Connected Vehicle Security
|
|
|
- Eugenia Perkins
- 9 years ago
- Views:
Transcription
1 Connected Vehicle Security ITS Advisory Committee May 24, 2012 Valerie Briggs ITS Joint Program Office, RITA, USDOT
2 Need for Security Trust Message Validity Defense Against Attacks 2
3 Goals for Security System Trust Message validity Protection against attacks Appropriate user privacy Ownership/ Operation Safety Cost Non-traceability for trips Personal information protections Implementable Security Privacy Feasibility Stability 3
4 Proposed Security Approach Modified Public Key Infrastructure Approach Certificate Management Entity Issues certificate and private key Each device potentially receives thousands of certificates per year Using private key, signs message and sends signature, message & certificate Verifies certificate and message (using public keys) 4
5 Generally, System Would Include: Security Network for credentialing and certificate management Security Back Office (Certificate Management Entity) operational functions that apply across any type of Security Network Applications Infrastructure Infrastructure specifically for V2I safety (DSRC) or V2I mobility (other options) All require sustainable funding 5
6 Overall Security System Components Security Network Options: Cellular/hybrid DSRC Other V2V communication via DSRC Security Back Office Functions Manage operations Certify processes & equipment Revocation 6
7 Security System & Security Infrastructure V2V communication Via DSRC Applications infrastructure as a part of security system: Must be part of the security network Adhere to performance requirements Adhere to system governance Adhere to certification requirements 7
8 Connected Vehicle Communications Needs Vehicle To Vehicle Vehicle To Infrastructure Security Management Safety messages Certificate exchanges Many needs safety and mobility application needs differ Security credentials updating and management Volume of data may be substantial Communication exchanges are distinct, which complicates a one-size fits all approach 8
9 Media Options for Communication Needs Cellular WiFi Technology Dedicated Short- Range Communications (DSRC) Wide area two-way mobile communications based on point to point mode (not broadcast) Voice and data oriented with high-speed data transfer rates; requires IP addressing Provides internet access to devices in range of base station footprint (typical range 100 feet) Typically takes ~ 10 seconds to recognize devices in network (too slow for some CME functions?) Designed specifically for communicating data with moving vehicles Allows terminals to broadcast to all other devices in radio range (range ~ 300 meters) 9
10 Study Scenario 1: Hybrid Certificate Management V2I Mobility Data V2V and V2I Safety Data Cellular Cellular DSRC Uses cellular data delivery for Certificate Management (CM) and V2I communications, and the DSRC network for the V2V communications Will examine potential efficiencies and costs of using two different networks for data delivery, and its ability to deliver CM functions 10
11 Study Scenario 2: Hybrid Certificate Management V2I Mobility Data V2V and V2I Safety Data Any and all opportunities: Cellular, WiFi and DSRC Cellular and DSRC DSRC Relies on the wireless ecosystem to provide certificate data exchange needs Must determine practicality: technical and deployment paths with data exchange functions important (e.g., OBE must have radio that can receive the right wireless connection) 11
12 Study Scenario 3: All DSRC Certificate Management V2I Mobility Data V2V and V2I Safety Data DSRC DSRC DSRC Relies on DSRC to provide the wireless data communications needed for each of the operational functions of the certificate data exchange system Need to determine incremental or additional costs of building DSRC network to deliver certificate communication needs 12
13 Ongoing Work Evaluating costs and organizational models for certificate management entities Exploring private, or hybrid models Evaluating security network and communications options and costs Assessing how strategies effect security, privacy, and safety Assessing business/investment models for implementation and ongoing expenses Conducting a field test using prototype security system (Safety Pilot) 13
14 Questions? 14
15 For More Information connected_vehicle_policy.htm 15
Safety Pilot Security System
Safety Pilot Security System Crash Avoidance II: Connected Vehicles (Session Code: G201) W L Fehr 1 Safety Pilot/Model Deployment Safety Pilot/Model Deployment is a U.S. DOT research program conducted
USDOT Connected Vehicle Overview
USDOT Connected Vehicle Overview RWM Stakeholder Meeting August 8, 2012 Dale Thompson, Intelligent Transportation Systems Joint Program Office, RITA, U.S. DOT 1 Overview NHTSA Decision Safety Pilot Policy-Architecture
Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved.
Connected Vehicles: New Directions and Opportunities AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA N A T I O N A L S E C U R I T Y E N G I N E E R I N G H E A L T H S O L U T I O N S
Current and Future Trends in Hybrid Cellular and Sensor Networks
2010-10-19 Current and Future Trends in Hybrid Cellular and Sensor Networks Yongjun Liu, Bin Zhen, Yong Xu, Hui Yang, Betty Zhao [email protected] www.huawei.com ETSI TC M2M Workshop 19-20 October
Evolution of Connected Vehicle Ecosystem
SAE Symposium: Intelligent Vehicle Systems Advancing the Connected Mobility Experience November 8-9, 2011 Troy Marriott, Troy MI Evolution of Connected Vehicle Ecosystem Partha Goswami Technology Manager
Innovative antenna designs
Innovative antenna designs Responsive manufacturing Trusted partner Keeping Your World Connected Mobile Mark is a leading supplier of innovative, high performance antennas to wireless companies across
Securing Wireless Access for Vehicular Environments (WAVE)
Securing Wireless Access for Vehicular Environments (WAVE) May 7, 2009 CTST, New Orleans Tim Weil CISSP/CISA Security Architect ITS Engineering Booz Allen Hamilton 0 The concept of VII started upon the
Development of V2I Safety Applications
Development of V2I Safety Applications Carl Andersen Federal Highway Administration, USDOT SIS13: C-ITS for Traffic Accident Avoidance Application Development The CAMP V2I Consortium is developing three
Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture
IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton
BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2
BSc (Hons.) Computer Science with Network Security BCNS/09/FT Examinations for 2011/2012 - Semester 2 MODULE: WIRELESS NETWORK SECURITY MODULE CODE: SECU 3105 Duration: 2 Hours 15 Minutes Reading time:
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions EXECUTIVE SUMMARY Outdoor wireless networks are playing a vital role in helping municipalities deliver critical services to citizens.
Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com
Wireless Services The Top Questions to Help You Choose the Right Wireless Solution for Your Business Get Started Now: 877.611.6342 to learn more. www.megapath.com Why Go Wireless? Today, it seems that
Advanced Metering Infrastructure Deployment at Energa-Operator. 8 December 2010
Advanced Metering Infrastructure Deployment at Energa-Operator Agenda AMI deployment purpose and scope Project status Standardization and interoperability Key business aspects Next steps AMI Deployment
Central Station Interface with Fire Alarm and the Relevant Codes & Standards
Central Station Interface with Fire Alarm and the Relevant Codes & Standards By: Kim Caron Director of Business Development Communication Paths History Panel Testing Requirements ULC Listed Station requirements
Bring Your Own Device (BYOD) to School
Bring Your Own Device (BYOD) to School As new and emerging technologies continue to change the world we live in, they also provide an opportunity for many unique and positive educational benefits to the
Engineering and R&D Services (ERS) EVP & Global Head Sales and Practice
Engineering and R&D Services (ERS) Sandeep Kishore EVP & Global Head Sales and Practice Engineering Services Outsourcing Market 1 2010 Engineering Services Outsourcing (ESO) is a $ 10 B market; 20% of
Cell Service and Wireless Remedies for Reception & Coverage. Panel Host Kathleen Austin Panel Participants Dan Leaf Gordon Mansfield Richard Sherwin
Cell Service and Wireless Remedies for Reception & Coverage Panel Host Kathleen Austin Panel Participants Dan Leaf Gordon Mansfield Richard Sherwin MDU attach rate is approximately 17% Why Is This Important?
IP Core Network Realization
IP Core Network Realization Ruben Montoya Technical Marketing Engineering Mobile Wireless Group 2001, Cisco Systems, Inc. All rights reserved. 1 IP Core Network Realization - Agenda Introduction Major
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
Understand VLANs, Wired LANs, and Wireless LANs
LESSON 1,2_B Understand VLANs, Wired LANs, and Wireless LANs Lesson Overview In this lesson, you will review: Wired local area networks Wireless local area networks Virtual local area networks (VLANs)
Novel AMR technologies and Remote Monitoring
Novel AMR technologies and Remote Monitoring Marios Milis, SignalGeneriX Ltd [email protected] 1 AMR Overview AMR is the technology of automatically collecting consumption, diagnostic, and
The Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014
The Future of the Automobile Vehicle Safety Communications Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014 About your lecturer Luca Delgrossi, Ph. D. Born in Italy, I live in the US since
Nokia Siemens Networks Mobile WiMAX
Nokia Siemens Networks Mobile WiMAX 1. 2/6 Mobile WiMAX leads the way to wireless broadband access With Mobile WiMAX, the communications industry is another step closer to offering mobile broadband Internet
Alarm Systems Using Wireless or Other Transmission Technology as a Single Path of Communication. Purpose. References. Description of Code Reference
TOWN OF BRIGHTON Office of the Fire Marshal 2300 Elmwood Avenue Rochester, New York 14618 (585) 784-5220 Office (585) 784-5207 Fax Alarm Systems Using Wireless or Other Transmission Technology as a Single
EXPANDING THE ROLE OF THE MOBILE NETWORK OPERATOR IN M2M
EXPANDING THE ROLE OF THE MOBILE NETWORK OPERATOR IN M2M STRATEGIC WHITE PAPER INTRODUCTION Machine-to-machine (M2M) communications is on the rise. Most mobile network operators (MNOs) are turning to M2M
Internet Banking Internal Control Questionnaire
Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?
VEHICLE INFRASTRUCTURE INTEGRATION (VII) U.S. DOT DAY-1 APPLICATION DEVELOPMENT PLANS
VEHICLE INFRASTRUCTURE INTEGRATION (VII) U.S. DOT DAY-1 APPLICATION DEVELOPMENT PLANS McLean, VA November 2006 VERSION 1.2 Revision History REVISION HISTORY Date Version Description July 2006 1.0 Initial
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
Acquisition of Novero. Investor presentation 18th December 2015
Acquisition of Novero Investor presentation 18th December 2015 What Novero brings to Laird The acquisition of Novero and LSR rebalances our business, Wireless Systems will now be of a similar scale to
ITIL v3 Service Manager Bridge
ITIL v3 Service Manager Bridge Course Length: 5 Days Course Overview This 5 day hands on, certification training program enables ITIL Version 2 certified Service Managers to upgrade their Service Manager
Connected Vehicles as things on the Internet. big data, the cloud, and advanced automotive research
Connected Vehicles as things on the Internet big data, the cloud, and advanced automotive research Clark Gaylord Chief Information Officer Virginia Tech Transportation Institute [email protected] Bingo card
AT&T. Push to Talk over Cellular & Interoperability into LMR networks
AT&T Push to Talk over Cellular & Interoperability into LMR networks Agenda Introduction Evolution Overview of Push to Talk over cellular Interoperability into LMR Use Cases Why a carrier solution vs.
Mobile Technology: Learn About Managing Mobility
Mobile Technology: Learn About Managing Mobility Presenters: Chris Kiley, Jeppesen Director, Mobile & Web Solutions, UxD Michelle Burnett, AirWatch Learn about. What you will learn/take away from today
Digital Advisory Services Professional Service Description Network Assessment
Digital Advisory Services Professional Service Description Network Assessment 1. Description of Services. 1.1. Network Assessment. Verizon will perform Network Assessment services for the Customer Network,
Business Continuity White Paper
White Paper January 2011 Introduction In today s demanding business environment, few companies can afford having a key facility or branch location go off-line, or face service interruptions at headquarters.
David Tuttle Research Fellow The University of Texas at Austin
David Tuttle Research Fellow The University of Texas at Austin The Home Energy Management Systems (HEMS), Home Area Network (HAN), and Plug-In Electric Vehicles (PEV) Security Risks Increase with Greater
Analog Devices RadioVerse technology: Simpler wireless system design
Analog Devices RadioVerse technology: Simpler wireless system design Steve Taranovich - May 23, 2016 If you are a design engineer interested in ways to accelerate your development cycle for Wireless Radio
Key Management and Distribution
and Distribution CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 January 2011 CSS322Y10S2L12, Steve/Courses/CSS322/Lectures/key.tex,
& benefits. Indian context +919799394943
Smart Metering Concern, Challenges, & benefits. Indian context Vivek Pathak Pthk +919799394943 Indian Context Utility Concern Growing Normal energy demand The demand is likely to grow at a pace more than
Fleet Optimization with IBM Maximo for Transportation
Efficiencies, savings and new opportunities for fleet Fleet Optimization with IBM Maximo for Transportation Highlights Integrates IBM Maximo for Transportation with IBM Fleet Optimization solutions Offers
Security Requirements for Wireless Networking
Security Requirements for Wireless Networking Developed by Copyright 2007 Rysavy Research TABLE OF CONTENTS INTRODUCTION... 2 SECURITY REQUIREMENTS... 2 WIRELESS OPERATOR SECURITY LIMITATIONS... 3 END
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
1 Public Key Cryptography and Information Security
International Carpathian Control Conference ICCC 2002 MALENOVICE, CZECH REPUBLIC May 27-30, 2002 IMPLEMENTATION ISSUES OF PKI TECHNOLOGY Victor-Valeriu PATRICIU, Marin BICA and Ion BICA Department of Computer
Fast, secure, wide area, wireless broadband is finally starting to arrive in the
WIRELESS BROADBAND LIVES! JULY 2004 EJEMS BY WILLIAM E. OTT Fast, secure, wide area, wireless broadband is finally starting to arrive in the United States. The arrival of this fast connectivity will spur
Vehicular Cloud. Fan Zhang
Vehicular Cloud Fan Zhang Outline VANET Cloud computing Vehicular cloud: motivation and concept Application scenarios Challenges: architecture/security Data forwarding Questions VANET Deliver timely information
Wireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
Smart Metering System for Smart Communities
Smart Metering System for Smart Communities Chuck Sathrum, Director Smart Grid Solutions Metering s Transitional Role Product Oriented Value Process Oriented Value People Oriented Value EM Meter Send Bill
Industrial Communication. Securing Industrial Wireless
Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...
INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-
ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between
Remote MasterMind for Mobility. Mobile Device Management Software
Remote MasterMind for Mobility Mobile Device Management Software Remote MasterMind for Mobility You have mobility devices in locations all across the area, state, or country. They are constantly on the
CISCO WIRELESS CONTROL SYSTEM (WCS)
CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page
Smart Systems: the key enabling technology for future IoT
Smart Systems: the key enabling technology for future IoT Roberto Zafalon Technology Programmes, Director R&D and Public Affairs, Italy STMicroelectronics IoT Large Scale Pilots Brokerage Workshop London
How To Support High Performance Computing
1 of 12 One Hundred Second Congress of the United States of America AT THE FIRST SESSION Begun and held at the City of Washington on Thursday, the third day of January, one thousand nine hundred and ninety-one
COMMUNICATIONS SYSTEMS USED FOR ITS
COMMUNICATIONS SYSTEMS USED FOR ITS Index Purpose Description Technologies 1 of 5 Purpose The telecommunication system is the main element for the development of telematics in Transport field. It enables
How To Secure A Wireless Network With A Wireless Device (Mb8000)
MB8000 Network Security and Access Control Overview MB8000 employs almost all of the current popular WLAN security mechanisms. These include wireless-user isolation, closed system (by turning off SSID
4Motion. End-to-end 4G Wireless Broadband
4Motion End-to-end 4G Wireless Broadband Meeting your 4G needs with freedom of choice 4Motion is Alvarion s end-to-end 4G wireless broadband solution, connecting people and businesses everywhere for a
TETRA data and the evolution to broadband. Ole Arrhenius, Senior Solution Marketing Manager 06 March 2014
TETRA data and the evolution to broadband Ole Arrhenius, Senior Solution Marketing Manager 06 March 2014 FINLAND Summer night 3AM Winter day 3PM TETRA base station service Content What is TETRA data What
Transnet Registration Authority Charter
Registration Authority Charter Version 3.0 is applicable from Effective Date Inyanda House 21 Wellington Road Parktown, 2193 Phone +27 (0)11 544 9368 Fax +27 (0)11 544 9599 Website: http://www.transnet.co.za/
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
DESIGN SCIENCE IN NFC RESEARCH
DESIGN SCIENCE IN NFC RESEARCH Busra OZDENIZCI, Mehmet N. AYDIN, Vedat COSKUN and Kerem OK Department of Information Technology ISIK University, Istanbul, Turkey The 5th International Conference on Internet
System Center Configuration Manager 2007
System Center Configuration Manager 2007 Software Distribution Guide Friday, 26 February 2010 Version 1.0.0.0 Baseline Prepared by Microsoft Copyright This document and/or software ( this Content ) has
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
VPN Technologies: Definitions and Requirements
VPN Technologies: Definitions and Requirements 1. Introduction VPN Consortium, January 2003 This white paper describes the major technologies for virtual private networks (VPNs) used today on the Internet.
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
The data can be transmitted through a variety of different communications platforms such as:
COMMUNICATION NETWORK General Overview of SCADA Communications Without a properly designed communication network system, a SCADA system cannot exist. All supervisory control and data acquisition aspects
CONTENTS. Satellite Fleet. Türksat 2A. Türksat 3A. Türksat 4A. Türksat 4B. Türksat VSAT
www.turksat.com TURKSAT A.S. Turksat, one of the leading operators in the satellite communication business, offers flexible solutions by providing its customers with cable and wireless broadcasting, high-speed
9. OPERATIONS AND MAINTENANCE PLAN. 9.1 Introduction. 9.2 Purpose of Operations and Maintenance Planning. 9.3 Project Operations Planning
9. OPERATIONS AND MAINTENANCE PLAN 9.1 Introduction Operations and maintenance planning is a critical component to any transportation system, especially in the case of ITS where new and complex technologies
SDP Hackathon #4 Analysis & Report
SDP Hackathon #4 Analysis & Report High Availability Public Cloud Research March 28, 2016 Research Participants The Software-Defined Perimeter (SDP) Research Workgroup of the Cloud Security Alliance (CSA)
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Energy Efficiency, Clean Power as Engine for Sustainable Growth
Energy Efficiency, Clean Power as Engine for Sustainable Growth Rakesh Kumar Bhatnagar, Advisor (Technology), & P K Panigrahi, Sr. DDG, Department of Telecommunications, Government of India. 1 Agenda 2
Remote MasterMind for Mobility 2.5. Mobile Device Management Software
Remote MasterMind for Mobility 2.5 Mobile Device Management Software Remote MasterMind for Mobility 2.5 You have mobility devices in locations all across the area, state, or country. They are constantly
Frederica Academy Chromebook Policy Fifth Grade 1:1 with Chromebooks 2015-2016. Software
1 Frederica Academy Chromebook Policy Fifth Grade 1:1 with Chromebooks 2015-2016 1. The fifth grade at Frederica Academy will be 1:1 with Chromebooks for the 2015/2016 school year. This will make for a
High-speed Internet Access: Wireless and WiFi
High-speed Internet Access: Wireless and WiFi Richard S. Wolff, Ph. D Montana State University Department of Electrical and Computer Engineering. [email protected] 406 994 7172 Wireless: lots of technologies
