Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture



Similar documents
Securing Wireless Access for Vehicular Environments (WAVE)

The Vision of Vehicle Infrastructure Integration (VII)

Draft Report April 13, 2012 publication number

VEHICLE INFRASTRUCTURE INTEGRATION (VII) U.S. DOT DAY-1 APPLICATION DEVELOPMENT PLANS

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

The Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014

Car Connections. Johan Lukkien. System Architecture and Networking

UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

Demystifying Wireless for Real-World Measurement Applications

Connected Vehicles as things on the Internet. big data, the cloud, and advanced automotive research

Safety Pilot Security System

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

CTS2134 Introduction to Networking. Module Network Security

IEEE DSRC Multi-Channel Operations and Its Implications on Vehicle Safety Communications. Qi Chen, Daniel Jiang, Luca Delgrossi

ETSI TR V1.1.1 ( ) Technical Report. Intelligent Transport Systems (ITS); Security; Threat, Vulnerability and Risk Analysis (TVRA)

NIST Test Personal Identity Verification (PIV) Cards

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

Security Digital Certificate Manager

Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved.

Security Digital Certificate Manager

Cyber Security Practical considerations for implementing IEC 62351

First Semester Examinations 2011/12 INTERNET PRINCIPLES

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

siemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office.

Secure Use of the New NHS Network (N3): Good Practice Guidelines

Accelerating Service Discovery in Ad-hoc Zero Configuration Networking

Performance Testing BroadR-Reach Automotive Ethernet

Overview of Computer Networks

DDoS Attack on WAVE-enabled VANET Through Synchronization

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Snow Agent System Pilot Deployment version

ACE Management Server Deployment Guide VMware ACE 2.0

Active Management Services

What is VLAN Routing?

Bit Chat: A Peer-to-Peer Instant Messenger

Opportunities and Challenges with Vehicular Networks

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: Document Version:

Concept of Electronic Approvals

The IDA Catalogue. of GENERIC SERVICES. Interchange of Data between Administrations

USDOT Connected Vehicle Overview

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Development of the FITELnet-G20 Metro Edge Router

CIP Security Phase 1 Secure Transport for EtherNet/IP

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

How To Configure Voice Vlan On An Ip Phone

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Overview. SSL Cryptography Overview CHAPTER 1

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Chapter 5. Data Communication And Internet Technology

Wireless Infusion Pumps: Securing Hospitals Most Ubiquitous Medical Device

Computer Networks CS321

Wireless Network Standard and Guidelines

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Service Definition. Internet Service. Introduction. Product Overview. Service Specification

Best Practices for Outdoor Wireless Security

FOUNDATION Fieldbus High Speed Ethernet Control System

IT Networking and Security

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

Cloud security architecture

Security in IEEE WLANs

Performance Evaluation of Linux Bridge

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

Home Automation and Cybercrime

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT

Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks

Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

Automotive Communication via Mobile Broadband Networks

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

IT 3202 Internet Working (New)

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

How To Manage An Wireless Network At A University

WirelessOffice Administrator LDAP/Active Directory Support

Basic processes in IEEE networks

Nokia Siemens Networks. CPEi-lte User Manual

HMRC Secure Electronic Transfer (SET)

Introduction to Computer Networks

Packet Level Authentication Overview

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Certificate Based Scheme and Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

IEEE 802 Protocol Layers. IEEE Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

Lightweight Security using Identity-Based Encryption Guido Appenzeller

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Public Key Infrastructure. A Brief Overview by Tim Sigmon


Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Wireless Sensor Networks Chapter 14: Security in WSNs

Public Key Infrastructure for a Higher Education Environment

Transcription:

IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton ITS Security Architect New Orleans 1 December 2008 0

Table of Contents Introduction WAVE Protocol Stack IdAM Frameworks for ITS ITS Services and OSS Architecture WAVE Service Provisioning, Identity Management and PKI 1609.2 Additional Topics and Recommendations Summary 12/22/08 1

IEEE 1609.2: WAVE Security Services for Applications and Management Messages Defines 5.9 GHz DSRC Security Anonymity, Authenticity and Confidentiality IEEE 1609.3: WAVE Networking Services Provides description and management of the DSRC Protocol Stack Application interfaces, Network configuration management WAVE Short Message (WSM) transmission and reception IEEE 1609.4: WAVE Multi-Channel Operation Provides DSRC frequency band coordination and management IEEE 802.11p: Wireless LAN Medium Access Control (MAC) and physical layer Defines the Lower Layers of the communications stack 2

IEEE Standards Association Publications IEEE P802.11p, Draft Amendment to STANDARD FOR Information technology Telecommunications and information exchange between systems LAN/MAN Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Wireless Access in Vehicular Environments (WAVE). IEEE Std 1609.1-2006, IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE) Resource Manager. IEEE Std 1609.2-2006, IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE) Security Services for Applications and Management Messages. IEEE Std 1609.3-2007,, IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE) Networking Services. IEEE Std 1609.4-2006,, IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE) Multi-Channel Operation. 3

DSRC Operations Model 4

System Architecture Overview The DSRC portion of the RSE is the Road Side Unit (RSU) Interconnects Connects DSRC Networks with Infrastructure Networks Applications can reside on both the RSU or a Network Host (application server) The DSRC portion of the OBE is the On Board Unit (OBU) Interconnects Vehicle Systems with DSRC Networks Applications can reside on both the OBU and a Vehicle Host Infrastructure Network Interface DSRC Vehicle Systems Interface 5

The VII System is composed of many Services, Subsystems and interfaces defined in the VII National System Specification. 6

Table of Contents Introduction WAVE Protocol Stack IdAM Framework for ITS ITS Services and OSS Architecture WAVE Service Provisioning, Identity Management and PKI 1609.2 Additional Topics and Recommendations Summary 12/22/08 7

ITS Security and Privacy Data You Can Trust 8

Threat Models for Securing Vehicular Communication http://ivc.epfl.ch 9

Identity and Access Management for ITS Device and Individual System Access ITS Entity Management Processes and technologies that manage the lifecycle of the OBE s and RSE s credentials as well as system users Credentialing Creation, revocation, and reconciliation of credentials for OBE s, RSE s, as well as individuals Authentication Verification /validation of OBE s, RSE s and system users Authorization Validation of an OBE s access rights to the network and value added services Storage Where required, protection of the identifiable information attributes 10

Table of Contents Introduction Concept, Credits, and IdAM Architectural Models IdAM Frameworks for ITS ITS Services and OSS Architecture WAVE Service Provisioning, Identity Management and PKI 1609.2 IdAM Additional Topics and Recommendations Summary 12/22/08 11

Introduction ITS Use Cases Services and Applications Traveler Information Travel Times, Incident Alerts, Road Closures, Work Zones In Vehicle Signage Local Signage (School Zones, Stop Signs) Highway Next Exit Services Navigation Off Board Navigation Reroute Information Traffic Management Ramp Metering Signal Timing Optimization Corridor Management Planning Assistance Corridor Management Load Balancing Weather Information Traveler Notification (Icy Bridge Warning) Improved Weather Observing Winter Maintenance Safety Emergency Electronic Brake Light Traffic Signal Violation Warning Stop Sign Violation Warning Curve Speed Warning Electronic Payment Parking Toll Roads Gasoline Pothole Maintenance 12/22/08 Tech Day VI 12

Advisory Message Distribution Service (AMDS) Provides users with the ability to broadcast messages to vehicles. The AMDS provides the following functions: CreateAdvisoryMessage: the ability to create a new message to be broadcasted to the VII System. QueryAdvisoryMessage: the ability to retrieve the parameters of an existing message. Update: the ability to update an existing message. Cancel: the ability to prematurely terminate an existing message. QueryDeliveryStatus: the ability to determine the real-time delivery status of an existing message. Synchronize: the ability to ensure only active, valid messages are being broadcast. The AMDS will submit queries to the Information Lookup Service (ILS) as necessary in order to fulfill user requests. The AMDS will monitor ILS for changes to the VII System and will dynamically update message broadcast instructions as necessary. The AMDS will prioritize the broadcast list based on message parameters. 13

Introduction USDOT ITS National Architecture (http://www.iteris.com/itsarch/index.htm) 14

WAVE Architecture Integration Component Services (1609.2/1609.3) ITS Service Provisioning Network Services Identity Management WAVE Provisioning (WMIE, WSA) Configuration Management Public Key Infrastructure WAVE Monitoring Protocol Enhancements 15

WAVE Architecture Integration Component Services (1609.2/1609.3) 16

Table of Contents Introduction WAVE Protocol Stack IdAM Framework for ITS ITS Services and OSS Architecture WAVE Service Provisioning, Identity Management and PKI 1609.2 Additional Topics and Recommendations Summary 12/22/08 17

ITS Service Provisioning 1 of 2 The Identity Repository (LDAP) creates and manages the assignment of RSE attributes for certificates (including PSIDs) 18

ITS Service Provisioning 2 of 2 19

ITS Identity Management (PSID Creation) 1 of 2 PSID Definition is WAVE(1609.3) Configurable data element published in the RSE Identity Certificate 20

ITS Identity Management (PSID Creation) 2 of 2 A Certificate Signing Request (CSR) is used to request RSE Identity Certificates The RSE Certificate Manager provides management of the certificates within an RSE required to secure the communications of Identifying applications over the WAVE radio access network. The RSE Certificate Manager communicates with the Certificate Authority to acquire and replace certificates and to process certificate revocations. 21

Types of Certificates And Certificate Users in ITS Vehicle RSE Network External Providers 1609.2 Anonymous Certificates Has and Uses Processes Processes CRLs Processes Processes CRLs Not Used Has and Uses Processes Processes CRLs 1609.2 Identifying Certificates Has and Uses Processes Processes CRLs Has and Uses Processes Processes CRLs Not Used Has and Uses Processes Processes CRLs X.509 Identifying Certificates Not Used Has and Uses Processes Processes CRLs Has and Uses Processes Processes CRLs Has and Uses Processes Processes CRLs 22

Public Key Infrastructure - Certificate Authority Architecture Transaction Service Provider, Network Users that send and receive information to or from other Network Users, Vehicles or Public Service Vehicles using facilities provided by the ITS System. Example: State DOT Transportation Traffic Management Center. Transportation Operations Center (TOC) Network User Advisory Providers that publish information to the ITS System. Example: a weather alerts provider, that issues warnings regarding weather events 23

AuthN/AuthZ Features addressed in the IEEE 1609 Standards Identity Management Features of 1609.2/1609.3 Classes of Digital Certificates Securing Transactions Securing Messages Structures Bootstrapping Trust Signed Messages Encrypting Message Structures Provider Service ID (PSID) Certificate Requests Certificate Revocation Lists Purpose There are classes of certificates identified by the subject_type field which describes what kind of entity owns the certificate. It is used to determine the scope of the certificate and the means of identifying the signer Transactions are exchanges in which multiple messages are sent by one or both peers. Transactions are initiated when a user receives a Provider Service Table (PST) as advertised by a WSA A secure message type is a published 1609.2 data structure with these options - unsecured message, signed message or signed WSM. All WAVE equipment are provisioned with a public key that can be used to validate root certificate updates. OBEs can generate their own key pairs. ECDSA signed messages provides authentication for WAVE multicast messages. The EncryptedMessage type is a subtype of the SecuredMessage type. A WAVE certificate contains one or two keys for either encryption, verification or both functions. A signed number that identifies a service provided by an application and announced in the WAVE Service Announcement (WSA) PSID Device provisioning with certificates use either push or pull model. Pull Model is supported with a CSR message type in 1609.2. 1609.2 defines a CRL type. The Security Manager annex describes the CRL functionality on a 1609 device (i.e. OBE) 24

Illustrative Mapping of 1609.2 Authorization Scenarios 25

VII Authentication Scenarios (1609.2 / 1609.3) PKI for VII Devices All devices are issued with public-key certificates that grant permissions to take certain actions. Public key certificates are a well-suited authentication method in the case where entities frequently have to communicate with other entities that they ve never encountered before. A device will typically have many different certificates. VII PKI requires a mechanism to remove certificates from the system if their owners misbehave (CRLs). WAVE Short Messages (1609.3) A reduced-bandwidth unicast or broadcast message which is digitally signed by an application per 1609.2 specifications. A WSM is routed to a receiving application using an Application Code Identifier (ACID) and an Application Code Mark (ACM) rather than an IP address and port Secure MultiCast (Broadcast) Messages Asynchronous applications. A secure message type is a published 1609.2 data structure with these options - unsecured message, signed message or signed WSM. Multicast messages from an OBU need to be authenticated to prove they originated from a legitimate vehicle at the correct time and location. Secure Transactions (WSAs/PSTs) Synchronous applications. Protection of networks services (advertised in the Provider Service Table) is enabled using signed WAVE Service Advertisement (WSAs). WSAs provide assurance that a legitimate service is being announced. Datagram TLS (DTLS) is the candidate security enabler for 1609.2 May require a full WAVE profile. OBU to RSU There is currently no specification for OBU to RSU authentication. The signed and encrypted message type in 1609.2 encrypts the entire message and could be used as a single authenticated response from the OBE. This is the only mechanism used to secure transactions over WSMP 26

Illustrative mapping of 1609.2 Authentication Scenarios 27

Table of Contents Introduction Concept, Credits, and IdAM Architectural Models Researching the WAVE Standards and VII Model ITS Services and OSS Architecture WAVE Service Provisioning, Identity Management and PKI 1609.2 Additional Topics and Recommendations Summary 12/22/08 28

IEEE 1609 Standards Working Group (http://vii.path.berkeley.edu/1609_wave) 29

Table of Contents Introduction Concept, Credits, and IdAM Architectural Models Researching the WAVE Standards and VII Model Notional PKI Architecture for Authentication 1609.2 Capabilities and Features (AuthN, AuthZ, Cryptography) 1609.2 Additional Topics and Recommendations Summary 12/22/08 30

1609.2 Security Functions IEEE Draft Std 1609.2-2006 was issued July 6, 2006 It contains formats for secured messages Signed and encrypted Elliptic curve cryptography (bandwidth) It contains mechanisms for identified authentication Custom cert format It contains certificate issue and expiry mechanisms It does not contain: Anonymous authentication mechanisms Secure session protocols optimized for DSRC/WAVE setting (though note that standard internet secure protocols may be appropriate) Any discussion of platform certification Note: The 1609 stack mandates 1609.2 security for WSAs. For all other applications, using 1609.2 security is optional. 31

ITS project: Security Implemented: 1609.2 in software security libraries Including some modifications to encrypted messages ECC accelerator (250 verifications / sec with 256-bit keys) Prototype secure session protocols CA and protocol to communicate with it Anonymous authentication mechanism Research projects on: Anonymous authentication Detailed analysis of one particular mechanism for over-the-air anonymous authentication Implemented this mechanism in the security libraries Misuse detection 32

1609.2/ITS Security Overhead Increase in bandwidth ~ 200 bytes for a signed message with one certificate If cert is known to receiver reduce overhead to ~ 90 bytes. ~ 150 bytes for an encrypted message with one recipient Computationally intensive Software: 100 verifications / sec on 400 MHz PC 5-ms latency requirement requires hardware acceleration No COTS ECC hardware currently available for this throughput First signed message received from a given cert requires two verifications Infrastructure requirements Issue certs and CRLs When app is installed / when vehicle is fitted out / when OBE is built Accurate local time and position (also a requirement for the whole ITS project) Conclusions: Tech Day VI Bandwidth is acceptable ITS infrastructure worked with small POC population Concern about latency requirements 12/22/08 33

Thank you for joining us! For Booz Allen Identity and Access Management ITS Engineering Project 34

35

WAVE Networking Services WAVE Service Information Element Services offered to user (OBU) applications are announced on the air interface via a WSIE inside a WAVE announcement frame 36

WAVE Networking Services WAVE Service Advertisement Frame Format with Optional Fields 37