Electronic Registration Identification (ERI)

Size: px
Start display at page:

Download "Electronic Registration Identification (ERI)"

Transcription

1 Electronic Registration Identification (ERI) Concept, architecture and current status Murcia, 18th June 2009

2 Overview The ERI standard User requirements Architecture Current status 2 Electronic Registration Identification (ERI) 18 juni 2009

3 The ERI standard: Scope ISO/TS Electronic Registration Identification (ERI) A standard for identifying vehicles by electronic means Suitable for: Identification of local and foreign vehicles by authorities Vehicle manufacturing, vehicle life cycle management Safety related purposes Crime reduction Commercial services Adhering to privacy/data protection regulations 3 Electronic Registration Identification (ERI) 18 juni 2009

4 The ERI standard: History A CEN and ISO standard (part 5 is ISO only) A basic variant: Basis ERI Work started in spring 2003 Participants from: US, Mexico, Japan, several EU countries 2004: Expert opinions security & feasibility Currently a Technical Specification (TS) In transition to an International Standard (IS) unanimous positive vote in June 4 Electronic Registration Identification (ERI) 18 juni 2009

5 The ERI standard: 5 parts and Basic ERI : Architecture : Operational Requirements 24535: Basic ERI : Vehicle data : Secure communications Using asymmetrical techniques Basic ERI : allows for proprietary security implementations Part 4: Security may vary from very modest to highly secure Part 5: Used in Japan : Secure communications Using symmetrical techniques Focus on application layer communication, lower layers are only referenced 5 Electronic Registration Identification (ERI) 18 juni 2009

6 User requirements: Identification Two types of identification: Specific vehicle identification Vehicle vicinity identification Safe, no hindrance to the driver Mandatory: no due diligence assumed Under all traffic and whether conditions Irrespective of the vehicle s speed Readable with roadside, mobile & handheld equipment 6 Electronic Registration Identification (ERI) 18 juni 2009

7 User requirements: Security Adaptable to user needs from very modest to highly secure Identification usable as legal evidence Authenticity (as needed) Is the ERT attached to the right vehicle Is it a genuine (not a fake) ERT ERT inoperable when removed Confidentiality (to the roadside) (as needed) privacy and protection against attack Read authorisation of authorities / third parties Support of international vehicle sales ERT key management / diversification 7 Electronic Registration Identification (ERI) 18 juni 2009

8 User requirements: ERI data Vehicle Id Vehicle Identification Number VIN (ISO 3779) Or, registration authority specific (WMI + e.g. a chassis number) Additional ERI data (optional) More then 60 different items E.g. vehicle registration certificate data Registration authority specific data 8 Electronic Registration Identification (ERI) 18 juni 2009

9 ERI: Architecture Overview: Basics Overall system concept The ERI system Two board variants In-vehicle architecture 9 Electronic Registration Identification (ERI) 18 juni 2009

10 Architecture: Basics For an acquirer: Architecture = Procurement policy! Only distinguish components if more than one party will be involved, i.e.: Different suppliers / maintenance companies Different owners / users do not specify internal details /interfaces Focus on behaviour / interfaces: Vehicle road-side (the main interface) In-vehicle (to support other onboard applications & architectures) ERI part 4 defines complete interfaces 10 Electronic Registration Identification (ERI) 18 juni 2009

11 Architecture: Overall system concept Vehicle Reader (writer) (Registration) authority Road Road-side (garage) Back office 11 Electronic Registration Identification (ERI) 18 juni 2009

12 Architecture: The ERI system ERI system ERT ERI reader/ writer Sensor system Onboard Non-ERI equipment ERI back office system E.g. a (registration) authority Vehicle 12 Electronic Registration Identification (ERI) 18 juni 2009

13 Architecture: Two onboard variants One single onboard component: ERT + DSRC tag Multiple onboard components: ERT ERR Other DSRC application module Onboard communication DSRC beacon ERI readers or readers/writers (ERRs) DSRC beacon Vehicle Road side 13 Electronic Registration Identification (ERI) 18 juni 2009

14 Architecture: In-vehicle architecture ERI standard interface ERI standard interface ERI Device Inductive coupling Internal reader /writer Other In vehicle device In vehicle communication Comm. device Air Interface e.g. ISO e.g. ISO / CEN Electronic Registration Identification (ERI) 18 juni 2009

15 Architecture: The ERT life cycle Customisation to a vehicle Writing vehicle data into the ERT Commissioning by a registration authority (RA) who may: assigns himself as the vehicle s RA enable / disable signing / encryption capabilities allow others to access ERT data Deployment, i.e. customised and commissioned Withdrawn (customised with revoked commissioning) 15 Electronic Registration Identification (ERI) 18 juni 2009

16 Current status ERI standard: Last steps in transition from TS to IS In the Netherlands: a TNO RDW project (see e.g. For 2 use cases: The inspector Rush hour avoidance Proprietary environment (=> secret keys) Multiple tags per vehicle to prevent identity fraud 16 Electronic Registration Identification (ERI) 18 juni 2009

17 In summary The ERI standard TS with part 4: Defines a complete interface with the OBE Allows a variety of onboard architectures Security is adaptable to user needs 17 Electronic Registration Identification (ERI) 18 juni 2009

18 Thank you for your attention For further information: Jan Vis Electronic Registration Identification (ERI) 18 juni 2009

Security risk analysis approach for on-board vehicle networks

Security risk analysis approach for on-board vehicle networks 1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle

More information

Vehicular On-board Security: EVITA Project

Vehicular On-board Security: EVITA Project C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security

More information

Concept for a cryptographic infrastructure for measurement components in smart grids

Concept for a cryptographic infrastructure for measurement components in smart grids Physikalisch-Technische Bundesanstalt Braunschweig und Berlin Concept for a cryptographic infrastructure for measurement components in smart grids Norbert Zisky Physikalisch-Technische Bundesanstalt Norbert

More information

Cloud Security and Managing Use Risks

Cloud Security and Managing Use Risks Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access

More information

Safety Pilot Security System

Safety Pilot Security System Safety Pilot Security System Crash Avoidance II: Connected Vehicles (Session Code: G201) W L Fehr 1 Safety Pilot/Model Deployment Safety Pilot/Model Deployment is a U.S. DOT research program conducted

More information

Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved.

Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved. Connected Vehicles: New Directions and Opportunities AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA N A T I O N A L S E C U R I T Y E N G I N E E R I N G H E A L T H S O L U T I O N S

More information

Network Security Protocols

Network Security Protocols Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination

More information

Electronic Logging Devices (ELD)s Reliability and Efficiency for Hours Of Service Enforcement CCMTA, June 16, 2015

Electronic Logging Devices (ELD)s Reliability and Efficiency for Hours Of Service Enforcement CCMTA, June 16, 2015 Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) Electronic Logging Devices (ELD)s Reliability and Efficiency for Hours Of Service

More information

Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy

Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy November 18, 2008 Teresa Schwarzhoff Computer Security Division Information

More information

2012 ISO TC46/SC4/WG11 N246

2012 ISO TC46/SC4/WG11 N246 RFID PRIVACY IN EUROPE Implications for Libraries Paul Chartier Convergent Software Ltd CILIP Conference, Nov 2012 ISO TC46/SC4/WG11 N246 Today s Presentation Broad Overview of the EU position A bit of

More information

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations. Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely

More information

siemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office.

siemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office. siemens.com/tolling Back-office system Server Supplies all front-end data. Suitable for any GNSS tolling back-office. Server: The universal back-office for efficient and effective toll collection Server

More information

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0 Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage

More information

Using PKI for PC Security

Using PKI for PC Security Using PKI for PC Security Public Key Infrastructure (PKI) is an important foundation for network and information security. In essence, PKI provides an enterprise infrastructure for managing the keys necessary

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy.

Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy. MOBILE APPLICATION PRIVACY POLICY Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy. SCOPE OF POLICY This policy (together with our end-user licence agreement

More information

Always one step ahead.

Always one step ahead. Always one step ahead. Image 25.4 x 5.28 cm 1 DSRC - Components basics for multi application solutions. Image 25.4 x 5.28 cm 14 th European Parking Congress, Vienna, 23-25 of September 2009 DI Werner Dreschl

More information

Technologies and Techniques for Collecting Floating Car Data. Mike Hayward Head of Vehicle Telematics WS Atkins Transport Systems

Technologies and Techniques for Collecting Floating Car Data. Mike Hayward Head of Vehicle Telematics WS Atkins Transport Systems Technologies and Techniques for Collecting Floating Car Data Mike Hayward Head of Vehicle Telematics WS Atkins Transport Systems Presentation What is Floating Car Data? Why is FCD of interest for Network

More information

Frequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 support@sslpost.com

Frequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 support@sslpost.com Frequently Asked Questions 2013 SSLPost Page 1 of 31 support@sslpost.com Table of Contents 1 What is SSLPost Cloud? 3 2 Why do I need SSLPost Cloud? 4 3 What do I need to use SSLPost Cloud? 5 4 Which Internet

More information

Securing Wireless Access for Vehicular Environments (WAVE)

Securing Wireless Access for Vehicular Environments (WAVE) Securing Wireless Access for Vehicular Environments (WAVE) May 7, 2009 CTST, New Orleans Tim Weil CISSP/CISA Security Architect ITS Engineering Booz Allen Hamilton 0 The concept of VII started upon the

More information

THE PROSPECTS FOR ELECTRONIC FEE COLLECTION (EFC) USING VEHICLE POSITIONING SYSTEMS (VPS)

THE PROSPECTS FOR ELECTRONIC FEE COLLECTION (EFC) USING VEHICLE POSITIONING SYSTEMS (VPS) THE PROSPECTS FOR ELECTRONIC FEE COLLECTION (EFC) USING VEHICLE POSITIONING SYSTEMS (VPS) erp1110 paper on VPS for Turin World Congress.doc by Ian Catling, Ian Catling Consultancy, Ash Meadow, Bridge Way,

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

ETSI TR 102 893 V1.1.1 (2010-03) Technical Report. Intelligent Transport Systems (ITS); Security; Threat, Vulnerability and Risk Analysis (TVRA)

ETSI TR 102 893 V1.1.1 (2010-03) Technical Report. Intelligent Transport Systems (ITS); Security; Threat, Vulnerability and Risk Analysis (TVRA) TR 102 893 V1.1.1 (2010-03) Technical Report Intelligent Transport Systems (ITS); Security; Threat, Vulnerability and Risk Analysis (TVRA) 2 TR 102 893 V1.1.1 (2010-03) Reference DTR/ITS-0050005 Keywords

More information

An Effective Approach to Open Payment Systems

An Effective Approach to Open Payment Systems An Effective Approach to Open Payment Systems Steven Grant May 18, 2012 Planning for Implementation of New Technology Assess the current fare system Are there goals and objectives? What is available? What

More information

Lecture II : Communication Security Services

Lecture II : Communication Security Services Lecture II : Communication Security Services Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 What is Communication

More information

SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY

SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY Introduction OPTIMIZING SSL DEPLOYMENT On-demand business breaks down the traditional network perimeter, creating interconnected systems between

More information

Module 1: e- Learning

Module 1: e- Learning Module 1: e- Learning SECTION 1: OVERVIEW... 2 PRIMER ON INFORMATION TECHNOLOGY, IS INFRASTRUCTURE AND EMERGING TECHNOLOGIES (12%) E-LEARNING... 2 Objective Objective:... 2 Task Statements... 2 Knowledge

More information

Safety and security related features in AUTOSAR

Safety and security related features in AUTOSAR Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security 2010 22

More information

INTELLIGENT AND INNOVATIVE TRANSPORT SYSTEMS

INTELLIGENT AND INNOVATIVE TRANSPORT SYSTEMS INTELLIGENT AND INNOVATIVE TRANSPORT SYSTEMS Turn-key solutions In a world facing rapid urbanization and accelerating environmental challenges, the role of public transportation is at the forefront. By

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Managing Information Security @ Stanford

Managing Information Security @ Stanford Managing Information Security @ Stanford March 4, 2011 Tina Darmohray, Assistant Vice President and Chief Information Security Officer 1 Stanford Information Assets Stanford s diversity results in many

More information

White Paper How Noah Mobile uses Microsoft Azure Core Services

White Paper How Noah Mobile uses Microsoft Azure Core Services NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah

More information

Car Data New access via telematic systems. Maja Berends, ADAC. 12 September 2013 10-13 SEPT 1

Car Data New access via telematic systems. Maja Berends, ADAC. 12 September 2013 10-13 SEPT 1 Car Data New access via telematic systems Maja Berends, ADAC 12 September 2013 10-13 SEPT 1 Access to car data Relevance for Automobile Clubs Ø Consumer protection Consumers free choice Ø Consumer data

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

Privacy and Data Protection Impact Assessment Framework for RFID Applications. 12 January 2011

Privacy and Data Protection Impact Assessment Framework for RFID Applications. 12 January 2011 Privacy and Data Protection Impact Assessment Framework for RFID Applications 12 January 2011 1 INDEX 1. Introduction...3 1.1. Key Concepts...4 1.2. Internal Procedures...5 2. The PIA Process...6 2.1.

More information

Advanced Authentication

Advanced Authentication White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is

More information

IIS Smart Roadside Takes the Lead in Roadside Safety and Enforcement

IIS Smart Roadside Takes the Lead in Roadside Safety and Enforcement IIS Smart Roadside Takes the Lead in Roadside Safety and Enforcement Smart Roadside is the leading law enforcement platform in commercial vehicle safety. Our success is defined by delivering real world

More information

mobile payment acceptance Solutions Visa security best practices version 3.0

mobile payment acceptance Solutions Visa security best practices version 3.0 mobile payment acceptance Visa security best practices version 3.0 Visa Security Best Practices for, Version 3.0 Since Visa s first release of this best practices document in 2011, we have seen a rapid

More information

Part A) I. Focus areas from the perspective of the German Government s on automated and connected driving

Part A) I. Focus areas from the perspective of the German Government s on automated and connected driving Cybersecurity and data protection Part A) Focus areas for presentation at the IG ITS/AD meeting in November 2015 Part B) Issues for discussion Part C) Preliminary Draft proposal for Guidelines on measures

More information

Current and Future Research into Network Security Prof. Madjid Merabti

Current and Future Research into Network Security Prof. Madjid Merabti Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition

More information

An Implementation of Secure Online Voting System

An Implementation of Secure Online Voting System An Implementation of Secure Online Voting System Prof. Anisaara Nadaph 1, Rakhi Bondre 2, Ashmita Katiyar 3, Durgesh Goswami 4, Tushar Naidu 5 1 Pune University, Trinity college of Eng. And res., anisaaranadaph@gmail.com

More information

Snow Agent System Pilot Deployment version

Snow Agent System Pilot Deployment version Pilot Deployment version Security policy Revision: 1.0 Authors: Per Atle Bakkevoll, Johan Gustav Bellika, Lars, Taridzo Chomutare Page 1 of 8 Date of issue 03.07.2009 Revision history: Issue Details Who

More information

Preventing fraud in epassports and eids

Preventing fraud in epassports and eids Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

Required changes to Table 6 2 in FIPS 201

Required changes to Table 6 2 in FIPS 201 The PIV Working Group appreciates the opportunity to provide guidance on the initial scope for ICAM Part B. In addressing your request we created three bodies of content: Required changes to Table 6 2

More information

Strategy for Mobile ID

Strategy for Mobile ID Mobile ID Devices Strategy for Mobile ID 20 September 2013 Version 2.1 Strategy for Mobile ID Solutions Contents Summary...1 Context...2 Police and immigration services...2 Mobile solutions generally...2

More information

4.6 Internet Connection

4.6 Internet Connection 4.6 Internet Connection Road users can utilize Internet connection to obtain various kinds of information, including road traffic, tourism, and vicinity information, while seated in their cars at parking

More information

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity

More information

Wireless traffic Safety network between Cars. CoMoSeF TULEVAT TRENDIT AUTOJEN M2M KOMMUNIKAATIOSSA WISAFECAR JA COMOSEF PROJEKTIT

Wireless traffic Safety network between Cars. CoMoSeF TULEVAT TRENDIT AUTOJEN M2M KOMMUNIKAATIOSSA WISAFECAR JA COMOSEF PROJEKTIT TULEVAT TRENDIT AUTOJEN M2M KOMMUNIKAATIOSSA WISAFECAR JA COMOSEF PROJEKTIT WiSafeCar Particpants Mobisoft (Co-ordinator) Finnish Meteorological Institute VTT Infotripla Taipale Telematics Sunit University

More information

Technical regulation in the scope of ERA-GLONASS emergency response system deployment

Technical regulation in the scope of ERA-GLONASS emergency response system deployment Technical regulation in the scope of ERA-GLONASS emergency response system deployment Victor Gladkikh, Deputy head of complex on technical regulation, Phd Artem Klimovskiy, Technical analyst Seminar on

More information

Interoperability Support systems Nationwide components (Estonia)

Interoperability Support systems Nationwide components (Estonia) Interoperability Support systems Nationwide components (Estonia) July 6, 2007 Forum Standaardisatie, Netherland Uuno Vallner, PhD. Ministry of Economic Affairs and Communications ICT legislation (1) Personal

More information

A Secure RFID Ticket System For Public Transport

A Secure RFID Ticket System For Public Transport A Secure RFID Ticket System For Public Transport Kun Peng and Feng Bao Institute for Infocomm Research, Singapore Abstract. A secure RFID ticket system for public transport is proposed in this paper. It

More information

Big data in the vehicle: another brick in the wall? Intelligent transportation in the era of big data

Big data in the vehicle: another brick in the wall? Intelligent transportation in the era of big data Big data in the vehicle: another brick in the wall? Intelligent transportation in the era of big data IBTTA Global Summit- Prague - 20 th October 2014 - PTOLEMUS intellectual property PTOLEMUS in a nutshell

More information

New Mobile App. Virtual Inspector revolutionizes vehicle inspections

New Mobile App. Virtual Inspector revolutionizes vehicle inspections New Mobile App Virtual Inspector revolutionizes vehicle inspections Vehicle inspections don t have to be timeconsuming and costly. New technologies and analytics are making them easy and inexpensive. Underwriters

More information

Sage Accpac CRM 5.8. Self Service Guide

Sage Accpac CRM 5.8. Self Service Guide Sage Accpac CRM 5.8 Self Service Guide Copyright 2005 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated,

More information

SECURITY THREATS TO CLOUD COMPUTING

SECURITY THREATS TO CLOUD COMPUTING IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD

More information

A Resilient Protection Device for SIEM Systems

A Resilient Protection Device for SIEM Systems A Resilient Protection Device for SIEM Systems Nuno Neves University of Lisboa, Portugal http://www.di.fc.ul.pt/~nuno Work with: Alysson Bessani, Miguel Garcia, Eric Vial, Ricardo Fonseca, Paulo Veríssimo

More information

Innovative means to exchange telecom fraud and network security risks information

Innovative means to exchange telecom fraud and network security risks information Innovative means to exchange telecom fraud and network security risks information Anastasius Gavras Eurescom GmbH Outline Who is Eurescom? Collaboration as an innovation instrument INNO-UTILITIES Sharing

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

An introduction to Cryptosoft

An introduction to Cryptosoft An introduction to Cryptosoft Seamless end-to-end data centric security for every IoT ecosystem Cryptosoft is building trust in the Internet of Things and M2M by simplifying the processes that a company

More information

ETSI TC ITS RELEASE PROCESS

ETSI TC ITS RELEASE PROCESS ETSI TC ITS RELEASE PROCESS ITS Workshop Doha 7-9 February 2012 Søren Hess Chairman ETSI TC ITS hess@shess.dk Status of ETSI standardisation M/453 Applicationand Facility Network and transport GeoNetworking

More information

Digital Identity in Canada The little Trust Framework that could

Digital Identity in Canada The little Trust Framework that could Digital Identity in Canada The little Trust Framework that could Why is Canada leading the world in federated identity? SecureKey Technologies Inc. All rights reserved. Page 1 SecureKey Technologies Inc.

More information

TETRA Security for Poland

TETRA Security for Poland TETRA ASSOCIATION TETRA Security for Poland Brian Murgatroyd TETRA ASSOCIATION former Chairman Security and Fraud Prevention Group Warren Systems (SFPG) Independent Security Consultant brian@warrensystems.co.uk

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

Smarter Tunnels Integration with the Traffic Management

Smarter Tunnels Integration with the Traffic Management Smarter Tunnels Integration with the Traffic Management Tor K. Moseng, SINTEF ICT Tunnels and ITS Bergen, 2011-06-16 1 Conclusions Monitor and control areas and road sections through a holistic traffic

More information

FIDO Trust Requirements

FIDO Trust Requirements FIDO Trust Requirements Ijlal Loutfi, Audun Jøsang University of Oslo Mathematics and Natural Sciences Faculty NordSec 2015,Stockholm, Sweden October, 20 th 2015 Working assumption: End Users Platforms

More information

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2 BSc (Hons.) Computer Science with Network Security BCNS/09/FT Examinations for 2011/2012 - Semester 2 MODULE: WIRELESS NETWORK SECURITY MODULE CODE: SECU 3105 Duration: 2 Hours 15 Minutes Reading time:

More information

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201. PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize

More information

TURPAK Vehicle ID Solution Solution Overview for Oil Companies

TURPAK Vehicle ID Solution Solution Overview for Oil Companies TURPAK Vehicle ID Solution Solution Overview for Oil Companies Agenda RFID Wireless Architecture Components Installation Recruiting & Issuing Security Summary RFID Wireless Advantages Proven solution,

More information

Europcar.co.uk collects personal data that you voluntarily provide. This information is collected when you:

Europcar.co.uk collects personal data that you voluntarily provide. This information is collected when you: Privacy Policy I What type of information do we collect? Europcar.co.uk collects personal data that you voluntarily provide. This information is collected when you: - Register / Become a Europcar member

More information

EMV-TT. Now available on Android. White Paper by

EMV-TT. Now available on Android. White Paper by EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

The Vision of Vehicle Infrastructure Integration (VII)

The Vision of Vehicle Infrastructure Integration (VII) The Vision of Vehicle Infrastructure Integration (VII) Ralph L. Robinson ITS Integration Office September, 2007 Cooperative Highways SAFETY MOBILITY Collision Avoidance Signal Control Emergency Alerts

More information

FAQ: (Data) security and privacy

FAQ: (Data) security and privacy Shockwave Traffic Jams A58 FAQ: (Data) security and privacy The strength of the shockwave traffic jam service developed in the project Shockwave Traffic Jams A58 is that the participants receive customized

More information

Cyber Security Test-bed TDL Download Corner. Achieving The Trust Paradigm Shift ATTPS. Arthur Leijtens, Daan Velthausz, Bicore, April, Brussel

Cyber Security Test-bed TDL Download Corner. Achieving The Trust Paradigm Shift ATTPS. Arthur Leijtens, Daan Velthausz, Bicore, April, Brussel Cyber Security Test-bed TDL Download Corner Arthur Leijtens, Daan Velthausz, Bicore, April, Brussel ATTPS Achieving The Trust Paradigm Shift Generic Trust Architecture ATTPS project has developed a generic

More information

TOP SECRETS OF CLOUD SECURITY

TOP SECRETS OF CLOUD SECURITY TOP SECRETS OF CLOUD SECURITY Protect Your Organization s Valuable Content Table of Contents Does the Cloud Pose Special Security Challenges?...2 Client Authentication...3 User Security Management...3

More information

How to create a Security roadmap for smart mobility projects and pilots?

How to create a Security roadmap for smart mobility projects and pilots? How to create a Security roadmap for smart mobility projects and pilots? 7 April 2016 Gilles Ampt Chairman national ITS Security table security@ditcm.eu ! Should autonomous vehicles be admitted on our

More information

Secure software updates for ITS communications devices

Secure software updates for ITS communications devices Secure software updates for ITS communications devices - International Standardization Activity in ITU-T SG17 - Masashi Eto, Senior researcher, Cybersecurity laboratory, Network security research institute,

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

IoT Security. Introduction. Threat Model

IoT Security. Introduction. Threat Model IoT Security Introduction In this 1248 white paper we summarise the various aspects of security which need to be considered when designing connected products for the Internet of Things. We give a general

More information

TLS and SRTP for Skype Connect. Technical Datasheet

TLS and SRTP for Skype Connect. Technical Datasheet TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security

More information

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless

More information

Fit and proper person guidelines. for inspecting organisations and vehicle inspectors

Fit and proper person guidelines. for inspecting organisations and vehicle inspectors Fit and proper person guidelines for inspecting organisations and vehicle inspectors Fit and proper person guidelines for inspecting organisations and vehicle inspectors NZ Transport Agency August 2011

More information

BIOMETRIC AUTHENTICATION SECURITY AND USABILITY

BIOMETRIC AUTHENTICATION SECURITY AND USABILITY BIOMETRIC AUTHENTICATION SECURITY AND USABILITY Václav Matyáš and Zdeněk Říha Faculty of Informatics, Masaryk University Brno, Czech Republic {matyas, zriha} @fi.muni.cz Abstract We would like to outline

More information

Management of Hardware Passwords in Think PCs.

Management of Hardware Passwords in Think PCs. Lenovo Corporation March 2009 security white paper Management of Hardware Passwords in Think PCs. Ideas from Lenovo Notebooks and Desktops Workstations and Servers Service and Support Accessories Introduction

More information

RECOMMENDATION ITU-R M.1453-1 * Transport information and control systems Dedicated short range communications at 5.8 GHz

RECOMMENDATION ITU-R M.1453-1 * Transport information and control systems Dedicated short range communications at 5.8 GHz Rec. ITU-R M.1453-1 1 RECOMMENDATION ITU-R M.1453-1 * Transport and control systems Dedicated short range communications at 5.8 GHz (Question ITU-R 205/8) (2000-2002) The ITU Radiocommunication Assembly,

More information

International Working Group on Data Protection in Telecommunications

International Working Group on Data Protection in Telecommunications International Working Group on Data Protection in Telecommunications 675.42.10 4 April 2011 Working Paper Event Data Recorders (EDR) on Vehicles Privacy and data protection issues for governments and manufacturers

More information

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

How to secure an LTE-network: Just applying the 3GPP security standards and that's it? How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro

More information

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald 0043306

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald 0043306 Software Engineering 4C03 Research Project An Overview of Secure Transmission on the World Wide Web Sean MacDonald 0043306 Tuesday April 5, 2005 Introduction Software Engineering 4C03 Research Project

More information

PKI in Large Scale Environments A Look at DMS. George Hoover Jayne Schaefer PKI/KMI (480) 441-0898 jayne.schaefer@motorola.com

PKI in Large Scale Environments A Look at DMS. George Hoover Jayne Schaefer PKI/KMI (480) 441-0898 jayne.schaefer@motorola.com PKI in Large Scale Environments A Look at DMS George Hoover Jayne Schaefer PKI/KMI (480) 441-0898 jayne.schaefer@motorola.com Information Assurance: Voice, Data, Network, PKI How Great is the Threat? 2000

More information

Developing an Architectural Framework towards achieving Cyber Resiliency. Presented by Deepak Singh

Developing an Architectural Framework towards achieving Cyber Resiliency. Presented by Deepak Singh Developing an Architectural Framework towards achieving Cyber Resiliency Presented by Deepak Singh Presentation Content Cyber Threat Landscape Cyber Attack and Threat Profile Cyber Threat Map Cyber Security

More information

This is a preview - click here to buy the full publication

This is a preview - click here to buy the full publication TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems

More information

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service G-Cloud Service Definition Atos Information Security Wireless Scanning Service Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service

More information

An OSGi based HMI for networked vehicles. Telefónica I+D Miguel García Longarón

An OSGi based HMI for networked vehicles. Telefónica I+D Miguel García Longarón June 10-11, 2008 Berlin, Germany An OSGi based HMI for networked vehicles Telefónica I+D Miguel García Longarón Networked Vehicle 2 Networked Vehicle! Tomorrow, the vehicles will be networked! Using Always

More information

The definitions of Article 2 might be misleading, especially for the definition of public spaces.

The definitions of Article 2 might be misleading, especially for the definition of public spaces. APRIL 2008 Position on European Commission consultation on "Draft Recommendation on the implementation of privacy, data protection and information security principles in applications supported by Radio

More information