Connected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is

Similar documents
Securing V2X communications with Infineon HSM

Press Release. ETAS GmbH. Borsigstraße Stuttgart, Germany Phone Press and Public Relations: Anja Krahl

Security for V2X Communications

Automotive Cyber Security

Implementing security has never been easier. Infineon Security Partner Network.

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle

Automotive Security An Overview of Standardization in AUTOSAR

Cyber security mechanisms for connected vehicles

Security and Privacy in Car2Car Adhoc Networks

Smart Meter Security. Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security

SMART MANUFACTURING: TECHNOLOGIES AND GLOBAL MARKETS

Security Challenges with ITS : A law enforcement view

Turbocharging Connectivity Beyond Cellular

Countermeasures against Cyber-attacks

INTRODUCTION. Figure 1 Mobile subscriptions by technologies (in billions) Source:

Visiongain. -v1531/ Publisher Sample

Securing the future of mobility

NCHRP Project Impacts of Connected Vehicles and Automated Vehicles on State and Local Transportation Agencies

Introduction to VANET

Cooperative ITS Corridor Joint Deployment

Presentation on OSGi Alliance

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur

SW-Update. Thomas Fleischmann June 5 th 2015

Efficient testing of ECUs despite Security

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

C-ITS Deployment in Austria & European Harmonisation Activities

C-ITS in Europe. Gerhard Menzel, DG MOVE 7th ETSI ITS Workshop 26 th of March 2015, Helmond. Transport

European Activities towards Cooperative Mobility

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy

CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT

Automotive Gateway: A Key Component to Securing the Connected Car

Economic and Social Council

oordination upport Status: February 2017

IRF and UNECE ITS Event

T-Systems company profile

OVERVIEW OF ETSI IoT ACTIVITIES

WE IMPROVE THE WORLD THROUGH ENGINEERING!

Agenda. About TRL. What is the issue? Security Analysis. Consequences of a Cyber attack. Concluding remarks. Page 2

Cyber-Physical Chain (CPChain) Light Paper

Platform Economy and Trustworthiness Standardization

Cooperative Vehicles Opportunity and Challenges

Fending Off Cyber Attacks Hardening ECUs by Fuzz Testing

*NSTAC Report to the President on the Internet of Things.

EU-R VIDEO SECURITY, DATA PROTECTION AND DATA SECURITY

Maxime Flament, CTO 5GAA GAA

FORTIKA - Cyber Security Accelerator for trusted SMEs IT Ecosystems THE PROJECT

National Strategies. Key Domain Primary Direction

Thomas Burke. Darek Kominek Marketing Manager, Matrikon (Honeywell) President, OPC Foundation OPC Foundation

Giesecke+Devrient. Company Presentation

A Perspective on V2X in the United States

GSMA Embedded SIM Specification Remote SIM Provisioning for M2M. A single, common and global specification to accelerate growth in M2M

Mobile Edge Computing

Talk2M. You and your devices, together everywhere. IIoT Cloud for Remote Connectivity.

KPIT S Connected Vehicle Practice

COMPANION FINAL EVENT 14 TH & 15 TH September 2016

EU General Data Protection Regulation (GDPR) Achieving compliance

Where are we with C-ITS today? Joint CIMEC/CODECS City Pool workshop Barcelona, 14 November 2016

Improving Internet of Things Device Certification with Policy Based Management

Christoph Voigt, Chairman 5GAA GAA

Data as a Key Enabler For Future Mobility Opportunities for the Region and Roles Of Governments

Auf dem Weg zur 5G -Technologie:

All rights reserved. ITS at ETSI. Presented by Luis Jorge Romero on behalf of ETSI TC ITS

Development of an autonomous driving ECU platform for streamlining the development of autonomous driving vehicle applications

Northeast Transportation Safety Conference Connect ed and Aut omat ed Vehicles

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017

Canada s Asia-Pacific Gateway and Corridor Initiative and Future Gateway Strategies

SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS

LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT

European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016

Cooperative ITS Corridor Joint Deployment

EMERG IOT / M2M regulation and autonomous driving

AUTOMOTIVE HMI DESIGN AT ITS BEST.

Security for Industry 4.0 Trends -- Challenges -- Opportunities

The international CETECOM Group. ETSI ITS Workshop 2013 Session 4 Testing and Certification CETECOM ITS Service Partner Ulrich Keuling, CETECOM

NSS NETWORK SECURITY SOLUTIONS REST ASSURED

SECURING THE CONNECTED ENTERPRISE.

Industry 4.0 & Transport for Digital Infrastructure

Strong Security Elements for IoT Manufacturing

International Telecommunication Union

WeVe: When Smart Wearables Meet Intelligent Vehicles

MASP Chapter on Safety and Security

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network

Achieving End-to-End Security in the Internet of Things (IoT)

SOLUTIONS FOR TESTING CAMERA-BASED ADVANCED DRIVER ASSISTANCE SYSTEMS SOLUTIONS FOR VIRTUAL TEST DRIVING

SCALABLE VEHICULAR AD-HOC NETWORKS DISTRIBUTED SOFTWARE-DEFINED NETWORKING

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

The Cost in Fatalities, Injuries and Crashes Associated with Waiting to Deploy Vehicle-to- Vehicle Communication

Smart Payments. Generating a seamless experience in a digital world.

Future Implications for the Vehicle When Considering the Internet of Things (IoT)

WHY 7LAYERS IS THE RIGHT CHOICE FOR SERVICES AND PRODUCTS LEADING INTO A SMARTER WORLD

WardsAuto Interiors Conference Creating the Ultimate User Experience

FACTS FIGURES TÜV SÜD AG

Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

ARC-IT V8 Workshop ARCHITECTURE OVERVIEW

Building digital societies in Asia: Making transportation smarter

Secure Product Design Lifecycle for Connected Vehicles

Real-World Static Map Data and its Connection to Dynamic Scenario Generation. Dr.-Ing. Gunnar Gräfe, 3D Mapping Solutions GmbH

Tsutomu Morimura Central Japan Railway Company

OTA and Remote Diagnostics

Transcription:

Press release High-performance IT security solutions protect V2X communication against cyberattacks ESCRYPT GmbH Am Hain 5, 44789 Bochum, Germany Phone: +49 234 43870-200 Press and Public Relations: Martin Delle martin.delle@escrypt.com www.escrypt.com Connected driving is the future. However, data exchange between vehicles and roadside equipment will only become genuinely beneficial when it is securely protected against unauthorized access. Cybersecurity specialist ESCRYPT is unveiling its secure V2X communication solution at CES 2018 in Las Vegas. The future benefits of V2X communication such as increased driving and traffic safety and intelligent traffic management are undeniable. It will help avoid accidents, shorten journey times, and make finding parking spaces a breeze. There is, however, an absolutely vital precondition: real-time communication from vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) must be reliably safeguarded from misuse, manipulation, and data spying. Even the thought that hackers could attack infrastructure and traffic management systems, create movement profiles, or access the onboard network communications of individual vehicles via V2X would deal a fatal blow to connected mobility. Security credentials management: the security infrastructure behind V2X V2X requires its own supporting security infrastructure which guarantees effective safeguarding of the mutual exchange of authenticated messages. ESCRYPT has developed software toolkits and security infrastructure products to help implement the Security Credentials Management System (SCMS) used to secure V2X communications. The system secures the communication of vehicles with each other and with roadside 1

equipment in two ways: by means of digital signatures, which protect messages against manipulation and unauthorized access; and by means of certificates, which identify the respective sender as trustworthy. Overall, the V2X data exchange has to be secured on two levels: first of all, in the embedded systems themselves, in the vehicle ECUs, and in the roadside equipment s electronic controllers; and secondly, through a backend that effectively and securely manages the huge number of certificates required for secure V2X communication. Complementary end-to-end solution: Smart certificate management ensures authentication and anonymity As a leading expert for automotive and IoT security, ESCRYPT provides complementary solutions that cover both these levels. The CycurV2X software development kit makes it possible for carmakers, tier-1 suppliers, and manufacturers of roadside equipment to implement V2X security protocols in their automotive embedded systems. To this end, CycurV2X supplies a robust V2X security solution that isolates the security infrastructure interfaces via a simple API. The special advantage of this system is that V2X security can be expanded seamlessly at any time from cautious introductions through to real-time operation with fully comprehensive IT security functions. In this complete solution, data security and data protection go hand in hand. The V2X messages are reliably authenticated at all times to ensure that only authorized vehicles and roadside equipment are communicating. In addition, the privacy of vehicle users is protected: the movements of road users cannot be tracked, as CycurV2X always holds a batch of concurrently valid certificates and replaces the active certificate with a new one on a rolling basis during the journey, at intervals of every few minutes. With CycurV2X-SCMS, ESCRYPT also supplies the requisite backend security infrastructure components for the public key infrastructure. CycurV2X-SCMS offers here a 2

comprehensive, standards-compliant platform for the supply and blocking of certificates for vehicles and roadside equipment. Both solutions are compliant with North American and European standards. Moreover, in their performance capability and scalability, they are already designed to manage the permanent exchange of authenticated messages between millions upon millions of vehicles and roadside equipment. When completed, the V2X security system will be by far the largest public key infrastructure in the world. At the same time, it will have to provide space to various different players. Accordingly, the security design of the ESCRYPT solutions is based on a distributed architecture with a separation of roles. This allows auto manufacturers and the managers of intelligent transport systems (ITS) to work independently of each other in one system based on a single trust anchor. Vehicles and roadside equipment can securely exchange authenticated messages even if they are managed by different organizations between which there is no official connection. Equally, data protection and the anonymity of road users is guaranteed at all times. Proven in ITS pilot projects The CycurV2X solutions are demonstrating their practicality for providing a functioning V2X security infrastructure in several ITS pilot projects. In North America, for example, ESCRYPT has been working with the U.S. Department of Transportation and the Crash Avoidance Metrics Partnership (CAMP) initiative to support various reference projects for vehicle connectivity. In Europe, the German Federal Office for Information Security (BSI) entrusted ESCRYPT with providing the requisite public key infrastructure for secure V2X communication for the Cooperative ITS Corridor project. Connected driving has moved way beyond just a model for the future. Thanks to intelligently linked IT security solutions, it is well on the path to becoming everyday reality. 3

Secure V2X communication at a glance 4

ESCRYPT GmbH - Embedded Security Martin Delle +49 234 43870-290 martin.delle@escrypt.com ESCRYPT GmbH Embedded Security ESCRYPT - Embedded Security is the leading system provider for embedded security world-wide. With locations in Germany, UK, Sweden, USA, Canada, India, China, Korea, and Japan we have security specialists available to help with current security topics such as secure M2M-communication, IT-security in the Internet of Things, protection of e- business models and automotive security and they develop highly secure, worldwide valued products and solutions which are tailored to the specific requirements of embedded systems and the relevant IT-infrastructure and are tested and proven a million times in automotive series production. For further information: www.escrypt.com 5