Security in Vehicle Networks



Similar documents
Vehicular On-board Security: EVITA Project

The relevance of cyber-security to functional safety of connected and automated vehicles

Functional Safety with ISO Principles and Practice Dr. Christof Ebert, Dr. Arnulf Braatz Vector Consulting Services

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

Automotive Software Development Challenges Virtualisation and Embedded Security

Safety and security related features in AUTOSAR

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

Automotive and Industrial Data Security

Embedding Trust into Cars Secure Software Delivery and Installation

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

WHITE PAPER Security in M2M Communication What is secure enough?

Security risk analysis approach for on-board vehicle networks

Vehicular Security Hardware The Security for Vehicular Security Mechanisms

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Hardware Security Modules for Protecting Embedded Systems

BYOD: End-to-End Security

Secure Software Delivery and Installation in Embedded Systems

Automotive Suppliers and Cybersecurity

Embedded Java & Secure Element for high security in IoT systems

Secure Key Management A Key Feature for Modern Vehicle Electronics

Over-the-Air Software Updates: Deployment Strategies

Security Issues with Integrated Smart Buildings

Frost & Sullivan Cybersecurity Presentation

Threat Modeling for Secure Embedded Software

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Cybersecurity And The Automotive Industry

Hardware Security for Trustworthy C2X Applications Marko Wolf

Semiconductors enablers of future mobility concepts 4. Kompetenztreffen Elektromobilität, 22. Februar 2012, Cologn

Laptops on 4 wheels. New service processes for the automotive industry. Marko Weiße ProSTEP ivip Symposium

Updating Car ECUs Over-The-Air (FOTA) White Paper

Keeping Up with the Data & Security Demands of the Automotive IoT

Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis

Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Network Security 101 Multiple Tactics for Multi-layered Security

In the pursuit of becoming smart

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application

SHE Secure Hardware Extension

Injazat s Managed Services Portfolio

Cyber Security for SCADA/ICS Networks

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Customer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions

ACEA PRINCIPLES OF DATA PROTECTION IN RELATION TO CONNECTED VEHICLES AND SERVICES

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Telematics Workshop: Remote 2-Way Communication Meeting Results

2016 North American Over-the-air Update Enabling Technology Leadership Award

Data Protection: From PKI to Virtualization & Cloud

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

A Survey Report by Horst Hientz Hans-Jürgen Kugler

Cost Effective Updating of Software in Cars From IVIs, TCUs and Domain Controllers to the Entire Vehicle. White Paper

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Crucial Role of ICT for the Reinvention of the Car

W ith an estimated 14 billion devices connected to

Chapter 1: Introduction

Security Inspection Inc. Solutions to secure your network

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

90% of data breaches are caused by software vulnerabilities.

IoT Security Concerns and Renesas Synergy Solutions

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

Vehicle Electronics. Services and Solutions to Manage the Complexity

PUF Physical Unclonable Functions

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

Securing the Internet of Things WHITEPAPER

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M

Effective Software Security Management

Credential Management for Cloud Computing

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

IT Architecture Review. ISACA Conference Fall 2003

future data and infrastructure

Industrial Control Systems Security Guide

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Security in ST : From Company to Products

Testing the Internet of Things

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Software Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication

Big Data - An Automotive Outlook

Dr. György Kálmán

Introduction to Information Security

Embedded Security for Modern Building Automation Systems

Security architecture Integrating security into the communicating vehicle. Norbert Bissmeyer, Fraunhofer SIT June 18 th 2015

The Future of Trucks. How Technology Will Change Value Chain Structures. Summary of study results. June 2005

On the road toward the autonomous truck

elearning for Secure Application Development

Security Goals Services

Applied and Integrated Security. C. Eckert

More effective protection for your access control system with end-to-end security

Transcription:

Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28

Introduction Vector Consulting Services supports clients worldwide in improving their product development and IT and with interim management with clients such as Accenture, Audi, BMW, Bosch, Daimler, Huawei, Hyundai, Lufthansa, Munich RE, Porsche, Siemens, Thales, ZF Aviation & Defense Automotive IT offers with the Vector Group a portfolio of tools, software components and services Energy & Environment is globally present as a group with over 1300 employees and well over 250 Mio. Medical & Healthcare www.vector.com/consulting www.vector.com/preevision Railway & Transportation 2/25

Agenda 1. Introduction 2. Security analysis 3. Software update and maintenance 4. Security key management 5. Network Strategies 3/25

Introduction Connected Cars - Today Cars contain high data connectivity Data access is shielded within the body of the car 4/25

Introduction Connected Cars - Tomorrow Multiple communication paths with access to vital functionality Distributed onboard communication across ECUs and sensor fusion Car2x ITS Roadside Station ISO 15118 Vehicle to grid communication OEM Backbone BlackBox (data collector) for insurance, etc. Off-Board Tester NFC Tire pressure monitoring via near field communication. Passengers internet (Google, E-Mail,..) Car Information (weather, traffic, map,..) 5/25

Introduction Complexity and Related Competence Gap Drive Security Risks Increasing complexity of E/E driven functionality Rising safety requirements and liability risks Inefficient engineering processes Lack of safety / security competence Electronic fuel injection Cruise control Gearbox control Traction control Anti lock brakes Electronic fuel injection Cruise control Airbags Electronic stability control Active body control Adaptive gearbox control Adaptive cruise control Emergency call Gearbox control Traction control Anti lock brakes Electronic fuel injection Cruise control Adaptive Headlights Steer-by-wire Lane Assistant Stop and Go Parking Distance Control Emergency Break Assist Curve-Warning Hybrid Drive Road Trains Electronic Brake Control Telediagnostics Car-2-car Communication Online Software Updates Airbags Electronic stability control Active body control Adaptive gearbox control Adaptive cruise control Emergency call Gearbox control Traction control Anti lock brakes Electronic fuel injection Cruise control 1975 1985 1995 2005 2015 6/25

Introduction Security projects for car2x Standardization across OEMs and countries needed! Projects for Car-2-x > SeVeCom (2006-2009, www.sevecom.org) > EVITA (2008-2011, www.evita-project.org) > SIMTD (2008-2013, www.simtd.de) > PRESERVE (2011-2015, www.preserve-project.eu) > C2C-CC and ETSI TC ITS WG Defined a reference architecture > Communication participants > Hardware and software requirements Determined relevant use cases > Scenarios for communication > Define involved participants Identified threats and risks. > Software is never perfect. > Remote access provides attack surface. Derive hardware and protocol requirements Source: ETSI Security Workshop 7/25

Agenda 1. Introduction 2. Security analysis 3. Software update and maintenance 4. Security key management 5. Network Strategies 8/25

Security analysis Car hacking analysis Physical access to the device > Details about the internal hardware > Eavesdropping of internal communication > Code and data could be extracted. > Disassembling the executable code. Weakness in the protocols > Usage of outdated and insecure crypto algorithm (DES) > Replay attacks possible > Partly unencrypted communication between ECU and backend. > Alert protocol provides failure information (?). Weakness in key management and storage. > Same key is used for all ECUs! > Keys are not stored in a secure memory area. No authentication and integrity check for transferred files. (No need for advanced hacking line timing analysis or side channel attacks) 9/25

Security analysis Example: Door unlock C C C C Ownership Backend Vehicle connectivity Body control module Assets Data along the communication path: > Off-board communication between backend and connectivity. > On-board communication between connectivity and BCM. > Communication between BCM and modules. Security keys of the devices. Threats: > Device manipulation. > Compromising keys. > Man-in-the-middle. > Gaining access control. > Denial of services Impacts: > Safety functions. > Financial loss. > Manufacturer reputation > System malfunction > Privacy information disclosure Door modules Ownership 10/25

Security analysis Systematic security analysis approach Threat analysis Attack potentials (STRIDE) based on attacker skill, time Automotive common criteria Network and system layout Specify use cases Identify communication path and data storage Risk assessment on functional level (ECU) on system level (vehicle) Security level Define security level for the asset Derive security requirements and test methods. 11/25 Vector Security Check relates specific automotive risks Ensure cost/benefit balance by prioritized security/threat targets

Security analysis Security Directly Impacts Safety Functional Safety (ISO 26262) Hazard and risk analysis Functions and risk mitigation Safety engineering Security demands implicitly addressed + Security Security architecture threats Misuse methods cases and mitigation data formats & Security functionality engineering For better efficiency and clear focus security engineering should be embedded to safety framework from hazards to after-sales updates 12/25

Security analysis Towards Automotive Common Criteria Goal Consistent security evaluation and certification of products and protection profiles Applicability Operating systems, key management systems, ICs, smart cards, crypto libraries,... Common criteria have been adopted for different critical systems, such as automation, aerospace, defense, Approach ISO 15408: 7 Evaluation Assurance Levels (EAL) for security requirements ISO 27001: techniques for security engineering Automotive experiences Many automotive players so far have unclear security targets and thus no consistent consideration in architecture and life-cycle processes Unnecessary high risk and cost due to overdoing in one area and failing on others Tailored protection profile combined with systematic safety/security engineering provide a thorough yet cost-effective solution. 13/25

Agenda 1. Introduction 2. Security analysis 3. Software update and maintenance 4. Security key management 5. Network Strategies 14/25

Software update and maintenance Software update and maintenance New security need: Quick and secure software updates Quick Over the air Flashing (SOTA) Cooperation of car owner necessary Secure Security keys and certificates Secure flashing protocols (e.g. HIS) Authorized access Software Updates Cooperation of tier1 and OEM OEM maintenance backend required Resulting Security Requirements Foresee SOTA from the begin of ECU development Procedures and responsibilities to be set before SOP Balance features vs. logistic infrastructure Business opportunities New markets like cloud-services, function enabling, secure internet access or software-as-a-product 15/25

Software update and maintenance Software update over the air (SOTA) Car has the Root certificate and the platform certificate with the public keys. Backbone legitimate to the car with its certificate, signed by the OEM CA. 1 1 0 0 1 1 1 0 1 Backend 0 0 1 1 0 0 Internet 16/25

Agenda 1. Introduction 2. Security analysis 3. Software update and maintenance 4. Security key management 5. Network Strategies 17/25

Security key management Key management along ECU lifecycle few many Management simple complex Risk high low Series A Series A Body Gateway HSM Series B Series B Chassis ADAS Infotainment 18/25

Security key management Key management lifecycle Development phase Production phase Failure analysis In-field / After-sales Development keys Initial keys Development TIER-1 production Stock (virgin ECUs) Production keys Authorized and non-authorized repair shops Analysis tools ECU defect analysis OEM Key database Defect return Vehicle production Production keys Vehicle operation Repair shop Re- keying Stock (Used ECUs) TIER-1 Production keys (unused) Production keys 19/25

Agenda 1. Introduction 2. Security analysis 3. Software update and maintenance 4. Security key management 5. Network Strategies 20/25

Network Strategies Network Strategies Learn from IT Business Know-how > Adoption of methods, such as automotive common criteria > Governance criteria for security engineering along the life-cycle Computers are grouped to separate networks > depending on their use case and traffic > Depending on the security level of their data assets > The access to computers is restricted by the structure of the network. Security components like firewall and router to separate networks. > A router passes only the relevant and allowed data from one network to the other. > A firewall integrated into a router controls the access to the internet. Security maintenance can be restricted to updates of the central routers 21/25

Network Strategies Network Strategies Gateway HSM External communication module Body Low security zone Medium security zone High security zone Chassis ADAS Infotainment Powertrain ECU 1 Function implementation Company 1 Company 2 ECU 2 Function implementation Security protocol implementation Dependancy Protected message Security protocol implementation 22/25

Network Strategies Example: Door unlock C C C C A Backend B Vehicle connectivity C Body control module 23/25 Network strategy: A, B: No security zone > Untrusted communication > Using certificates and asymmetric cryptography C: Low security zone > Authentication with symmetric keys > Confidentiality can be considered. > Key storage important D: Medium security zone > Encapsulated communication area > Authentication with symmetric keys D Door modules No security zone Low security zone Medium security zone High security zone

Conclusion Outlook: Security will ramp up fast Security Engineering Software update and maintenance Systematic security engineering activities from requirements onwards Automotive security common criteria building upon from ISO 15408 etc. Security policies and governance Thorough training of engineers More thorough and systematic Firewall and protection concepts Secure over-the-air (OTA) updates for vulnerabilities with secure cloud services for function upgrades Consistent intrusion detection and reporting, with fast counter measures Network strategies Automatic data distribution and usage analysis in the network Consistent network structure according to security requirements Encapsulate nodes and networks with remote access Firewalls and secure communication bottom up from ECU and base software Security key management End-to-end secure key management over the life cycle of the vehicle Enhanced encryption schemes Long term availability of a secured access and provisioning ECU lifecycle protection, e.g., for SW upgrades and HW changes 24/25

For more information about Vector and our products please visit www.vector.com/security Authors: Armin Happel, Prof. Dr. Christof Ebert Vector Consulting Services GmbH 2015. Vector Consulting Services GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.1 2015-04-28