Safety Pilot Security System

Similar documents
Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved.

USDOT Connected Vehicle Overview

Connected Vehicle Security

The relevance of cyber-security to functional safety of connected and automated vehicles

22 nd ITS World Congress Towards Intelligent Mobility Better Use of Space. GPS 2: Big Data The Real Value of Your Social Media Accounts

Space-Based Position Navigation and Timing National Advisory Board

Securing Wireless Access for Vehicular Environments (WAVE)

INTELLIGENT TRANSPORTATION SYSTEMS. Vehicle-to- Infrastructure Technologies Expected to Offer Benefits, but Deployment Challenges Exist

The Vision of Vehicle Infrastructure Integration (VII)

Development of V2I Safety Applications

Kapsch V2X. Cooperative Systems.

INTELLIGENT TRANSPORTATION SYSTEMS. Vehicle-to-Vehicle Technologies Expected to Offer Safety Benefits, but a Variety of Deployment Challenges Exist

Policy Development for Big Data at the ITS JPO

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture

Car Connections. Johan Lukkien. System Architecture and Networking

The Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014

GATEWAY CITIES TECHNOLOGY PROGRAM FOR GOODS MOVEMENT OVERVIEW OF EMERGING CONNECTED COMMERCIAL VEHICLES PROGRAM

Connected Vehicles as things on the Internet. big data, the cloud, and advanced automotive research

Evolution of Connected Vehicle Ecosystem

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

Vehicular On-board Security: EVITA Project

Acquisition of Novero. Investor presentation 18th December 2015

Improving Driving Safety Through Automation

Innovative antenna designs

Electronic Registration Identification (ERI)

Traffic Management Centers

Cybersecurity And The Automotive Industry

IIS Smart Roadside Takes the Lead in Roadside Safety and Enforcement

Ahead of the Curve with Intelligent. Transportation

VEHICLE SAFETY COMMUNICATIONS IN THE UNITED STATES

VEHICLE INFRASTRUCTURE INTEGRATION (VII) U.S. DOT DAY-1 APPLICATION DEVELOPMENT PLANS

David Tuttle Research Fellow The University of Texas at Austin

International Working Group on Data Protection in Telecommunications

CONNECTED VEHICLE PILOT DEPLOYMENT PROGRAM PHASE 1

Linking Planning and Operations Initiative A Data Driven Approach. Chris Francis Transportation Statistics

Research Projects in the Mobile Computing and Networking (MCN) Lab

Cooperative Intersection Collision Avoidance System Limited to Stop Sign and Traffic Signal Violations (CICAS-V) Phase I Final Report

Request for Proposals

Maintain Fleet Management Solutions Using Wide Area Wireless Technology

OIT User Conference Security Team November 2014

DOT HS A September Vehicle Safety Communications Applications (VSC-A) Final Report

September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS

Vehicle IOT Gateway Family Datasheet

Current and Future Trends in Hybrid Cellular and Sensor Networks

USING DEDICATED SHORT RANGE COMMUNICATIONS FOR VEHICLE SAFETY APPLICATIONS THE NEXT GENERATION OF COLLISION AVOIDANCE

TomTom HAD story How TomTom enables Highly Automated Driving

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

Garmin dēzl Trucking Navigator Compatibility to. Automatic on-board Recording Device (AOBRD) Requirements, Part

Simplifying the remote acquisition, cloud management, and multiscreen distribution of professional live video over IP

Securing your Juniper SSL VPN with two-factor authentication.

Patch and Vulnerability Management Program

CELL PHONE TRACKING. Index. Purpose. Description. Relevance for Large Scale Events. Options. Technologies. Impacts. Integration potential

Security risk analysis approach for on-board vehicle networks

PUBLIC OPINION ABOUT SELF-DRIVING VEHICLES IN CHINA, INDIA, JAPAN,

Modern two-factor authentication: Easy. Affordable. Secure.

This document is intended to make you familiar with the ServersCheck Monitoring Appliance

About Redtail Telematics

Technologies and Techniques for Collecting Floating Car Data. Mike Hayward Head of Vehicle Telematics WS Atkins Transport Systems

Advanced Transportation Management Systems

Wireless Roadside Inspection Phase II Final Report

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

Link Layer and Network Layer Security for Wireless Networks

VDO RoadLog EOBR Electronic On Board Recorder The simple solution for daily log book and compliance reporting.

Deliverable 5: Conclusions and Recommendations for Deployment of Cooperative Systems by Road

Utilization of the 4.9 GHz Band in Transportation and Emergency Response Applications

Deployment of Cloud Computing into VANET to Create Ad Hoc Cloud Network Architecture

How To Manage Security On A Networked Computer System

The Wireless World - 5G and Beyond. Björn Ekelund Ericsson Research

EROAD THE FUTURE OF TRANSPORT TECHNOLOGY

Vehicular Cloud. Fan Zhang

5 TH C-ITS PLUGTEST 2016 USE CASES V01. Contact

Ohio Smart Mobility Initiative. Carla Bailo October 8, 2015

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Bringing research to deployment: Concrete implementation of Cooperative Systems. Kees den Hollander Copenhagen, March 6, 2012

An OSGi based HMI for networked vehicles. Telefónica I+D Miguel García Longarón

Channels of Delivery of Travel Information (Static and Dynamic On-Trip Information)

INTERNATIONAL SURVEY OF BEST PRACTICES IN CONNECTED AND AUTOMATED VEHICLE TECHNOLOGIES 2014 UPDATE

INTELLIGENT TRANSPORTATION SYSTEMS IN WHATCOM COUNTY A REGIONAL GUIDE TO ITS TECHNOLOGY

Link Layer and Network Layer Security for Wireless Networks

Transcription:

Safety Pilot Security System Crash Avoidance II: Connected Vehicles (Session Code: G201) W L Fehr 1

Safety Pilot/Model Deployment Safety Pilot/Model Deployment is a U.S. DOT research program conducted by the RITA and NHTSA with CAMP to develop technology that will help cars, trucks, buses, and other vehicles avoid crashes. The Program has two parts: Six Safety Pilot Driver Acceptance Clinics to help the Department learn more about how drivers respond to crash-avoidance applications that use connected vehicle communication. The clinics have been held in locations around the country. The Safety Pilot Model Deployment that includes the installation of wireless devices in up to 3,000 vehicles in one location to evaluate the effectiveness of connected vehicle technology to prevent crashes. The deployment will take place of Ann Arbor, MI from August, 2012 to August, 2013 and will operate in an everyday environment. Both the Driver Acceptance Clinics and the Model Deployment results will contribute to the NHTSA 2013 Agency Decision. 2

Complete Security Plan To be complete, the Safety Pilot/Model Deployment security plan must include all devices, communications, and policies determined by all of the organizations that make up the installation. Devices: in-vehicle equipment, roadside equipment, Internet-based equipment, support equipment. Communications: 5.9GHz DSRC communication among vehicles, between vehicles and roadside, IP communication between vehicles, roadside, and the Internet. Policies: USDOT, CAMP. The plan will be embodied in device requirement specifications, experiment operational specifications. 3

System Design Principles The parts of the system are controlled by a federation of equals Private industry; government at all levels. An appropriate level of trust is essential: All communications will be signed using a common cryptographic process. Rights of ownership (privacy) are protected. The receiving party of a communication will be responsible for determining the authenticity of any message. An entity trusted by all will establish the root secret that all cryptographic security credentials will be based on. Security solution fits the communication needs Small data exchanges; rapid exchanges; short, intermittent connections. Devices share situation information (BSM s, SPaT, etc.) in broadcasts with no expectation of a response. Any response to broadcast information, or point-to-point interactions that cause a result to occur in a device (such as a driver alert or file update) will be initiated by the most vulnerable party to the interaction: Onboard equipment will initiate interactions with roadside equipment. Roadside equipment will initiate interactions with Internetbased equipment. (NO push from the Internet) 4

Connected Vehicle Environment 5

Devices Security processes either cryptographic or physical will be applied to all device interfaces used for operational and maintenance purposes. Mobile (Onboard) Integrated Vehicle Devices Aftermarket Safety Devices Vehicle Awareness Devices Heavy (Truck, Transit) Devices Field (Roadside) Roadside Equipment Center (Internet) Security Credential Management System Log File Management System 6

Safety Pilot/Model Deployment Environment 5.9GHz DSRC Roadside Equipment Cellular Security management policies Root secret Log file management policies Traffic Signal Controllers Provisioning and maintenance tools Data Acquisition Systems Integrated Vehicle Equipment Vehicle Awareness Devices ASD devices Heavy Vehicle Devices Security Credential Management System Log file management Roadside Equipment monitoring 7

Communications Operational Communication WSMP over 5.9GHz DSRC for V-V between mobile devices. WSMP over 5.9GHz DSRC for V-I between mobile devices and roadside devices. IP over 5.9GHz DSRC for point-to-point between mobile devices and roadside devices. IP over Internet for point-to-point between roadside devices and Internet-based devices. Provisioning and Maintenance Communication IP over Serial medium (Ethernet, USB) between all devices and temporarily-attached tools. File content in removable medium (SD, USB) in certain mobile devices. NO mobile device or field device provisioning from Internet-based devices 8

Safety Pilot/Model Deployment Communications IP data Provisioning and maintenance tool data Policies Traffic Signal Controllers interface data 5.9GHz DSRC SPaT, MAP TIM IP data 5.9GHz DSRC BSM System provisioning and maintenance tool data HIA batch provisioning tool data Intrasystem communication 9

Security Plan Roadmap v5 CY 2011 CY 2012 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Design Completed (SW 1 & 2) Build Prototype V-V System CAMP System Test Integration w/ Scalability TB CAMP Prototype Completed Oak Ridge Nat'l Lab Agreement Executed SOW for SCMS IV&V of Security Plan, Devices, Installation Assessment of Complete Plan USDOT Security Profiles Completed Security Credential Processes Defined Security Plan Device Specifications Test Bed Contractor SCMS Site Investigation Completed Develop and Hosting of Security Credential Management System Test Conductor Security Credential Batch Tool Site Security Plan Pre-Model Deployment SCMS Integration Test Model Deployment Final SCMS Deployed 10