Car Connections. Johan Lukkien. System Architecture and Networking



Similar documents
The relevance of cyber-security to functional safety of connected and automated vehicles

Performance Analysis of Authentication Protocols in Vehicular Ad Hoc Networks (VANET)

A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University

Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved.

The Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

Intelligent Transportation System for Vehicular Ad-Hoc Networks

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture

The Vision of Vehicle Infrastructure Integration (VII)

INTELLIGENT TRANSPORTATION SYSTEMS. Vehicle-to- Infrastructure Technologies Expected to Offer Benefits, but Deployment Challenges Exist

Space-Based Position Navigation and Timing National Advisory Board

Vehicular On-board Security: EVITA Project

Safety Pilot Security System

5 TH C-ITS PLUGTEST 2016 USE CASES V01. Contact

Securing Wireless Access for Vehicular Environments (WAVE)

Automotive Communication via Mobile Broadband Networks

An M2M-Based Interface Management Framework for Vehicles with Multiple Network Interfaces

Advanced Safety. Driver Vehicle Interface Collision Avoidance & Mitigation Vehicle Communications. Helping industry engineer safe vehicles

Security risk analysis approach for on-board vehicle networks

International Working Group on Data Protection in Telecommunications

White paper on cybersecurity & privacy in connected and cooperative mobility

Improving Driving Safety Through Automation

Kapsch V2X. Cooperative Systems.

TomTom HAD story How TomTom enables Highly Automated Driving

Index Terms: Vehicular Ad-Hoc Network (VANET), Road Side Unit (RSU), Vehicular Cloud (VC), Security, Privacy, Mobility.

INTELLIGENT TRANSPORTATION SYSTEMS. Vehicle-to-Vehicle Technologies Expected to Offer Safety Benefits, but a Variety of Deployment Challenges Exist

Impact of Connected Automated Vehicles on Traffic Management Centers (TMCs)

VEHICLE SAFETY COMMUNICATIONS IN THE UNITED STATES

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

VEHICULAR NETWORKS DEPLOYMENT VIEW: APPLICATIONS, DEPLOYMENT ARCHITECTURES AND SECURITY MEANS

Hybrid System for Driver Assistance

JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development

Deliverable 5: Conclusions and Recommendations for Deployment of Cooperative Systems by Road

Evolution of Connected Vehicle Ecosystem

Science Fiction to Reality: The Future of Automobile Insurance and Transportation Technology

An OSGi based HMI for networked vehicles. Telefónica I+D Miguel García Longarón

PUBLIC OPINION ABOUT SELF-DRIVING VEHICLES IN CHINA, INDIA, JAPAN,

LTE-V: A Cellular-Assisted V2X Communication Technology

An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Paper ID Abstract

September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS

(Enabling Technologies for Transport Efficiencies)

22 nd ITS World Congress Towards Intelligent Mobility Better Use of Space. GPS 2: Big Data The Real Value of Your Social Media Accounts

Connected Vehicle Insurance

Intelligent Transportation System - I

Conditional Pseudonymity in Vehicular Ad Hoc Networks

Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis

USING DEDICATED SHORT RANGE COMMUNICATIONS FOR VEHICLE SAFETY APPLICATIONS THE NEXT GENERATION OF COLLISION AVOIDANCE

Cybersecurity And The Automotive Industry

Development of V2I Safety Applications

Does the Federal government require them? No, the Federal government does not require manufacturers to install EDRs.

Cooperative Traffic Light Controllers A new ITS architecture (ivri) Gerben Passier

Connected Vehicle Reference Implementation Architecture (CVRIA) Workshop. June 11 and 12, Draper Labs

Balancing Active and Passive Safety

Smart Energy / Grids. ehealth / Healthy Living. Smart Agriculture. Smart Content. egovernment. Smart Mobility. Smart City / Living

Introduction CHAPTER 1

Driver Performance Solutions from CNA RISK CONTROL

VHICLE-TO-VEHICLE (V2V) communication can promote

What Every Driver Must Know Review Assignment

Vehicular Networks Security, Vulnerabilities and Countermeasures. Master of Science Thesis in the program Networks and Distributed Systems

Accident Detection System Independent of In-Vehicle Detection System

A Trust-driven Privacy Architecture for Vehicular Ad-Hoc Networks

Wireless traffic Safety network between Cars. CoMoSeF TULEVAT TRENDIT AUTOJEN M2M KOMMUNIKAATIOSSA WISAFECAR JA COMOSEF PROJEKTIT

ETSI TC ITS RELEASE PROCESS

Automotive and Industrial Data Security

Traffic Management Centers

USDOT Connected Vehicle Overview

U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE

Car2x From Research to Product Development

Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process

Current and Future Trends in Hybrid Cellular and Sensor Networks

top issues An annual report

Security Evaluation of Mobile Device Integration with V2X Communication

On the road toward the autonomous truck

Research Projects in the Mobile Computing and Networking (MCN) Lab

MANAGEMENT OF ROADISDE UNITS FOR THE sim TD FIELD TEST (GERMANY)

Location Identification and Vehicle Tracking using VANET(VETRAC)

Internet of Things Connected cars: risks and opportunities

A WIDER SHARING ECOSYSTEM. The pivotal role of data in transport solutions

are the leading cause of teen fatalities, accounting for

ETC-based ITS Applications.

ETSI TS V1.2.1 ( ) Technical Specification

Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions

Department of Integrated Science and Technology James Madison University Harrisonburg, VA USA

Maintain Fleet Management Solutions Using Wide Area Wireless Technology

D7.2.3 Regulatory Report

Implementation of CVIS ITS Application in a Driving Simulator Environment Kenneth Sørensen, kenneth.sorensen@sintef.no SINTEF

Transcription:

Car Connections Johan Lukkien System Architecture and Networking 1

Smart mobility, TU/e wide Cooperative Driving (platooning), A270: Helmond-Eindhoven, 2011 (Mechanical Engineering/TNO) Full electric: Lupo (ME) Full Solar: Stella Strategic Area Smart Mobility 2

Smart mobility, TU/e wide M&CS, ME scalability in V2V Hybrid Innovations for Trucks (HIT) project Safety-Critical Domain Certification InMotion, Solar Team, Cars in Context TU/e projects Functional safety methodology (PDEng projects)

Agenda Privacy, Safety and Security Intelligent Transport Systems overview Communication spheres within the vehicle inter vehicle: short and long range Security in short range communication applications, and architecture US and EU schemes safety, privacy current viewpoints Security within the vehicle Conclusion and outlook 4

Privacy, Safety, and Security Privacy: control over personal information Safety: freedom from danger or risk on injury resulting from recognized but potentially hazardous events Security: regulating access to (electronic) assets according to some policy policy: allowed and disallowed actions security mechanisms: can be regarded as enforcing the policy Privacy and safety restrictions result in security policies security for privacy and security for safety 5

Requirements Examples: Safety: safety violations by malicious external parties must be prevented safety must be maintained while executing regular functions (functional safety) Privacy: personal data must remain under control of the owner Leads to Common Criteria, classification of functions and development process (ISO 26262), certification Sounds rather abstract, so, let s look at some details. 6

Vehicles operate using networked ICT Driver In-car network Local Local Local

Vehicles become parts of a larger whole Accident prevention V2V network Driver Driver Driver

A conceptual view of ITS Example data flows: (1) gather detailed driving data to determine local weather road condition (1) Johan J. Lukkien, j.j.lukkien@tue.nl (3) Accident prevention Congestion control Road maintenance Environment control And whatever sensing you can think of Internet, V2I V2V V2V (2) accident prevention by direct intervention Driver (4) V2V network Driver Driver (2) (3),(4) informing driver about upcoming road conditions Local In-car network Local Local

A more detailed view on V2V/V2I Node Internet Server AU OBU GW RSU HS Application Unit On Board Unit Gateway Road Side Unit Hot spot GW Access Network RSU RSU HS Infrastructure Domain Ad-Hoc Domain OBU OBU In-Vehicle Domain OBU AU AU AU IEEE 802.11p IEEE 802.11a/b/g Other wireless technology (full coverage) C2C-CC (Car2Car Communication Consortium initiated by six European car manufacturers) architecture (~2010) 10

11 from: Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Applications, NHTSA, August 2014

How does this work? It is cooperative Two different approaches, same network technology (802.11p) US: Wireless Access in Vehicular Environments WAVE, using single-hop broadcast EU: ETSI TC ITS standards, using Geo-networking Essentially: vehicles emit periodically or event-driven status information called Basic Safety Messages (BSM, US) and Cooperative Awareness Messages (CAM, EU) 12

Some application examples (BSM ~SAE J2735) Apps. Comm.type Freq. Latency Range Lane Change Warning V2V, periodic, P2M 10Hz 100ms 150m Collision Warning V2V, periodic, P2M 10Hz 100ms 150m Emergency Brake Lights V2V, event-driven, P2M 10Hz 100ms 300m Pre-Crash Sensing V2V, event-driven, P2P 50Hz 20ms 50m Stop Sign Assists I2V and V2I, periodic 10Hz 100ms 250m Left Turn Assistance I2V and V2I, periodic, P2M 10Hz 100ms 300m Traffic Signal Violation I2V, periodic, P2M 10Hz 100ms 250m Curve Speed Warning I2V, periodic, P2M 1Hz 1s 200m Eight high priority vehicle safety applications as chosen by NHTSA and VSCC. NHTSA US National Highway Traffic Safety Administration VSCC Vehicle Safety Communication Consortium of CAMP (Crash Avoidance Metrics Partnership) V2V = Vehicle to Vehicle P2M = Point to Multipoint I2V = Infra structure to Vehicle 13

Security to protect safety in BSM A vehicle could perform a (physical) action upon receiving certain messages. This response must be on good grounds, and safe. authentication: does this message really come from that particular car? the car left behind me? authorization: what is allowed by this party? by this message? integrity: was this message not tampered with? Further concerns regarding safety: are messages really delivered (and not lost or jammed)? functional safety maintain safe and responsive behavior while executing normal functions 15

Security to protect privacy in BSM Communication might reveal sensitive information location of vehicle, one could track it driver identity, number of passengers driving behavior Security mechanisms might add to this e.g. the signing of messages Hence: policies on data handling, certification of those policies e.g. collect only anonymous data, forbid vehicle tracking in mandatory services requirements on security mechanisms 16

Requirements on security Interoperable Process-able in real-time and limited in size (bandwidth) Identity-free Non-repudiation (sender cannot deny having sent a message) Scalable local: few hundreds of vehicles global: millions of vehicles Extensible, towards other applications of V2x communication 17

Proposal (US) Use Public Key Infrastructure to sign messages authentication, integrity & non-repudiation Certificate associates public and private key decryption using the public key demonstrates: knowledge by the sender of the private key, which is associated with an identity that the message was not altered Complex extentions to deal with the specific concerns of these applications intermittent connectivity, anonimity Certificate for ing.nl small size certificates, keys and certificates: ECQVI / ECDSA though these require 10 times more processing power 18

System outline Comparison: basic PKI / V2x design from: Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Applications, NHTSA, August 2014 19

Zooming out. Johan J. Lukkien, j.j.lukkien@tue.nl Congestion control Road maintenance Environment control And whatever sensing you can think of Security concerns within the vehicle. Accident prevention Internet, V2I V2V V2V V2V network Driver Driver Driver In-car network Local Local Local 20

Hacker with access to internal systems Funny. but more harmful hacks are possible as well e.g. disabling the brakes However, any malicious physical access is dangerous 22

Next Generation Vehicle OS 25

Concluding remarks Security in ITS serves privacy and safety Security within the vehicle is lagging behind Security between vehicles is being designed in ITS is a required step towards fully automated driving 26

Literature Used in this presentation: Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Applications, NHTSA, August 2014 Rate-Adaptation Based Congestion for Vehicle Safety Communications, PhD thesis Tessa Tielert 27