Sigyn II software in global yielding networks

Slides:



Advertisements
Similar presentations
Security Controls and Systems in E-Commerce
Advertisements

IEEE/FIPA WG Mobile Agents Ulrich Pinsdorf Fraunhofer-Institute IGD, Germany Dept. Security Technology
Mafijul Islam, PhD Software Systems, Electrical and Embedded Systems Advanced Technology & Research Research Issues in Computing Systems: An Automotive.
School of Health Science AND Human Services Health Science Cluster Biotechnology Research and Development Diagnostic Services CAS — Public Health and Advanced.
The European Activities of BR Communication e-CODEX e-Justice Communication via Online Data Exchange Bucharest, June 14 th 2013.
GPS Vehicle Tracking & Fleet Management Automatic Vehicle Location Solutions to manage your Vehicle & Assets | US | UK | UAE.
Network Identity Kai Kang 27 th October Outline Introduction –Definition –Five drivers –Basic services –Roadmap Network Identity management approaches.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
College ICT Committee An Overview of DARS Stewart Watson 29 th April 2008 Copy for distribution.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Web Mapping Applications with ArcGIS Server: Case Studies 4 th Annual GIS Symposium and Workshop Kevin Stewart.
Mobile Peer-to-Peer Network Architectures Matt Monroe 4/7/11.
1 © 2002, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Networking Academy Program Prepare Yourself for 21 st Century IT.
Wednesday, September 6, rd International Conference on Trust, Privacy & Security in Digital Business Kraków, Poland, September 4-8, 2006 Panel Discussion:
Doc.: IEEE /0573r1 Submission May 2012 David Halasz, Motorola MobilitySlide 1 Scalable Authentication Date: Authors:
SIGYN II Partners and sub projects Partners: Volvo Cars Alkit communication SP EIS by Semcon Chalmers Viktoriainstitutet Sub projects: 1.Academy.
In the name of GOD Telemedicine Nazanin Makkinejad Raziye Salarifard Spring 2011.
SIMULTECH’15, Colmar, France July 21, 2015 Plenary Panel (organized by Prof. Mohammad Obaidat): “Advances in Modeling and Simulation of Computer Networks.
Michael Westra, CISSP June BSides Detroit Security Presentation: Vehicle Hacking “If you think technology can solve your security problems, then.
Cloud Computing Introduction to China-cloud Project and Related Works in JSI Yi Liu Sino-German Joint Software Institute, Beihang Univ. May 2011.
28 August 2015T Kari Laitinen1 T Seminar on Wireless Future 3 ECTS cr Dr. Kari Laitinen Principal Lecturer Oulu University of Applied Sciences.
Computer Networks CSE 434 Fall 2009
Management Information Systems
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Computer Jobs 2013 Bob Nielson. Average Wage The average wages of all jobs in America >>>> $45,790 > $80,180.
Developing PC-Based Automobile Diagnostic System Based on OBD System Authors : Hu Jie, Yan Fuwu, Tian Jing, Wang Pan, Cao Kai School of Automotive Engineer.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Computer Jobs 2014 Bob Nielson. Average Wage The average wages of all jobs in America >>>> $45,790 > $80,180.
IP-Based Emergency Applications and Services for Next Generation Networks PEACE Presented by Suji Gunaratne PhD.
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.
USDOT, RITA RITA: Oversight of USDOT’s R&D programs  University Transportation Centers $100M  UTC Consortia $80M  UTC Multimodal R&D $40M  Intelligent.
CHATS IN THE CLASSROOM: EVALUATIONS FROM THE PERSPECTIVES OF STUDENTS AND TUTORS AT CHEMNITZ UNIVERSITY OF TECHNOLOGY, COMMUNICATION ON TECHNOLOGY AND.
Evaluation of a Publish/Subscribe System for Collaboration and Mobile Working Collaborative Advertising over Internet with Agents Independent Study: Wireless.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Architecture and Design of Customer Support System using Microsoft.NET technologies Nikolay Pavlov Asen Rahnev.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Free Powerpoint Templates Page 1 Free Powerpoint Templates FP7 – Secure Enterprise Remote Banking System (SERBS) Small or medium scale focused research.
Warning and Notification Systems. Workshop – Warning and Notification Systems Summary Telegrafia Warning & Notification Systems Warning network Communication.
Korea Telematics Business Association APEC TEL Telematics Strategy Study 33rd APEC TEL BFSG Meeting 27 April 2006.
© Federal Statistical Office, Research Data Centre, Maurice Brandt Folie 1 ESSnet Projects “Decentralised Access to EU microdata” Maurice Brandt Research.
Security Advisories – Sources and examples Presented by Srujan Baddam.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
TRAIN COM Fifth Framework Programme 23 May, 2000 Laboratori Fondazione Guglielmo Marconi 1 Paolo Umiliacchi - TrainCom Consortium Integrated Vehicle/Infrastructure.
B. RAMMAMURTHY Connected Vehicle Technology 6/6/2014 cse651 1.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
INNOVATIVE ACTIONS UNDER THE ERDF REGIONAL PROGRAMME OF INNOVATIVE ACTIONS ENtrepreneurship Through Innovation in Epirus “ENTI”
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
IDB-1394 Real-Time System Lab. Mar Contents TELEMATICS IVN (In-Vehicle Network) Technical Trend of IVN IDB-1394 IDB-1394 Vs. MOST 1.
Rome - 24 January Earth Server EU FP7-INFRA project Scalability for Big Data Roberto Barbera - University of Catania and INFN - Italy
Embedded Systems - the Neural Backbone of Society ARTEMIS Industry Association ARTEMIS, from successful R&D to cutting-edge Innovation Rolf Ernst, TU Braunschweig.
T.Russell Shields, Co-Chair, Collaboration on ITS Communication Standards Martin Adolph, Programme Coordinator, ITU ITU activities on secure vehicle software.
TRANSPORTATION MANAGEMENT AND TRACKING SYSTEMS GPS-GPRS SOLUTIONS.
A Global Approach to EMF Management and Standards Mike Wood Vice Chairman, ITU-T SG5, WP2 11th Symposium on ICT, Environment and Climate Change 21 April.
OBD Technology Update 5/3/2016.
Sensors Journal, IEEE, Issue Date: May 2013,
Information Collection and Presentation Enriched by Remote Sensor Data
    PRODUCT PRESENTATION ON :   INCREASING REVENUE BY USING GLO 3G NETWORK TO SUPPORT REMOTE AUTO DIAGNOSIS AND MANAGEMENT (GLO VEHICLE DIAGNOSIS AND MANAGEMENT)
World-Leading Research with Real-World Impact!
Connected Vehicle Technology
CYBERSECURITY FOR AUTONOMOUS VEHICLES
Mobile edge computing Report by Weiqing huang.
FIIF Jam Session Dr. Heli Helaakoski, VTT
Final Conference in Paris WP6 – Protection Profiles Specification
Presentation transcript:

Sigyn II 2009-2012 software in global yielding networks Issuer: Anna Karin Anckar AKARLS13, Brand & Insights, PowerPoint Guidelines, Security Class: Proprietary Date created: 2012-03-12

Project organization & partners Academy & Administration SOTA1 SADD2 * TACTA3 CIRA4 1. SOTA: Security cOncept and IT Architecture 2. SADD: Safety Analysis and concept for Diagnostics and software Download 3. TACTA: TrAfic Control and Test car mAnagement 4. CIRA: Connected car Impact on Repair shops and After sales * Know it left the project in Q4 2010

Intensions & objectives Intentions are to study Connected vehicles with services like remote diagnostics, measurement and software download Test car status and traffic monitoring/controlling Security and safety concepts for connected vehicles and Security analysis at academies Basic objectives are to Add safety, robustness and security to the remote services Develop a scalable IT architecture to handle a large vehicle population increasing over time Requirement on future vehicle architecture Evaluate IT architecture, remote diagnostics, measurement and software download

Results remote services Asynchronous remote services Synchronous remote services R&D Work shop Remote SWDL Vehicle state of health Remote Diagnostic parameter settings Wireless Diagnostics & SWDL Remote online Diagnostics Remote data measurement

Results security Security implications Resource constrains of the ECU. Limited possibilities of extra cost, security solutions must be very cost efficient. Lifetime of the solution, the vehicle may be in use for 10-15 years. Security concept Reliance on cryptography and hardware security modules to establish trust. Communication security solutions with strong authentication Application of defense in depth concepts Issuer: [Name] [CDS ID], [Organisation], [Name of Doc], Security Class: Proprietary Date created: [YYYY-MM-DD] 5

Result Safety Safety implications Safety concept Previously the diagnostic client was always physically attached to the vehicle via the OBD-connector and became de-attached before the vehicle left the workshop. The diagnostic client will be built into the vehicle (thus never de-attached). There will be occasions when the workshop mechanic have no visual overview of the vehicle when performing remote diagnostics. Safety concept Involvement and reliance upon the vehicle user Vehicle must verify certain conditions The application of requirements is location dependent (road side/workshop)

publications “Security Concerns in Communication with the Connected Car using DoIP”. P. Kleberger, A. Javaheri, V. Izosimov, and H. Broberg. In: Electronic Systems for Motor Vehicles. VDI- Berichte 2132. ISBN: 978-3-18-092132-7. Baden-Baden, Germany, Oct. 2011, pp. 245-254 (nominated for best paper at the conference) “A Framework for Assessing the Security of the Connected Car Infrastructure” P. Kleberger, A. Javaheri, T. Olovsson, and E. Jonsson. In: Proceedings of the Sixth International Conference on Systems and Networks Communications (ICSNC 2011). IARIA. Barcelona, Spain, Oct. 2011, pp. 236-241. “Security Aspects of the In-Vehicle Network in the Connected Car” P. Kleberger, T. Olovsson, and E. Jonsson.. In: Proceedings of the 2011 IEEE Intelligent Vehicles Symposium (IV). Baden- Baden, Germany: IEEE, June 2011, pp. 528-533. doi: IVS.2011.5940525. “An In-Depth Analysis of the Security of the Connected Repair Shop”. P. Kleberger, T. Olovsson, and E. Jonsson. In: Proceedings of the Seventh International Conference on Systems and Networks Communications (ICSNC 2012). IARIA. Lisbon, Portugal., Nov. 2012, pp. 99-107. "Remote vehicle diagnostics over the Internet using the DoIP protocol M. Johanson, P. Dahle and A. Söderberg," 6th International Conference on Systems and Network Communications, ICSNC 2011, Barcelona, Spain, October 23-29, 2011. "A Structured Approach to Securing the Connected Car". P. Kleberger . Thesis for degree of Licentiate of engineering. Technical report at Department of Computer science and engineering, no 99L ISSN 1652-876X.

The sigyn journey 2005 2006 2007 2008 2009 2010 2011 2012 SIGYN II Pre study SIGYN LOKE 2005 2006 2007 2008 2009 2010 2011 2012

Project significance Functionality introduction in SPA Volvo Technology award winner 2012

SIGYN II Continuation FFI Security Framework (SeFram) FFI Remote Data Collection & Visualization (RDCV) FFI Big Automotive Data (BAuD) 2016 2015 2014 2013 2012

Thanks for your attention! Anna Sundalen Volvo Cars