Policy and Organizational Challenges for Vehicular Communications Security

Size: px
Start display at page:

Download "Policy and Organizational Challenges for Vehicular Communications Security"

Transcription

1 Policy and Organizational Challenges for Vehicular Communications Security Secure Vehicular Communications Workshop. EPFL, Emilio Davila Gonzalez EC DG INFSO.G4

2 Contents The Framework: Trust and Security in electronic communications EC research activities on Trust and Security The special case of vehicular communications The ecall case 1 st Workshop in-vehicle telematics and cooperative systems Privacy and data protection esecurity Working Group Research activities Security in VC, EPFL, , 2

3 The Framework Information Society (r)evolution has caused massive amounts of personal data generated, processed, exchanged and stored i2010 Initiative identifies security (trust and privacy) as one of the main challenges posed by digital convergence Personalised, dynamic open services need trust and security PETs can allow deployment of services while respecting personal privacy User centric - empowerment approach, data protection and proportionality are key issues Security in VC, EPFL, , 3

4 Relevant EC regulation Directive 95/46/EC: Protection of individuals with regard to the processing of personal data and on the free movement of such data. Directive 2002/58/EC: The processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) COM(2006) 251: A strategy for a Secure Information Society Dialogue, partnership and empowerment COM(2007) 96: Radio Frequency Identification (RFID) in Europe: steps towards a policy framework COM(2007) 228: Promoting Data Protection by Privacy Enhancing Technologies (PETs) Security in VC, EPFL, , 4

5 Contents The Framework: Trust and Security in electronic communications EC research activities on Trust and Security The special case of vehicular communications The ecall case 1 st Workshop in-vehicle telematics and cooperative systems Privacy and data protection esecurity Working Group Research activities Security in VC, EPFL, , 5

6 ICT WP , Objective 1.4: Secure, dependable & trusted infrastructures 90 M Car/Railway Mobile Office/Factory DVC PC TV Personal Information STB Game Machine Audio SIM SD MMC Map Information SD MMC Intranet Information Enabling Technologies Web Technologies Crypto, trusted computing, secure software (virtual environments, collaborative communities ) Digital contents IC Card Public expectation E-Tower SD MMC DVD Telephone Security in VC, EPFL, , 6 Home Coordination Outdoor Actions Street/Shop

7 ICT Objective 1.4: Secure, dependable & trusted infrastructures 90 M Network infrastructures Identity management, Service privacy, trust policies infrastructures 4 Projects 11 m 2 Projects 1 Project 5.8 m 9.4 m Enabling Technologies Crypto, trusted 3 computing, Projects secure software 4 Projects 20.5 m 18 m Enabling technologies for trustworthy infrastructures Biometrics, trusted computing, cryptography, secure SW 6 Projects: 22 m Coordination Actions Research roadmaps, metrics and benchmarks, Security in VC, EPFL, , 7 Coordination Actions international cooperation, coordination activities 4 Projects: 3.3 m

8 7 th EU Research Framework Programme ( ) Secure, dependable & trusted infrastructures Type of projects 90 M Coordination Actions STREPs NoEs IP projects PICOS privacy PRIMELIFE TURBINE biometry MOBIO ACTIBIO INTERSECTION network WOMBAT PRISM SWIFT AWISSENET GEMOM FORWARD ECRYPT II networking & coordination THINK TRUST INCO-TRUST TAS3 AMBER CONSEQUENCE MASTER services SecureSCM AVANTSSAR trusted computing TECOM CACE SHIELDS secure implementation

9 Security in network infrastructures: 4 projects, 11 m EC funding Main R&D project priorities An integrated security framework and tools for the security and resilience of heterogeneous networks (INTERSECTION) A networking protocol stack for security and resilience across ad-hoc PANs & WSNs (Awissenet) A message-oriented MW platform for increasing resilience of information systems (GEMOM) Data gathering and analysis for understanding and preventing cyber Security in VC, EPFL, , 9 threats (WOMBAT)

10 Security enabling Technologies 6 projects, 22 m EC funding Main R&D project priorities Trusted Computing IP TECOMT trusted embedded systems: HW platforms with integrated trust components Cryptography NoE ecrypt II Multi-modal Biometrics multi-biometric authentication (based on face and voice) for mobile devices (MOBIO) activity related and soft biometrics technologies for supporting continuous authentication and monitoring of users in ambient environments (ACTIBIO) Secure SW implementation providing SW developers with the means to prevent occurrences of known vulnerabilities Security in VC, EPFL, when , building 10 software (SHIELDS) A toolbox for cryptographic software engineering (CACE)

11 Contents The Framework: Trust and Security in electronic communications EC research activities on Trust and Security The special case of vehicular communications The ecall case 1 st Workshop in-vehicle telematics and cooperative systems Privacy and data protection esecurity Working Group Research activities Security in VC, EPFL, , 11

12 ecall: Data Protection issues (1) Legitimate processing of MSD: Solution: Unambiguous consent -7(a) => Possibility of easy deactivation Adequate processing by data controllers: Publicly appointed organisations to act as PSAPs Adequate storage periods Security of the communications and of data stored IVS, MNOs, PSAPs Security in VC, EPFL, , 12

13 ecall: Data Protection issues (2) Citizen Trust Fair, adequate and not excessive processing No secondary use of information MSD => Minimum information for effective handling of the emergency call System not permanently tracked User awareness Security in VC, EPFL, , 13

14 ecall: Data Protection issues (3) Service providers (contract) Specific rules for FSD: Service providers should respect the data protection and privacy regulation: Clear definition of the use of data Proportionality Transparency Freely given consent Security in VC, EPFL, , 14

15 1 st Workshop in-vehicle telematics and cooperative systems Privacy and data protection Privacy may be a barrier for the deployment of services Objective: bring together ITS & DPO experts to discuss common guidelines for the design of applications in this area 1 st WS: 13/02/ participants, including 8 DPO Security in VC, EPFL, , 15

16 1 st WS: Conclusions Privacy/data protection issues should be integrated from the early design. Liaison with Data Protection Authorities to clarify concepts/provide guidelines Data protection/limits depend on the type of applications Use the personal data for the sole purpose is collected. Anonymous data can be used for other purposes PETs are important tools to allow services deployment while improving privacy protection Inspire public confidence: user awareness about protection of their privacy is a plus Transparency and right of choice to the user Cost effectiveness should be taken into consideration Security in VC, EPFL, , 16

17 1 st WS: Way forward: Next steps Continue collaboration with art. 29 WP Creation of a CIRCA repository for exchanging of information esafety Forum to elaborate code of practice in collaboration with art. 29 WP (ITF) Security and Data protection by better design Security in VC, EPFL, , 17

18 esecurity Working Group (1) Objectives Two focus: Data protection Intrusion avoidance Support the reliability of esafety Protection of esafety functions Prevention of critical road safety effects which result from electronic vehicle systems Preventing of misuse or malpractice, including privacy infringement Establishment of new R&D fields Providing of recommendations, code of practice, standardisation Security in VC, EPFL, , 18

19 esecurity Working Group (2) Topics Protection against unauthorised mobile remote access and wired access on networked vehicles including the full electronic system and its components and data against manipulation and subsequent misuse (e.g. wired & tele- data / software transfer) Protection of electronic motor vehicle components against eassaults (e.g. viruses, trojans, spy-ware, spam, etc.) and of digital data stored in the motor vehicle and road infrastructure against unauthorised access and manipulation Protection of motor vehicles, fleets and road infrastructure by securing telematics and cooperative system applications Establishment of the legal requirement catalogue on necessities in MS and European legislation, certification, and inspection procedures next to the esecurity Standards survey Security in VC, EPFL, , 19

20 Research Activities in the ICT for mobility: The Potential of Co-operative Systems The potential benefits include: increased road network capacity reduced congestion and pollution shorter and more predictable journey times improved traffic safety for all road users lower vehicle operating costs more efficient logistics improved management and control of the road network (both urban and inter-urban) increased efficiency of the public transport systems better and more efficient response to hazards, incidents and accidents Car-to-Infrastructure Communication Security in VC, EPFL, , 20 Car-to-Car Communication

21 The EU Approach Actions: Not only RTD Co-operative Systems will enhance the support available to drivers and other road users RTD Coordination & support Policy Research & Development Wider Adoption Best Use Right Regulatory Environment Projects: GST CVIS Safespot Coopers Security in VC, EPFL, , 21 COMeSafety Sevecom Spectrum policy (CEPT) esafety WG on communications esafety WG on Security esafety WG on Service oriented architectures

22 Trust & Security on in-vehicle telematics: GST Goal: open and standardised framework architecture enabling end-to-end in-vehicle telematics services GST functionalities include service deployment, service provisioning, access to vehicle and handling of nomadic devices GST has developed and implemented telematics certification, security and payment services GST architecture and functionality has been tested with three services (Rescue/eCall, Safety Channel, Enhanced FCD) on six test sites GST results are already used by CVIS Security in VC, EPFL, , 22

23 Security in VC, EPFL, , 23 FP6 VC Projects: Collaboration and Synergies

24 On-going projects FP6: SEVECOM Mission: define a consistent and futureproof solution to the problem of V2V/V2I security Focus: Threats, such as bogus information, denial of service or identity cheating. Requirements: authentication, availability, and privacy. Operational Properties: network scale, privacy, cost and trust. Coordinator: Coordinator: TRIALOG TRIALOG Total costs: ± K Total costs: ± K EC contribution: K EC contribution: K Start date: 1/02/2006 Start date: 1/02/2006 Duration: 36 months Duration: 36 months Security in VC, EPFL, , 24 Research Topics: gspecify an architecture and security mechanisms iwhich provide the right level of protection. iwhich address issues such as liability versus privacy gfully addressed topics ikey and identity management, isecure communication protocols (including secure routing), itamper proof device and decision on crypto-system, iprivacy. ginvestigated topics iintrusion Detection, idata consistency, isecure positioning, isecure user interface.

25 FP7 New projects: PRECIOSA Mission: demonstrate that co-operative systems can comply with privacy regulations using an example application endowed with PET for location data Coordinator: Coordinator: TRIALOG TRIALOG Total costs: ± 2,465 K Total costs: ± 2,465 K EC contribution: 1,667 K EC contribution: 1,667 K Start date: 1/03/2008 Start date: 1/03/2008 Duration: 24 months Duration: 24 months Security in VC, EPFL, , 25 Under Negotiation Objectives: Picture: C2C consortium g Define an approach for evaluation of co-operative systems in terms of: icommunication privacy idata storage privacy g Define a privacy aware architecture for co-operative systems, involving: isuitable trust models and ontologies iv2v and V2I privacy verifiable architecture, including: iprotection iinfringement detection iauditing g Define and validate guidelines for privacy aware co-operative systems g Investigate specific challenges for privacy

26 FP7 New projects: EVITA Mission: avoid un-authorised manipulation of on-board systems to prevent intrusion into the in-vehicular systems and transmission of corrupted data outside Coordinator: Coordinator: Fraunhofer Fraunhofer (SIT) (SIT) Total costs: ± 6,000 K Total costs: ± 6,000 K EC contribution: 3,857 K EC contribution: 3,857 K Start date:??/??/2008 Start date:??/??/2008 Duration: 36 months Duration: 36 months Objective: g Develop open standard secure architecture and protocol specification Methodology: The project will: g g g g g Under Negotiation Identify idustrial use cases (assembly, field maintenance) Compile scenarios of possible threats Define of overall security requirements Compile secure trust model Specify, verify, validate and demonstrate a secure on-board architecture and protocol. Security in VC, EPFL, , 26

27 Thank you for your attention! Security in VC, EPFL, , 27

R&D on Trust & Security. Vilija Juceviciene European Commission Information Society and Media Directorate General Unit F5 - Trust & Security

R&D on Trust & Security. Vilija Juceviciene European Commission Information Society and Media Directorate General Unit F5 - Trust & Security Overview of DG INFSO R&D on Trust & Security Vilija Juceviciene European Commission Information Society and Media Directorate General Unit F5 - Trust & Security Setting the scene - The Digital Wave Sophia

More information

Digital Road Map Data :

Digital Road Map Data : Digital Road Map Data : The European Agenda European Commission DG MOVE 21 June 2011 Workshop Access to public data for digital road maps EU Policies on ITS Action Plan for the Deployment of Intelligent

More information

l Digital Road Map Data :

l Digital Road Map Data : l Digital Road Map Data : The European Agenda Gilles Carabin European Commission DG MOVE 29 March 2011 Workshop Access to public data for digital road maps l EU Policies on ITS Action Plan for the Deployment

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

Secure Vehicle Communication. SEVECOM (SE-cure VE-hicle COM-munication) General Introduction SEVECOM General Introduction

Secure Vehicle Communication. SEVECOM (SE-cure VE-hicle COM-munication) General Introduction SEVECOM General Introduction Secure Vehicle Communication SEVECOM (SE-cure VE-hicle COM-munication) General Introduction 1 Outline Vehicle Communication Security and Privacy Threats Research topics Preliminary results 2 Vehicle Communication

More information

Dr. Panos Papadimitratos

Dr. Panos Papadimitratos Dr. Panos Papadimitratos Ecole Polytechnique Fédéral de Lausanne (EPFL) 2 Security in Vehicle-to-Vehicle (V2V) and Vehicle-to- Infrastructure (V2I) Communications Security and Privacy Why? 3 o Safety (?)

More information

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

A Strategy for a secure Information Society Dialogue, Partnership and empowerment A Strategy for a secure Information Society Dialogue, Partnership and empowerment Gerard.Galler@ec.europa.eu European Commission DG Information Society & Media Unit INFSO/A3: Internet; Network & Information

More information

Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy

Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy Andrea Glorioso European Commission DG INFSO-A3 Andrea.Glorioso@ec.europa.eu Network and

More information

New Services in Mobility: C-ITS

New Services in Mobility: C-ITS New Services in Mobility: C-ITS UNECE ITS Workshop, 07th of October 2015, Bordeaux Gerhard Menzel European Commission DG Mobility and Unit C3 - Intelligent Systems President Juncker: a target of at least

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

European Activities towards Cooperative Mobility

European Activities towards Cooperative Mobility European Activities towards Cooperative Mobility CARS 21 WG1 MEETING Brussels, 21 February 2011 Juhani Jääskeläinen Head of Unit, ICT for Transport European Commission Directorate General Information Society

More information

Valérie Andrianavaly European Commission DG INFSO-A3

Valérie Andrianavaly European Commission DG INFSO-A3 Security and resilience in the Information Society: towards a CIIP policy in the EU Valérie Andrianavaly European Commission DG INFSO-A3 valerie.andrianavaly@ec.europa.eu Network and information security:

More information

Cooperative Mobility and the importance of harmonised international standards

Cooperative Mobility and the importance of harmonised international standards Cooperative Mobility and the importance of harmonised international standards 2 nd ETSI TC ITS Workshop Sophia Antipolis, 10-12/02/2010 Juhani Jääskeläinen Head of Unit, ICT or Transport European Commission

More information

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy 14 February 2017 Amsterdam Gerhard Menzel European Commission - DG MOVE Scope:

More information

ACARE WG 4 Security Overview

ACARE WG 4 Security Overview ACARE WG 4 Security Overview ART WS ATM Security and Cybersecurity Kristof Lamont ATM & Cyber Security Expert 23 March 2016 ACARE Advisory Council for Aviation Research and Innovation in Europe http://www.acare4europe.com/

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Towards a European Cloud Computing Strategy

Towards a European Cloud Computing Strategy Towards a European Cloud Computing Strategy Jorge Gasós European Commission Information Society and Media Directorate General Trust and Security Unit Security, privacy, and trust in the information society

More information

Security and Privacy in Car2Car Adhoc Networks

Security and Privacy in Car2Car Adhoc Networks Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com 15/06/2016 1 Introduction French SME Involved since 2002 in security and privacy for connected vehicles 15/06/2016 2

More information

C-ITS in Europe. Gerhard Menzel, DG MOVE 7th ETSI ITS Workshop 26 th of March 2015, Helmond. Transport

C-ITS in Europe. Gerhard Menzel, DG MOVE 7th ETSI ITS Workshop 26 th of March 2015, Helmond. Transport C-ITS in Europe Gerhard Menzel, DG MOVE 7th ETSI ITS Workshop 26 th of March 2015, Helmond Why C-ITS? Cooperative Systems understood as "connected mobility": More Connecting improving enhancing optimising

More information

European Transport Policy: ITS in action ITS Action Plan Directive 2010/40/EU

European Transport Policy: ITS in action ITS Action Plan Directive 2010/40/EU European Transport Policy: ITS in action ITS Action Plan Directive 2010/40/EU Hermann Meyer, CEO ERTICO IMPACTS, Barcelona, 31 March 2011 This presentation is mainly based on charts which were already

More information

Voertuigconstructeurs en data economie

Voertuigconstructeurs en data economie Voertuigconstructeurs en data economie STUDIEDAG VERKEERSVEILIGHEID VLAAMS HUIS VOOR DE VERKEERSVEILIGHEID DEPT MOW VLAAMS PARLEMENT, BRUSSEL 11 DECEMBER 2017 Saturday, 30 December 2017 AGENDA 1. Context

More information

Trustworthy ICT. FP7-ICT Objective 1.5 WP 2013

Trustworthy ICT. FP7-ICT Objective 1.5 WP 2013 Trustworthy ICT FP7-ICT-2013-10 Objective 1.5 WP 2013 1 General Overview Focused in a limited number of technologies in emerging application of high economic impact in the security area, Cloud Computing

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a

More information

Information sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3

Information sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3 Information sharing in the EU policy on NIS & CIIP Andrea Servida European Commission DG INFSO-A3 Andrea.Servida@ec.europa.eu COM(2006) 251 - Towards a secure Information Society DIALOGUE structured and

More information

H2020 & THE FRENCH SECURITY RESEARCH

H2020 & THE FRENCH SECURITY RESEARCH H2020 & THE FRENCH SECURITY RESEARCH JANUARY 22, 2013 WISG 2013 / TROYES LUIGI REBUFFI CEO EUROPEAN ORGANISATION FOR SECURITY WWW.EOS EU.COM PRESIDENT CSOSG STEERING COMMITTEE European Organisation for

More information

EC Perspective on Connectivity and Smart Mobility and the Role of "Digital Co-production/Co-creation" in Transportation

EC Perspective on Connectivity and Smart Mobility and the Role of Digital Co-production/Co-creation in Transportation EC Perspective on Connectivity and Smart Mobility and the Role of "Digital Co-production/Co-creation" in Transportation Francisco García Morán Chief IT Advisor European Commission Roadmap to a Single European

More information

How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015

How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 Claudia Prettner, Unit for Health and Well-Being, DG CONNECT Table of

More information

Economic and Social Council

Economic and Social Council United Nations Economic and Social Council ECE/TRANS/WP.29/2017/46 Distr.: General 23 December 2016 Original: English Economic Commission for Europe Inland Transport Committee World Forum for Harmonization

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing

More information

COMeSafety Specific Support Action

COMeSafety Specific Support Action COMeSafety Specific Support Action Towards a Common European Communication Architecture for for Cooperative Systems Current Status, Major Issues, Next Steps Dr. Dr. Timo Timo Kosch Kosch BMW BMW Group

More information

Security of vehicular communications. Vehicular communication (VC) systems

Security of vehicular communications. Vehicular communication (VC) systems Security of vehicular communications vehicular safety communications design constraints attacker classes desired security services a security architecture Vehicular communication (VC) systems motivations:

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

EUROPEAN PLATFORMS AND INITIATIVES FOR C-ITS DEPLOYMENT

EUROPEAN PLATFORMS AND INITIATIVES FOR C-ITS DEPLOYMENT EUROPEAN PLATFORMS AND INITIATIVES FOR C-ITS DEPLOYMENT Dr. Angelos Amditis Research Director, ICCS OUTLINE Introduction C-ITS Platform GEAR2030 Digital Transport & Logistics Forum (DTLF) EC Directive

More information

Third public workshop of the Amsterdam Group and CODECS European Framework for C-ITS Deployment

Third public workshop of the Amsterdam Group and CODECS European Framework for C-ITS Deployment Third public workshop of the Amsterdam Group and CODECS European Framework for C-ITS Deployment 14 February 2017 Amsterdam Gerhard Menzel European Commission - DG MOVE EU Policy Tools Large-scale deployment

More information

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity & Digital Privacy in the Energy sector ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European

More information

H2020 WP Cybersecurity PPP topics

H2020 WP Cybersecurity PPP topics Info Day 2017 SC7 Secure Societies 06-07/03/2017 H2020 WP 2017 - Cybersecurity PPP topics Rafael Tesoro Cybersecurity & Digital Privacy, DG CNECT Cyberspace: a backbone of digital society & economic growth

More information

COMPANION FINAL EVENT 14 TH & 15 TH September 2016

COMPANION FINAL EVENT 14 TH & 15 TH September 2016 COMPANION FINAL EVENT 14 TH & 15 TH September 2016 Update on recent developments related to Connected and Automated Driving Myriam COULON CANTUER Smart Mobility & Living Communication Networks, Content

More information

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3 The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3 Andrea.Servida@ec.europa.eu What is at stake with CIIs The World Economic Forum

More information

The emerging EU certification framework: A role for ENISA Dr. Andreas Mitrakas Head of Unit EU Certification Framework Conference Brussels 01/03/18

The emerging EU certification framework: A role for ENISA Dr. Andreas Mitrakas Head of Unit EU Certification Framework Conference Brussels 01/03/18 The emerging EU certification framework: A role for ENISA Dr. Andreas Mitrakas Head of Unit EU Certification Framework Conference Brussels 01/03/18 European Union Agency for Network and Information Security

More information

Sichere Intelligente Mobilität - Testfeld Deutschland. Safe Intelligent Mobility Field Test Germany

Sichere Intelligente Mobilität - Testfeld Deutschland. Safe Intelligent Mobility Field Test Germany Sichere Intelligente Mobilität Testfeld Deutschland Safe Intelligent Mobility Field Test Germany The German Approach to Field Testing of Cooperative Systems Dr. Christian Weiß Daimler AG Group Research

More information

Recommendations on residual issues relevant to ecall

Recommendations on residual issues relevant to ecall Recommendations on residual issues relevant to ecall Robert MacDougall Vodafone Group Public Policy ECC Public Workshop on numbering for ecall Copenhagen 31 January 2017 Vodafone Connected car services

More information

Where are we with C-ITS today? Joint CIMEC/CODECS City Pool workshop Barcelona, 14 November 2016

Where are we with C-ITS today? Joint CIMEC/CODECS City Pool workshop Barcelona, 14 November 2016 Where are we with C-ITS today? Joint CIMEC/CODECS City Pool workshop Barcelona, 14 November 2016 C-ITS - background Substantial effort to develop and deploy C-ITS 200+ million of EU money on projects National-funded

More information

ENISA s Position on the NIS Directive

ENISA s Position on the NIS Directive ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides

More information

EISAS Enhanced Roadmap 2012

EISAS Enhanced Roadmap 2012 [Deliverable November 2012] I About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private

More information

Global cybersecurity and international standards

Global cybersecurity and international standards World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level

More information

ehealth action in the EU

ehealth action in the EU ehealth action in the EU ehealth for smart and inclusive growth 13 February 2014 Jerome Boehm DG SANCO ehealth and Health Technology Assessment General Health Objectives of the EU cooperation on ehealth

More information

ecall Introduction, deployment and life cycle Freddie McBride, European Communications Office

ecall Introduction, deployment and life cycle Freddie McBride, European Communications Office ecall Introduction, deployment and life cycle Freddie McBride, European Communications Office FICORA Workshop ecall International and National Implementation Helsinki, Wednesday 08 February 2017 Agenda

More information

NIS-Directive and Smart Grids

NIS-Directive and Smart Grids NIS-Directive and Smart Grids Workshop on European Smart Grid Cybersecurity: Emerging Threats and Countermeasures Marie Holzleitner Table of Content Aims & Objectives Affected Parties Selected Requirements

More information

A regulatory framework for connected and automated driving Towards a strengthened cooperation

A regulatory framework for connected and automated driving Towards a strengthened cooperation A regulatory framework for connected and automated driving Towards a strengthened cooperation 3 rd SIP-adus WS TOKYO, JAPAN Friedemann Bruehl JAIA, on behalf of ACEA 2016 年 11 月 15 日 ( 火 ) ACEA MEMBERS

More information

Status of the ecall initiative

Status of the ecall initiative Status of the ecall initiative IMCO Committee Brussels, 24/01/12 Thierry Van der Pyl Director European Commission. DG Information Society and Media Background Current status and next steps 2 The pan-european

More information

EU policy on Network and Information Security & Critical Information Infrastructures Protection

EU policy on Network and Information Security & Critical Information Infrastructures Protection EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

Secure automotive on-board networks

Secure automotive on-board networks Secure automotive on-board networks Basis for secure vehicle-to-x communication Dr.-Ing. Olaf Henniger Fraunhofer SIT / Darmstadt 2 December 2010 Presentation overview EVITA project overview Security challenges

More information

First Science-Policy- Industry meeting on CBRN-E Introductory words. Philippe Quevauviller. Security Research and Industry. DG Enterprise and Industry

First Science-Policy- Industry meeting on CBRN-E Introductory words. Philippe Quevauviller. Security Research and Industry. DG Enterprise and Industry First Science-Policy- Industry meeting on CBRN-E Introductory words Brussels, 30 th January 2014 Philippe Quevauviller Security and Industry DG Enterprise and Industry FP7 CBRN- Where do we stand? Around

More information

Strategic Transport Research and Innovation Agenda - STRIA

Strategic Transport Research and Innovation Agenda - STRIA Strategic Transport Research and Innovation Agenda - STRIA Brussels, 15 September 2016 Cristina Marolda DG Mobility & Transport European Commission Mobility & Transport Why do we need a new transport R&I

More information

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope Timestamp 8/30/2013 15:34:00 The information solicited through this questionnaire will only be used in aggregate form, unless otherwise authorised by the respondent. Do you authorise us to cite/share your

More information

RESOLUTION 45 (Rev. Hyderabad, 2010)

RESOLUTION 45 (Rev. Hyderabad, 2010) 212 RESOLUTION 45 (Rev. Hyderabad, 2010) The World Telecommunication Development Conference (Hyderabad, 2010), recalling a) Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference

More information

Car2Car Communication Consortium C2C-CC

Car2Car Communication Consortium C2C-CC Car2Car Communication Consortium C2C-CC Secure Vehicular Communication: Results and Challenges Ahead February 20th/21st 2008, Lausanne Benjamin Weyl BMW Group Research and Technology Chair C2C-CC Security

More information

Transport Network ITS Spatial Data Deployment Platform

Transport Network ITS Spatial Data Deployment Platform Transport Network ITS Spatial Data Deployment Platform TN-ITS and JRS meeting 18 June 2014 The core concept (1/2) TN-ITS is about the exchange of static map information from the Road Sector, it is not

More information

Call for Expressions of Interest

Call for Expressions of Interest Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...

More information

Internet of Things, A European Outlook Antonis Tzortzakakis, Treasurer ECTA

Internet of Things, A European Outlook Antonis Tzortzakakis, Treasurer ECTA Internet of Things, A European Outlook Antonis Tzortzakakis, Treasurer ECTA Internet of Things IoT represents the next step towards the digitalisation of our society and economy, where objects and people

More information

The international CETECOM Group. ETSI ITS Workshop 2013 Session 4 Testing and Certification CETECOM ITS Service Partner Ulrich Keuling, CETECOM

The international CETECOM Group. ETSI ITS Workshop 2013 Session 4 Testing and Certification CETECOM ITS Service Partner Ulrich Keuling, CETECOM The international CETECOM Group ETSI ITS Workshop 2013 Session 4 Testing and Certification CETECOM ITS Service Partner Ulrich Keuling, CETECOM Wireless Car Connectivity 2 Driving factors behind Car Connectivity

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in ISO/IEC JTC 1/SC 27/WG 4 IT Security Controls and Services M. De Soete, ISO/IEC JTC 1 SC27 Vice Chair copyright ISO/IEC JTC 1/SC 27, 2014. This is an SC27 public document and is distributed as is for the

More information

Sichere Intelligente Mobilität - Testfeld Deutschland. Safe Intelligent Mobility Field Test Germany

Sichere Intelligente Mobilität - Testfeld Deutschland. Safe Intelligent Mobility Field Test Germany 1 Sichere Intelligente Mobilität Testfeld Deutschland Safe Intelligent Mobility Field Test Germany The German Approach to Field Testing of Cooperative Systems Matthias Schulze Daimler AG Group Research

More information

EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA

EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA Ref. Ares(2011)514527-12/05/2011 EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA Electronic Communications Policy Implementation of Regulatory Framework (I) Brussels, 6th May 2011

More information

13967/16 MK/mj 1 DG D 2B

13967/16 MK/mj 1 DG D 2B Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:

More information

PATHWAYS TO INNOVATION IN DISASTER RISK MANAGEMENT. Paolo Venturoni CEO European Organisation For Security 4 th June 2018

PATHWAYS TO INNOVATION IN DISASTER RISK MANAGEMENT. Paolo Venturoni CEO European Organisation For Security 4 th June 2018 PATHWAYS TO INNOVATION IN DISASTER RISK MANAGEMENT Paolo Venturoni CEO European Organisation For Security 4 th June 2018 1 What is EOS The European Organisation for Security (EOS) is the voice of the European

More information

NIS Standardisation ENISA view

NIS Standardisation ENISA view NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number

More information

The FP7 ITSSv6 Project

The FP7 ITSSv6 Project The FP7 ITSSv6 Project IPv6 ITS Station Stack for Cooperative ITS FOTs http://www.itssv6.eu Coordinated by INRIA (Thierry Ernst) thierry.ernst@mines-paristech.fr Mines ParisTech / INRIA 2012-05-25 ITSSv6:

More information

IPv6 Task Force - Phase II. Welcome

IPv6 Task Force - Phase II. Welcome IPv6 Task Force - Phase II Welcome Joao da Silva European Commission Brussels 12 September 2002 Erkki Liikanen - Date 2002-1 Latest EU action on IPv6 IPv6 Task Force (Phase I) launched April 2001 Recommendations

More information

ehealth in Europe: at the convergence of technology, medicine, law and society

ehealth in Europe: at the convergence of technology, medicine, law and society ehealth in Europe: at the convergence of technology, medicine, law and society Pēteris Zilgalvis, J.D. Head of Unit, ICT for Health DG Information Society and Media, European Commission IPTS Spring Meeting,

More information

EUROPEAN COMMISSION Enterprise Directorate-General

EUROPEAN COMMISSION Enterprise Directorate-General EUROPEAN COMMISSION Enterprise Directorate-General Services, commerce, tourism, e-business & IDA E-business, ICT industries and services Brussels, 21 October 2003 DG ENTR-D4 M 338 - EN Standardisation

More information

ETSI Security Standards Workshop January 2006

ETSI Security Standards Workshop January 2006 ETSI Security Standards Workshop Adrian Scrase ETSI CTO adrian.scrase@etsi.org 1 Welcome to ETSI 2 ETSI is A European standards organization Active in all areas of ICT Setting globally-applicable standards

More information

ECC Recommendation (17)04. Numbering for ecall

ECC Recommendation (17)04. Numbering for ecall ECC Recommendation (17)04 Numbering for ecall Approved 22 November 2017 ECC/REC/(17)04 Page 2 INTRODUCTION ecall is a service designed for automotive vehicles to provide quick emergency response in case

More information

Security Challenges with ITS : A law enforcement view

Security Challenges with ITS : A law enforcement view Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr

More information

Harmonised EU-wide interoperable ecall

Harmonised EU-wide interoperable ecall Harmonised EU-wide interoperable ecall Cars21 WG on ITS Brussels 4/5/2012 Emilio Davila European Commission DG Information Society and Media ICT for transport 1 What is ecall? Triggered automatically by

More information

a view from emobility

a view from emobility European Technology Platforms Future Research Challenges in ICT Trust, Security, Privacy and Dependability a view from emobility Presented by Prof. Rahim Tafazolli University of Surrey Future Internet,

More information

The European Union approach to Biometrics

The European Union approach to Biometrics The European Union approach to Biometrics gerald.santucci@cec.eu.int Head of Unit Trust & Security European Commission Directorate General Information Society The Biometric Consortium Conference 2003 1

More information

EU General Data Protection Regulation (GDPR) Achieving compliance

EU General Data Protection Regulation (GDPR) Achieving compliance EU General Data Protection Regulation (GDPR) Achieving compliance GDPR enhancing data protection and privacy The new EU General Data Protection Regulation (GDPR) will apply across all EU member states,

More information

Massive M2M Communications: Challenges for NRAs

Massive M2M Communications: Challenges for NRAs Communications Regulatory Agency Bosnia and Herzegovina GD-001/2018 (E) Massive M2M Communications: Challenges for NRAs Aleksandar Mastilovic Expert Advisor the Director-General at Communications Regulatory

More information

Research and Innovation Impact of Trust & Security Programme White Paper 2013

Research and Innovation Impact of Trust & Security Programme White Paper 2013 Research and Innovation Impact of Trust & Security Programme White Paper 2013 Fabio Massacci, Olga Gadyatskaya (University of Trento) Frances Cleary (Waterford Institute of Technology) Version 1.1 October

More information

Conferenza GARR Moving Forward to deliver an «EOSC in Practice» by 2018

Conferenza GARR Moving Forward to deliver an «EOSC in Practice» by 2018 Conferenza GARR 2017 Moving Forward to deliver an «EOSC in Practice» by 2018 Silvana Muscella Chair EOSC HLEG, CEO Trust-IT Services s.muscella@trust-itservices.com @silvanamuscella Mission profile Our

More information

Harmonisation of Digital Markets in the EaP. Vassilis Kopanas European Commission, DG CONNECT

Harmonisation of Digital Markets in the EaP. Vassilis Kopanas European Commission, DG CONNECT Harmonisation of Digital Markets in the EaP Vassilis Kopanas European Commission, DG CONNECT vassilis.kopanas@ec.europa.eu The cost of non-europe European Parliament Research Study, March 2014 Fully realising

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

European Cyber Security Certification: ECSO Meta-Scheme Approach

European Cyber Security Certification: ECSO Meta-Scheme Approach European Cyber Security Certification: ECSO Meta-Scheme Approach Sergio Lomban ECSO WG1 Chairman Conference on Cybersecurity Act Establishing the link between Standardisation and Certification 13 February

More information

AASHTO INTERNATIONAL DAY

AASHTO INTERNATIONAL DAY AASHTO INTERNATIONAL DAY Session 1: Policy and Regulatory initiatives to support existing / legacy ITS technology deployments and their transition to accommodate and adapt emerging operations strategies

More information

ENISA S WORK ON ICS AND SMART GRID SECURITY

ENISA S WORK ON ICS AND SMART GRID SECURITY AMSTERDAM, OCTOBER 15, 2012 ENISA S WORK ON ICS AND SMART GRID SECURITY Dr. Evangelos OUZOUNIS Head of CIIP & Resilience Unit ENISA 1 Why is it important? Industrial networks is the CI for the SCADA and

More information

EUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity

EUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity EUROPEAN COMMISSION JOINT RESEARCH CENTRE Information Note JRC activities in the field of Cybersecurity Date: 28 January, 2016 JRC activities in the field of Cybersecurity 1. Societal and political context

More information

The Role of the Data Protection Officer

The Role of the Data Protection Officer The Role of the Data Protection Officer Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 28 July 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC consultant Infrastructure services

More information

What our members see as being the value of TM 2.0

What our members see as being the value of TM 2.0 About TM 2.0 The TM 2.0 ERTICO Platform originated in 2011 by TomTom and Swarco-Mizar and was formally established on 17 June 2014 during the ITS Europe Congress in Helsinki. It now comprises more than

More information

1. Publishable Summary

1. Publishable Summary 1. Publishable Summary 1.1Project objectives and context Identity management (IdM) has emerged as a promising technology to distribute identity information across security domains. In e-business scenarios,

More information

The Arab ICT Organization

The Arab ICT Organization The Arab ICT Organization UNCITRAL, 21-22 April, 2016 The Arab ICT Organization SUMMARY I. About AICTO : creation, organs, membership II. objectives III. Action Plan IV. Working groups V. Projects : the

More information

Media (NEM) Initiative

Media (NEM) Initiative Networked and Electronic Media (NEM) Initiative NEM Initiative and involvement of Game developers Possibilities for participation in the new EU funding work programme 2011 Dr.-Ing. Halid Hrasnica Eurescom

More information

Package of initiatives on Cybersecurity

Package of initiatives on Cybersecurity Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

Version 11

Version 11 The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic

More information