Risks and Problems associated with a Telematic Approach for Log Downloads for EOBRs



Similar documents
Interim Threat / Risk Assessment. Student E- Communications Outsourcing Project

Arkansas Department of Information Systems Arkansas Department of Finance and Administration

MCSAC Task Technical Workgroup October 24 25, 2011

2/24/2014. Discussion Agenda for Today. The Regulatory Environment

Welcome Webinar Login Information Group Registration Policy

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

Evaluation of the Iceland State Financial and Human Resource System REPORT OF THE INDIVIDUAL EVALUATOR. Annex 2 SYSTEM AND SOFTWARE QUALITY

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

Mobile Computing Platform 50

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

Electronic Logging Devices (ELD)s Reliability and Efficiency for Hours Of Service Enforcement CCMTA, June 16, 2015

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Strategic Outlook on the Global Commercial Vehicle Telematics Market in 2013 Fleet Management Vendors Test Waters in Emerging Economies

Content Teaching Academy at James Madison University

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Best Practices for PCI DSS V3.0 Network Security Compliance

Five PCI Security Deficiencies of Restaurants

Garmin dēzl Trucking Navigator Compatibility to. Automatic on-board Recording Device (AOBRD) Requirements, Part

Chapter 8 Software Testing

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

WHITE PAPER. PCI Compliance: Are UK Businesses Ready?

Cyber Security Risk Mitigation Checklist

An Introduction to Continuous Controls Monitoring

BlackBerry Mobile Voice System

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Information Security Basic Concepts

How To Protect The Time System From Being Hacked

ReadyNAS Remote White Paper. NETGEAR May 2010

External Supplier Control Requirements

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Electronic business conditions of use

FDA Title 21 CFR Part 11:Electronic Records; Electronic Signatures; Final Rule (1997)

Security in the PEPPOL

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Why MVNOs and Carriers Aren t Right for Your M2M Application

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

Staying Compliant with Changing Trucking Regulations. What is the difference between ELD, EOBR and AOBRD?

A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT

The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting

March

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

A Noval Approach for S/MIME

Getting Started with J.J. Keller E -Logs. Powered by J. J. Keller Encompass

Where every interaction matters.

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

White paper. Electronic On-Board Recorders: Benefits Beyond Compliance

It s All About Authentication

Network Security. Introduction. Security services. Players. Conclusions. Distributed information Distributed processing Remote smart systems access

BlackBerry 10.3 Work and Personal Corporate

Ensuring the security of your mobile business intelligence

NATIONAL GATEWAY SECURITY SURVEY

PCI Security Standards Council

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Why you need secure

Certificate Management in Ad Hoc Networks

Information Security Insights From and For Canadian Small to Medium Sized Enterprises

White Paper: Managing Security on Mobile Phones

ADMINISTRATIVE POLICY # (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # (2014) Remote Access

Mobility, Security Concerns, and Avoidance

WHITE PAPER Usher Mobile Identity Platform

Why SMS for 2FA? MessageMedia Industry Intelligence

2015 FLEET AND VEHICLE MANAGEMENT SURVEY REPORT

How SSL-Encrypted Web Connections are Intercepted

Developing and Implementing a Strategy for Technology Deployment

SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS

Extending SharePoint for Real-time Collaboration: Five Business Use Cases and Enhancement Opportunities

RSS Cloud Solution COMMON QUESTIONS

ELECTRONIC SIGNATURE AGREEMENT

Sync Security and Privacy Brief

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

Complying with PCI Data Security

Hang Seng HSBCnet Security. May 2016

DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper

Will You Be Ready? Emory A. Mills, CDS. Director of Safety & Driver Administration FTC Transportation, Inc. 5/19/2016

Business Mobile Deposit Capture Terms & Conditions

CHIS, Inc. Privacy General Guidelines

Remote Vendor Monitoring

Four Top Emagined Security Services

Transport Layer Security (TLS) About TLS

Oracle WebCenter Content

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Network Test Labs (NTL) Software Testing Services for igaming

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Department of Administrative Services Voyager CardAudit

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Waste Fleet Safety: Tips and Tools to Ensure Safe Driving. White Paper.

Wireless Infusion Pumps: Securing Hospitals Most Ubiquitous Medical Device

Privacy Policy and Notice of Information Practices

Five PCI Security Deficiencies of Retail Merchants and Restaurants

Enterprise Data Protection

The Top Five Security Challenges Presented by Mobile SharePoint Access

The Information Assurance Process: Charting a Path Towards Compliance

Wireless Roadside Inspection Program Pre-Field Operational Test

External Supplier Control Requirements

Electronic Signatures: A New Opportunity for Growth. May 10, 2005

Transcription:

Risks and Problems associated with a Telematic Approach for Log Downloads for EOBRs Revision 1.0 Page 1 of 6

Table of Contents 1. Introduction... 3 2. Summary... 3 3. Risk Analysis... 4 3.1 Lack of data integrity protection... 4 3.2 Lack of authenticity of data... 4 3.3 Repudiation possible... 4 3.4 High Level of Complexity... 4 3.5 Availability of enforcement infrastructure... 5 3.6 Availability of wireless network... 5 3.7 Key and Certificate Infrastructure... 5 3.8 Transaction and communication costs... 5 4. Glossary... 6 4.1 Integrity... 6 4.2 Authenticity... 6 4.3 Authentication... 6 4.4 Repudiation... 6 Page 2 of 6

1. Introduction has significant experience in building secure on board recording devices, including the provision of data download/transport mechanisms and back office solutions for fleet management as well as cost effective equipment for law enforcement purposes. This document contains feedback on the potential risks and obvious problems associated with the concept described in the document Framework for Telematics Application Services Approach DRAFT.DOCX and presented by Qualcomm, Xata and PeopleNet at the MCSAC meeting on 25.10.2011. 2. Summary There are considerable risks associated with the exclusive usage of a multi node telematic system for the transmission and storage of electronic driving records for EOBR devices. The following factors represent the main risk elements in terms of security, usability, costs and availability: Lack of data integrity protection Lack of authenticity of data Repudiation possible (rejection of records by driver or fleet as invalid) High level of complexity Availability of enforcement infrastructure Availability of wireless network Key and certificate Infrastructure Transaction costs This document is not questioning in any way the attainable security level using state of the art transmission technologies e.g. SSL, VPN, that are correctly implemented and use an appropriate, reliable trust anchor. The focus is more on the steps between the secure transmissions and the insecure storage of data, as well as the complexity of the resulting system and the costs incurred for all involved stakeholders. Furthermore, strongly recommends the separation of legal EOBR and commercial Fleet Management Systems (FMS) requirements. A ruling that mandates only peer to peer roadside inspections would give FMS manufacturers the freedom to continue to develop the needed commercial FMS solutions for their customers while avoiding the cost and complexity of the proposed telematic enforcement solution. The EOBR application can clearly be integrated in an FMS product, but the EOBR requirements should not be influenced by FMS implementations. Page 3 of 6

3. Risk Analysis 3.1 Lack of data integrity protection The lack of data integrity protection is a major concern of the proposed telematic solution. Despite the fact that authentication and secure transmission is employed between the different nodes of the system, there is no secure mechanism employed to ensure that the original data (electronic driving records) cannot be changed, or to detect changes once they have occurred. This allows the data to be changed, either deliberately or due to human or computer error, at the following stages of the process: Within the EOBR Host System: it would easily be possible to modify driving records to either increase the available driving time or to avoid infringement detection. Within the Enforcement System: main risk due to human error or system errors. Within the Roadside Enforcement Device: main risk due to human error or system errors. This issue can be fully mitigated using the solution proposed by in the document EOBR_Security_Concept_Proposal_v1.0.pdf. 3.2 Lack of authenticity of data Similar to the data integrity issue, is the ability of the roadside agent to be certain that the electronic driving records which have been provided actually come from the EOBR and the driver being controlled. This cannot be guaranteed by the proposed telematic system, as the data itself carries no secure information linking it to the source EOBR. Secure communication of the data from one insecure storage node to another, cannot provide the needed assurance. The cryptographic mechanisms commonly employed to provide integrity, also provide the necessary authenticity. 3.3 Repudiation possible Due to the above points describing the lack of data integrity and authenticity protection, in an infringement situation, the involved driver could repudiate his actions. Holding the driver accountable for the infringements would be problematic as it very difficult to prove that the data has not been modified, and that there have been no system errors that could potentially lead to incorrect data being delivered to the roadside agent. This weakness would be common knowledge amongst drivers within a short space of time, and could be exploited in infringement situations. 3.4 High Level of Complexity The 30 page document Framework for Telematics Application Services Approach DRAFT.DOCX clearly demonstrates the high level of complexity that roadside enforcement using a telematic approach incurs. There are many scenarios involved, all of which require significant infrastructure to be put in place and Page 4 of 6

maintained. Apart from the increased costs, this will make the system less robust and reduce its availability. This will lead to fewer roadside inpections being completed. 3.5 Availability of enforcement infrastructure For the proposed telematic solution to be usable nationwide, all enforcement agents would need to be equipped with appropriate enforcement computers, all of which must be wireless and internet capable. Depending on the current penetration of such equipment, this represents a significant investment as well as recurring maintenance and training costs for the enforcement community. 3.6 Availability of wireless network Fleet management applications are generally insensitive to the lack of wireless connectivity in extended areas it is likely that a connection will be available later on the route. However, with a telematic solution, roadside controls in an area in which wireless connections to the internet are not available or not reliable will be difficult or impossible. This contradicts the basic federal requirement that a driver must be able to present his driving records to law enforcement upon request. 3.7 Key and Certificate Infrastructure The telematic based solution proposes that the FMCSA should provide, support and manage authentication credentials ( FMCSA is responsible for managing certificates with all the EOBR Host vendors authorized to provide electronic driver log file transfers ). This PKI (public key infrastructure) is only used to secure the communication between the nodes of the telematic system and incurs costs for all involved. In other words, this increased cost would be a direct result of the use of a telematic based enforcement approach and would provide little or no added value to the security of the total EOBR system. The provision of key infrastructure and a PKI implementation is justified when applied down to the level of the EOBR devices which would achieve a significantly higher security level for the whole system. Such a PKI implementation would be compatible with both a peer to peer or a telematics approach. This approach is detailed in the solution proposed by in the document EOBR_Security_Concept_Proposal_v1.0.pdf. 3.8 Transaction and communication costs A telematic based enforcement solution would incur significant monthly fees and per usage costs for carriers for communications, data handling and storage. Law enforcement agencies would also have to bear such costs. A peer to peer based solution would completely avoid such costs. Page 5 of 6

4. Glossary 4.1 Integrity Integrity is the property that data is protected against inadvertent or unauthorized modification. 4.2 Authenticity Authenticity is the property that data is genuine and originated from its purported source 4.3 Authentication Authentication is the process of establishing confidence in user identities. 4.4 Repudiation Claiming to have not performed an action. Repudiation occurs when someone performs an action and then claims that they didn't actually do it. Page 6 of 6