Securing Wireless Access for Vehicular Environments (WAVE)



Similar documents
Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture

The Vision of Vehicle Infrastructure Integration (VII)

VEHICLE INFRASTRUCTURE INTEGRATION (VII) U.S. DOT DAY-1 APPLICATION DEVELOPMENT PLANS

Connected Vehicles as things on the Internet. big data, the cloud, and advanced automotive research

Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved.

The Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

Demystifying Wireless for Real-World Measurement Applications

RECOMMENDATION ITU-R M * Transport information and control systems Dedicated short range communications at 5.8 GHz

siemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office.

IEEE DSRC Multi-Channel Operations and Its Implications on Vehicle Safety Communications. Qi Chen, Daniel Jiang, Luca Delgrossi

Safety Pilot Security System

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Development of V2I Safety Applications

USDOT Connected Vehicle Overview

Automotive Communication via Mobile Broadband Networks

Connected Vehicle Reference Implementation Architecture (CVRIA) Workshop. June 11 and 12, Draper Labs

Wireless Technology Test Challenges Facing the Automotive Industry

Packet Level Authentication Overview

Space-Based Position Navigation and Timing National Advisory Board

Vehicular On-board Security: EVITA Project

Draft Report April 13, 2012 publication number

Car Connections. Johan Lukkien. System Architecture and Networking

ETSI TC ITS RELEASE PROCESS

Impact of Connected Automated Vehicles on Traffic Management Centers (TMCs)

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

Research Projects in the Mobile Computing and Networking (MCN) Lab

Wireless LANs vs. Wireless WANs

Wireless Network Standard and Guidelines

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

VEHICLE SAFETY COMMUNICATIONS IN THE UNITED STATES

ETSI TR V1.1.1 ( ) Technical Report. Intelligent Transport Systems (ITS); Security; Threat, Vulnerability and Risk Analysis (TVRA)

Threat Model for Software Reconfigurable Communications Systems

Best Practices for Outdoor Wireless Security

Cyber Security Practical considerations for implementing IEC 62351

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

How To Protect A Wireless Lan From A Rogue Access Point

Connected Vehicle Security

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

How To Manage An Wireless Network At A University

Planning for ac Adoption with Ekahau Site Survey 6.0

Doppler Traffic Flow Sensor For Traveler Information Systems. October,

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Performance Analysis of Authentication Protocols in Vehicular Ad Hoc Networks (VANET)

Security and Risk Analysis of VoIP Networks

September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS

White Paper. Enhancing Website Security with Algorithm Agility

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

Smart Metering and RF Mesh Networks for Communities

Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan Wharf T&T Limited. Version: 1.0 Date: 26 January 2004

CHICAGO REGION S INTEROPERABLE TRANSIT SIGNAL PRIORITY PROGRAM

Introduction Chapter 1. Uses of Computer Networks

Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB _v02

Wireless Ethernet LAN (WLAN) General a/802.11b/802.11g FAQ

Comparison of FTP and Signiant

Expert Reference Series of White Papers. Wireless Bandwidth Not Necessarily as Advertised COURSES.

Chapter 2 Configuring Your Wireless Network and Security Settings

ZIGBEE ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna

White Paper: Librestream Security Overview

920MHz Band Multi-hop Wireless Network System

Keywords-Vehicular communications; DSRC; p; WAVE; prototype;

Kapsch V2X. Cooperative Systems.

Business Opportunities beyond Ultrabroadband: Proximity Services and LTE direct

CWNA Instructor Led Course Outline

California PATH, University of California at Berkeley, Building 452, Richmond Field Station 1357 South 46 th Street, Richmond, CA 94804

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

PCMCIA Wireless LAN Card User s Manual

Opportunities and Challenges with Vehicular Networks

SECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS

High Performance VPN Solutions Over Satellite Networks

Multichannel Virtual Access Points for Seamless Handoffs in IEEE Wireless Networks

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

POLICY ON WIRELESS SYSTEMS

Using & Offering Wholesale Ethernet Network and Operational Considerations

FOUNDATION Fieldbus High Speed Ethernet Control System

Chapter 2 Wireless Settings and Security

A NIMS Smart Practice

Utilization of the 4.9 GHz Band in Transportation and Emergency Response Applications

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.

Mobile Office Security Requirements for the Mobile Office

How To Secure Wireless Networks

GATEWAY CITIES TECHNOLOGY PROGRAM FOR GOODS MOVEMENT OVERVIEW OF EMERGING CONNECTED COMMERCIAL VEHICLES PROGRAM

Bluetooth in Automotive Applications Lars-Berno Fredriksson, KVASER AB

SpiderCloud E-RAN Security Overview

Bluetooth Health Device Profile and the IEEE Medical Device Frame Work

CS 356 Lecture 29 Wireless Security. Spring 2013

VOICE OVER WI-FI CAPACITY PLANNING

Cognitive radio for vehicular ad hoc networks (CR-VANETs): approaches and challenges

Wireless Sensor Networks Chapter 14: Security in WSNs

Performance Evaluation of the IEEE p WAVE Communication Standard

IIS Smart Roadside Takes the Lead in Roadside Safety and Enforcement

DDoS Attack on WAVE-enabled VANET Through Synchronization

Egyptian Best Practices Securing E-Services

IEEE Ad Hoc Networks: Performance Measurements

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

INTELLIGENT TRANSPORTATION SYSTEMS IN WHATCOM COUNTY A REGIONAL GUIDE TO ITS TECHNOLOGY

Transcription:

Securing Wireless Access for Vehicular Environments (WAVE) May 7, 2009 CTST, New Orleans Tim Weil CISSP/CISA Security Architect ITS Engineering Booz Allen Hamilton 0

The concept of VII started upon the basic premise of facilitating communication between vehicles and road side infrastructure. Tech Day VI 1

ITS Security and Privacy Data You Can Trust 2

Threat Models for Securing Vehicular Communication http://ivc.epfl.ch 3

Wireless Access for Vehicular Environments (WAVE) Standards IEEE 1609.2: WAVE Security Services for Applications and Management Messages Defines 5.9 GHz DSRC Security Anonymity, Authenticity and Confidentiality IEEE 1609.3: WAVE Networking Services Provides description and management of the DSRC Protocol Stack Application interfaces, Network configuration management WAVE Short Message (WSM) transmission and reception IEEE 1609.4: WAVE Multi-Channel Operation Provides DSRC frequency band coordination and management IEEE 802.11p: Wireless LAN Medium Access Control (MAC) and physical layer Defines the Lower Layers of the communications stack 4

DSRC Operations Model 5

Identity and Access Management for ITS Device and Individual System Access ITS Entity Management Processes and technologies that manage the lifecycle of the OBE s and RSE s credentials as well as system users Credentialing Creation, revocation, and reconciliation of credentials for OBE s, RSE s, as well as individuals Authentication Verification /validation of OBE s, RSE s and system users Authorization Validation of an OBE s access rights to the network and value added services Storage Where required, protection of the identifiable information attributes 6

Introduction ITS Use Cases Services and Applications Traveler Information Travel Times, Incident Alerts, Road Closures, Work Zones In Vehicle Signage Local Signage (School Zones, Stop Signs) Highway Next Exit Services Navigation Off Board Navigation Reroute Information Traffic Management Ramp Metering Signal Timing Optimization Corridor Management Planning Assistance Corridor Management Load Balancing Pothole Maintenance Weather Information Traveler Notification (Icy Bridge Warning) Improved Weather Observing Winter Maintenance Safety Emergency Electronic Brake Light Traffic Signal Violation Warning Stop Sign Violation Warning Curve Speed Warning Electronic Payment Parking Toll Roads Gasoline 7

Introduction USDOT ITS National Architecture (http://www.iteris.com/itsarch/index.htm) 8

WAVE Architecture Integration Component Services (1609.2/1609.3) ITS Service Provisioning Network Services Identity Management WAVE Provisioning (WMIE, WSA) Configuration Management Public Key Infrastructure WAVE Monitoring Protocol Enhancements 9

WAVE Architecture Integration Component Services (1609.2/1609.3) 10

ITS Service Provisioning 2 of 2 11

ITS Identity Management (PSID Creation) 1 of 2 PSID Definition is WAVE(1609.3) Configurable data element published in the RSE Identity Certificate 12

ITS Identity Management (PSID Creation) 2 of 2 A Certificate Signing Request (CSR) is used to request RSE Identity Certificates The RSE Certificate Manager provides management of the certificates within an RSE required to secure the communications of Identifying applications over the WAVE radio access network. The RSE Certificate Manager communicates with the Certificate Authority to acquire and replace certificates and to process certificate revocations. 13

Public Key Infrastructure - Certificate Authority Architecture Transaction Service Provider, Network Users that send and receive information to or from other Network Users, Vehicles or Public Service Vehicles using facilities provided by the ITS System. Example: State DOT Transportation Traffic Management Center. Transportation Operations Center (TOC) Network User Advisory Providers that publish information to the ITS System. Example: a weather alerts provider, that issues warnings regarding weather events 14

Illustrative Mapping of 1609.2 Authorization Scenarios 15

IEEE P1609.11 - Standard for WAVE - Over-the-Air Data Exchange Protocol for ITS Interoperability Electronic Payment Services (Proposed for 2010) SCOPE This standard defines a basic level of technical interoperability for electronic payment equipment, i.e. onboard unit (OBU) and roadside equipment (RSE) using DSRC. It does not provide a full solution for interoperability, and it does not define other parts of the electronic payment-system, other services, other technologies and non-technical elements of interoperability. This standard is not intended to define technology and processes to activate and store data into the OBU ( personalization ) 16

Thank you for joining us! For Booz Allen Security and ITS Engineering 17

18

1609/WAVE WSA WSIE Frame Formats and 1609.2 Summary Reference Slides 19

WAVE Networking Services WAVE Service Information Element Services offered to user (OBU) applications are announced on the air interface via a WSIE inside a WAVE announcement frame 20

WAVE Networking Services WAVE Service Advertisement Frame Format with Optional Fields 21

1609.2 Security Functions IEEE Draft Std 1609.2-2006 was issued July 6, 2006 It contains formats for secured messages Signed and encrypted Elliptic curve cryptography (bandwidth) It contains mechanisms for identified authentication Custom cert format It contains certificate issue and expiry mechanisms It does not contain: Anonymous authentication mechanisms Secure session protocols optimized for DSRC/WAVE setting (though note that standard internet secure protocols may be appropriate) Any discussion of platform certification Note: The 1609 stack mandates 1609.2 security for WSAs. For all other applications, using 1609.2 security is optional. 22

ITS project: Security Implemented: 1609.2 in software security libraries Including some modifications to encrypted messages ECC accelerator (250 verifications / sec with 256-bit keys) Prototype secure session protocols CA and protocol to communicate with it Anonymous authentication mechanism Research projects on: Anonymous authentication Detailed analysis of one particular mechanism for over-the-air anonymous authentication Implemented this mechanism in the security libraries Misuse detection 23

1609.2/ITS Security Overhead Increase in bandwidth ~ 200 bytes for a signed message with one certificate If cert is known to receiver reduce overhead to ~ 90 bytes. ~ 150 bytes for an encrypted message with one recipient Computationally intensive Software: 100 verifications / sec on 400 MHz PC 5-ms latency requirement requires hardware acceleration No COTS ECC hardware currently available for this throughput First signed message received from a given cert requires two verifications Infrastructure requirements Issue certs and CRLs When app is installed / when vehicle is fitted out / when OBE is built Accurate local time and position (also a requirement for the whole ITS project) Conclusions: Bandwidth is acceptable ITS infrastructure worked with small POC population Concern about latency requirements 24