Car2Car Communication Consortium C2C-CC

Size: px
Start display at page:

Download "Car2Car Communication Consortium C2C-CC"

Transcription

1 Car2Car Communication Consortium C2C-CC Secure Vehicular Communication: Results and Challenges Ahead February 20th/21st 2008, Lausanne Benjamin Weyl BMW Group Research and Technology Chair C2C-CC Security & Middleware Working Group

2 Benjamin Weyl BMW Group Research and Technology Page 2 Networking and communication. New applications in driver assistance. A well connected driver is a well informed driver is a safer driver.

3 Agenda C2C-CC Overview Security Discussion Areas and Technical Scope C2C-CC Baseline Concepts & Solution Space Summary, Conclusion and Challenges Ahead C2C-CC Security WG 3

4 Who is behind C2C-CC? C2C-CC Security WG 4

5 C2C-CC Goals The C2C-CC is a non-profit industry forum driven by the Automobile manufacturers (OEMs). Among its main purposes are: to work together for more safety on the road jointly driving development, harmonization and adoptoin of technologies for Car2Car systems is to establish an open European industry standard for a Car2Car communication system, coordinating the approach towards and drive standardizing and regulating those technologies, is to promote the allocation of royalty-free European-wide frequency band for Car2Car applications is to enable the development of an open system supporting active safety applications as well as a broad range of information services is to take into consideration worldwide related activities is to develop realistic deployment strategies and business models to speed-up the market penetration C2C-CC Security WG 5

6 C2C-CC Applications The C2C-CC is looking at a broad range of applications: Critical safety applications requiring a dedicated frequency band, such as intersection assistance, traffic merging, forward collision warning/avoidance Safety, and other public applications, such as traffic flow improvement Commercial applications, such as infotainment or generic internet connectivity Proprietary applications, such as telemetry and telediagnostics Priorities and interests: Key motivation is to standardize safety applications Agree and standardize essential non-safety applications Ensure co-existence with all other applications Accommodate commercial and public applications, allowing for multiple business models potentially pursued by OEMs and other stakeholders C2C-CC Security WG 6

7 C2C-CC: Frequency Allocation Status C2C-CC Security WG 7

8 C2C-CC: Protocol Architecture Active Safety Application Traffic Efficiency Application Infotainment Application Car2Car Transport TCP / UDP / Other Car2Car Network IPv6 Option Mobile IPv6 NEMO MAC / LLC Car2Car MAC Layer Extension European IEEE p PHY European IEEE p Car2Car Network MAC / LLC IEEE a,b,g PHY IEEE a,b,g Other Radio (e.g UMTS) C2C-CC Security WG 8

9 C2C-CC reference model I3 I7 C2C Service Infrast. Vehicle I2 Road-Side Unit I8 C2C IPv6 Backbone I9 I10 C2C OSS I12 I1 I5 I11 Vehicle I6 I4 Telco IPv6 Backbone, incl. heterog. access network Telco SPP Other Service Infrast C2C-CC Security WG 9

10 C2C-CC Cooperation Japan USA VSC VII AHSRA AVS3 ASV3 ISO IEEE CEN ETSI European Projects CarTALK2000 GST Prevent EASIS DAIDALOS Safespot? CIVIS CVIS? COMeSafety SeVeCom? Legislation Member States Standardization Frequency Regulation CEPT ITU AIDA NOW Invent FleetNet INFONEBBIA National Projects Suppl. Veh. Manf. Telco Road Insurance Stakeholders C2C-CC Security WG 10

11 Overview of Security discussion areas Trust Privacy Prot. Concepts Limited Confidentiality Liability Privacy Legisl. Identity Managem. Legislation Law Enforcement Acceptance C2C-CC Security Business Models End User Commercial Req. Credibility Partnerships Operational Concepts Regulation IEEE IETF W3C Standards Oasis Open / Liberty All. Infrastructure Telco Platforms Secure Onboard Env. ISO ETSI 3GPP PKI C2C-CC Security WG 11

12 Security Motivation: Simulated Attack Scenario Simulation: 400 honest vehicles variable number of attackers randomly put in scenario Results: 3 attackers have hit already 20% honest vehicles 10 attackers are able to interfere 50% of honest vehicles C2C-CC Security WG 12

13 Technical Scope of Security Attacks on in-vehicular system infrastructure must ensure not to be illegally tampered with: Attacks on internal vehicle infrastructure via physical access Attacks on internal vehicle system via wireless interface prevent that safety critical systems can not be influenced The attacks on external communication: must be prevented or at least detected and contained, so that fake messages are properly identified and eliminated before influencing applications C2C-CC Security WG 13

14 C2C-CC Security Baselines Trustworthy dissemination of data Integrity of messages Authenticity ensuring trustworthiness of the data Access control (node isolation) Confidentiality only where applicable Availability and timely delivery while observing Privacy: Identity concealment e.g. to provide person/location privacy Over all layers: From PHY/MAC to application Multiple identities may need to be managed Vehicle identity in C2C-CC specific environment Vehicle identity in telco environment Vehicle identity in current legal framework C2C-CC Security WG 14

15 Confidentiality Usually not: C2C-CC information shall be openly shared to improve traffic efficiency and road safety Messages need to be authentic, but their contents needn t be encrypted Potential exception: where closed group communication can be more efficiently addressed through temporary peer authentication and subsequent secure session But: this is dependent on business models Infrastructure deployment may ride on business models requiring exclusive access to information Proprietary use cases co-existing with standardized use cases C2C-CC Security WG 15

16 Privacy Relevant for vehicles, not RSU Protect against typical privacy-infringing malicious profiling or accidental eavesdropping Ensure system maintainability and stability: Allow faulty/malicious vehicles to be identified and excluded Provide respective scalable re-keying mechanisms Constraints: Location plausibility verification and inference from recorded message stream is possible so why care about unlinkability of messages? Can this be countered for selected applications in areas and/or situations where recording is likely? C2C-CC Security WG 16

17 C2C-CC Baseline: Addressing & Identities For operational reasons we need Fixed addresses per vehicle IPv6 and/or Unique Vehicle ID Permanent unique certificate per vehicle But we mustn t disclose them in communication over the air. Hence we also need ID-hopping: temporary addresses, in particular MAC & IP Short-lived certificates Considering scalability and efficiency C2C-CC Security WG 17

18 Comparison of Technical Solutions Scalability Signature Length Computation Effort Privacy PKI + Digital Signatures Fixed Pseudonym Pool PKI + Dynamic Pseudonyms PKI + Group Signatures C2C-CC Security WG 18

19 Key, Certificate, and Identity Management C2C Service Infrast. Vehicle Keys Certificates Trustworthy Message Exchange Road-Side Unit Keys Certificates C2C IPv6 Backbone C2C OSS Key Management Trustworthy Message Exchange Keys Certificates SIM Vehicle Telco IPv6 Backbone, incl. heterog. access network Identity Federation Telco SPP Other Service Infrast C2C-CC Security WG 19

20 Summary: Baseline for C2C-CC Security Addressing: One permanent set (private) One temporary set (used in over-the-air communication) Trust and Privacy: Signing C2X-Messages One pseudonym certificate per vehicle, regularly updated Security standards involved TPM, PKI, ECC (desirable) Pseudonym protocols under discussion Technologies/standards to look at for C2I: SIM IPv6, EAP, DIAMETER, PANA (IETF) SAML (OASIS), Liberty Alliance , etc. But Technical concepts must follow commercial/political discussion Regulation and Legislation Business modeling, policies, and operational concepts Ensure user acceptance and credibility C2C-CC Security WG 20

21 Conclusion C2C-CC Security WG activities: Technical and non-technical security discussion areas Analysis of security use cases and requirements Development and harmonization of security measures for secure and privacy preserving Car2X communication C2C-CC Sec WG has specified a Work Item within ETSI TC ITS WG5 Security for privacy preserving trustworthy message exchange Approach for preserving privacy based on: Pseudonym-based signed messaged exchange Integrated with Telco-platforms where applicable Integrated with application-specific infrastructure such as e.g. traffic management systems C2C-CC Security WG 21

22 Challenges Ahead Privacy: Research on pseudonym change rates Integration over all layers Efficient distribution techniques Integration of different identity management concepts Fake messages sent out from a node: Prevention or at least detection and containment of attack Secure node architecture employing soft- and hardware measures Applying plausibility checks Commercial and political discussion: Possible operational models Regulation and legislation C2C-CC Security WG 22

23 Further Information C2C-CC Security WG 23

24 Benjamin Weyl BMW Group Research and Technology Page 24 Thank you for your attention. Benjamin Weyl Chair WG Security & Middleware BMW Group Research and Technology

COMeSafety Specific Support Action

COMeSafety Specific Support Action COMeSafety Specific Support Action Towards a Common European Communication Architecture for for Cooperative Systems Current Status, Major Issues, Next Steps Dr. Dr. Timo Timo Kosch Kosch BMW BMW Group

More information

Secure Vehicle Communication. SEVECOM (SE-cure VE-hicle COM-munication) General Introduction SEVECOM General Introduction

Secure Vehicle Communication. SEVECOM (SE-cure VE-hicle COM-munication) General Introduction SEVECOM General Introduction Secure Vehicle Communication SEVECOM (SE-cure VE-hicle COM-munication) General Introduction 1 Outline Vehicle Communication Security and Privacy Threats Research topics Preliminary results 2 Vehicle Communication

More information

Dr. Panos Papadimitratos

Dr. Panos Papadimitratos Dr. Panos Papadimitratos Ecole Polytechnique Fédéral de Lausanne (EPFL) 2 Security in Vehicle-to-Vehicle (V2V) and Vehicle-to- Infrastructure (V2I) Communications Security and Privacy Why? 3 o Safety (?)

More information

Security of vehicular communications. Vehicular communication (VC) systems

Security of vehicular communications. Vehicular communication (VC) systems Security of vehicular communications vehicular safety communications design constraints attacker classes desired security services a security architecture Vehicular communication (VC) systems motivations:

More information

Security and Privacy in Car2Car Adhoc Networks

Security and Privacy in Car2Car Adhoc Networks Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com 15/06/2016 1 Introduction French SME Involved since 2002 in security and privacy for connected vehicles 15/06/2016 2

More information

COMeSafety Specific Support Action

COMeSafety Specific Support Action COMeSafety Specific Support Action ITS Consolidation and Standardization Common Architecture Dr. Andreas Lübke, Volkswagen AG February 5th, 2009 Outline Introduction COMeSafety Goals Partners Consolidation

More information

Car2Car Forum Operational Security

Car2Car Forum Operational Security Car2Car Forum 2012 14.11.2012 Operational Security Stefan Goetz, Continental Hervé Seudié, Bosch Working Group Security Task Force: In-vehicle Security and Trust Assurance Level 15/11/2012 C2C-CC Security

More information

COOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY

COOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY COOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY ETSI IoT Security WORKSHOP, 13 15 June 2016 Brigitte LONC, RENAULT ETSI TC ITS WG 5 Chairman ETSI 2016.

More information

Sichere Intelligente Mobilität - Testfeld Deutschland. Safe Intelligent Mobility Field Test Germany

Sichere Intelligente Mobilität - Testfeld Deutschland. Safe Intelligent Mobility Field Test Germany Sichere Intelligente Mobilität Testfeld Deutschland Safe Intelligent Mobility Field Test Germany The German Approach to Field Testing of Cooperative Systems Dr. Christian Weiß Daimler AG Group Research

More information

The GeoNet project: Combination of IPv6 & GeoNetworking

The GeoNet project: Combination of IPv6 & GeoNetworking The GeoNet project: Combination of IPv6 & GeoNetworking Geographic addressing and routing for vehicular communications http://www.geonet-project.eu Dr. Thierry Ernst INRIA Mines ParisTech (LaRA) GeoNet

More information

Intelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014

Intelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014 Intelligent Transportation Systems Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014 Outline Wireless Access for Vehicular Environments (WAVE) IEEE 802.11p IEEE

More information

Sichere Intelligente Mobilität - Testfeld Deutschland. Safe Intelligent Mobility Field Test Germany

Sichere Intelligente Mobilität - Testfeld Deutschland. Safe Intelligent Mobility Field Test Germany 1 Sichere Intelligente Mobilität Testfeld Deutschland Safe Intelligent Mobility Field Test Germany The German Approach to Field Testing of Cooperative Systems Matthias Schulze Daimler AG Group Research

More information

EUROPEAN STANDARD Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 3: Network Architecture

EUROPEAN STANDARD Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 3: Network Architecture EN 302 636-3 V1.2.1 (2014-12) EUROPEAN STANDARD Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 3: Network Architecture 2 EN 302 636-3 V1.2.1 (2014-12) Reference REN/ITS-0030034

More information

Economic and Social Council

Economic and Social Council United Nations Economic and Social Council ECE/TRANS/WP.29/2017/46 Distr.: General 23 December 2016 Original: English Economic Commission for Europe Inland Transport Committee World Forum for Harmonization

More information

Cooperative Mobility and the importance of harmonised international standards

Cooperative Mobility and the importance of harmonised international standards Cooperative Mobility and the importance of harmonised international standards 2 nd ETSI TC ITS Workshop Sophia Antipolis, 10-12/02/2010 Juhani Jääskeläinen Head of Unit, ICT or Transport European Commission

More information

ITS Standardization. Oyunchimeg Shagdar, Inria Thierry Ernst, Mines Paris Tech

ITS Standardization. Oyunchimeg Shagdar, Inria Thierry Ernst, Mines Paris Tech ITS Standardization Oyunchimeg Shagdar, Inria Thierry Ernst, Mines Paris Tech JNCT: Les Journées Nationales des Communication dans les Transports 29 Mai 2013 ITS: Intelligent Transportations Systems Systems

More information

Introduction to VANET

Introduction to VANET VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of

More information

VPKIs: State-of-the-Art, Challenges and Extensions

VPKIs: State-of-the-Art, Challenges and Extensions VPKIs: State-of-the-Art, Challenges and Extensions VPKIs: State-of-the-Art, Challenges and Extensions Hongyu Jin, Mohammad Khodaei and Panos Papadimitratos Networked Systems Security Group www.ee.kth.se/nss

More information

Prof. Dr. Ralf Guido Herrtwich, Daimler AG, Sindelfingen, Germany

Prof. Dr. Ralf Guido Herrtwich, Daimler AG, Sindelfingen, Germany The Role of the automotive industry in standardization activities and the business perspective of co-operative systems 3 rd ETSI TC ITS Workshop February 2011 Venice, Italy Prof. Dr. Ralf Guido Herrtwich,

More information

The international CETECOM Group. ETSI ITS Workshop 2013 Session 4 Testing and Certification CETECOM ITS Service Partner Ulrich Keuling, CETECOM

The international CETECOM Group. ETSI ITS Workshop 2013 Session 4 Testing and Certification CETECOM ITS Service Partner Ulrich Keuling, CETECOM The international CETECOM Group ETSI ITS Workshop 2013 Session 4 Testing and Certification CETECOM ITS Service Partner Ulrich Keuling, CETECOM Wireless Car Connectivity 2 Driving factors behind Car Connectivity

More information

Cooperative ITS Corridor Joint Deployment

Cooperative ITS Corridor Joint Deployment Cooperative ITS Corridor Joint Deployment Secure V2X Communication Glasgow, June 8th 2016 Markus Ullmann Federal Office for Information Security (BSI) Outline Cooperative Intelligent Transport System (C-ITS)

More information

C2X congress C-ITS standards

C2X congress C-ITS standards Elektrische Signalverarbeitung Dr. Fischer GmbH C2X congress C-ITS standards Frankfurt 1. March 2016 1.3.2016 C-ITS standards 1 The purpose of standards? 1. Interoperability: Specification of interfaces

More information

ETSI G5 technology: the European approach. Date: 13 th June 2013 Name: Lan LIN Position: Senior Researcher Organisation: Hitachi Europe SAS.

ETSI G5 technology: the European approach. Date: 13 th June 2013 Name: Lan LIN Position: Senior Researcher Organisation: Hitachi Europe SAS. ETSI G5 technology: the European approach Date: 13 th June 2013 Name: Lan LIN Position: Senior Researcher Organisation: Hitachi Europe SAS. Outlines Background Motivations Technical insignts Conclusion

More information

ISO TC204 WG 16: The CALM Architecture. INRIA IMARA project-team / JRU LARA.

ISO TC204 WG 16: The CALM Architecture. INRIA IMARA project-team / JRU LARA. ISO TC204 WG 16: The CALM Architecture Thierry.Ernst@inria.fr INRIA IMARA project-team / JRU LARA http://www.lara.prd.fr ISO TC204 WG16: CALM ISO Technical Committee 204: Currently 12 active WGs http://www.sae.org/technicalcommittees/tc204wg16.htm

More information

Standards for Cooperative ITS: A Proof of Concept

Standards for Cooperative ITS: A Proof of Concept Standards for Cooperative ITS: A Proof of Concept Presented by Thierry Ernst Mines ParisTech Authored by Rodrigo Silva, Satoru Noguchi Thierry Ernst, Arnaud de La Fortelle, Walter Godoy Jr AICT 2014 Paris

More information

A Perspective on V2X in the United States

A Perspective on V2X in the United States A Perspective on V2X in the United States John B. Kenney, Ph.D Director and Principal Researcher Toyota InfoTechnology Center, USA jkenney@us.toyota-itc.com November 14, 2017 SIP-adus Workshop on Connected

More information

The current status of Esi TC and the future of electronic signatures

The current status of Esi TC and the future of electronic signatures SG&A ETSI FUTURE WORKSHOP Sophia Antipolis, 16th January 2006 The current status of Esi TC and the future of electronic signatures Riccardo Genghini, Chairman of Etsi Esi TC riccardo.genghini@sng.it The

More information

Automotive Industry: Why the ITS B usinesses Need to C are about IPv6?

Automotive Industry: Why the ITS B usinesses Need to C are about IPv6? Automotive Industry: Why the ITS B usinesses Need to C are about IPv6? i.e. a presentation on IPv6 and C ooperative ITS Thierry.Ernst@inria.fr JRU LARA (INR IA & M ines ParisTech) http://www.lara.prd.fr/ipv6-its

More information

Automotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017

Automotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017 Automotive Security: Challenges, Standards and Solutions Alexander Much 12 October 2017 Driver s fears are being fueled by recent news Connected Cars, new opportunities for hackers Autonomous Driving Concepts

More information

SSL/TSL EV Certificates

SSL/TSL EV Certificates SSL/TSL EV Certificates CA/Browser Forum Exploratory seminar on e-signatures for e-business in the South Mediterranean region 11-12 November 2013, Amman, Jordan Moudrick DADASHOW CEO, Skaitmeninio Sertifikavimo

More information

Applying Lessons Learned to V2X Communications for China

Applying Lessons Learned to V2X Communications for China Jim Misener Director, Technical Standards Qualcomm Technologies, Inc. Applying Lessons Learned to V2X Communications for China 2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All

More information

DSRC and Ad-hoc Network development in Japan

DSRC and Ad-hoc Network development in Japan DSRC and Ad-hoc Network development in Japan September 2, 2005 Cologne, Germany Satoshi Oyama (Hitachi, Ltd.) ITS Info-Communications Forum, Japan September 2, 2005 1 Contents DSRC Standards in Japan DSRC

More information

VANETs. Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe

VANETs. Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe VANETs Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe April 15 th 2005 Marc Torrent Moreno 1 Main Motivation

More information

Privacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH

Privacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH Privacy in Vehicular Ad-hoc Networks Nikolaos Alexiou, LCN, EE KTH alexiou@kth.se 2/10/2012 Outline Introduction VANETs: an overview VANET privacy - Anonymity - Location Privacy - VPKI Privacy Attacks

More information

Introduction to Vehicular Networks

Introduction to Vehicular Networks CS 795/895 Vehicular Networks Introduction to Vehicular Networks Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/courses/cs795-s07/

More information

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy 14 February 2017 Amsterdam Gerhard Menzel European Commission - DG MOVE Scope:

More information

Roberto Brignolo The SAFESPOT Integrated Project: Overview of the architecture, technologies and applications

Roberto Brignolo The SAFESPOT Integrated Project: Overview of the architecture, technologies and applications Roberto Brignolo The SAFESPOT Integrated Project: Overview of the architecture, technologies and applications General figures 2 Project type: Integrated Project (IP) Co-funded by: the European Commission

More information

European Activities towards Cooperative Mobility

European Activities towards Cooperative Mobility European Activities towards Cooperative Mobility CARS 21 WG1 MEETING Brussels, 21 February 2011 Juhani Jääskeläinen Head of Unit, ICT for Transport European Commission Directorate General Information Society

More information

Update of C2C-CC Requirements for NEMO Route Optimization

Update of C2C-CC Requirements for NEMO Route Optimization Update of C2C-CC Requirements for NEMO Route Optimization draft-baldessari-c2ccc-nemo-req-01 IETF-69-26/07/2007 - NEMO WG Roberto Baldessari NEC Europe Ltd. Heidelberg Andreas Festag NEC Deutschland GmbH

More information

ISO INTERNATIONAL STANDARD. Intelligent transport systems Communications access for land mobiles (CALM) Mobile wireless broadband using HC-SDMA

ISO INTERNATIONAL STANDARD. Intelligent transport systems Communications access for land mobiles (CALM) Mobile wireless broadband using HC-SDMA INTERNATIONAL STANDARD ISO 25113 First edition 2010-03-01 Intelligent transport systems Communications access for land mobiles (CALM) Mobile wireless broadband using HC-SDMA Systèmes intelligents de transport

More information

All rights reserved. ITS at ETSI. Presented by Luis Jorge Romero on behalf of ETSI TC ITS

All rights reserved.  ITS at ETSI. Presented by Luis Jorge Romero on behalf of ETSI TC ITS http://eustandards.in/ ITS at ETSI Presented by Luis Jorge Romero on behalf of ETSI TC ITS 2 All rights reserved ITS: a definition ITS means applying Information and Communications Technologies (ICT) to

More information

Vehicular Networking

Vehicular Networking Vehicular Networking Christoph Sommer http://www.ccs labs.org/~sommer/ IAB Technical Plenary 93 rd IETF July 2015 Prague Motivation Illustration: C2C-CC Illustration: C2C-CC Illustration: Project AKTIV

More information

GPRS and UMTS T

GPRS and UMTS T GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,

More information

Wi SUN Technology and Certification Phil Beecher, President and CEO March 2018

Wi SUN Technology and Certification Phil Beecher, President and CEO March 2018 Wi SUN Technology and Certification Phil Beecher, President and CEO March 2018 Wi SUN Alliance was established in April 2012 Incorporated as Not for Profit Organization (501c) in Delaware, US Regional

More information

C2X Security. Introduction and overview (focus to European standard only) Cryptovision s Mindshare V

C2X Security. Introduction and overview (focus to European standard only) Cryptovision s Mindshare V C2X Security Introduction and overview (focus to European standard only) Cryptovision s Mindshare 2015-06-24 V1.00 2015-06-24 Agenda What is Car2x Communication? Standards Security concepts C2X-PKI 2/30

More information

NIS Standardisation ENISA view

NIS Standardisation ENISA view NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number

More information

ETSI TC ITS WORKSHOP February 2011 Venice Italy. ETSI All rights reserved

ETSI TC ITS WORKSHOP February 2011 Venice Italy. ETSI All rights reserved ETSI TC ITS WORKSHOP 09-11 February 2011 Venice Italy ETSI 2011. All rights reserved WG1 STANDARDIZATION ACTIVITIES Lan LIN, Hitachi, ETSI TC ITS WG1 Vice-Chairman ETSI 2011. All rights reserved Transportation

More information

3GPP security. Valtteri Niemi 3GPP SA3 (Security) chairman Nokia

3GPP security. Valtteri Niemi 3GPP SA3 (Security) chairman Nokia 3GPP security Valtteri Niemi 3GPP SA3 (Security) chairman Nokia 1 Some history and background 2 Some history 1/2 SA3 took over the responsibility of specifications created by ETSI SMG10, e.g. TS 43.020

More information

CVIS. CVIS Chief Architect Dallas 14. November 2006

CVIS. CVIS Chief Architect Dallas 14. November 2006 CVIS Knut.Evensen@Q-Free.com CVIS Chief Architect Dallas 14. November 2006 European R&D projects supported by DG INFSO Coordinator: ERTICO Total budget: 41 Million EC contribution: 22 Million Consortium:

More information

How do you decide what s best for you?

How do you decide what s best for you? How do you decide what s best for you? Experience Transparency Leadership Commitment Cost reduction Security Trustworthiness Credibility Confidence Reliability Compliance Privacy Expertise Flexibility

More information

Identity Management. Rolf Blom Ericsson Research

Identity Management. Rolf Blom Ericsson Research Identity Management Rolf Blom Ericsson Research Identity Management Agenda What is a Digital Identity Why Identity Management Identity Management Roles and technology User attitudes User Requirements Standardization

More information

CAMP. Intelligent Transportation Systems. A Security Credential Management System for Vehicle-to-Vehicle Communications

CAMP. Intelligent Transportation Systems. A Security Credential Management System for Vehicle-to-Vehicle Communications CAMP Vehicle Safety Communications 3 Intelligent Transportation Systems A Security Credential Management System for Vehicle-to-Vehicle Communications William Whyte (Security Innovation); André Weimerskirch

More information

OPENWAVE ENGINE / WSU - A PLATFORM FOR C2C-CC

OPENWAVE ENGINE / WSU - A PLATFORM FOR C2C-CC OPENWAVE ENGINE / WSU - A PLATFORM FOR C2C-CC Robert Lasowski, Tim Leinmüller + and Markus Strassberger Cirquent GmbH, robert.lasowski@cirquent.de + DENSO AUTOMOTIVE Deutschland GmbH, Technical Research

More information

The WAVE Communications Stack: IEEE p, and, September, 2007

The WAVE Communications Stack: IEEE p, and, September, 2007 The WAVE Communications Stack: IEEE 802.11p, 1609.4 and, 1609.3 September, 2007 WAVE System Components External Systems ROAD SIDE UNIT Covered by WAVE Standards ON-BOARD UNITS External Systems Host Host

More information

Trusted Platform for Mobile Devices: Challenges and Solutions

Trusted Platform for Mobile Devices: Challenges and Solutions Trusted Platform for Mobile Devices: Challenges and Solutions Lily Chen Motorola Inc. May 13, 2005 Outline Introduction Challenges for a trusted platform Current solutions Standard activities Summary New

More information

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks D.Balamahalakshmi Department of Computer Science and Engineering, V.S.B Engineering College, Karur, Tamilnadu, India 1

More information

Secure Ethernet Communication for Autonomous Driving. Jared Combs June 2016

Secure Ethernet Communication for Autonomous Driving. Jared Combs June 2016 Secure Ethernet Communication for Autonomous Driving Jared Combs June 2016 Agenda Motivation for Security The Multi-Level Security Architecture Proposal Level 1: Restrict access to the network Level 2:

More information

V2X standardization and deployment: viewpoint of a system provider

V2X standardization and deployment: viewpoint of a system provider V2X standardization and deployment: viewpoint of a system provider Les Journées Nationales des Communications dans les Transports, JNCT 2013 29 th May 2013 Lan LIN lan.lin@hitachi-eu.com, FRANCE All Rights

More information

Vehicle Networks. V2X communication protocols. Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl

Vehicle Networks. V2X communication protocols. Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl Vehicle Networks V2X communication protocols Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl Outline Wireless Access for Vehicular Environments (WAVE) IEEE 802.11p IEEE 1609.1-4 SAE 2735 Car-2-Car

More information

To realize Connected Vehicle Society. Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan

To realize Connected Vehicle Society. Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan To realize Connected Vehicle Society Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan Services provided by Connected Vehicle 1 Vehicle 5G V2X Connected Vehicle Big Data AI

More information

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 50 Connected Vehicles II So, now we are going to continue

More information

Status of the ecall initiative

Status of the ecall initiative Status of the ecall initiative IMCO Committee Brussels, 24/01/12 Thierry Van der Pyl Director European Commission. DG Information Society and Media Background Current status and next steps 2 The pan-european

More information

AWS Webinar. Navigating GDPR Compliance on AWS. Christian Hesse Amazon Web Services

AWS Webinar. Navigating GDPR Compliance on AWS. Christian Hesse Amazon Web Services AWS Webinar Navigating GDPR Compliance on AWS Christian Hesse Amazon Web Services What is the GDPR? What is the GDPR? The "GDPR" is the General Data Protection Regulation, a significant new EU Data Protection

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

DSRC - WAVE. VITMMA10 Okos város MSc mellékspecializáció. Simon Csaba

DSRC - WAVE. VITMMA10 Okos város MSc mellékspecializáció. Simon Csaba DSRC - WAVE VITMMA10 Okos város MSc mellékspecializáció Simon Csaba Overview DSRC Dedicated Short-Range Communications ASTM Standard E2213-03, based on 802.11a ITS communications on 5.9/5.8GHz band WAVE

More information

ETSI ITS Workshop, 7 9 February 2012, Doha

ETSI ITS Workshop, 7 9 February 2012, Doha ETSI ITS Workshop, 7 9 February 2012, Doha Session 3: EC Mandate for CEN and ETSI Standardization Christoph Wöste, Chairman TC ITS WG4 ETSI 2012. All rights reserved WG 4 (Media and Medium Related) Activities

More information

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a

More information

eidas Interoperability Architecture Version November 2015

eidas Interoperability Architecture Version November 2015 eidas Interoperability Architecture Version 1.00 6. November 2015 1 Introduction This document specifies the interoperability components of the eidas-network, i.e. the components necessary to achieve interoperability

More information

DATEX II & Cooperatives systems

DATEX II & Cooperatives systems DATEX II & Cooperatives systems Lan Lin Hitachi Europe SAS ETSI TC ITS WG1 Co-chair www.easyway-its.eu Table of content Cooperative System overview EU mandate 453 and roles of SDOs Standardization activities

More information

ISO INTERNATIONAL STANDARD. Intelligent transport systems Communications access for land mobiles (CALM) Architecture

ISO INTERNATIONAL STANDARD. Intelligent transport systems Communications access for land mobiles (CALM) Architecture INTERNATIONAL STANDARD ISO 21217 First edition 2010-04-15 Intelligent transport systems Communications access for land mobiles (CALM) Architecture Systèmes intelligents de transport Accès aux communications

More information

TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003

TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003 Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET Bornholm, October 2003

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

Standards for C-ITS ESF GmbH, Dr. Hans-Joachim Fischer Fichtenweg 9, D Blaubeuren, Germany

Standards for C-ITS ESF GmbH, Dr. Hans-Joachim Fischer Fichtenweg 9, D Blaubeuren, Germany Introduction Standards for C-ITS ESF GmbH, Dr. Hans-Joachim Fischer Fichtenweg 9, D-89143 Blaubeuren, Germany http://fischer-tech.eu, HJFischer@fischer-tech.eu : document may be reproduced and distributed

More information

DSRC Standards Development in ITU-R and Japan

DSRC Standards Development in ITU-R and Japan DSRC Standards Development in ITU-R and Japan SS30: Future ITS Wireless Communications November 10, 2005 San Francisco, U.S.A. Sam Oyama (Hitachi, Ltd.) ITS Info-Communications Forum, Japan November 10,

More information

The FP7 ITSSv6 Project

The FP7 ITSSv6 Project The FP7 ITSSv6 Project IPv6 ITS Station Stack for Cooperative ITS FOTs http://www.itssv6.eu Coordinated by INRIA (Thierry Ernst) thierry.ernst@mines-paristech.fr Mines ParisTech / INRIA 2012-05-25 ITSSv6:

More information

GLOBAL CYBERSECURITY INDEX 2016

GLOBAL CYBERSECURITY INDEX 2016 GLOBAL CYBERSECURITY INDEX 2016 Objective The Global Cybersecurity Index (GCI) measures each nation state s level of cybersecurity commitment in five main areas: Legal Technical Organizational Capacity

More information

Securing V2X communications with Infineon HSM

Securing V2X communications with Infineon HSM Infineon Security Partner Network Securing V2X communications with Infineon HSM Savari and Infineon The Sign of Trust for V2X Products SLI 97 www.infineon.com/ispn Use case Application context and security

More information

Deployment is underway!

Deployment is underway! Deployment is underway! 15 September 2015 Scandic Hotel Roskilde, Denmark CODECS has received funding from the European Union s Horizon 2020 research and innovation programme under Grant Agreement No 653339.

More information

LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT

LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT André Weimerskirch, Scott Bogard, Debby Bezzina University of Michigan Transportation Research Institute 2901 Baxter Road Ann Arbor,

More information

ISO INTERNATIONAL STANDARD. Intelligent transport systems Communications access for land mobiles (CALM) Mobile wireless broadband using HC-SDMA

ISO INTERNATIONAL STANDARD. Intelligent transport systems Communications access for land mobiles (CALM) Mobile wireless broadband using HC-SDMA INTERNATIONAL STANDARD ISO 25113 First edition 2010-03-01 Intelligent transport systems Communications access for land mobiles (CALM) Mobile wireless broadband using HC-SDMA Systèmes intelligents de transport

More information

Standard For IIUM Wireless Networking

Standard For IIUM Wireless Networking INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM) Document No : IIUM/ITD/ICTPOL/4.3 Effective Date : 13/11/2008 1.0 OBJECTIVE Standard For IIUM Wireless Networking Chapter : Network Status : APPROVED Version

More information

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données INTERNATIONAL STANDARD ISO 15764 First edition 2004-08-15 Road vehicles Extended data link security Véhicules routiers Sécurité étendue de liaison de données Reference number ISO 15764:2004(E) ISO 2004

More information

Certification of EGNSS Timing Receivers and Services

Certification of EGNSS Timing Receivers and Services Certification of EGNSS Timing Receivers and Services Roland Bauernfeind 03.11.2016 International Timing & Sync Forum 2016, Time for a Smart Future NavCert, the GNSS-Certifier for ITS 2006 founded as joint

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

Hybrid Communication in Cooperative ITS

Hybrid Communication in Cooperative ITS Hybrid Communication in Cooperative ITS Our approach to connected vehicles From vehicles & roads to cross-domain operations Friedhelm Ramme Principal Consultant Ericsson Global Competence Hub Content Ericsson

More information

EUROPEAN PLATFORMS AND INITIATIVES FOR C-ITS DEPLOYMENT

EUROPEAN PLATFORMS AND INITIATIVES FOR C-ITS DEPLOYMENT EUROPEAN PLATFORMS AND INITIATIVES FOR C-ITS DEPLOYMENT Dr. Angelos Amditis Research Director, ICCS OUTLINE Introduction C-ITS Platform GEAR2030 Digital Transport & Logistics Forum (DTLF) EC Directive

More information

DIGITIZING INDUSTRY, ICT STANDARDS TO

DIGITIZING INDUSTRY, ICT STANDARDS TO DIGITIZING INDUSTRY, ICT STANDARDS TO DELIVER ON DIGITAL SINGLE MARKET OBJECTIVES ETSI When Standards Support Policy 14 November 2016 Emilio Davila Gonzalez Unit Start ups & Innovation, EC DG Connect 72%

More information

Authentication with Privacy for Connected Cars - A research perspective -

Authentication with Privacy for Connected Cars - A research perspective - Authentication with Privacy for Connected Cars - A research perspective - Mark Manulis Surrey Centre for Cyber Security, Deputy-Director Department of Computer Science University of Surrey sccs.surrey.ac.uk

More information

Update on Security, Privacy and Safety Standards

Update on Security, Privacy and Safety Standards , January 7-12, 2007, San Diego, CA Update on Security, Privacy and Safety Standards HL7 Germany Aspects of Protection and Security after C. Laske Security of personal data (data protection) Protection

More information

EULER Dissemination and Standardization activities

EULER Dissemination and Standardization activities www.euler-project.eu European SDR for wireless in joint security operations EULER Dissemination and Standardization activities Timo Bräysy, CWC/Univ. of Oulu Euler Workshop 26.11.2009 Vision The EULER

More information

Connected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is

Connected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is Press release High-performance IT security solutions protect V2X communication against cyberattacks ESCRYPT GmbH Am Hain 5, 44789 Bochum, Germany Phone: +49 234 43870-200 Press and Public Relations: Martin

More information

Cyber security of automated vehicles

Cyber security of automated vehicles Cyber security of automated vehicles B. Steurich Infineon Technologies Conference Sep. 2017, Berlin Building blocks of automated driving: Cooperation of multiple system and disciplines Data Processing

More information

ECHONET Lite SPECIFICATION. ECHONET Lite System Design Guidelines 2011 (2012) ECHONET CONSORTIUM ALL RIGHTS RESERVED

ECHONET Lite SPECIFICATION. ECHONET Lite System Design Guidelines 2011 (2012) ECHONET CONSORTIUM ALL RIGHTS RESERVED Part V ECHONET Lite System Design Guidelines i 2011 (2012) ALL RIGHTS RESERVED The specifications published by the ECHONET Consortium are established without regard to industrial property rights (e.g.,

More information

WLAN Security Overview

WLAN Security Overview WLAN Security Overview This Chapter Explore the basic terminology of WLAN security. Discuss the organizations that create the standards, certifications, and recommendations that help guide and direct wireless

More information

ETSI Security Standards Workshop January 2006

ETSI Security Standards Workshop January 2006 ETSI Security Standards Workshop January 2006 Charles Brookson ETSI OCG SECURITY CHAIRMAN cbrookson@iee.org 1 ETSI s relations with ITU, IEC & ISO and Standards Bodies International bodies ITU-T ITU-T

More information

Status of activities Joint Working Group on standards for Smart Grids in Europe

Status of activities Joint Working Group on standards for Smart Grids in Europe Status of activities Joint Working Group on standards for Smart Grids in Europe Ralph Sporer Chairman JWG on standards for Smart Grids ETSI - Smart Grids Workshop 5-6 April 2011 Sophia-Antipolis Page 1

More information

Federated Identity Management and Network Virtualization

Federated Identity Management and Network Virtualization Federated Identity Management and Network Virtualization Yang Cui and Kostas Pentikousis 3rd ETSI Future Networks Workshop 10 April 2013 Sophia Antipolis, France The opinions expressed in this presentation

More information

Mobile WiMAX Security

Mobile WiMAX Security WHITE PAPER WHITE PAPER Makes Mobile WiMAX Simple Mobile WiMAX Security Glossary 3 Abstract 5 Introduction to Security in Wireless Networks 6 Data Link Layer Security 8 Authentication 8 Security Association

More information

Request for Comments: K. Norrman Ericsson June 2006

Request for Comments: K. Norrman Ericsson June 2006 Network Working Group Request for Comments: 4563 Category: Standards Track E. Carrara KTH V. Lehtovirta K. Norrman Ericsson June 2006 The Key ID Information Type for the General Extension Payload in Multimedia

More information

OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE. Dr. Angelos Amditis Research Director, ICCS

OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE. Dr. Angelos Amditis Research Director, ICCS OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE Dr. Angelos Amditis Research Director, ICCS OUTLINE Introduction L3Pilot: Pilot Testing INFRAMIX: Hybrid Infrastructure SAFERtec:Cyber-security / Security

More information