vehicle architectures
Threat landscape Suggested security mechanisms

5 Automotive architecture
Consists of different data networks: Legacy systems where new technologies are take many years to replace old ones Low cost technologies with multiple resource-constraints Changing a simple component requires possible changes and testing of the entire system

6 Entering the in-vehicle network
central gateway GPS interface Diagnostic interface USB interface GSM/GPRS interface Bluetooth interface DSRC interface CAN MOST protocol FlexRay LIN Engine control Steering control Instrument cluster Head Unit Audio Video Transmission control Air Bag control Climate control Navigation Power train sensors Breaking system Door locking Telephone

7 In-vehicle protocol usage
Abbreviation Description CAN Controller Area Network Inexpensive low-speed serial bus CAN FD With Flexible Data Rate Extension to CAN FlexRay N/A General purpose high speed protocol with safety-critical features LIN Local Interconnect Network Low cost in-vehicle sub-network MOST Media Oriented Systems Transport High speed multimedia interface Automotive Ethernet Ongoing development for infotainment and active safety

8 Background on Controller Area Network (CAN)
Serial communication protocol Multi master message model Any node receives/transmits messages No addressing  use of ID CSMA/CA Priority determined by ID (low ID = high prio) Messages are sent/received: Periodically On request Also used in trucks, ships, railway systems, elevators, …

9 Overview of in-vehicle architectures
Threat landscape Suggested security mechanisms

10 Attack surfaces OBDII Tire Pressure Monitoring Head Sensor Keyless
Unit Keyless entry Medium observation in broadcasted messages Direct access Central Gateway Telematics Control Unit Short-range access Long-range access

11 Attack scenario OBDII Sniff the telematics system IP address
Random generator of Bluetooth PIN / WiFi WPA password Brake Control Unit Central Gateway Telematics Control Unit Head Unit

12 Move to safety Bus from telematics system
OBDII Move to safety Bus from telematics system Brake Control Unit Central Gateway Telematics Control Unit Head Unit

13 Disengage brakes or kill engine
OBDII Disengage brakes or kill engine Brake Control Unit Central Gateway Telematics Control Unit Head Unit

14 Overview of in-vehicle architectures
Threat landscape Suggested security mechanisms

15 Categories of security mechanisms
Physical Security tampering protection mechanisms and tamper proof devices Digital signatures and Certificates Firewall Gateway Honeypot Software security Intrusion detection systems Intrusion prevention systems

16 Digital signatures and Certificates
Pros: - Widely adopted as it provides a fast design/implementation security solution Cons: 1) Performance requirements can only be met when dedicated hardware is provided Accelerates the algorithmic execution 2) Infected ECUs can still send valid compromised messages

17 Firewall Based on the definition of CAN in Automation (CiA) 447 profile Pros: 1) Verification of message validity 2) Whitelist IP rules Cons: 1) Frequent rule update required Security update on the cars are not frequent 2) Bypassed by impersonation of legitimate ECU attacks

18 Intrusion detection/prevention systems (IDS/IPS)
Monitoring V2X and in-vehicle activity and detection of suspicious and anomalous behavior Flow of data exchange Deep data inspection and analysis Can operate in the level of: Host application Communication network Pros: - Protection against zero-day attacks - Frequent update Cons: - Requires to learn the normal system behavior to detect anomalies Hybrid approach Signatures Behavior Normal network data parsed by IDS Abnormal network data parsed by IDS Alerts/logs

19 Vehicle cybersecurity in a glance
Traffic encryption Firewall protection Anomaly detection (i.e. IDS) Misuse/threat distinction Incident response Vehicle cybersecurity in a glance

20 Reaction upon attack detection
Turning the car into “limb” mode Partial networking functionality Main ECUs functioning with lower performance Car can be restored when any malicious activity is prevented Indications to the manufacturer Alarms to the driver?

21 Security research in automotive systems
APPSTACLE: open standard APplication Platform for carS and TrAnsportation vehiCLEs Goals: open and secure cloud platform interconnecting a wide range of vehicles to the cloud via open in-car and Internet connection supported by an integrated open source software development ecosystem ForeScout IDS systems for end-to-end security in automotive environments Detection of known and unknown in-vehicle threats Support of different in-vehicle networks


Download ppt "Network and security trends in connected cars"

Similar presentations


Ads by Google