Cooperative ITS Corridor Joint Deployment

Size: px
Start display at page:

Download "Cooperative ITS Corridor Joint Deployment"

Transcription

1 Cooperative ITS Corridor Joint Deployment Secure V2X Communication Glasgow, June 8th 2016 Markus Ullmann Federal Office for Information Security (BSI)

2 Outline Cooperative Intelligent Transport System (C-ITS) Corridor Project Rotterdam-Frankfurt-Vienna Use Cases Secure Vehicle-2-Vehicle Communication (V2V) according to ETSI Shortcomings of the existing ETSI Specifications Secure V2X Communication Secure ITS Roadside Station (IRS) messages (DENM) IRS PKI Domain Conclusion/Future Work Markus Ullmann, Christian Wieschebrink, Dennis Kügler, Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems, Proceedings VEHICULAR 2015, pages 14 19, IARIA 2

3 C-ITS Corridor Project Cooperative ITS Corridor Project Rotterdam-Frankfurt-Vienna (NL-GE-AU) Digitalization of Road Works Warning Use Cases (Broadcast Communication) Send DENM messages to the crossing vehicles Receive CAM / DENM messages of crossing vehicles 3

4 ETSI ITS Architecture ITS roadside stations ITS vehicle stations ITS central stations ITS personal stations 4

5 Secure Vehicle-2-Vehicle Communication Broadcast Communication ETSI ITS Specifications TS V 1.3.2: Cooperative Awareness Message (CAM): Location, Speed, Time,... Header CAM Information ECDSA Signature Certificate TS V 1.2.2: Decentralized Environmental Notification Basis Services (DENM): Warning Header DENM Information ECDSA Signature Certificate TS V 1.2.1: Security header and Certificate formats 5

6 Pseudonym Concept Concept Pseudonymous key pairs/certificates Privacy Requirements Location privacy Message unlinkability 6

7 Decentralized Environmental Notification Basis Services (DENM) 7

8 Secure Vehicular Communication - Keys, Certificates, PKI Identification and Authentication of Vehicles Long term cryptographic key pair (certificate) based on Elliptic Curves (NIST P-256) ETSI Certificate format (not widely used) Issued by Long Term Certification Authority (LTCA) [ETSI: Enrolement Authority] Message Security/Location Privacy Pseudonymous key pairs (certificates) (ECC NIST P-256) ETSI Certificate Format Issued by Pseudonym Certification Authority (PCA) [ETSI: Authorization Authority] 8

9 Shortcomings of the ETSI Specifications Security Cryptographic Setting Missing mechanism for cryptographic update (crypto agility) Elliptic Curve Domain Parameter Hash Function Signature Algorithms, One root PKI for ITS vehicle stations and ITS roadside stations ITS vehicle stations and ITS roadside stations have different (privacy) requirements ETSI certificate format Not widely applied Only NIST-ECC-Domain parameter: Prime Field NIST P-256 (not recommended any more by NSA) Missing properties (role concept, rights,...) Privacy Pseudonym Concept 9

10 Secure ITS Roadside Stations (1) Integration of an electronic gateway Threats to incoming/outgoing messages Availability Jamming,... Authenticity Masquerading, Integrity Injection of forged messages,... Confidentiality Extraction of sensitive information (e.g., cryptographic keys) Threats concerning the integrity of the electronic gateway itself (untrusted environment) Malicious software Extraction of cryptographic keys,... 10

11 Secure ITS Roadside Stations (2) Location Privacy ITS roadside stations are not controlled by an user No Privacy Requirements ==> no pseudonym certificates are needed Instead: Credential Certificate with Identity included (short validity period [~ days] to avoid CRLs) Security Requirements DENM-Security: Message integrity and authentication Protection of the gateways Protection Profile (PP) Identification and authentication (roles) Access Control Short time authorization (credential certificate) 11

12 C-ITS Use Case: Sending DENM messages Short Term Credential Certificate Usage Authorization of ITS roadside station Message integrity and authentication of DENM messages ETSI Certificate format 12

13 IRS PKI Domain (Infrastructure) Identification and Authentication of ITS Roadside station Long term key pair (certificate) based on Elliptic Curves Brainpool curve X.509 V3 certificate format Issued by Long Term Certification Authority (LT-CA) [ETSI: Enrolement Authority] Authorization and Message Authentication Short term key pair (credential certificate) based on Elliptic Curves Brainpool curve ETSI Certificate format Issued by Credential Certification Authority (C-CA) [ETSI: Authorization Authority] 13

14 Conclusion / Future Work Next steps C-ITS Corridor Project (2016) Setup IRS-Pilot PKI for ITS Roadside stations (April, 2016) Equip. RWW gateways with keys/certificates (June, 2016) Test secure V2X communication (Hessen Mobil) Discussion with European Stakeholders EC DG Move C-ITS platform WG5: Preparing Common C-ITS PKI- Policy (~ October 2016) Cryptographic requirements (e.g., ECDSA_brainpoolP256r1_with_SHA256,... ) Certificate validity period Revocation... 14

15 Thank you for your kind attention Suggestions orquestions? Bild: Hessen Mobil Road and Traffic Management

Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems

Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems Markus Ullmann, Christian Wieschebrink and Dennis Kügler Federal Office for Information Security D-53133 Bonn,

More information

COOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY

COOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY COOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY ETSI IoT Security WORKSHOP, 13 15 June 2016 Brigitte LONC, RENAULT ETSI TC ITS WG 5 Chairman ETSI 2016.

More information

Security and Privacy in Car2Car Adhoc Networks

Security and Privacy in Car2Car Adhoc Networks Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com 15/06/2016 1 Introduction French SME Involved since 2002 in security and privacy for connected vehicles 15/06/2016 2

More information

Cooperative ITS Corridor Joint Deployment

Cooperative ITS Corridor Joint Deployment Cooperative ITS Corridor Joint Deployment Amsterdam Group CODECS Workshop Roskilde, 15 September 2015 The official start On 10 June 2013, the Ministers of Transport of the Netherlands, Germany and Austria

More information

Technical Limitations, and Privacy Shortcomings of the Vehicle-to-Vehicle Communication

Technical Limitations, and Privacy Shortcomings of the Vehicle-to-Vehicle Communication Technical Limitations, and Privacy Shortcomings of the Vehicle-to-Vehicle Communication Markus Ullmann, Thomas Strubbe, and Christian Wieschebrink Federal Office for Information Security D-53133 Bonn,

More information

C2X Security. Introduction and overview (focus to European standard only) Cryptovision s Mindshare V

C2X Security. Introduction and overview (focus to European standard only) Cryptovision s Mindshare V C2X Security Introduction and overview (focus to European standard only) Cryptovision s Mindshare 2015-06-24 V1.00 2015-06-24 Agenda What is Car2x Communication? Standards Security concepts C2X-PKI 2/30

More information

C-ITS Platform WG5: Security & Certification. Final Report

C-ITS Platform WG5: Security & Certification. Final Report C-ITS Platform WG5: Security & Certification Final Report ANNEX 3: Crypto Agility / Updateability in in Cooperative-Intelligent Transport Systems (C ITS) v1.0 1 Contents 1 Scope... 3 2 Introduction...

More information

PKI AND ROAMING IN ITS

PKI AND ROAMING IN ITS PKI AND ROAMING IN ITS 7th ETSI Security Workshop Sophia Antipolis, France, on 18th 19th January 2012 Prepared by STF423: Scott Cadzow, H.Cruickshank@surrey.ac.uk, Benjamin Glas, Siv-Hilde Houmb, Steve

More information

A GENERIC PUBLIC KEY INFRASTRUCTURE FOR SECURING CAR-TO-X COMMUNICATION

A GENERIC PUBLIC KEY INFRASTRUCTURE FOR SECURING CAR-TO-X COMMUNICATION A GENERIC PUBLIC KEY INFRASTRUCTURE FOR SECURING CAR-TO-X COMMUNICATION Norbert Bißmeyer 1, Hagen Stübing 2, Elmar Schoch 3, Stefan Götz 4, Jan Peter Stotz 1, Brigitte Lonc 5 1 Fraunhofer SIT, Secure Mobile

More information

Privacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH

Privacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH Privacy in Vehicular Ad-hoc Networks Nikolaos Alexiou, LCN, EE KTH alexiou@kth.se 2/10/2012 Outline Introduction VANETs: an overview VANET privacy - Anonymity - Location Privacy - VPKI Privacy Attacks

More information

ETSI TC ITS WORKSHOP February 2011 Venice Italy. ETSI All rights reserved

ETSI TC ITS WORKSHOP February 2011 Venice Italy. ETSI All rights reserved ETSI TC ITS WORKSHOP 09-11 February 2011 Venice Italy ETSI 2011. All rights reserved WG1 STANDARDIZATION ACTIVITIES Lan LIN, Hitachi, ETSI TC ITS WG1 Vice-Chairman ETSI 2011. All rights reserved Transportation

More information

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy 14 February 2017 Amsterdam Gerhard Menzel European Commission - DG MOVE Scope:

More information

Secure and Privacy Preserving Vehicular Communication Systems: Identity and Credential Management Infrastructure

Secure and Privacy Preserving Vehicular Communication Systems: Identity and Credential Management Infrastructure KTH ROYAL INSTITUTE OF TECHNOLOGY Secure and Privacy Preserving Vehicular Communication Systems: Identity and Credential Management Infrastructure Mohammad Khodaei and Panos Papadimitratos Networked Systems

More information

ETSI G5 technology: the European approach. Date: 13 th June 2013 Name: Lan LIN Position: Senior Researcher Organisation: Hitachi Europe SAS.

ETSI G5 technology: the European approach. Date: 13 th June 2013 Name: Lan LIN Position: Senior Researcher Organisation: Hitachi Europe SAS. ETSI G5 technology: the European approach Date: 13 th June 2013 Name: Lan LIN Position: Senior Researcher Organisation: Hitachi Europe SAS. Outlines Background Motivations Technical insignts Conclusion

More information

European Framework for C-ITS Security 6 th of March 2018 Gerhard Menzel European Commission

European Framework for C-ITS Security 6 th of March 2018 Gerhard Menzel European Commission European Framework for C-ITS Security 6 th of March 2018 Gerhard Menzel European Commission Key EU Policy Milestones to deliver C-ITS in Europe by 2019 Cooperative Intelligent Transport Systems A European

More information

Dr. Panos Papadimitratos

Dr. Panos Papadimitratos Dr. Panos Papadimitratos Ecole Polytechnique Fédéral de Lausanne (EPFL) 2 Security in Vehicle-to-Vehicle (V2V) and Vehicle-to- Infrastructure (V2I) Communications Security and Privacy Why? 3 o Safety (?)

More information

Certificate Policy for Deployment and Operation of European Cooperative Intelligent Transport Systems (C-ITS)

Certificate Policy for Deployment and Operation of European Cooperative Intelligent Transport Systems (C-ITS) Result of C-ITS Platform Phase II Certificate Policy for Deployment and Operation of European Cooperative Intelligent Transport Systems (C-ITS) RELEASE 1.1 JUNE 2018 Certificate Policy for Deployment and

More information

CAMP. Intelligent Transportation Systems. A Security Credential Management System for Vehicle-to-Vehicle Communications

CAMP. Intelligent Transportation Systems. A Security Credential Management System for Vehicle-to-Vehicle Communications CAMP Vehicle Safety Communications 3 Intelligent Transportation Systems A Security Credential Management System for Vehicle-to-Vehicle Communications William Whyte (Security Innovation); André Weimerskirch

More information

Enhanced Management of Certificate Caching and Revocation Lists in VANET

Enhanced Management of Certificate Caching and Revocation Lists in VANET Enhanced Management of Certificate Caching and Revocation Lists in VANET Sadiq H. Abdulhussain Computer Engineering Department College of Engineering University of Baghdad ABSTRACT Vehicular network security

More information

VPKIs: State-of-the-Art, Challenges and Extensions

VPKIs: State-of-the-Art, Challenges and Extensions VPKIs: State-of-the-Art, Challenges and Extensions VPKIs: State-of-the-Art, Challenges and Extensions Hongyu Jin, Mohammad Khodaei and Panos Papadimitratos Networked Systems Security Group www.ee.kth.se/nss

More information

Where are we with C-ITS today? Joint CIMEC/CODECS City Pool workshop Barcelona, 14 November 2016

Where are we with C-ITS today? Joint CIMEC/CODECS City Pool workshop Barcelona, 14 November 2016 Where are we with C-ITS today? Joint CIMEC/CODECS City Pool workshop Barcelona, 14 November 2016 C-ITS - background Substantial effort to develop and deploy C-ITS 200+ million of EU money on projects National-funded

More information

Securing V2X communications with Infineon HSM

Securing V2X communications with Infineon HSM Infineon Security Partner Network Securing V2X communications with Infineon HSM Savari and Infineon The Sign of Trust for V2X Products SLI 97 www.infineon.com/ispn Use case Application context and security

More information

LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT

LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT André Weimerskirch, Scott Bogard, Debby Bezzina University of Michigan Transportation Research Institute 2901 Baxter Road Ann Arbor,

More information

All rights reserved. ITS at ETSI. Presented by Luis Jorge Romero on behalf of ETSI TC ITS

All rights reserved.  ITS at ETSI. Presented by Luis Jorge Romero on behalf of ETSI TC ITS http://eustandards.in/ ITS at ETSI Presented by Luis Jorge Romero on behalf of ETSI TC ITS 2 All rights reserved ITS: a definition ITS means applying Information and Communications Technologies (ICT) to

More information

Cooperative, Connected and Automated Mobility

Cooperative, Connected and Automated Mobility Cooperative, Connected and Automated Mobility 1. ITS Deutschland Kongress, Frankfurt 22.11.2017 Gerhard Menzel European Commission - DG MOVE Key EU Policy Milestones to deliver C-ITS in Europe by 2019

More information

New Services in Mobility: C-ITS

New Services in Mobility: C-ITS New Services in Mobility: C-ITS UNECE ITS Workshop, 07th of October 2015, Bordeaux Gerhard Menzel European Commission DG Mobility and Unit C3 - Intelligent Systems President Juncker: a target of at least

More information

C-ITS in Europe. Gerhard Menzel, DG MOVE 7th ETSI ITS Workshop 26 th of March 2015, Helmond. Transport

C-ITS in Europe. Gerhard Menzel, DG MOVE 7th ETSI ITS Workshop 26 th of March 2015, Helmond. Transport C-ITS in Europe Gerhard Menzel, DG MOVE 7th ETSI ITS Workshop 26 th of March 2015, Helmond Why C-ITS? Cooperative Systems understood as "connected mobility": More Connecting improving enhancing optimising

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 11: Public Key Infrastructure Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Public key infrastructure Certificates Trust

More information

CANoe.Car2x. Product Information

CANoe.Car2x. Product Information Product Information Table of Contents 1 Introduction... 3 1.1 Benefits at a Glance... 4 1.2 Application Areas... 4 1.3 Further Information... 6 2 Functions... 6 3 Hardware... 10 4 Training... 10 V1.5 02/2017

More information

Short-term Linkable Group Signatures with Categorized Batch Verification

Short-term Linkable Group Signatures with Categorized Batch Verification Short-term Linkable Group Signatures with Categorized Batch Verification Lukas Malina 1, Jordi Castella-Rocà 2, Arnau Vives-Guasch 2, Jan Hajny 1 1 Department of Telecommunications Faculty of Electrical

More information

EUROPEAN STANDARD Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 3: Network Architecture

EUROPEAN STANDARD Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 3: Network Architecture EN 302 636-3 V1.2.1 (2014-12) EUROPEAN STANDARD Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 3: Network Architecture 2 EN 302 636-3 V1.2.1 (2014-12) Reference REN/ITS-0030034

More information

Deployment is underway!

Deployment is underway! Deployment is underway! 15 September 2015 Scandic Hotel Roskilde, Denmark CODECS has received funding from the European Union s Horizon 2020 research and innovation programme under Grant Agreement No 653339.

More information

New Security Features in DLMS/COSEM

New Security Features in DLMS/COSEM New Security Features in DLMS/COSEM A comparison to the Smart Meter Gateway Workshop on Power Line Communications 2015 (HRW), Robin Massink (DNV GL), Gerd Bumiller (HRW) 21.09.2015 21.09.2015 1 Initiated

More information

5GAA TR A G Automotive Association; Working Group System Architecture and Solution Development; 5GAA V2X Terms and Definitions

5GAA TR A G Automotive Association; Working Group System Architecture and Solution Development; 5GAA V2X Terms and Definitions 5GAA TR A-170188 Technical Report 5G Automotive Association; Working Group System Architecture and Solution Development; 5GAA V2X Terms and Definitions 2. 5GAA Postal address 5GAA address 5GAA c/o MCI

More information

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material

More information

5GAA TR A G Automotive Association; Working Group System Architecture and Solution Development; 5GAA V2X Terms and Definitions

5GAA TR A G Automotive Association; Working Group System Architecture and Solution Development; 5GAA V2X Terms and Definitions 5GAA TR A-170188 Technical Report 5G Automotive Association; Working Group System Architecture and Solution Development; 5GAA V2X Terms and Definitions 2. 5GAA Postal address 5GAA address 5GAA c/o MCI

More information

C2X congress C-ITS standards

C2X congress C-ITS standards Elektrische Signalverarbeitung Dr. Fischer GmbH C2X congress C-ITS standards Frankfurt 1. March 2016 1.3.2016 C-ITS standards 1 The purpose of standards? 1. Interoperability: Specification of interfaces

More information

Cooperative ITS Corridor Joint Deployment. Serge van Dam Rijkswaterstaat. Update The Netherlands June 2017

Cooperative ITS Corridor Joint Deployment. Serge van Dam Rijkswaterstaat. Update The Netherlands June 2017 Cooperative ITS Corridor Joint Deployment Serge van Dam Rijkswaterstaat Update The Netherlands June 2017 The Netherlands summarystatus Contents Flashback 2015 Developments so far in summary Pre-deployments

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 18013-3 Second edition 2017-04 Information technology Personal identification ISO-compliant driving licence Part 3: Access control, authentication and integrity validation

More information

DRIVE-C2X presentation Interoperability challenges

DRIVE-C2X presentation Interoperability challenges DRIVE-C2X presentation Interoperability challenges Interoperability for cooperative mobility systems TNO, Helmond, 17 November 2011 Francois FISCHER, Andreas FESTAG on behalf of DRIVE-C2X Contents DRIVE

More information

Connected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is

Connected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is Press release High-performance IT security solutions protect V2X communication against cyberattacks ESCRYPT GmbH Am Hain 5, 44789 Bochum, Germany Phone: +49 234 43870-200 Press and Public Relations: Martin

More information

Standardisation Proposal

Standardisation Proposal EUROPEAN COMMISSION SEVENTH FRAMEWORK PROGRAMME GA No. 610990 Cooperative dynamic formation of platoons for safe and energy-optimized goods transportation D3.3 - Standardisation Proposal Deliverable No.

More information

DATEX II & Cooperatives systems

DATEX II & Cooperatives systems DATEX II & Cooperatives systems Lan Lin Hitachi Europe SAS ETSI TC ITS WG1 Co-chair www.easyway-its.eu Table of content Cooperative System overview EU mandate 453 and roles of SDOs Standardization activities

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual

More information

The FP7 ITSSv6 Project

The FP7 ITSSv6 Project The FP7 ITSSv6 Project IPv6 ITS Station Stack for Cooperative ITS FOTs http://www.itssv6.eu Coordinated by INRIA (Thierry Ernst) thierry.ernst@mines-paristech.fr Mines ParisTech / INRIA 2012-05-25 ITSSv6:

More information

C-ITS future opportunities and challenges

C-ITS future opportunities and challenges C-ITS future opportunities and challenges CIMEC workshop: C-ITS standardisation requirements for the urban environment, 12 September 2016, Brussel Bahar Namaki Araghi, Eng., PhD ITS Project Manager, City

More information

Car2Car Communication Consortium C2C-CC

Car2Car Communication Consortium C2C-CC Car2Car Communication Consortium C2C-CC Secure Vehicular Communication: Results and Challenges Ahead February 20th/21st 2008, Lausanne Benjamin Weyl BMW Group Research and Technology Chair C2C-CC Security

More information

Internet Engineering Task Force (IETF) Category: Informational ISSN: October 2013

Internet Engineering Task Force (IETF) Category: Informational ISSN: October 2013 Internet Engineering Task Force (IETF) J. Merkle Request for Comments: 7027 secunet Security Networks Updates: 4492 M. Lochter Category: Informational BSI ISSN: 2070-1721 October 2013 Abstract Elliptic

More information

Digital signatures: How it s done in PDF

Digital signatures: How it s done in PDF Digital signatures: How it s done in PDF Agenda Why do we need digital signatures? Basic concepts applied to PDF Digital signatures and document workflow Long term validation Why do we need digital signatures?

More information

Architecture of the Car2X Systems Network

Architecture of the Car2X Systems Network Architecture of the Car2X Systems Network Overview Governance Definition of major rules all participants of the system have to oblige to Inspection and enforcement rules Top level security entities. Backend

More information

Introduction to VANET

Introduction to VANET VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of

More information

TLS authentication using ETSI TS and IEEE certificates

TLS authentication using ETSI TS and IEEE certificates TLS authentication using ETSI TS 103 097 and IEEE 1609.2 certificates IETF meeting 93 Prague TLS WG session Wednesday, July 22, 2015 Objective & Motivations Objective: enable C/S authentication using C-ITS*

More information

European Activities towards Cooperative Mobility

European Activities towards Cooperative Mobility European Activities towards Cooperative Mobility CARS 21 WG1 MEETING Brussels, 21 February 2011 Juhani Jääskeläinen Head of Unit, ICT for Transport European Commission Directorate General Information Society

More information

Secure Vehicle Communication. SEVECOM (SE-cure VE-hicle COM-munication) General Introduction SEVECOM General Introduction

Secure Vehicle Communication. SEVECOM (SE-cure VE-hicle COM-munication) General Introduction SEVECOM General Introduction Secure Vehicle Communication SEVECOM (SE-cure VE-hicle COM-munication) General Introduction 1 Outline Vehicle Communication Security and Privacy Threats Research topics Preliminary results 2 Vehicle Communication

More information

Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University

Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University OUTLINE Intelligent Transportation Systems (ITS) Vehicle connectivity

More information

This article presents a condensed

This article presents a condensed Securing IT EDITORS: Rick Kuhn, US National Institute of Standards and Technology, kuhn@nist.gov Tim Weil, Scram Systems, tweil.ieee@gmail.com VPKI Hits the Highway Secure Communication for the Connected

More information

Security of vehicular communications. Vehicular communication (VC) systems

Security of vehicular communications. Vehicular communication (VC) systems Security of vehicular communications vehicular safety communications design constraints attacker classes desired security services a security architecture Vehicular communication (VC) systems motivations:

More information

Pilot PKI Security Management Message Formats

Pilot PKI Security Management Message Formats Pilot PKI Security Management Message Formats CAR 2 CAR Communication Consortium Workgroup Security Partners of the C2C-CC Pilot-PKI-SecManFormats v1.1 25.07.2013 Page 1 of 15 Document information Company:

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

X.509. CPSC 457/557 10/17/13 Jeffrey Zhu

X.509. CPSC 457/557 10/17/13 Jeffrey Zhu X.509 CPSC 457/557 10/17/13 Jeffrey Zhu 2 3 X.509 Outline X.509 Overview Certificate Lifecycle Alternative Certification Models 4 What is X.509? The most commonly used Public Key Infrastructure (PKI) on

More information

Common transportation user experience through unified fundamental data definition and movement from mobile elements, to roadside, to centers.

Common transportation user experience through unified fundamental data definition and movement from mobile elements, to roadside, to centers. Common transportation user experience through unified fundamental data definition and movement from mobile elements, to roadside, to centers. 1 2 The concept is to organize installations in a large region

More information

Copyright

Copyright This video will look at the different components that make up Active Directory Certificate Services and which services you should look at installing these components on. Which components to install where?

More information

Apple Inc. Apple IOS 11 VPN Client on iphone and ipad Guidance Documentation

Apple Inc. Apple IOS 11 VPN Client on iphone and ipad Guidance Documentation Apple Inc. Apple IOS 11 VPN Client on iphone and ipad Guidance Documentation April 2018 Version 1.2 1 Contents 1 Introduction... 4 1.1 Target of Evaluation... 4 1.2 Cryptographic Support... 5 1.3 Glossary...

More information

Secure digital certificates with a blockchain protocol

Secure digital certificates with a blockchain protocol Secure digital certificates with a blockchain protocol Federico Pintore 1 Trento, 10 th February 2017 1 University of Trento Federico Pintore Blockchain and innovative applications Trento, 10 th February

More information

5G LAB GERMANY. 5G Impact and Challenges for the Future of Transportation

5G LAB GERMANY. 5G Impact and Challenges for the Future of Transportation 5G LAB GERMANY 5G Impact and Challenges for the Future of Transportation Dr. Meryem Simsek, Research Group Leader at TU Dresden, Germany Senior Research Scientist at ICSI Berkeley, USA Contributors: Gerhard

More information

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006 PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy

More information

IEEE VNC Vehicular Networking Conference

IEEE VNC Vehicular Networking Conference "The Future of V2x IEEE VNC Vehicular Networking Conference Torino, 2017-11-27 By Ing. Paul Spaanderman Vice Chair WG1 and WG2 ETSI TC ITS Internet and Communication Innovation Projects www.paulsconsultancy.com

More information

Security and Certificates

Security and Certificates Encryption, page 1 Voice and Video Encryption, page 6 Federal Information Processing Standards, page 6 Certificate Validation, page 6 Required Certificates for On-Premises Servers, page 7 Certificate Requirements

More information

About FIPS, NGE, and AnyConnect

About FIPS, NGE, and AnyConnect About FIPS, NGE, and AnyConnect, on page 1 Configure FIPS for the AnyConnect Core VPN Client, on page 4 Configure FIPS for the Network Access Manager, on page 5 About FIPS, NGE, and AnyConnect AnyConnect

More information

arxiv: v1 [cs.cr] 14 Feb 2018

arxiv: v1 [cs.cr] 14 Feb 2018 1 A Security Credential Management System for V2X Communications Benedikt Brecht, Dean Therriault, André Weimerskirch, William Whyte, Virendra Kumar, Thorsten Hehn, Roy Goudy Benedikt.Brecht@vw.com dean.therriault@gm.com

More information

Hybrid Communication. CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto

Hybrid Communication. CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto Hybrid Communication CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto Contents Project Overview Hybrid Communication Concepts Services Enabled by Hybrid Communication

More information

Revocation for Certificateless Authentication in VANETs

Revocation for Certificateless Authentication in VANETs Revocation for Certificateless Authentication in VANETs Pino Caballero-Gil, Francisco Martín Fernández, Cándido Caballero-Gil Department of Computer Engineering University of La Laguna San Cristobal de

More information

ITS Standardization. Oyunchimeg Shagdar, Inria Thierry Ernst, Mines Paris Tech

ITS Standardization. Oyunchimeg Shagdar, Inria Thierry Ernst, Mines Paris Tech ITS Standardization Oyunchimeg Shagdar, Inria Thierry Ernst, Mines Paris Tech JNCT: Les Journées Nationales des Communication dans les Transports 29 Mai 2013 ITS: Intelligent Transportations Systems Systems

More information

eidas Interoperability Architecture Version November 2015

eidas Interoperability Architecture Version November 2015 eidas Interoperability Architecture Version 1.00 6. November 2015 1 Introduction This document specifies the interoperability components of the eidas-network, i.e. the components necessary to achieve interoperability

More information

The Open Protocol for Access Control Identification and Ticketing with PrivacY

The Open Protocol for Access Control Identification and Ticketing with PrivacY The Open Protocol for Access Control Identification and Ticketing with PrivacY For Secure Contactless Transactions and Enabling Logical and Physical Access Convergence October 2010 Actividentity 2 OPACITY

More information

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4

More information

ETSI ITS Security Assessment

ETSI ITS Security Assessment ETSI ITS Security Assessment Alexandru C. Serban 1,2 Erik Poll 1 Joost Visser 2 1 Digital Security - Radboud University, Nijmegen 2 Research Team - Software Improvement Group, Amsterdam Contents Outline

More information

Internet Engineering Task Force (IETF) Request for Comments: 6160 Category: Standards Track April 2011 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6160 Category: Standards Track April 2011 ISSN: Internet Engineering Task Force (IETF) S. Turner Request for Comments: 6160 IECA Category: Standards Track April 2011 ISSN: 2070-1721 Abstract Algorithms for Cryptographic Message Syntax (CMS) Protection

More information

A privacy-preserving authentication service using mobile devices

A privacy-preserving authentication service using mobile devices A privacy-preserving authentication service using mobile devices Mihai Togan Security Software Architect certsign Context Mobile devices Present everywhere What to consider High performance Computing power

More information

TOWARDS AUTONOMOUS DRIVING

TOWARDS AUTONOMOUS DRIVING TOWARDS AUTONOMOUS DRIVING DRIA 27/09/16 SUMARY Automation levels Reference / Version / Date / Owner / Privacy level 3 AUTOMATION LEVELS Basic functions Reference / Version / Date / Owner / Privacy level

More information

Internet Engineering Task Force (IETF) Request for Comments: 7192 Category: Standards Track April 2014 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 7192 Category: Standards Track April 2014 ISSN: Internet Engineering Task Force (IETF) S. Turner Request for Comments: 7192 IECA Category: Standards Track April 2014 ISSN: 2070-1721 Abstract Algorithms for Cryptographic Message Syntax (CMS) Key Package

More information

The GeoNet project: Combination of IPv6 & GeoNetworking

The GeoNet project: Combination of IPv6 & GeoNetworking The GeoNet project: Combination of IPv6 & GeoNetworking Geographic addressing and routing for vehicular communications http://www.geonet-project.eu Dr. Thierry Ernst INRIA Mines ParisTech (LaRA) GeoNet

More information

SCOPE OF ACCREDITATION TO ISO/IEC 17025:2005

SCOPE OF ACCREDITATION TO ISO/IEC 17025:2005 SCOPE OF ACCREDITATION TO ISO/IEC 17025:2005 DEKRA TESTING AND CERTIFICATION, S.A.U. Parque Tecnologico de Andalucia C/ Severo Ochoa 2 29590-Campanillas, Málaga, SPAIN Jose Maria Fernandez Phone: +34 952619100

More information

The current status of Esi TC and the future of electronic signatures

The current status of Esi TC and the future of electronic signatures SG&A ETSI FUTURE WORKSHOP Sophia Antipolis, 16th January 2006 The current status of Esi TC and the future of electronic signatures Riccardo Genghini, Chairman of Etsi Esi TC riccardo.genghini@sng.it The

More information

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of

More information

Diffie-Hellman. Part 1 Cryptography 136

Diffie-Hellman. Part 1 Cryptography 136 Diffie-Hellman Part 1 Cryptography 136 Diffie-Hellman Invented by Williamson (GCHQ) and, independently, by D and H (Stanford) A key exchange algorithm o Used to establish a shared symmetric key Not for

More information

VEHICLE-to-Vehicle (V2V) communications between

VEHICLE-to-Vehicle (V2V) communications between 3850 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 19, NO. 12, DECEMBER 2018 A Security Credential Management System for V2X Communications Benedikt Brecht, Dean Therriault, André Weimerskirch,

More information

About & Beyond PKI. Blockchain and PKI. André Clerc Dipl. Inf.-Ing. FH, CISSP, CAS PM TEMET AG, Zürich. February 9, 2017

About & Beyond PKI. Blockchain and PKI. André Clerc Dipl. Inf.-Ing. FH, CISSP, CAS PM TEMET AG, Zürich. February 9, 2017 About & Beyond PKI Blockchain and PKI André Clerc Dipl. Inf.-Ing. FH, CISSP, CAS PM TEMET AG, Zürich February 9, 2017 1 Agenda Does blockchain secure PKIs in the longterm? Disadvantages of classic PKIs

More information

Open Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014

Open Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 The enabler of solutions Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 SIMalliance Allows usage of Secure Elements in Mobile Devices Designed for Open Handset OS platforms Common API for Apps

More information

FIPS Security Policy

FIPS Security Policy FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided

More information

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données INTERNATIONAL STANDARD ISO 15764 First edition 2004-08-15 Road vehicles Extended data link security Véhicules routiers Sécurité étendue de liaison de données Reference number ISO 15764:2004(E) ISO 2004

More information

Expert groep Dutch profile. 5 dec 2017

Expert groep Dutch profile. 5 dec 2017 Expert groep Dutch profile 5 dec 2017 Expert groep Dutch profile 5 december Verzamelen deliverables en planning uit projecten Update en review Dutch profile Identificeren nieuwe input momenten vanuit

More information

SG-CG/SGIS SG-CG/SGIS. ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid

SG-CG/SGIS SG-CG/SGIS. ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid SG-CG/SGIS ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid Page 1 CEN/CENELEC/ETSI Smart Grid Co-ordination Group CEN-CENELEC-ETSI 2011 European

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

DEFINITION OF A PILOT TEST PLAN FOR COOPERATION OF AGRICULTURE EQUIPMENT WITH ONEM2M AND C-ITS

DEFINITION OF A PILOT TEST PLAN FOR COOPERATION OF AGRICULTURE EQUIPMENT WITH ONEM2M AND C-ITS DEFINITION OF A PILOT TEST PLAN FOR COOPERATION OF AGRICULTURE EQUIPMENT WITH ONEM2M AND C-ITS ETSI STF 542 Presented by Michelle Wetterwald for ETSI ITS Workshop, Berlin, 7 h of March, 2018 Outline Motivation

More information

Compass4D Working towards deployment of C-ITS. Pierpaolo Tona, Project Manager

Compass4D Working towards deployment of C-ITS. Pierpaolo Tona, Project Manager Compass4D Working towards deployment of C-ITS Pierpaolo Tona, Project Manager ERTICO: Towards deployment of C-ITS I N T E R N A T I O N A L C O O P E R A T I O N C-ITS Showcase Amsterdam 2010 C-ITS Plugtest

More information

Getting to Grips with Public Key Infrastructure (PKI)

Getting to Grips with Public Key Infrastructure (PKI) Getting to Grips with Public Key Infrastructure (PKI) What is a PKI? A Public Key Infrastructure (PKI) is a combination of policies, procedures and technology that forms a trust infrastructure to issue

More information

The Cryptographic Sensor

The Cryptographic Sensor The Cryptographic Sensor Libor Dostálek and Václav Novák {libor.dostalek, vaclav.novak}@prf.jcu.cz Faculty of Science University of South Bohemia České Budějovice Abstract The aim is to find an effective

More information

Hybrid Communication in Cooperative ITS

Hybrid Communication in Cooperative ITS Hybrid Communication in Cooperative ITS Our approach to connected vehicles From vehicles & roads to cross-domain operations Friedhelm Ramme Principal Consultant Ericsson Global Competence Hub Content Ericsson

More information

Security for V2X Communications

Security for V2X Communications Security for V2X Communications ITS Canada Annual General Meeting May 1-4, 2016 Brian Romansky VP Strategic Technology Your Connected Car Your Connected Car Security Security Partner Partner TrustPoint

More information