034675082 Eyal Hamo 066372632 Berry Shnaider בס " ד 1.

Slides:



Advertisements
Similar presentations
Vehicle-infrastructure integration: creating co-operative mobility systems and services Hearing EU Parliament, 22 January 2009 Hermann Meyer, CEO.
Advertisements

Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
Connected Vehicles AASHTO Annual Meeting | October 17, 2013 | Denver, CO Mike Cammisa Director, Safety Association of Global Automakers.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
1 Key Management for Vehicular Networks Maxim Raya and Jean-Pierre Hubaux Secure Vehicular Communications Workshop EPFL - 19/05/2015.
Original vision for Vehicle Infrastructure Integration (VII):
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
Securing Vehicular Communications CSCE 790 Wireless Networking - Spring’08 Presented: April 15, 2008 University of South Carolina Sharaf J. Malebary.
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
Secure Vehicle Communication 1 Secure Vehicular Communications Workshop Lausanne. February 1st/2nd 2006 Hosted by EFPL Antonio Kung SEVECOM Project Co-ordinator.
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
InVANET(Intelligent Vehicular Ad Hoc Network
Wireless Sensor Network Security Anuj Nagar CS 590.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Co-operative Systems for Road Safety “Smart Vehicles on Smart Roads”
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
IntelliDrive Policy and Institutional Issues Research Valerie Briggs Team Lead, Knowledge Transfer and Policy, ITS Joint Program Office, RITA May 4, 2010.
Privacy Issues in Vehicular Ad Hoc Networks.
National VII Architecture – Data Perspective Michael Schagrin ITS Joint Program Office US Department of Transportation TRB 2008 Annual Meeting Session.
HYBRID ROUTING PROTOCOL FOR VANET
USDOT, RITA RITA: Oversight of USDOT’s R&D programs  University Transportation Centers $100M  UTC Consortia $80M  UTC Multimodal R&D $40M  Intelligent.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
2. Survey of VANETs A Tutorial Survey on Vehicular Ad Hoc Networks
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Roadway Safety Panel How can ITS assist in bridging vehicle technology with roadway design and function?
V ehicle I nfrastructure I ntegration Jeffrey F. Paniati Associate Administrator for Operations and Acting Program Manager for ITS Joint Program Office.
Vehicle Infrastructure Integration (VII) FDOT’s Annual ITS Working Group Meeting March 20, 2008 George Gilhooley.
Roadnet Vehicular Ad-Hoc Network System September 19, 2011 Andrew Crossman - CS
Mike Schagrin US Department of Transportation ITS Joint Program Office IntelliDrive Safety Program Overview.
A Security Architecture Concept for Vehicular Network Nodes 蔡嘉翔 許閔傑.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Information Security What is Information Security?
September 25, 2013 Greg Davis FHWA Office of Safety Research, Development and Test Overview of V2I Safety Applications.
C OLLABORATIVE V2V S ECURITY R ESEARCH U PDATE ITS-JPO Public Workshop September 24, 2013 Mike Lukuc, NHTSA Research.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
SAFENET The OSU SAFENET Project The Ohio State University Center for Automotive Research & Center for Intelligent Transportation Research.
Lecture 24 Wireless Network Security
Ad Hoc Network.
Research on the Connected Car Hans-J. Reumerman Philips Technology Research Laboratories Aachen Connectivity Systems Application Industry relations Technology.
BY PREETHI.E. * For people living in developed countries the absolute volume of road traffic can be a daily nuisance. In addition, the road traffic.
A Vehicle Manufacturer’s Perspective on VII Christopher Wilson ITS Oregon- Feb 1, 2005 Christopher Wilson.
Prof. J.-P. Hubaux Mobile Networks Module I – Part 2 Securing Vehicular Networks 1.
Azam Supervisor : Prof. Raj Jain
1 Vehicular Networks Slides are integrated from researchers at EPFL.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Embedded system security
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
SCS - M2M Altran Software Competence Centre – SC²
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Security of the Internet of Things: perspectives and challenges
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
Threat Modeling for Cloud Computing
VANET.
VANET.
Jack Pokrzywa Director Ground Vehicle Standards, SAE International
CS 450/650 Fundamentals of Integrated Computer Security
ASSET - Automotive Software cyber SEcuriTy
Adaptable safety and security in v2x systems
Developing Vehicular Data Cloud Services in the IoT Environment
Presentation transcript:

Eyal Hamo Berry Shnaider בס " ד 1

Outline Introduction. VANET security. Different between VANET security and PC security. Security Architectures Tamper-proof device Digital signatures CRL IEEE P standard Vehicle Safety Communication (VSC) Secure Vehicle Communication (SeVeCom) Network on Wheels (NoW) Car2Car Communication Consortium (C2C-CC) Challenges of Data Security in Vehicular Networks. 2

Introduction IT software and hardware in VANET VANET – V2V – V2I Infotainment Applications 3 Software+ hardware rest

IT safety & IT security 4

VANET applications Secure: - Driver - Manufacturer. - Suppliers. Why to protect on Applications? Malicious manipulation Financial loss. 5

Different between VANET security and PC security Embedded computing platforms: Hardware – processors, memory. Vehicles Lifespan. Communication: Bandwidth limited. Vehicles Lifespan. Attackers Types. Privacy – The system is reachability (e.g. mechanics, valets). Connections Types. Secure connection. 6

Security Architectures Tamper-proof device Each vehicle carries a tamper-proof device Contains the secrets of the vehicle itself Has its own battery Has its own clock (notably in order to be able to sign timestamps) Is in charge of all security operations Is accessible only by authorized personnel 7

Digital signatures Symmetric cryptography is not suitable: messages are standalone, large scale, non-repudiation requirement Hence each message should be signed with a DS Liability-related messages should be stored in the EDR 8

certificate revocation Lists (CRL) List of serial numbers for certificates. Certificate Authority in VANET. 9

Vehicle infrastructure integration (VII) Directly linking road vehicles to their physical surroundings. Provide a communications link between vehicles on the road and between vehicles and the roadside infrastructure. Increase the safety, efficiency, and convenience of the transportation system 10

Vehicle infrastructure integration (VII) 11

Vehicle Safety Communications(VSC) A key VII initiative is the development of Vehicle Safety Communication (VSC) technologies Processing systems with wireless communications for real-time transmission and processing of relevant safety data to provide: warnings of hazards predict dangerous scenarios help avoid collisions 12

Vehicle Safety Communications(VSC) - Examples Traffic Signal Violation Warning Curve Speed Warning Emergency Electronic Brake Lights Pre-Crash Warning Stop Sign Movement Assistance 13

Vehicle Safety Communications Consortiums (VSCC) The Vehicle Safety Communications Consortium (VSCC) of CAMP, which consists of seven OEMs (Original Equipment Manufacturer): BMW, DaimlerChrysler, Ford, GM, Nissan, Toyota, and Volkswagen was formed to investigate the potential of using vehicle-to vehicle and vehicle-to-roadside communications as a means of improving crash prevention performance. 14

Vehicle Safety Communications Consortiums (VSCC) - GOALS identify and evaluate the safety benefits of vehicle safety communication applications, and estimate their deployment feasibility assess the associated communication and data requirements specific for VSC applications investigate any issues that might affect the successful deployment of vehicle safety applications contribute to the formation of the necessary technical standards and communication protocols (Vehicle Safety Communications Consortium) 15

IEEE P standard Standard for Wireless Access in Vehicular Environments -Security Services for Applications and Management Messages. defines secure message formats and processing. This standard also defines the circumstances for using secure message exchanges and how those messages should be processed based upon the purpose of the exchange. 16

Illustration of the IEEE standard 17

Secure Vehicular Communications(SEVECOM) The SeVeCom project is an European project that was specifically set up in order to develop a complete security architecture. Threats, such as bogus information, denial of service or identity cheating. Requirements: authentication, availability, and privacy. Operational Properties: network scale, privacy, cost and trust 18

Network on Wheels (NoW) Active between 2004 and 2008, funded by the German government Main objectives of NOW Communication protocols and data security algorithms for inter- vehicle ad hoc communication systems To support active safety applications, infotainment applications with infrastructure and between vehicles Radio systems based on IEEE technology Standardization on European level with the Car2Car Communication Consortium Implementation of a reference system Planning of introduction strategies and business models 19

Car2Car Communication Consortium (C2C-CC) The CAR 2 CAR system shall provide the following top level features: automatic fast data transmission between vehicles and between vehicles and road side units transmission of traffic information, hazard warnings and entertainment data support of ad hoc CAR 2 CAR Communications without need of a pre-installed network infrastructure the CAR 2 CAR system is based on short range Wireless LAN technology and free of transmission costs 20

Challenges of Data Security in Vehicular Networks Security in vehicular networks: Risk potential Financial assets Cost Usability Mobility Privacy New business models Market penetration Legislation 21

Risk potential The risk involved in vehicular networks Software/Driver - take over control of a vehicle. driver’s reaction to the warning Usually attacks - (hacking, phishing, pharming..) Effects of hacked application. Global attacked. 22

Financial assets Applications based on vehicular communication. Digital infotainment content. Location based services Financial gain. system might be manipulated by: vehicle owner \ hackers. third parties. 23

Road Tolling Built-in automotive payment functions. hacking, phishing. 24

Cost Cost of security solutions in VANET. Anti-virus software and firewalls. Vehicle buyers. 25

Usability Security software (PC / VANET) Installed. Configured and adjusted automatically. Updating. 26

Mobility Not moved in groups. Secure channel limited. 27

Privacy Driver’s location and behavior. carried out on privacy : Technical. Organizational. 28

Reliability Malicious modifications. Software updates - Remote. Financial loss. 29

New business models Vehicular applications relies on strong security functionality. Selling software for vehicles will make for a completely new business model Example: Optimizations for a sporty vs. updates to the vehicle’s entertainment system 30

Market penetration Details USA vehicles : 7 million vehicles sold per year. Around 243 million vehicles altogether Supporting Infrastructure available in the form of roadside units (RSUs). Potential security solutions should work with a low penetration rate of radio enabled vehicles and small number of deployed RSUs 31

Legislation Provide strong security and privacy solutions. Complexity of a security certificatio. For example, in Europe.trucks are required to use a digital tachograph. 32

The End 33