Car2Car Communication Consortium C2C-CC
|
|
- Duane Chandler
- 6 years ago
- Views:
Transcription
1 Car2Car Communication Consortium C2C-CC Secure Vehicular Communication: Results and Challenges Ahead February 20th/21st 2008, Lausanne Benjamin Weyl BMW Group Research and Technology Chair C2C-CC Security & Middleware Working Group
2 Benjamin Weyl BMW Group Research and Technology Page 2 Networking and communication. New applications in driver assistance. A well connected driver is a well informed driver is a safer driver.
3 Agenda C2C-CC Overview Security Discussion Areas and Technical Scope C2C-CC Baseline Concepts & Solution Space Summary, Conclusion and Challenges Ahead C2C-CC Security WG 3
4 Who is behind C2C-CC? C2C-CC Security WG 4
5 C2C-CC Goals The C2C-CC is a non-profit industry forum driven by the Automobile manufacturers (OEMs). Among its main purposes are: to work together for more safety on the road jointly driving development, harmonization and adoptoin of technologies for Car2Car systems is to establish an open European industry standard for a Car2Car communication system, coordinating the approach towards and drive standardizing and regulating those technologies, is to promote the allocation of royalty-free European-wide frequency band for Car2Car applications is to enable the development of an open system supporting active safety applications as well as a broad range of information services is to take into consideration worldwide related activities is to develop realistic deployment strategies and business models to speed-up the market penetration C2C-CC Security WG 5
6 C2C-CC Applications The C2C-CC is looking at a broad range of applications: Critical safety applications requiring a dedicated frequency band, such as intersection assistance, traffic merging, forward collision warning/avoidance Safety, and other public applications, such as traffic flow improvement Commercial applications, such as infotainment or generic internet connectivity Proprietary applications, such as telemetry and telediagnostics Priorities and interests: Key motivation is to standardize safety applications Agree and standardize essential non-safety applications Ensure co-existence with all other applications Accommodate commercial and public applications, allowing for multiple business models potentially pursued by OEMs and other stakeholders C2C-CC Security WG 6
7 C2C-CC: Frequency Allocation Status C2C-CC Security WG 7
8 C2C-CC: Protocol Architecture Active Safety Application Traffic Efficiency Application Infotainment Application Car2Car Transport TCP / UDP / Other Car2Car Network IPv6 Option Mobile IPv6 NEMO MAC / LLC Car2Car MAC Layer Extension European IEEE p PHY European IEEE p Car2Car Network MAC / LLC IEEE a,b,g PHY IEEE a,b,g Other Radio (e.g UMTS) C2C-CC Security WG 8
9 C2C-CC reference model I3 I7 C2C Service Infrast. Vehicle I2 Road-Side Unit I8 C2C IPv6 Backbone I9 I10 C2C OSS I12 I1 I5 I11 Vehicle I6 I4 Telco IPv6 Backbone, incl. heterog. access network Telco SPP Other Service Infrast C2C-CC Security WG 9
10 C2C-CC Cooperation Japan USA VSC VII AHSRA AVS3 ASV3 ISO IEEE CEN ETSI European Projects CarTALK2000 GST Prevent EASIS DAIDALOS Safespot? CIVIS CVIS? COMeSafety SeVeCom? Legislation Member States Standardization Frequency Regulation CEPT ITU AIDA NOW Invent FleetNet INFONEBBIA National Projects Suppl. Veh. Manf. Telco Road Insurance Stakeholders C2C-CC Security WG 10
11 Overview of Security discussion areas Trust Privacy Prot. Concepts Limited Confidentiality Liability Privacy Legisl. Identity Managem. Legislation Law Enforcement Acceptance C2C-CC Security Business Models End User Commercial Req. Credibility Partnerships Operational Concepts Regulation IEEE IETF W3C Standards Oasis Open / Liberty All. Infrastructure Telco Platforms Secure Onboard Env. ISO ETSI 3GPP PKI C2C-CC Security WG 11
12 Security Motivation: Simulated Attack Scenario Simulation: 400 honest vehicles variable number of attackers randomly put in scenario Results: 3 attackers have hit already 20% honest vehicles 10 attackers are able to interfere 50% of honest vehicles C2C-CC Security WG 12
13 Technical Scope of Security Attacks on in-vehicular system infrastructure must ensure not to be illegally tampered with: Attacks on internal vehicle infrastructure via physical access Attacks on internal vehicle system via wireless interface prevent that safety critical systems can not be influenced The attacks on external communication: must be prevented or at least detected and contained, so that fake messages are properly identified and eliminated before influencing applications C2C-CC Security WG 13
14 C2C-CC Security Baselines Trustworthy dissemination of data Integrity of messages Authenticity ensuring trustworthiness of the data Access control (node isolation) Confidentiality only where applicable Availability and timely delivery while observing Privacy: Identity concealment e.g. to provide person/location privacy Over all layers: From PHY/MAC to application Multiple identities may need to be managed Vehicle identity in C2C-CC specific environment Vehicle identity in telco environment Vehicle identity in current legal framework C2C-CC Security WG 14
15 Confidentiality Usually not: C2C-CC information shall be openly shared to improve traffic efficiency and road safety Messages need to be authentic, but their contents needn t be encrypted Potential exception: where closed group communication can be more efficiently addressed through temporary peer authentication and subsequent secure session But: this is dependent on business models Infrastructure deployment may ride on business models requiring exclusive access to information Proprietary use cases co-existing with standardized use cases C2C-CC Security WG 15
16 Privacy Relevant for vehicles, not RSU Protect against typical privacy-infringing malicious profiling or accidental eavesdropping Ensure system maintainability and stability: Allow faulty/malicious vehicles to be identified and excluded Provide respective scalable re-keying mechanisms Constraints: Location plausibility verification and inference from recorded message stream is possible so why care about unlinkability of messages? Can this be countered for selected applications in areas and/or situations where recording is likely? C2C-CC Security WG 16
17 C2C-CC Baseline: Addressing & Identities For operational reasons we need Fixed addresses per vehicle IPv6 and/or Unique Vehicle ID Permanent unique certificate per vehicle But we mustn t disclose them in communication over the air. Hence we also need ID-hopping: temporary addresses, in particular MAC & IP Short-lived certificates Considering scalability and efficiency C2C-CC Security WG 17
18 Comparison of Technical Solutions Scalability Signature Length Computation Effort Privacy PKI + Digital Signatures Fixed Pseudonym Pool PKI + Dynamic Pseudonyms PKI + Group Signatures C2C-CC Security WG 18
19 Key, Certificate, and Identity Management C2C Service Infrast. Vehicle Keys Certificates Trustworthy Message Exchange Road-Side Unit Keys Certificates C2C IPv6 Backbone C2C OSS Key Management Trustworthy Message Exchange Keys Certificates SIM Vehicle Telco IPv6 Backbone, incl. heterog. access network Identity Federation Telco SPP Other Service Infrast C2C-CC Security WG 19
20 Summary: Baseline for C2C-CC Security Addressing: One permanent set (private) One temporary set (used in over-the-air communication) Trust and Privacy: Signing C2X-Messages One pseudonym certificate per vehicle, regularly updated Security standards involved TPM, PKI, ECC (desirable) Pseudonym protocols under discussion Technologies/standards to look at for C2I: SIM IPv6, EAP, DIAMETER, PANA (IETF) SAML (OASIS), Liberty Alliance , etc. But Technical concepts must follow commercial/political discussion Regulation and Legislation Business modeling, policies, and operational concepts Ensure user acceptance and credibility C2C-CC Security WG 20
21 Conclusion C2C-CC Security WG activities: Technical and non-technical security discussion areas Analysis of security use cases and requirements Development and harmonization of security measures for secure and privacy preserving Car2X communication C2C-CC Sec WG has specified a Work Item within ETSI TC ITS WG5 Security for privacy preserving trustworthy message exchange Approach for preserving privacy based on: Pseudonym-based signed messaged exchange Integrated with Telco-platforms where applicable Integrated with application-specific infrastructure such as e.g. traffic management systems C2C-CC Security WG 21
22 Challenges Ahead Privacy: Research on pseudonym change rates Integration over all layers Efficient distribution techniques Integration of different identity management concepts Fake messages sent out from a node: Prevention or at least detection and containment of attack Secure node architecture employing soft- and hardware measures Applying plausibility checks Commercial and political discussion: Possible operational models Regulation and legislation C2C-CC Security WG 22
23 Further Information C2C-CC Security WG 23
24 Benjamin Weyl BMW Group Research and Technology Page 24 Thank you for your attention. Benjamin Weyl Chair WG Security & Middleware BMW Group Research and Technology
COMeSafety Specific Support Action
COMeSafety Specific Support Action Towards a Common European Communication Architecture for for Cooperative Systems Current Status, Major Issues, Next Steps Dr. Dr. Timo Timo Kosch Kosch BMW BMW Group
More informationSecure Vehicle Communication. SEVECOM (SE-cure VE-hicle COM-munication) General Introduction SEVECOM General Introduction
Secure Vehicle Communication SEVECOM (SE-cure VE-hicle COM-munication) General Introduction 1 Outline Vehicle Communication Security and Privacy Threats Research topics Preliminary results 2 Vehicle Communication
More informationDr. Panos Papadimitratos
Dr. Panos Papadimitratos Ecole Polytechnique Fédéral de Lausanne (EPFL) 2 Security in Vehicle-to-Vehicle (V2V) and Vehicle-to- Infrastructure (V2I) Communications Security and Privacy Why? 3 o Safety (?)
More informationSecurity of vehicular communications. Vehicular communication (VC) systems
Security of vehicular communications vehicular safety communications design constraints attacker classes desired security services a security architecture Vehicular communication (VC) systems motivations:
More informationSecurity and Privacy in Car2Car Adhoc Networks
Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com 15/06/2016 1 Introduction French SME Involved since 2002 in security and privacy for connected vehicles 15/06/2016 2
More informationCOMeSafety Specific Support Action
COMeSafety Specific Support Action ITS Consolidation and Standardization Common Architecture Dr. Andreas Lübke, Volkswagen AG February 5th, 2009 Outline Introduction COMeSafety Goals Partners Consolidation
More informationCar2Car Forum Operational Security
Car2Car Forum 2012 14.11.2012 Operational Security Stefan Goetz, Continental Hervé Seudié, Bosch Working Group Security Task Force: In-vehicle Security and Trust Assurance Level 15/11/2012 C2C-CC Security
More informationCOOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY
COOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY ETSI IoT Security WORKSHOP, 13 15 June 2016 Brigitte LONC, RENAULT ETSI TC ITS WG 5 Chairman ETSI 2016.
More informationSichere Intelligente Mobilität - Testfeld Deutschland. Safe Intelligent Mobility Field Test Germany
Sichere Intelligente Mobilität Testfeld Deutschland Safe Intelligent Mobility Field Test Germany The German Approach to Field Testing of Cooperative Systems Dr. Christian Weiß Daimler AG Group Research
More informationThe GeoNet project: Combination of IPv6 & GeoNetworking
The GeoNet project: Combination of IPv6 & GeoNetworking Geographic addressing and routing for vehicular communications http://www.geonet-project.eu Dr. Thierry Ernst INRIA Mines ParisTech (LaRA) GeoNet
More informationIntelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014
Intelligent Transportation Systems Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014 Outline Wireless Access for Vehicular Environments (WAVE) IEEE 802.11p IEEE
More informationSichere Intelligente Mobilität - Testfeld Deutschland. Safe Intelligent Mobility Field Test Germany
1 Sichere Intelligente Mobilität Testfeld Deutschland Safe Intelligent Mobility Field Test Germany The German Approach to Field Testing of Cooperative Systems Matthias Schulze Daimler AG Group Research
More informationEUROPEAN STANDARD Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 3: Network Architecture
EN 302 636-3 V1.2.1 (2014-12) EUROPEAN STANDARD Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 3: Network Architecture 2 EN 302 636-3 V1.2.1 (2014-12) Reference REN/ITS-0030034
More informationEconomic and Social Council
United Nations Economic and Social Council ECE/TRANS/WP.29/2017/46 Distr.: General 23 December 2016 Original: English Economic Commission for Europe Inland Transport Committee World Forum for Harmonization
More informationCooperative Mobility and the importance of harmonised international standards
Cooperative Mobility and the importance of harmonised international standards 2 nd ETSI TC ITS Workshop Sophia Antipolis, 10-12/02/2010 Juhani Jääskeläinen Head of Unit, ICT or Transport European Commission
More informationITS Standardization. Oyunchimeg Shagdar, Inria Thierry Ernst, Mines Paris Tech
ITS Standardization Oyunchimeg Shagdar, Inria Thierry Ernst, Mines Paris Tech JNCT: Les Journées Nationales des Communication dans les Transports 29 Mai 2013 ITS: Intelligent Transportations Systems Systems
More informationIntroduction to VANET
VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of
More informationVPKIs: State-of-the-Art, Challenges and Extensions
VPKIs: State-of-the-Art, Challenges and Extensions VPKIs: State-of-the-Art, Challenges and Extensions Hongyu Jin, Mohammad Khodaei and Panos Papadimitratos Networked Systems Security Group www.ee.kth.se/nss
More informationProf. Dr. Ralf Guido Herrtwich, Daimler AG, Sindelfingen, Germany
The Role of the automotive industry in standardization activities and the business perspective of co-operative systems 3 rd ETSI TC ITS Workshop February 2011 Venice, Italy Prof. Dr. Ralf Guido Herrtwich,
More informationThe international CETECOM Group. ETSI ITS Workshop 2013 Session 4 Testing and Certification CETECOM ITS Service Partner Ulrich Keuling, CETECOM
The international CETECOM Group ETSI ITS Workshop 2013 Session 4 Testing and Certification CETECOM ITS Service Partner Ulrich Keuling, CETECOM Wireless Car Connectivity 2 Driving factors behind Car Connectivity
More informationCooperative ITS Corridor Joint Deployment
Cooperative ITS Corridor Joint Deployment Secure V2X Communication Glasgow, June 8th 2016 Markus Ullmann Federal Office for Information Security (BSI) Outline Cooperative Intelligent Transport System (C-ITS)
More informationC2X congress C-ITS standards
Elektrische Signalverarbeitung Dr. Fischer GmbH C2X congress C-ITS standards Frankfurt 1. March 2016 1.3.2016 C-ITS standards 1 The purpose of standards? 1. Interoperability: Specification of interfaces
More informationETSI G5 technology: the European approach. Date: 13 th June 2013 Name: Lan LIN Position: Senior Researcher Organisation: Hitachi Europe SAS.
ETSI G5 technology: the European approach Date: 13 th June 2013 Name: Lan LIN Position: Senior Researcher Organisation: Hitachi Europe SAS. Outlines Background Motivations Technical insignts Conclusion
More informationISO TC204 WG 16: The CALM Architecture. INRIA IMARA project-team / JRU LARA.
ISO TC204 WG 16: The CALM Architecture Thierry.Ernst@inria.fr INRIA IMARA project-team / JRU LARA http://www.lara.prd.fr ISO TC204 WG16: CALM ISO Technical Committee 204: Currently 12 active WGs http://www.sae.org/technicalcommittees/tc204wg16.htm
More informationStandards for Cooperative ITS: A Proof of Concept
Standards for Cooperative ITS: A Proof of Concept Presented by Thierry Ernst Mines ParisTech Authored by Rodrigo Silva, Satoru Noguchi Thierry Ernst, Arnaud de La Fortelle, Walter Godoy Jr AICT 2014 Paris
More informationA Perspective on V2X in the United States
A Perspective on V2X in the United States John B. Kenney, Ph.D Director and Principal Researcher Toyota InfoTechnology Center, USA jkenney@us.toyota-itc.com November 14, 2017 SIP-adus Workshop on Connected
More informationThe current status of Esi TC and the future of electronic signatures
SG&A ETSI FUTURE WORKSHOP Sophia Antipolis, 16th January 2006 The current status of Esi TC and the future of electronic signatures Riccardo Genghini, Chairman of Etsi Esi TC riccardo.genghini@sng.it The
More informationAutomotive Industry: Why the ITS B usinesses Need to C are about IPv6?
Automotive Industry: Why the ITS B usinesses Need to C are about IPv6? i.e. a presentation on IPv6 and C ooperative ITS Thierry.Ernst@inria.fr JRU LARA (INR IA & M ines ParisTech) http://www.lara.prd.fr/ipv6-its
More informationAutomotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017
Automotive Security: Challenges, Standards and Solutions Alexander Much 12 October 2017 Driver s fears are being fueled by recent news Connected Cars, new opportunities for hackers Autonomous Driving Concepts
More informationSSL/TSL EV Certificates
SSL/TSL EV Certificates CA/Browser Forum Exploratory seminar on e-signatures for e-business in the South Mediterranean region 11-12 November 2013, Amman, Jordan Moudrick DADASHOW CEO, Skaitmeninio Sertifikavimo
More informationApplying Lessons Learned to V2X Communications for China
Jim Misener Director, Technical Standards Qualcomm Technologies, Inc. Applying Lessons Learned to V2X Communications for China 2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All
More informationDSRC and Ad-hoc Network development in Japan
DSRC and Ad-hoc Network development in Japan September 2, 2005 Cologne, Germany Satoshi Oyama (Hitachi, Ltd.) ITS Info-Communications Forum, Japan September 2, 2005 1 Contents DSRC Standards in Japan DSRC
More informationVANETs. Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe
VANETs Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe April 15 th 2005 Marc Torrent Moreno 1 Main Motivation
More informationPrivacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH
Privacy in Vehicular Ad-hoc Networks Nikolaos Alexiou, LCN, EE KTH alexiou@kth.se 2/10/2012 Outline Introduction VANETs: an overview VANET privacy - Anonymity - Location Privacy - VPKI Privacy Attacks
More informationIntroduction to Vehicular Networks
CS 795/895 Vehicular Networks Introduction to Vehicular Networks Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/courses/cs795-s07/
More informationThird public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy
Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy 14 February 2017 Amsterdam Gerhard Menzel European Commission - DG MOVE Scope:
More informationRoberto Brignolo The SAFESPOT Integrated Project: Overview of the architecture, technologies and applications
Roberto Brignolo The SAFESPOT Integrated Project: Overview of the architecture, technologies and applications General figures 2 Project type: Integrated Project (IP) Co-funded by: the European Commission
More informationEuropean Activities towards Cooperative Mobility
European Activities towards Cooperative Mobility CARS 21 WG1 MEETING Brussels, 21 February 2011 Juhani Jääskeläinen Head of Unit, ICT for Transport European Commission Directorate General Information Society
More informationUpdate of C2C-CC Requirements for NEMO Route Optimization
Update of C2C-CC Requirements for NEMO Route Optimization draft-baldessari-c2ccc-nemo-req-01 IETF-69-26/07/2007 - NEMO WG Roberto Baldessari NEC Europe Ltd. Heidelberg Andreas Festag NEC Deutschland GmbH
More informationISO INTERNATIONAL STANDARD. Intelligent transport systems Communications access for land mobiles (CALM) Mobile wireless broadband using HC-SDMA
INTERNATIONAL STANDARD ISO 25113 First edition 2010-03-01 Intelligent transport systems Communications access for land mobiles (CALM) Mobile wireless broadband using HC-SDMA Systèmes intelligents de transport
More informationAll rights reserved. ITS at ETSI. Presented by Luis Jorge Romero on behalf of ETSI TC ITS
http://eustandards.in/ ITS at ETSI Presented by Luis Jorge Romero on behalf of ETSI TC ITS 2 All rights reserved ITS: a definition ITS means applying Information and Communications Technologies (ICT) to
More informationVehicular Networking
Vehicular Networking Christoph Sommer http://www.ccs labs.org/~sommer/ IAB Technical Plenary 93 rd IETF July 2015 Prague Motivation Illustration: C2C-CC Illustration: C2C-CC Illustration: Project AKTIV
More informationGPRS and UMTS T
GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,
More informationWi SUN Technology and Certification Phil Beecher, President and CEO March 2018
Wi SUN Technology and Certification Phil Beecher, President and CEO March 2018 Wi SUN Alliance was established in April 2012 Incorporated as Not for Profit Organization (501c) in Delaware, US Regional
More informationC2X Security. Introduction and overview (focus to European standard only) Cryptovision s Mindshare V
C2X Security Introduction and overview (focus to European standard only) Cryptovision s Mindshare 2015-06-24 V1.00 2015-06-24 Agenda What is Car2x Communication? Standards Security concepts C2X-PKI 2/30
More informationNIS Standardisation ENISA view
NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number
More informationETSI TC ITS WORKSHOP February 2011 Venice Italy. ETSI All rights reserved
ETSI TC ITS WORKSHOP 09-11 February 2011 Venice Italy ETSI 2011. All rights reserved WG1 STANDARDIZATION ACTIVITIES Lan LIN, Hitachi, ETSI TC ITS WG1 Vice-Chairman ETSI 2011. All rights reserved Transportation
More information3GPP security. Valtteri Niemi 3GPP SA3 (Security) chairman Nokia
3GPP security Valtteri Niemi 3GPP SA3 (Security) chairman Nokia 1 Some history and background 2 Some history 1/2 SA3 took over the responsibility of specifications created by ETSI SMG10, e.g. TS 43.020
More informationCVIS. CVIS Chief Architect Dallas 14. November 2006
CVIS Knut.Evensen@Q-Free.com CVIS Chief Architect Dallas 14. November 2006 European R&D projects supported by DG INFSO Coordinator: ERTICO Total budget: 41 Million EC contribution: 22 Million Consortium:
More informationHow do you decide what s best for you?
How do you decide what s best for you? Experience Transparency Leadership Commitment Cost reduction Security Trustworthiness Credibility Confidence Reliability Compliance Privacy Expertise Flexibility
More informationIdentity Management. Rolf Blom Ericsson Research
Identity Management Rolf Blom Ericsson Research Identity Management Agenda What is a Digital Identity Why Identity Management Identity Management Roles and technology User attitudes User Requirements Standardization
More informationCAMP. Intelligent Transportation Systems. A Security Credential Management System for Vehicle-to-Vehicle Communications
CAMP Vehicle Safety Communications 3 Intelligent Transportation Systems A Security Credential Management System for Vehicle-to-Vehicle Communications William Whyte (Security Innovation); André Weimerskirch
More informationOPENWAVE ENGINE / WSU - A PLATFORM FOR C2C-CC
OPENWAVE ENGINE / WSU - A PLATFORM FOR C2C-CC Robert Lasowski, Tim Leinmüller + and Markus Strassberger Cirquent GmbH, robert.lasowski@cirquent.de + DENSO AUTOMOTIVE Deutschland GmbH, Technical Research
More informationThe WAVE Communications Stack: IEEE p, and, September, 2007
The WAVE Communications Stack: IEEE 802.11p, 1609.4 and, 1609.3 September, 2007 WAVE System Components External Systems ROAD SIDE UNIT Covered by WAVE Standards ON-BOARD UNITS External Systems Host Host
More informationTrusted Platform for Mobile Devices: Challenges and Solutions
Trusted Platform for Mobile Devices: Challenges and Solutions Lily Chen Motorola Inc. May 13, 2005 Outline Introduction Challenges for a trusted platform Current solutions Standard activities Summary New
More informationSybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks
Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks D.Balamahalakshmi Department of Computer Science and Engineering, V.S.B Engineering College, Karur, Tamilnadu, India 1
More informationSecure Ethernet Communication for Autonomous Driving. Jared Combs June 2016
Secure Ethernet Communication for Autonomous Driving Jared Combs June 2016 Agenda Motivation for Security The Multi-Level Security Architecture Proposal Level 1: Restrict access to the network Level 2:
More informationV2X standardization and deployment: viewpoint of a system provider
V2X standardization and deployment: viewpoint of a system provider Les Journées Nationales des Communications dans les Transports, JNCT 2013 29 th May 2013 Lan LIN lan.lin@hitachi-eu.com, FRANCE All Rights
More informationVehicle Networks. V2X communication protocols. Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl
Vehicle Networks V2X communication protocols Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl Outline Wireless Access for Vehicular Environments (WAVE) IEEE 802.11p IEEE 1609.1-4 SAE 2735 Car-2-Car
More informationTo realize Connected Vehicle Society. Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan
To realize Connected Vehicle Society Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan Services provided by Connected Vehicle 1 Vehicle 5G V2X Connected Vehicle Big Data AI
More informationIntroduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur
Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 50 Connected Vehicles II So, now we are going to continue
More informationStatus of the ecall initiative
Status of the ecall initiative IMCO Committee Brussels, 24/01/12 Thierry Van der Pyl Director European Commission. DG Information Society and Media Background Current status and next steps 2 The pan-european
More informationAWS Webinar. Navigating GDPR Compliance on AWS. Christian Hesse Amazon Web Services
AWS Webinar Navigating GDPR Compliance on AWS Christian Hesse Amazon Web Services What is the GDPR? What is the GDPR? The "GDPR" is the General Data Protection Regulation, a significant new EU Data Protection
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationDSRC - WAVE. VITMMA10 Okos város MSc mellékspecializáció. Simon Csaba
DSRC - WAVE VITMMA10 Okos város MSc mellékspecializáció Simon Csaba Overview DSRC Dedicated Short-Range Communications ASTM Standard E2213-03, based on 802.11a ITS communications on 5.9/5.8GHz band WAVE
More informationETSI ITS Workshop, 7 9 February 2012, Doha
ETSI ITS Workshop, 7 9 February 2012, Doha Session 3: EC Mandate for CEN and ETSI Standardization Christoph Wöste, Chairman TC ITS WG4 ETSI 2012. All rights reserved WG 4 (Media and Medium Related) Activities
More informationVdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe
Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a
More informationeidas Interoperability Architecture Version November 2015
eidas Interoperability Architecture Version 1.00 6. November 2015 1 Introduction This document specifies the interoperability components of the eidas-network, i.e. the components necessary to achieve interoperability
More informationDATEX II & Cooperatives systems
DATEX II & Cooperatives systems Lan Lin Hitachi Europe SAS ETSI TC ITS WG1 Co-chair www.easyway-its.eu Table of content Cooperative System overview EU mandate 453 and roles of SDOs Standardization activities
More informationISO INTERNATIONAL STANDARD. Intelligent transport systems Communications access for land mobiles (CALM) Architecture
INTERNATIONAL STANDARD ISO 21217 First edition 2010-04-15 Intelligent transport systems Communications access for land mobiles (CALM) Architecture Systèmes intelligents de transport Accès aux communications
More informationTECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET Bornholm, October 2003
More informationSecurity and resilience in Information Society: the European approach
Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments
More informationStandards for C-ITS ESF GmbH, Dr. Hans-Joachim Fischer Fichtenweg 9, D Blaubeuren, Germany
Introduction Standards for C-ITS ESF GmbH, Dr. Hans-Joachim Fischer Fichtenweg 9, D-89143 Blaubeuren, Germany http://fischer-tech.eu, HJFischer@fischer-tech.eu : document may be reproduced and distributed
More informationDSRC Standards Development in ITU-R and Japan
DSRC Standards Development in ITU-R and Japan SS30: Future ITS Wireless Communications November 10, 2005 San Francisco, U.S.A. Sam Oyama (Hitachi, Ltd.) ITS Info-Communications Forum, Japan November 10,
More informationThe FP7 ITSSv6 Project
The FP7 ITSSv6 Project IPv6 ITS Station Stack for Cooperative ITS FOTs http://www.itssv6.eu Coordinated by INRIA (Thierry Ernst) thierry.ernst@mines-paristech.fr Mines ParisTech / INRIA 2012-05-25 ITSSv6:
More informationGLOBAL CYBERSECURITY INDEX 2016
GLOBAL CYBERSECURITY INDEX 2016 Objective The Global Cybersecurity Index (GCI) measures each nation state s level of cybersecurity commitment in five main areas: Legal Technical Organizational Capacity
More informationSecuring V2X communications with Infineon HSM
Infineon Security Partner Network Securing V2X communications with Infineon HSM Savari and Infineon The Sign of Trust for V2X Products SLI 97 www.infineon.com/ispn Use case Application context and security
More informationDeployment is underway!
Deployment is underway! 15 September 2015 Scandic Hotel Roskilde, Denmark CODECS has received funding from the European Union s Horizon 2020 research and innovation programme under Grant Agreement No 653339.
More informationLESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT
LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT André Weimerskirch, Scott Bogard, Debby Bezzina University of Michigan Transportation Research Institute 2901 Baxter Road Ann Arbor,
More informationISO INTERNATIONAL STANDARD. Intelligent transport systems Communications access for land mobiles (CALM) Mobile wireless broadband using HC-SDMA
INTERNATIONAL STANDARD ISO 25113 First edition 2010-03-01 Intelligent transport systems Communications access for land mobiles (CALM) Mobile wireless broadband using HC-SDMA Systèmes intelligents de transport
More informationStandard For IIUM Wireless Networking
INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM) Document No : IIUM/ITD/ICTPOL/4.3 Effective Date : 13/11/2008 1.0 OBJECTIVE Standard For IIUM Wireless Networking Chapter : Network Status : APPROVED Version
More informationISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données
INTERNATIONAL STANDARD ISO 15764 First edition 2004-08-15 Road vehicles Extended data link security Véhicules routiers Sécurité étendue de liaison de données Reference number ISO 15764:2004(E) ISO 2004
More informationCertification of EGNSS Timing Receivers and Services
Certification of EGNSS Timing Receivers and Services Roland Bauernfeind 03.11.2016 International Timing & Sync Forum 2016, Time for a Smart Future NavCert, the GNSS-Certifier for ITS 2006 founded as joint
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationHybrid Communication in Cooperative ITS
Hybrid Communication in Cooperative ITS Our approach to connected vehicles From vehicles & roads to cross-domain operations Friedhelm Ramme Principal Consultant Ericsson Global Competence Hub Content Ericsson
More informationEUROPEAN PLATFORMS AND INITIATIVES FOR C-ITS DEPLOYMENT
EUROPEAN PLATFORMS AND INITIATIVES FOR C-ITS DEPLOYMENT Dr. Angelos Amditis Research Director, ICCS OUTLINE Introduction C-ITS Platform GEAR2030 Digital Transport & Logistics Forum (DTLF) EC Directive
More informationDIGITIZING INDUSTRY, ICT STANDARDS TO
DIGITIZING INDUSTRY, ICT STANDARDS TO DELIVER ON DIGITAL SINGLE MARKET OBJECTIVES ETSI When Standards Support Policy 14 November 2016 Emilio Davila Gonzalez Unit Start ups & Innovation, EC DG Connect 72%
More informationAuthentication with Privacy for Connected Cars - A research perspective -
Authentication with Privacy for Connected Cars - A research perspective - Mark Manulis Surrey Centre for Cyber Security, Deputy-Director Department of Computer Science University of Surrey sccs.surrey.ac.uk
More informationUpdate on Security, Privacy and Safety Standards
, January 7-12, 2007, San Diego, CA Update on Security, Privacy and Safety Standards HL7 Germany Aspects of Protection and Security after C. Laske Security of personal data (data protection) Protection
More informationEULER Dissemination and Standardization activities
www.euler-project.eu European SDR for wireless in joint security operations EULER Dissemination and Standardization activities Timo Bräysy, CWC/Univ. of Oulu Euler Workshop 26.11.2009 Vision The EULER
More informationConnected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is
Press release High-performance IT security solutions protect V2X communication against cyberattacks ESCRYPT GmbH Am Hain 5, 44789 Bochum, Germany Phone: +49 234 43870-200 Press and Public Relations: Martin
More informationCyber security of automated vehicles
Cyber security of automated vehicles B. Steurich Infineon Technologies Conference Sep. 2017, Berlin Building blocks of automated driving: Cooperation of multiple system and disciplines Data Processing
More informationECHONET Lite SPECIFICATION. ECHONET Lite System Design Guidelines 2011 (2012) ECHONET CONSORTIUM ALL RIGHTS RESERVED
Part V ECHONET Lite System Design Guidelines i 2011 (2012) ALL RIGHTS RESERVED The specifications published by the ECHONET Consortium are established without regard to industrial property rights (e.g.,
More informationWLAN Security Overview
WLAN Security Overview This Chapter Explore the basic terminology of WLAN security. Discuss the organizations that create the standards, certifications, and recommendations that help guide and direct wireless
More informationETSI Security Standards Workshop January 2006
ETSI Security Standards Workshop January 2006 Charles Brookson ETSI OCG SECURITY CHAIRMAN cbrookson@iee.org 1 ETSI s relations with ITU, IEC & ISO and Standards Bodies International bodies ITU-T ITU-T
More informationStatus of activities Joint Working Group on standards for Smart Grids in Europe
Status of activities Joint Working Group on standards for Smart Grids in Europe Ralph Sporer Chairman JWG on standards for Smart Grids ETSI - Smart Grids Workshop 5-6 April 2011 Sophia-Antipolis Page 1
More informationFederated Identity Management and Network Virtualization
Federated Identity Management and Network Virtualization Yang Cui and Kostas Pentikousis 3rd ETSI Future Networks Workshop 10 April 2013 Sophia Antipolis, France The opinions expressed in this presentation
More informationMobile WiMAX Security
WHITE PAPER WHITE PAPER Makes Mobile WiMAX Simple Mobile WiMAX Security Glossary 3 Abstract 5 Introduction to Security in Wireless Networks 6 Data Link Layer Security 8 Authentication 8 Security Association
More informationRequest for Comments: K. Norrman Ericsson June 2006
Network Working Group Request for Comments: 4563 Category: Standards Track E. Carrara KTH V. Lehtovirta K. Norrman Ericsson June 2006 The Key ID Information Type for the General Extension Payload in Multimedia
More informationOVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE. Dr. Angelos Amditis Research Director, ICCS
OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE Dr. Angelos Amditis Research Director, ICCS OUTLINE Introduction L3Pilot: Pilot Testing INFRAMIX: Hybrid Infrastructure SAFERtec:Cyber-security / Security
More information