Cooperative ITS Corridor Joint Deployment
|
|
- Rodney May
- 6 years ago
- Views:
Transcription
1 Cooperative ITS Corridor Joint Deployment Secure V2X Communication Glasgow, June 8th 2016 Markus Ullmann Federal Office for Information Security (BSI)
2 Outline Cooperative Intelligent Transport System (C-ITS) Corridor Project Rotterdam-Frankfurt-Vienna Use Cases Secure Vehicle-2-Vehicle Communication (V2V) according to ETSI Shortcomings of the existing ETSI Specifications Secure V2X Communication Secure ITS Roadside Station (IRS) messages (DENM) IRS PKI Domain Conclusion/Future Work Markus Ullmann, Christian Wieschebrink, Dennis Kügler, Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems, Proceedings VEHICULAR 2015, pages 14 19, IARIA 2
3 C-ITS Corridor Project Cooperative ITS Corridor Project Rotterdam-Frankfurt-Vienna (NL-GE-AU) Digitalization of Road Works Warning Use Cases (Broadcast Communication) Send DENM messages to the crossing vehicles Receive CAM / DENM messages of crossing vehicles 3
4 ETSI ITS Architecture ITS roadside stations ITS vehicle stations ITS central stations ITS personal stations 4
5 Secure Vehicle-2-Vehicle Communication Broadcast Communication ETSI ITS Specifications TS V 1.3.2: Cooperative Awareness Message (CAM): Location, Speed, Time,... Header CAM Information ECDSA Signature Certificate TS V 1.2.2: Decentralized Environmental Notification Basis Services (DENM): Warning Header DENM Information ECDSA Signature Certificate TS V 1.2.1: Security header and Certificate formats 5
6 Pseudonym Concept Concept Pseudonymous key pairs/certificates Privacy Requirements Location privacy Message unlinkability 6
7 Decentralized Environmental Notification Basis Services (DENM) 7
8 Secure Vehicular Communication - Keys, Certificates, PKI Identification and Authentication of Vehicles Long term cryptographic key pair (certificate) based on Elliptic Curves (NIST P-256) ETSI Certificate format (not widely used) Issued by Long Term Certification Authority (LTCA) [ETSI: Enrolement Authority] Message Security/Location Privacy Pseudonymous key pairs (certificates) (ECC NIST P-256) ETSI Certificate Format Issued by Pseudonym Certification Authority (PCA) [ETSI: Authorization Authority] 8
9 Shortcomings of the ETSI Specifications Security Cryptographic Setting Missing mechanism for cryptographic update (crypto agility) Elliptic Curve Domain Parameter Hash Function Signature Algorithms, One root PKI for ITS vehicle stations and ITS roadside stations ITS vehicle stations and ITS roadside stations have different (privacy) requirements ETSI certificate format Not widely applied Only NIST-ECC-Domain parameter: Prime Field NIST P-256 (not recommended any more by NSA) Missing properties (role concept, rights,...) Privacy Pseudonym Concept 9
10 Secure ITS Roadside Stations (1) Integration of an electronic gateway Threats to incoming/outgoing messages Availability Jamming,... Authenticity Masquerading, Integrity Injection of forged messages,... Confidentiality Extraction of sensitive information (e.g., cryptographic keys) Threats concerning the integrity of the electronic gateway itself (untrusted environment) Malicious software Extraction of cryptographic keys,... 10
11 Secure ITS Roadside Stations (2) Location Privacy ITS roadside stations are not controlled by an user No Privacy Requirements ==> no pseudonym certificates are needed Instead: Credential Certificate with Identity included (short validity period [~ days] to avoid CRLs) Security Requirements DENM-Security: Message integrity and authentication Protection of the gateways Protection Profile (PP) Identification and authentication (roles) Access Control Short time authorization (credential certificate) 11
12 C-ITS Use Case: Sending DENM messages Short Term Credential Certificate Usage Authorization of ITS roadside station Message integrity and authentication of DENM messages ETSI Certificate format 12
13 IRS PKI Domain (Infrastructure) Identification and Authentication of ITS Roadside station Long term key pair (certificate) based on Elliptic Curves Brainpool curve X.509 V3 certificate format Issued by Long Term Certification Authority (LT-CA) [ETSI: Enrolement Authority] Authorization and Message Authentication Short term key pair (credential certificate) based on Elliptic Curves Brainpool curve ETSI Certificate format Issued by Credential Certification Authority (C-CA) [ETSI: Authorization Authority] 13
14 Conclusion / Future Work Next steps C-ITS Corridor Project (2016) Setup IRS-Pilot PKI for ITS Roadside stations (April, 2016) Equip. RWW gateways with keys/certificates (June, 2016) Test secure V2X communication (Hessen Mobil) Discussion with European Stakeholders EC DG Move C-ITS platform WG5: Preparing Common C-ITS PKI- Policy (~ October 2016) Cryptographic requirements (e.g., ECDSA_brainpoolP256r1_with_SHA256,... ) Certificate validity period Revocation... 14
15 Thank you for your kind attention Suggestions orquestions? Bild: Hessen Mobil Road and Traffic Management
Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems
Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems Markus Ullmann, Christian Wieschebrink and Dennis Kügler Federal Office for Information Security D-53133 Bonn,
More informationCOOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY
COOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY ETSI IoT Security WORKSHOP, 13 15 June 2016 Brigitte LONC, RENAULT ETSI TC ITS WG 5 Chairman ETSI 2016.
More informationSecurity and Privacy in Car2Car Adhoc Networks
Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com 15/06/2016 1 Introduction French SME Involved since 2002 in security and privacy for connected vehicles 15/06/2016 2
More informationCooperative ITS Corridor Joint Deployment
Cooperative ITS Corridor Joint Deployment Amsterdam Group CODECS Workshop Roskilde, 15 September 2015 The official start On 10 June 2013, the Ministers of Transport of the Netherlands, Germany and Austria
More informationTechnical Limitations, and Privacy Shortcomings of the Vehicle-to-Vehicle Communication
Technical Limitations, and Privacy Shortcomings of the Vehicle-to-Vehicle Communication Markus Ullmann, Thomas Strubbe, and Christian Wieschebrink Federal Office for Information Security D-53133 Bonn,
More informationC2X Security. Introduction and overview (focus to European standard only) Cryptovision s Mindshare V
C2X Security Introduction and overview (focus to European standard only) Cryptovision s Mindshare 2015-06-24 V1.00 2015-06-24 Agenda What is Car2x Communication? Standards Security concepts C2X-PKI 2/30
More informationC-ITS Platform WG5: Security & Certification. Final Report
C-ITS Platform WG5: Security & Certification Final Report ANNEX 3: Crypto Agility / Updateability in in Cooperative-Intelligent Transport Systems (C ITS) v1.0 1 Contents 1 Scope... 3 2 Introduction...
More informationPKI AND ROAMING IN ITS
PKI AND ROAMING IN ITS 7th ETSI Security Workshop Sophia Antipolis, France, on 18th 19th January 2012 Prepared by STF423: Scott Cadzow, H.Cruickshank@surrey.ac.uk, Benjamin Glas, Siv-Hilde Houmb, Steve
More informationA GENERIC PUBLIC KEY INFRASTRUCTURE FOR SECURING CAR-TO-X COMMUNICATION
A GENERIC PUBLIC KEY INFRASTRUCTURE FOR SECURING CAR-TO-X COMMUNICATION Norbert Bißmeyer 1, Hagen Stübing 2, Elmar Schoch 3, Stefan Götz 4, Jan Peter Stotz 1, Brigitte Lonc 5 1 Fraunhofer SIT, Secure Mobile
More informationPrivacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH
Privacy in Vehicular Ad-hoc Networks Nikolaos Alexiou, LCN, EE KTH alexiou@kth.se 2/10/2012 Outline Introduction VANETs: an overview VANET privacy - Anonymity - Location Privacy - VPKI Privacy Attacks
More informationETSI TC ITS WORKSHOP February 2011 Venice Italy. ETSI All rights reserved
ETSI TC ITS WORKSHOP 09-11 February 2011 Venice Italy ETSI 2011. All rights reserved WG1 STANDARDIZATION ACTIVITIES Lan LIN, Hitachi, ETSI TC ITS WG1 Vice-Chairman ETSI 2011. All rights reserved Transportation
More informationThird public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy
Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy 14 February 2017 Amsterdam Gerhard Menzel European Commission - DG MOVE Scope:
More informationSecure and Privacy Preserving Vehicular Communication Systems: Identity and Credential Management Infrastructure
KTH ROYAL INSTITUTE OF TECHNOLOGY Secure and Privacy Preserving Vehicular Communication Systems: Identity and Credential Management Infrastructure Mohammad Khodaei and Panos Papadimitratos Networked Systems
More informationETSI G5 technology: the European approach. Date: 13 th June 2013 Name: Lan LIN Position: Senior Researcher Organisation: Hitachi Europe SAS.
ETSI G5 technology: the European approach Date: 13 th June 2013 Name: Lan LIN Position: Senior Researcher Organisation: Hitachi Europe SAS. Outlines Background Motivations Technical insignts Conclusion
More informationEuropean Framework for C-ITS Security 6 th of March 2018 Gerhard Menzel European Commission
European Framework for C-ITS Security 6 th of March 2018 Gerhard Menzel European Commission Key EU Policy Milestones to deliver C-ITS in Europe by 2019 Cooperative Intelligent Transport Systems A European
More informationDr. Panos Papadimitratos
Dr. Panos Papadimitratos Ecole Polytechnique Fédéral de Lausanne (EPFL) 2 Security in Vehicle-to-Vehicle (V2V) and Vehicle-to- Infrastructure (V2I) Communications Security and Privacy Why? 3 o Safety (?)
More informationCertificate Policy for Deployment and Operation of European Cooperative Intelligent Transport Systems (C-ITS)
Result of C-ITS Platform Phase II Certificate Policy for Deployment and Operation of European Cooperative Intelligent Transport Systems (C-ITS) RELEASE 1.1 JUNE 2018 Certificate Policy for Deployment and
More informationCAMP. Intelligent Transportation Systems. A Security Credential Management System for Vehicle-to-Vehicle Communications
CAMP Vehicle Safety Communications 3 Intelligent Transportation Systems A Security Credential Management System for Vehicle-to-Vehicle Communications William Whyte (Security Innovation); André Weimerskirch
More informationEnhanced Management of Certificate Caching and Revocation Lists in VANET
Enhanced Management of Certificate Caching and Revocation Lists in VANET Sadiq H. Abdulhussain Computer Engineering Department College of Engineering University of Baghdad ABSTRACT Vehicular network security
More informationVPKIs: State-of-the-Art, Challenges and Extensions
VPKIs: State-of-the-Art, Challenges and Extensions VPKIs: State-of-the-Art, Challenges and Extensions Hongyu Jin, Mohammad Khodaei and Panos Papadimitratos Networked Systems Security Group www.ee.kth.se/nss
More informationWhere are we with C-ITS today? Joint CIMEC/CODECS City Pool workshop Barcelona, 14 November 2016
Where are we with C-ITS today? Joint CIMEC/CODECS City Pool workshop Barcelona, 14 November 2016 C-ITS - background Substantial effort to develop and deploy C-ITS 200+ million of EU money on projects National-funded
More informationSecuring V2X communications with Infineon HSM
Infineon Security Partner Network Securing V2X communications with Infineon HSM Savari and Infineon The Sign of Trust for V2X Products SLI 97 www.infineon.com/ispn Use case Application context and security
More informationLESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT
LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT André Weimerskirch, Scott Bogard, Debby Bezzina University of Michigan Transportation Research Institute 2901 Baxter Road Ann Arbor,
More informationAll rights reserved. ITS at ETSI. Presented by Luis Jorge Romero on behalf of ETSI TC ITS
http://eustandards.in/ ITS at ETSI Presented by Luis Jorge Romero on behalf of ETSI TC ITS 2 All rights reserved ITS: a definition ITS means applying Information and Communications Technologies (ICT) to
More informationCooperative, Connected and Automated Mobility
Cooperative, Connected and Automated Mobility 1. ITS Deutschland Kongress, Frankfurt 22.11.2017 Gerhard Menzel European Commission - DG MOVE Key EU Policy Milestones to deliver C-ITS in Europe by 2019
More informationNew Services in Mobility: C-ITS
New Services in Mobility: C-ITS UNECE ITS Workshop, 07th of October 2015, Bordeaux Gerhard Menzel European Commission DG Mobility and Unit C3 - Intelligent Systems President Juncker: a target of at least
More informationC-ITS in Europe. Gerhard Menzel, DG MOVE 7th ETSI ITS Workshop 26 th of March 2015, Helmond. Transport
C-ITS in Europe Gerhard Menzel, DG MOVE 7th ETSI ITS Workshop 26 th of March 2015, Helmond Why C-ITS? Cooperative Systems understood as "connected mobility": More Connecting improving enhancing optimising
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 11: Public Key Infrastructure Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Public key infrastructure Certificates Trust
More informationCANoe.Car2x. Product Information
Product Information Table of Contents 1 Introduction... 3 1.1 Benefits at a Glance... 4 1.2 Application Areas... 4 1.3 Further Information... 6 2 Functions... 6 3 Hardware... 10 4 Training... 10 V1.5 02/2017
More informationShort-term Linkable Group Signatures with Categorized Batch Verification
Short-term Linkable Group Signatures with Categorized Batch Verification Lukas Malina 1, Jordi Castella-Rocà 2, Arnau Vives-Guasch 2, Jan Hajny 1 1 Department of Telecommunications Faculty of Electrical
More informationEUROPEAN STANDARD Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 3: Network Architecture
EN 302 636-3 V1.2.1 (2014-12) EUROPEAN STANDARD Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 3: Network Architecture 2 EN 302 636-3 V1.2.1 (2014-12) Reference REN/ITS-0030034
More informationDeployment is underway!
Deployment is underway! 15 September 2015 Scandic Hotel Roskilde, Denmark CODECS has received funding from the European Union s Horizon 2020 research and innovation programme under Grant Agreement No 653339.
More informationNew Security Features in DLMS/COSEM
New Security Features in DLMS/COSEM A comparison to the Smart Meter Gateway Workshop on Power Line Communications 2015 (HRW), Robin Massink (DNV GL), Gerd Bumiller (HRW) 21.09.2015 21.09.2015 1 Initiated
More information5GAA TR A G Automotive Association; Working Group System Architecture and Solution Development; 5GAA V2X Terms and Definitions
5GAA TR A-170188 Technical Report 5G Automotive Association; Working Group System Architecture and Solution Development; 5GAA V2X Terms and Definitions 2. 5GAA Postal address 5GAA address 5GAA c/o MCI
More informationBlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module
BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material
More information5GAA TR A G Automotive Association; Working Group System Architecture and Solution Development; 5GAA V2X Terms and Definitions
5GAA TR A-170188 Technical Report 5G Automotive Association; Working Group System Architecture and Solution Development; 5GAA V2X Terms and Definitions 2. 5GAA Postal address 5GAA address 5GAA c/o MCI
More informationC2X congress C-ITS standards
Elektrische Signalverarbeitung Dr. Fischer GmbH C2X congress C-ITS standards Frankfurt 1. March 2016 1.3.2016 C-ITS standards 1 The purpose of standards? 1. Interoperability: Specification of interfaces
More informationCooperative ITS Corridor Joint Deployment. Serge van Dam Rijkswaterstaat. Update The Netherlands June 2017
Cooperative ITS Corridor Joint Deployment Serge van Dam Rijkswaterstaat Update The Netherlands June 2017 The Netherlands summarystatus Contents Flashback 2015 Developments so far in summary Pre-deployments
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 18013-3 Second edition 2017-04 Information technology Personal identification ISO-compliant driving licence Part 3: Access control, authentication and integrity validation
More informationDRIVE-C2X presentation Interoperability challenges
DRIVE-C2X presentation Interoperability challenges Interoperability for cooperative mobility systems TNO, Helmond, 17 November 2011 Francois FISCHER, Andreas FESTAG on behalf of DRIVE-C2X Contents DRIVE
More informationConnected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is
Press release High-performance IT security solutions protect V2X communication against cyberattacks ESCRYPT GmbH Am Hain 5, 44789 Bochum, Germany Phone: +49 234 43870-200 Press and Public Relations: Martin
More informationStandardisation Proposal
EUROPEAN COMMISSION SEVENTH FRAMEWORK PROGRAMME GA No. 610990 Cooperative dynamic formation of platoons for safe and energy-optimized goods transportation D3.3 - Standardisation Proposal Deliverable No.
More informationDATEX II & Cooperatives systems
DATEX II & Cooperatives systems Lan Lin Hitachi Europe SAS ETSI TC ITS WG1 Co-chair www.easyway-its.eu Table of content Cooperative System overview EU mandate 453 and roles of SDOs Standardization activities
More informationNext Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop
Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual
More informationThe FP7 ITSSv6 Project
The FP7 ITSSv6 Project IPv6 ITS Station Stack for Cooperative ITS FOTs http://www.itssv6.eu Coordinated by INRIA (Thierry Ernst) thierry.ernst@mines-paristech.fr Mines ParisTech / INRIA 2012-05-25 ITSSv6:
More informationC-ITS future opportunities and challenges
C-ITS future opportunities and challenges CIMEC workshop: C-ITS standardisation requirements for the urban environment, 12 September 2016, Brussel Bahar Namaki Araghi, Eng., PhD ITS Project Manager, City
More informationCar2Car Communication Consortium C2C-CC
Car2Car Communication Consortium C2C-CC Secure Vehicular Communication: Results and Challenges Ahead February 20th/21st 2008, Lausanne Benjamin Weyl BMW Group Research and Technology Chair C2C-CC Security
More informationInternet Engineering Task Force (IETF) Category: Informational ISSN: October 2013
Internet Engineering Task Force (IETF) J. Merkle Request for Comments: 7027 secunet Security Networks Updates: 4492 M. Lochter Category: Informational BSI ISSN: 2070-1721 October 2013 Abstract Elliptic
More informationDigital signatures: How it s done in PDF
Digital signatures: How it s done in PDF Agenda Why do we need digital signatures? Basic concepts applied to PDF Digital signatures and document workflow Long term validation Why do we need digital signatures?
More informationArchitecture of the Car2X Systems Network
Architecture of the Car2X Systems Network Overview Governance Definition of major rules all participants of the system have to oblige to Inspection and enforcement rules Top level security entities. Backend
More informationIntroduction to VANET
VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of
More informationTLS authentication using ETSI TS and IEEE certificates
TLS authentication using ETSI TS 103 097 and IEEE 1609.2 certificates IETF meeting 93 Prague TLS WG session Wednesday, July 22, 2015 Objective & Motivations Objective: enable C/S authentication using C-ITS*
More informationEuropean Activities towards Cooperative Mobility
European Activities towards Cooperative Mobility CARS 21 WG1 MEETING Brussels, 21 February 2011 Juhani Jääskeläinen Head of Unit, ICT for Transport European Commission Directorate General Information Society
More informationSecure Vehicle Communication. SEVECOM (SE-cure VE-hicle COM-munication) General Introduction SEVECOM General Introduction
Secure Vehicle Communication SEVECOM (SE-cure VE-hicle COM-munication) General Introduction 1 Outline Vehicle Communication Security and Privacy Threats Research topics Preliminary results 2 Vehicle Communication
More informationVehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University
Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University OUTLINE Intelligent Transportation Systems (ITS) Vehicle connectivity
More informationThis article presents a condensed
Securing IT EDITORS: Rick Kuhn, US National Institute of Standards and Technology, kuhn@nist.gov Tim Weil, Scram Systems, tweil.ieee@gmail.com VPKI Hits the Highway Secure Communication for the Connected
More informationSecurity of vehicular communications. Vehicular communication (VC) systems
Security of vehicular communications vehicular safety communications design constraints attacker classes desired security services a security architecture Vehicular communication (VC) systems motivations:
More informationPilot PKI Security Management Message Formats
Pilot PKI Security Management Message Formats CAR 2 CAR Communication Consortium Workgroup Security Partners of the C2C-CC Pilot-PKI-SecManFormats v1.1 25.07.2013 Page 1 of 15 Document information Company:
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More informationX.509. CPSC 457/557 10/17/13 Jeffrey Zhu
X.509 CPSC 457/557 10/17/13 Jeffrey Zhu 2 3 X.509 Outline X.509 Overview Certificate Lifecycle Alternative Certification Models 4 What is X.509? The most commonly used Public Key Infrastructure (PKI) on
More informationCommon transportation user experience through unified fundamental data definition and movement from mobile elements, to roadside, to centers.
Common transportation user experience through unified fundamental data definition and movement from mobile elements, to roadside, to centers. 1 2 The concept is to organize installations in a large region
More informationCopyright
This video will look at the different components that make up Active Directory Certificate Services and which services you should look at installing these components on. Which components to install where?
More informationApple Inc. Apple IOS 11 VPN Client on iphone and ipad Guidance Documentation
Apple Inc. Apple IOS 11 VPN Client on iphone and ipad Guidance Documentation April 2018 Version 1.2 1 Contents 1 Introduction... 4 1.1 Target of Evaluation... 4 1.2 Cryptographic Support... 5 1.3 Glossary...
More informationSecure digital certificates with a blockchain protocol
Secure digital certificates with a blockchain protocol Federico Pintore 1 Trento, 10 th February 2017 1 University of Trento Federico Pintore Blockchain and innovative applications Trento, 10 th February
More information5G LAB GERMANY. 5G Impact and Challenges for the Future of Transportation
5G LAB GERMANY 5G Impact and Challenges for the Future of Transportation Dr. Meryem Simsek, Research Group Leader at TU Dresden, Germany Senior Research Scientist at ICSI Berkeley, USA Contributors: Gerhard
More informationPKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006
PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy
More informationIEEE VNC Vehicular Networking Conference
"The Future of V2x IEEE VNC Vehicular Networking Conference Torino, 2017-11-27 By Ing. Paul Spaanderman Vice Chair WG1 and WG2 ETSI TC ITS Internet and Communication Innovation Projects www.paulsconsultancy.com
More informationSecurity and Certificates
Encryption, page 1 Voice and Video Encryption, page 6 Federal Information Processing Standards, page 6 Certificate Validation, page 6 Required Certificates for On-Premises Servers, page 7 Certificate Requirements
More informationAbout FIPS, NGE, and AnyConnect
About FIPS, NGE, and AnyConnect, on page 1 Configure FIPS for the AnyConnect Core VPN Client, on page 4 Configure FIPS for the Network Access Manager, on page 5 About FIPS, NGE, and AnyConnect AnyConnect
More informationarxiv: v1 [cs.cr] 14 Feb 2018
1 A Security Credential Management System for V2X Communications Benedikt Brecht, Dean Therriault, André Weimerskirch, William Whyte, Virendra Kumar, Thorsten Hehn, Roy Goudy Benedikt.Brecht@vw.com dean.therriault@gm.com
More informationHybrid Communication. CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto
Hybrid Communication CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto Contents Project Overview Hybrid Communication Concepts Services Enabled by Hybrid Communication
More informationRevocation for Certificateless Authentication in VANETs
Revocation for Certificateless Authentication in VANETs Pino Caballero-Gil, Francisco Martín Fernández, Cándido Caballero-Gil Department of Computer Engineering University of La Laguna San Cristobal de
More informationITS Standardization. Oyunchimeg Shagdar, Inria Thierry Ernst, Mines Paris Tech
ITS Standardization Oyunchimeg Shagdar, Inria Thierry Ernst, Mines Paris Tech JNCT: Les Journées Nationales des Communication dans les Transports 29 Mai 2013 ITS: Intelligent Transportations Systems Systems
More informationeidas Interoperability Architecture Version November 2015
eidas Interoperability Architecture Version 1.00 6. November 2015 1 Introduction This document specifies the interoperability components of the eidas-network, i.e. the components necessary to achieve interoperability
More informationThe Open Protocol for Access Control Identification and Ticketing with PrivacY
The Open Protocol for Access Control Identification and Ticketing with PrivacY For Secure Contactless Transactions and Enabling Logical and Physical Access Convergence October 2010 Actividentity 2 OPACITY
More informationCONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements
CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4
More informationETSI ITS Security Assessment
ETSI ITS Security Assessment Alexandru C. Serban 1,2 Erik Poll 1 Joost Visser 2 1 Digital Security - Radboud University, Nijmegen 2 Research Team - Software Improvement Group, Amsterdam Contents Outline
More informationInternet Engineering Task Force (IETF) Request for Comments: 6160 Category: Standards Track April 2011 ISSN:
Internet Engineering Task Force (IETF) S. Turner Request for Comments: 6160 IECA Category: Standards Track April 2011 ISSN: 2070-1721 Abstract Algorithms for Cryptographic Message Syntax (CMS) Protection
More informationA privacy-preserving authentication service using mobile devices
A privacy-preserving authentication service using mobile devices Mihai Togan Security Software Architect certsign Context Mobile devices Present everywhere What to consider High performance Computing power
More informationTOWARDS AUTONOMOUS DRIVING
TOWARDS AUTONOMOUS DRIVING DRIA 27/09/16 SUMARY Automation levels Reference / Version / Date / Owner / Privacy level 3 AUTOMATION LEVELS Basic functions Reference / Version / Date / Owner / Privacy level
More informationInternet Engineering Task Force (IETF) Request for Comments: 7192 Category: Standards Track April 2014 ISSN:
Internet Engineering Task Force (IETF) S. Turner Request for Comments: 7192 IECA Category: Standards Track April 2014 ISSN: 2070-1721 Abstract Algorithms for Cryptographic Message Syntax (CMS) Key Package
More informationThe GeoNet project: Combination of IPv6 & GeoNetworking
The GeoNet project: Combination of IPv6 & GeoNetworking Geographic addressing and routing for vehicular communications http://www.geonet-project.eu Dr. Thierry Ernst INRIA Mines ParisTech (LaRA) GeoNet
More informationSCOPE OF ACCREDITATION TO ISO/IEC 17025:2005
SCOPE OF ACCREDITATION TO ISO/IEC 17025:2005 DEKRA TESTING AND CERTIFICATION, S.A.U. Parque Tecnologico de Andalucia C/ Severo Ochoa 2 29590-Campanillas, Málaga, SPAIN Jose Maria Fernandez Phone: +34 952619100
More informationThe current status of Esi TC and the future of electronic signatures
SG&A ETSI FUTURE WORKSHOP Sophia Antipolis, 16th January 2006 The current status of Esi TC and the future of electronic signatures Riccardo Genghini, Chairman of Etsi Esi TC riccardo.genghini@sng.it The
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms
Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of
More informationDiffie-Hellman. Part 1 Cryptography 136
Diffie-Hellman Part 1 Cryptography 136 Diffie-Hellman Invented by Williamson (GCHQ) and, independently, by D and H (Stanford) A key exchange algorithm o Used to establish a shared symmetric key Not for
More informationVEHICLE-to-Vehicle (V2V) communications between
3850 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 19, NO. 12, DECEMBER 2018 A Security Credential Management System for V2X Communications Benedikt Brecht, Dean Therriault, André Weimerskirch,
More informationAbout & Beyond PKI. Blockchain and PKI. André Clerc Dipl. Inf.-Ing. FH, CISSP, CAS PM TEMET AG, Zürich. February 9, 2017
About & Beyond PKI Blockchain and PKI André Clerc Dipl. Inf.-Ing. FH, CISSP, CAS PM TEMET AG, Zürich February 9, 2017 1 Agenda Does blockchain secure PKIs in the longterm? Disadvantages of classic PKIs
More informationOpen Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014
The enabler of solutions Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 SIMalliance Allows usage of Secure Elements in Mobile Devices Designed for Open Handset OS platforms Common API for Apps
More informationFIPS Security Policy
FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided
More informationISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données
INTERNATIONAL STANDARD ISO 15764 First edition 2004-08-15 Road vehicles Extended data link security Véhicules routiers Sécurité étendue de liaison de données Reference number ISO 15764:2004(E) ISO 2004
More informationExpert groep Dutch profile. 5 dec 2017
Expert groep Dutch profile 5 dec 2017 Expert groep Dutch profile 5 december Verzamelen deliverables en planning uit projecten Update en review Dutch profile Identificeren nieuwe input momenten vanuit
More informationSG-CG/SGIS SG-CG/SGIS. ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid
SG-CG/SGIS ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid Page 1 CEN/CENELEC/ETSI Smart Grid Co-ordination Group CEN-CENELEC-ETSI 2011 European
More informationAcronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector
Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National
More informationDEFINITION OF A PILOT TEST PLAN FOR COOPERATION OF AGRICULTURE EQUIPMENT WITH ONEM2M AND C-ITS
DEFINITION OF A PILOT TEST PLAN FOR COOPERATION OF AGRICULTURE EQUIPMENT WITH ONEM2M AND C-ITS ETSI STF 542 Presented by Michelle Wetterwald for ETSI ITS Workshop, Berlin, 7 h of March, 2018 Outline Motivation
More informationCompass4D Working towards deployment of C-ITS. Pierpaolo Tona, Project Manager
Compass4D Working towards deployment of C-ITS Pierpaolo Tona, Project Manager ERTICO: Towards deployment of C-ITS I N T E R N A T I O N A L C O O P E R A T I O N C-ITS Showcase Amsterdam 2010 C-ITS Plugtest
More informationGetting to Grips with Public Key Infrastructure (PKI)
Getting to Grips with Public Key Infrastructure (PKI) What is a PKI? A Public Key Infrastructure (PKI) is a combination of policies, procedures and technology that forms a trust infrastructure to issue
More informationThe Cryptographic Sensor
The Cryptographic Sensor Libor Dostálek and Václav Novák {libor.dostalek, vaclav.novak}@prf.jcu.cz Faculty of Science University of South Bohemia České Budějovice Abstract The aim is to find an effective
More informationHybrid Communication in Cooperative ITS
Hybrid Communication in Cooperative ITS Our approach to connected vehicles From vehicles & roads to cross-domain operations Friedhelm Ramme Principal Consultant Ericsson Global Competence Hub Content Ericsson
More informationSecurity for V2X Communications
Security for V2X Communications ITS Canada Annual General Meeting May 1-4, 2016 Brian Romansky VP Strategic Technology Your Connected Car Your Connected Car Security Security Partner Partner TrustPoint
More information