Connected Vehicle Security



Similar documents
Safety Pilot Security System

USDOT Connected Vehicle Overview

Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved.

Current and Future Trends in Hybrid Cellular and Sensor Networks

Evolution of Connected Vehicle Ecosystem

Innovative antenna designs

Securing Wireless Access for Vehicular Environments (WAVE)

Development of V2I Safety Applications

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/ Semester 2

Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

Advanced Metering Infrastructure Deployment at Energa-Operator. 8 December 2010

Central Station Interface with Fire Alarm and the Relevant Codes & Standards

Bring Your Own Device (BYOD) to School

Engineering and R&D Services (ERS) EVP & Global Head Sales and Practice

Cell Service and Wireless Remedies for Reception & Coverage. Panel Host Kathleen Austin Panel Participants Dan Leaf Gordon Mansfield Richard Sherwin

IP Core Network Realization

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Understand VLANs, Wired LANs, and Wireless LANs

Novel AMR technologies and Remote Monitoring

The Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014

Nokia Siemens Networks Mobile WiMAX

Alarm Systems Using Wireless or Other Transmission Technology as a Single Path of Communication. Purpose. References. Description of Code Reference

EXPANDING THE ROLE OF THE MOBILE NETWORK OPERATOR IN M2M

Internet Banking Internal Control Questionnaire

VEHICLE INFRASTRUCTURE INTEGRATION (VII) U.S. DOT DAY-1 APPLICATION DEVELOPMENT PLANS

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Acquisition of Novero. Investor presentation 18th December 2015

ITIL v3 Service Manager Bridge

Connected Vehicles as things on the Internet. big data, the cloud, and advanced automotive research

AT&T. Push to Talk over Cellular & Interoperability into LMR networks

Mobile Technology: Learn About Managing Mobility

Digital Advisory Services Professional Service Description Network Assessment

Business Continuity White Paper

David Tuttle Research Fellow The University of Texas at Austin

Analog Devices RadioVerse technology: Simpler wireless system design

Key Management and Distribution

& benefits. Indian context

Fleet Optimization with IBM Maximo for Transportation

Security Requirements for Wireless Networking

Domain 1 The Process of Auditing Information Systems

1 Public Key Cryptography and Information Security

Fast, secure, wide area, wireless broadband is finally starting to arrive in the

Vehicular Cloud. Fan Zhang

Wireless LANs vs. Wireless WANs

Smart Metering System for Smart Communities

Industrial Communication. Securing Industrial Wireless

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

Remote MasterMind for Mobility. Mobile Device Management Software

CISCO WIRELESS CONTROL SYSTEM (WCS)

The PNC Financial Services Group, Inc. Business Continuity Program

Smart Systems: the key enabling technology for future IoT

How To Support High Performance Computing

COMMUNICATIONS SYSTEMS USED FOR ITS

How To Secure A Wireless Network With A Wireless Device (Mb8000)

4Motion. End-to-end 4G Wireless Broadband

TETRA data and the evolution to broadband. Ole Arrhenius, Senior Solution Marketing Manager 06 March 2014

Transnet Registration Authority Charter

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

LIST OF FIGURES. Figure No. Caption Page No.

DESIGN SCIENCE IN NFC RESEARCH

System Center Configuration Manager 2007

Configuring Security Solutions

VPN Technologies: Definitions and Requirements

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

The data can be transmitted through a variety of different communications platforms such as:

CONTENTS. Satellite Fleet. Türksat 2A. Türksat 3A. Türksat 4A. Türksat 4B. Türksat VSAT

9. OPERATIONS AND MAINTENANCE PLAN. 9.1 Introduction. 9.2 Purpose of Operations and Maintenance Planning. 9.3 Project Operations Planning

SDP Hackathon #4 Analysis & Report

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

Energy Efficiency, Clean Power as Engine for Sustainable Growth

Remote MasterMind for Mobility 2.5. Mobile Device Management Software

Frederica Academy Chromebook Policy Fifth Grade 1:1 with Chromebooks Software

High-speed Internet Access: Wireless and WiFi

Transcription:

Connected Vehicle Security ITS Advisory Committee May 24, 2012 Valerie Briggs ITS Joint Program Office, RITA, USDOT

Need for Security Trust Message Validity Defense Against Attacks 2

Goals for Security System Trust Message validity Protection against attacks Appropriate user privacy Ownership/ Operation Safety Cost Non-traceability for trips Personal information protections Implementable Security Privacy Feasibility Stability 3

Proposed Security Approach Modified Public Key Infrastructure Approach Certificate Management Entity Issues certificate and private key Each device potentially receives thousands of certificates per year Using private key, signs message and sends signature, message & certificate Verifies certificate and message (using public keys) 4

Generally, System Would Include: Security Network for credentialing and certificate management Security Back Office (Certificate Management Entity) operational functions that apply across any type of Security Network Applications Infrastructure Infrastructure specifically for V2I safety (DSRC) or V2I mobility (other options) All require sustainable funding 5

Overall Security System Components Security Network Options: Cellular/hybrid DSRC Other V2V communication via DSRC Security Back Office Functions Manage operations Certify processes & equipment Revocation 6

Security System & Security Infrastructure V2V communication Via DSRC Applications infrastructure as a part of security system: Must be part of the security network Adhere to performance requirements Adhere to system governance Adhere to certification requirements 7

Connected Vehicle Communications Needs Vehicle To Vehicle Vehicle To Infrastructure Security Management Safety messages Certificate exchanges Many needs safety and mobility application needs differ Security credentials updating and management Volume of data may be substantial Communication exchanges are distinct, which complicates a one-size fits all approach 8

Media Options for Communication Needs Cellular WiFi Technology Dedicated Short- Range Communications (DSRC) Wide area two-way mobile communications based on point to point mode (not broadcast) Voice and data oriented with high-speed data transfer rates; requires IP addressing Provides internet access to devices in range of base station footprint (typical range 100 feet) Typically takes ~ 10 seconds to recognize devices in network (too slow for some CME functions?) Designed specifically for communicating data with moving vehicles Allows terminals to broadcast to all other devices in radio range (range ~ 300 meters) 9

Study Scenario 1: Hybrid Certificate Management V2I Mobility Data V2V and V2I Safety Data Cellular Cellular DSRC Uses cellular data delivery for Certificate Management (CM) and V2I communications, and the DSRC network for the V2V communications Will examine potential efficiencies and costs of using two different networks for data delivery, and its ability to deliver CM functions 10

Study Scenario 2: Hybrid Certificate Management V2I Mobility Data V2V and V2I Safety Data Any and all opportunities: Cellular, WiFi and DSRC Cellular and DSRC DSRC Relies on the wireless ecosystem to provide certificate data exchange needs Must determine practicality: technical and deployment paths with data exchange functions important (e.g., OBE must have radio that can receive the right wireless connection) 11

Study Scenario 3: All DSRC Certificate Management V2I Mobility Data V2V and V2I Safety Data DSRC DSRC DSRC Relies on DSRC to provide the wireless data communications needed for each of the operational functions of the certificate data exchange system Need to determine incremental or additional costs of building DSRC network to deliver certificate communication needs 12

Ongoing Work Evaluating costs and organizational models for certificate management entities Exploring private, or hybrid models Evaluating security network and communications options and costs Assessing how strategies effect security, privacy, and safety Assessing business/investment models for implementation and ongoing expenses Conducting a field test using prototype security system (Safety Pilot) 13

Questions? 14

For More Information http://www.its.dot.gov/connected_vehicle/ connected_vehicle_policy.htm www.its.dot.gov 15