ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011.

Slides:



Advertisements
Similar presentations
Potential Smart Grid standardisation work in ETSI Security and privacy aspects Carmine Rizzo on behalf of Scott CADZOW, C3L © ETSI All rights reserved.
Advertisements

A strategy for a Secure Information Society –
Public Sector Information & Data Protection: A plea for personal privacy settings for the re-use of PSI Bart van der Sloot Institute for Information Law.
NATIONAL INFORMATION GOVERNANCE BOARD
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Data Protection Billy Hawkes Data Protection Commissioner Irish Human Rights Commission 20 November 2010.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi David Cauchi Office of the Commissioner for Data Protection.
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
Vehicle-infrastructure integration: creating co-operative mobility systems and services Hearing EU Parliament, 22 January 2009 Hermann Meyer, CEO.
Net Neutrality, What Else? Wim Nauwelaerts Partner Hunton & Williams.
Cranfield Safety and Accident Investigation Centre Independent Investigation How it works in aviation Prof Graham Braithwaite.
Data Protection and the GRA. 1. Commentary on Data Protection 2. The GRA’s Role The Register Investigations, Mediation and Compensation Enforcement Notices.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi Office of the Data Protection Commissioner.
An Ocean of Opportunity: An integrated maritime policy for the EU 1 Places of refuge: General legal framework and developments within IMO and the EU Alexandros.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Europol’s tailor-made data protection framework
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
European Union Agency for Network and Information Security Follow ENISA: ENISA and standards Sławomir Górniak European Union Agency.
Data Protection: International. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
 Road Safety the European Union Policy Carla Hess European Commission, Directorate General for Mobility & Transport Road.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
European data protection and privacy regulations Johny GASSER Orange Business Services – Consulting & Solutions Integration International Cyber Center.
IntelliDrive Policy and Institutional Issues Research Valerie Briggs Team Lead, Knowledge Transfer and Policy, ITS Joint Program Office, RITA May 4, 2010.
Nov/Dec 2003ElectraNet BSP-2 Workshop (khb) 1 EU Telecoms Regulatory Status Governing Legislation Package 2002  Directive 2002/19/EC Access to, and interconnection.
World Class Standards CCIF New York - April Grids, Clouds and Service Infrastructures ETSI Strategy & New Initiatives.
European Standards on Confidentiality and Privacy in Healthcare Dr Colin M Harper Division of Psychiatry & Neuroscience Queen’s University.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
The application of certain restrictions on access to environmental information in accordance with AC Personal Data Ana Barreira Instituto.
INTERNATIONAL E-DISCOVERY: WHEN CULTURES COLLIDE Alvin F. Lindsay Hogan & Hartson LLP.
European Standards on Confidentiality and Privacy in Healthcare Dr Colin M Harper Division of Psychiatry & Neuroscience Queen’s University.
DOCUMENT #:GSC15-PLEN-36 FOR:Presentation SOURCE:ETSI AGENDA ITEM:PLEN 6.6 CONTACT(S):Soeren Hess, TC ITS Chair Intelligent Transport Systems Presenter:
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
16-17 November 2005 COSCAP – NA Project Steering Group Guangzhou, China 1 Co-operating with the European Aviation safety Agency.
Data protection and European citizens’ initiatives
Directive on the Authorisation of electronic communications networks & Services Directive (2002/20/EC) Authorisation Directive Presented by: Nelisa Gwele.
Fostering worldwide interoperabilityGeneva, July 2009 Intelligent Transport Systems Presenter: Soeren Hess Chairman TC ITS Global Standards Collaboration.
New Services in Mobility: C-ITS
Article 28(2) USD Introduction. The Problem Fraud and Misuse scale Evolving risks Impact on end users –Direct financial impact –Direct inconvenience Indirect.
International Telecommunication Union ITU-T Cybersecurity Symposium - Florianópolis, Brazil, 4 October 2004 Infrastructure Security: The impact on Telecommunications.
 ROAD SAFETY: the European Union Policy European Commission, Directorate General for Mobility & Transport «Road Safety.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 14 – Transport Bilateral screening:
Week 12. Lecture 2. Health Law & the EU Cross-border healthcare: patients’ rights.
1 Export Control of Dual-Use Items and Arms: Industry Outreach Sofia, May, 2006 POLAND’S EXPERIENCES INDUSTRY OUTREACH and PERSONNEL TRAINING JACEK.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
ROMANIA NATIONAL NATURAL GAS REGULATORY AUTHORITY Public Service Obligations in Romanian Gas Sector Ligia Medrea General Manager – Authorizing, Licensing,
TRANSBORDER DATA FLOWS INA MEIRING. THE PROTECTION OF PERSONAL INFORMATION ACT (“POPI”) > 'personal information' means information relating to an identifiable,
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
Clash of jurisdictions in the area of data protection
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
Data Protection: EU & International
The General Data Protection Regulation act (GDPR)
General Data Protection Regulation
Establishing the Infrastructure for Radiation Safety Preparatory Actions and Initial Regulatory Activities.
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
Data Protection & Human Rights
Bob Siegel President Privacy Ref, Inc.
Presentation to TRAN Committee
EU Reference Centres for Animal Welfare
State of the privacy union
GDPR Workshop MEU Symposium Prague 2018
Is Data Protection a Fundamental Right Protecting the Individual?
Welcome IITA Inbound Insider Webinar: An Introduction to GDPR
PRESENTATION OF MONTENEGRO
Presentation transcript:

ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Purpose and scope of WG5 WG5 exists to provide security standards within the ITS Standards platform To protect the ITS platform (ITS-S?) To protect the ITS infrastructure (RSU and beyond) To protect the ITS user WG5 also exists to provide guidance on the use of security standards to protect the ITS applications 2

Is security necessary? Yes Society depends on effective transport and society needs assurance that it will be free from attack The scope for manipulation of transport networks is too extensive to hope it will be able to serve us without security control to prevent ITS serving only the criminal community The data gathered from use of ITS is personal data and needs to be protected using Privacy Enhancing Technologies 3

Stakeholders in ITS Security Society ITS provides benefit to all of society Industry 100s of millions of vehicles, billions of phones, billions of internet connected devices, billions of people able to move and interact with transport networks Government Need to manage ITS as a societal benefit and ensure it fits to the other government managed societal benefits Need to ensure global cooperation for ITS 4 Security standardisation aims to protect all the stakeholders

WG5 WORKING METHODS Risk analysis and countermeasure specification 5

Technical domain of ITS Security ComSec Giving assurance to the user that data is transferred without being vulnerable to interception and misrouting AppSec Giving assurance to the user that the ITS application works without harming the user SysSec Giving assurance that the ITS system is not harming its environment (or spreading harm from the environment to its users) DataSec Giving assurance that data in the ITS system is accurate, timely, and free from manipulation Regulatory compliance Data protection, privacy protection, export control of algorithms, etc. 6

Working methods in ITS WG5 7 TR TS ES

Security analysis (TVRA) Understanding the user’s communication scenarios: Correspondents know and trust one another and the network Correspondents know and trust one another but don’t trust the network Correspondents know but don’t trust one another but trust the network Correspondents don’t know one another (V2V) Communications network is public (V2I) Communications network is private Etc.

Overview Current work Standard for deploying signed CAM and DENM using IEEE PKI design to support IEEE and privacy Whilst maintaining regulatory compliance Minimum standards to support EU Mandates for ITS Future work Extension for full communications technology suite Extension for full applications technology suite Extension for non-vehicle centric ITS 9

THE REGULATORY AND SOCIETAL DIMENSION 10

Basic concepts in ETSI ITS #1 Access to transport infrastructure is highly regulated and policed Driver and vehicle licensing Different roads have different restrictions (vehicle and driver) Infrastructure is operated both commercially and non- commercially Transport infrastructure supports many different transport uses Movement of individuals Movement of livestock Movement of dangerous goods Summarised in many licensing schemes: Private, Light goods, Heavy Goods, For hire, Multi-user. 11

Basic concepts in ETSI ITS #2 ITS stations send environmental (event) and (vehicle) status data to other ITS stations ITS stations may exist in vehicles ITS stations may exist in roadside furniture ITS stations may be applets on internet connected devices Android or Apple Apps for example ITS stations may be networked together Interpretation of received data may assist in driver safety E.g. Collision avoidance Interpretation of received data may assist in regulatory compliance E.g. Speed limit notification and adherence Different data has different authority E.g. Speed limit notification from an authority versus speed assertion from an ITS station 12

Regulatory issues Deployment regulation Specific to some of the involved ITS industries R&TTE directive Placement of radio equipment on the market Privacy Article 12 UDHR: Article 8 EU Convention for the Protection of Human Rights and Fundamental Freedoms: Right to respect for private and family life Data protection Crypto export Support to law enforcement Data retention and lawful interception 13

Privacy, data protection and security Assigns rights to citizens on how data related to them is protected Enshrined in law in Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data Supplemented by Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) 14

Privacy, data protection and security Personal data shall mean any information relating to an identified or identifiable natural person ('data subject'); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity Processing of personal data shall mean any operation or set of operations which is performed upon personal data, whether or not by automatic means, such as collection, recording, organization, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, blocking, erasure or destruction “data subject’s” consent shall mean any freely given specific and informed indication of his wishes by which the data subject signifies his agreement to personal data relating to him being processed 15

Privacy, data protection and security The means to give assurance of the confidentiality, integrity and availability of data and services Offers technical and procedural means to support regulation Security supports … Privacy (Privacy Enhancing Technologies) COM(2007) 228 final: “COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL on Promoting Data Protection by Privacy Enhancing Technologies (PETs)” Data protection 16

CURRENT WORK PROGRAMME Aims of WG5 in the year or so to come 17

Main work focus Keying strategies for ITS Assuming correspondents don’t know one another Assuming limited infrastructure access Assuming minimising of cryptographic load (number of algorithms, number of mechanisms, number of keys) Assuming need to reinforce regulation frameworks For telecommunications and all other regulations Minimal development of “novel” security solutions Maximum re-use of existing best practices 18

Identity and role All vehicles have identities Make and model Colour and specification VIN Registration mark Many identifiers have an authority VIN = Manufacturer Registration mark = National vehicle licensing centre Some vehicles take on special roles Emergency services Some vehicles and their roles imply behaviour Farm Tractor – slow vehicle Motorbike 19

PKI and Certificates 20 Certificate Authority (CA) Trustworthy entity: OEM, government, etc. Alice Bob certificate What is a certificate: A signed (by the CA) public key (of Alice or Bob) A certificate binds an identity (Alice) and/or a role (e.g. emergency vehicle) to a public key Certificate(Alice) = [Alice,, Sig CA (Alice, ) [ ] 1.Verify certificate 2.Verify message

PKI Design Approach 21 TVRA Countermeasures Security Services Stakeholder Limitations and Interests PKI Requirements PKI Design Design input being gathered

Enrolment Authority: Example Euro A National Enrolment Authority European Enrolment Authority CA OEM Production Line Sub-CA 1. Request 2. Enrolment Credential Euro B National Enrolment Authority 22

CLOSING AND THANKS And some acknowledgments 23

Acknowledgements Members of ETSI TC ITS WG5 and ISO TC204 WG16.7 Including the members of ETSI STF397 and STF408 FP7 project i-TOUR The chair is supported in part by the i-TOUR project funded from European Community’s Seventh Framework Programme (FP7/ ) under the Grant Agreement number

BACK UP SLIDES (PKI OPTIONS) If really really needed and if time is available 25

Enrolment Authority: Example Euro A National Enrolment Authority European Enrolment Authority CA OEM Production Line Sub-CA 1. Request 2. Enrolment Credential Euro B National Enrolment Authority OEM 1 Enrolment Authority OEM 2 Enrolment Authority Sub-CA Can this level be omitted? 26

Safety Ticket Authority: Examples European Safety Ticket Authority CA Euro A National Safety Ticket Authority Sub-CA Euro B National Safety Ticket Authority

Commercial and Information Ticket Authority: Example Root authority certifies provider authorities (need to satisfy minimum requirements). Then basically any structure is allowed OEMs offering services 3 rd party service providers Government agencies etc. European Commercial and Information Ticket Authority OEM 1 Ticket Authority Tier 1 Ticket Authority Euro A Ticket Authority Sub-CA Could include another country- level CA 28