Secure Ethernet Communication for Autonomous Driving. Jared Combs June 2016

Similar documents
Automotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017

How Security Mechanisms Can Protect Cars Against Hackers. Christoph Dietachmayr, CIS Solution Manager EB USA Techday, Dec.

Automotive Security An Overview of Standardization in AUTOSAR

Automotive Anomaly Monitors and Threat Analysis in the Cloud

Countermeasures against Cyber-attacks

Software Architecture for Secure ECUs. Rudolf Grave EB TechDay-June 2015

Efficient testing of ECUs despite Security

Trusted Platform Modules Automotive applications and differentiation from HSM

Time Synchronization Security using IPsec and MACsec

Market Trends and Challenges in Vehicle Security

Cyber security mechanisms for connected vehicles

Automotive Cybersecurity: A steep learning curve

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)

CSC 6575: Internet Security Fall 2017

Agenda. Introduction. Security Protocols Wireless / Mobile Security. Lecture 10. Network Security I

... Lecture 10. Network Security I. Information & Communication Security. Prof. Dr. Kai Rannenberg

IS CAR HACKING OVER? AUTOSAR SECURE ONBOARD COMMUNICATION

PREEvision Technical Article

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017

The IPsec protocols. Overview

Automotive Security: Challenges and Solutions

IPSec. Overview. Overview. Levente Buttyán

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

SW-Update. Thomas Fleischmann June 5 th 2015

Internet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Ethernet Design Challenges The requirements and use of Ethernet with AUTOSAR

IP Security. Cunsheng Ding HKUST, Kong Kong, China

Automotive Gateway: A Key Component to Securing the Connected Car

CIS 6930/4930 Computer and Network Security. Topic 8.1 IPsec

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Introducing Hardware Security Modules to Embedded Systems

CSE543 Computer and Network Security Module: Network Security

Connecting Securely to the Cloud

EB TechPaper. Combining the strengths of Elektrobit's SecOC with Argus IDPS. elektrobit.com

Scalable and Flexible Software Platforms for High-Performance ECUs. Christoph Dietachmayr Sr. Engineering Manager, Elektrobit November 8, 2018

Cyber security of automated vehicles

OFF-ROAD VEHICLE DIAGNOSTICS WITH AUTOSAR. Jigar Patel Namdeo Dhawle July 18, 2018

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/sicurezza1415/ Chapter 16: 1

Functional Safety and Cyber-Security Experiences and Trends

13W-AutoSPIN Automotive Cybersecurity

Network Encryption 3 4/20/17

Security and Lawful Intercept In VoIP Networks. Manohar Mahavadi Centillium Communications Inc. Fremont, California

CIS 5373 Systems Security

Cryptography and Network Security. Sixth Edition by William Stallings

Securing the future of mobility

Intrusion Detection Adapted for Automotive Challenges for Hardware - An Implementation Example

Introduction and Overview. Why CSCI 454/554?

Securing Internet of things Infrastructure Standard and Techniques

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Virtual Private Networks.

Mentor Automotive. Vehicle Network Design to meet the needs of ADAS and Autonomous Driving

CIT 380: Securing Computer Systems. Network Security Concepts

Development of Intrusion Detection System for vehicle CAN bus cyber security

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017

Network Security and Cryptography. December Sample Exam Marking Scheme

The Safe State: Design Patterns and Degradation Mechanisms for Fail- Operational Systems

Network Security. Thierry Sans

AIT 682: Network and Systems Security

CSCE 715: Network Systems Security

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Secure automotive on-board networks

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Owner Nicklas Andersson 5610_ Date Revision 0.1 Page 1(15) Project Document. Title VCM User Manual.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

Distributed Systems. Lecture 14: Security. Distributed Systems 1

Security Concerns in Automotive Systems. James Martin

Distributed Systems. Lecture 14: Security. 5 March,

Autonomous Driving From Fail-Safe to Fail-Operational Systems

Lecture 12 Page 1. Lecture 12 Page 3

On the Internet, nobody knows you re a dog.

THOUGHTS ON TSN SECURITY

Lecture 13 Page 1. Lecture 13 Page 3

IPSec Transform Set Configuration Mode Commands

INTERNET PROTOCOL SECURITY (IPSEC) GUIDE.

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG

Adversary Models. CPEN 442 Introduction to Computer Security. Konstantin Beznosov

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Future Implications for the Vehicle When Considering the Internet of Things (IoT)

Chapter 24 Wireless Network Security

Legacy-Compliant Data Authentication for Industrial Control System Traffic

ETHERNET JOURNEY AT JAGUAR LAND ROVER CHALLENGES IN THE DEVELOPMENT OF AN ETHERNET BACKBONE

VoIP Security Threat Analysis

Chances and challenges

Functional Safety and Cyber Security Experiences and Trends

Virtual Private Networks (VPN)

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/sicurezza1516/ Chapter 16: 1

Wireless Network Security

Control Plane Security Overview

盤技術Approaches for Secure and Efficient In-Vehicle Key Management*

Numerics. Index 1. SSH See SSH. connection inactivity time 2-3 console, for configuring authorized IP managers 11-5 DES 6-3, 7-3

Wireless Network Security Spring 2015

Transport Level Security

CSC 4900 Computer Networks: Security Protocols (2)

CSCE 715: Network Systems Security

Wireless Network Security Spring 2013

SECURITY OF VEHICLE TELEMATICS SYSTEMS. Daniel Xiapu Luo Department of Computing The Hong Kong Polytechnic University

Firewalls, Tunnels, and Network Intrusion Detection

Transcription:

Secure Ethernet Communication for Autonomous Driving Jared Combs June 2016

Agenda Motivation for Security The Multi-Level Security Architecture Proposal Level 1: Restrict access to the network Level 2: Secure onboard communication Level 3: Apply data usage policies Level 4: Detect anomalies and defend Multi-level security architecture with AUTOSAR 2

Motivation Advanced driver assistance systems (ADAS) are evolving towards autonomous driving From alert & assist e.g. lane departure warning, lane keeping assist to features taking more control e.g. highway chauffeur, valet parking Automotive Ethernet is a key enabler for autonomous driving. Secure Ethernet Communication is required to ensure: Availability Sensor data is available on time to create an environment model of the vehicle Actuator commands are sent correctly to control the vehicle Integrity Sensor and actuator data are sent by authorized parties only to avoid manipulation Sensor and actuator data is not altered, removed or delayed to avoid manipulation Confidentiality Sensor and actuator data are not monitored by unauthorized 3 rd parties to protect driver s privacy 3

Secure Communication Protection against effects of malicious faults on the communication link Types of Attack: injection of malicious control commands prevention of correct system function (insertion, deletion, manipulation, replay and delay of messages) Points of Attack: additional nodes (e.g. via OBD connector or wireless access) corrupted and misused existing nodes (e.g. root access to infotainment system via cellular network) nodes replaced by manipulated ones New threats can emerge during system operation Threats are attacks (malicious, human made, external) Goal: Protect assets (property, environment and human life) 4

Solution: Multi-Level Security Architecture Enhancedconnectivity and the dynamicsof the security threats demand to establishseveralsecuritybarriersin order to avoid a full exposure in case a security mechanism is bypassed. Approach: establish security mechanisms on four levels: Level 1: restrict access to the network Level 2: secure onboard communication Level 3: apply data usage policies Level 4: detect anomalies and defend Goal: Protect against attacks violating the availability, integrity and confidentiality. 5

Multi-Level Security Architecture Level 1: Restrict access to the network Level 2: Secure onboard communication Level 3: Apply data usage policies Level 4: Detect anomalies and defend 6

Various access points to the network Car2Infrastructure Car2Car ecall Bluetooth connection Wireless key Internet connection WiFi Hotspot Remote HVAC Remote start Tire pressure monitor 7

Level 1: Restrict access to the network (I) Limit the number of ECUs with off-board connections (WLAN, bluetooth, cellular, wireless key, DAB, OBD plug, PLC), e.g. via central network access point with stateful firewall diagnostic communication from external tester to ECUs via central gateway (communication between tester and central gateway via TLS) 8

Level 1: Restrict access to the network (II) Divide network into security zones, e.g. extern, demilitarized, internal. And restrict traffic between zones: Physical split or separation via VLANs Not only extern-intern, but also intern-intern, e.g. infotainment to powertrain Tester VLAN Tagging to separate external internal All frames from the external tester are tagged with an orange VLAN tag at the switch located at the GW Thus only nodes assigned to the orange VLAN can receive frames from the external tester Frames to be sent to external tester, are sent via the orange VLAN the switch at the gateway removes the orange VLAN tags before forwarding it to the tester VLAN Tagging to separate internal networks ECUs from Infotainment (blue VLAN), chassis (green VLAN) and powertrain (yellow VLAN) can be separated, i.e. will only see frames from the assigned VLANs Traffic between VLANs require a switch or Gateway 9

Level 1: Restrict access to the network (III) static Ethernet Switch Forwarding tables OR MAC learning only during learning mode (e.g. end-of-line) static ARP tables at nodes OR Address Resolution Protocol only during learning mode (e.g. end-of-line) Source: AUTOSAR 4.2 EthSwt SWS device authentication/authorization deactivation of unused (non authorized) ports 10

Multi-Level Security Architecture Level 1: Restrict access to the network Level 2: Secure onboard communication Level 3: Apply data usage policies Level 4: Detect anomalies and defend 11

Level 2: Secure onboard communication (I) Data integrity, authentication, encryption Authentication and integrity of critical frames Symmetric key because of calculation effort (and required bandwidth) Encryption for exchange of session keys Choice of protection layer and protocol: Application Application specific (proprietary) ASR SecOC Application Com SW Com HW MACsec TLS IPsec Switch MACsec Com SW Com HW 12

Level 2: Secure onboard communication (II) Data integrity, authentication, encryption - Protocols Protocol Standard Type/Layer Authent. Encryption Comment MACsec IPsec AH (Authentication Header) IPsec ESP (Encapsulating Security Payload ) TLS 1.2 (Transport Layer Security) SecOC IEEE 802.1AE IETF RfC 4302 IETF RfC 4303 IETF RfC 5246 AUTOSAR Hop-by-hop Data-Link End-to-End IP End-to-End IP End-to-End TCP End-to-End PDUs X X X - X X X X X - Requires crypto/keys at each network node Does not work with UDP supports MACtruncation (works also with CAN / FlexRay) 13

Level 2: Secure onboard communication (III) Data integrity, authentication using AUTOSAR SecOC Authentication and integrity of critical frames based on Message Authentication Code (MAC, i.e. usage of symmetric key) and freshness value (counter or timestamp) Symmetric key because of calculation effort (and required bandwidth) Sender generates MAC based on DataId, data, freshness value and secret key. MAC and freshness value are transmitted together with PDU data. Receiver verifies MAC based on received data and freshness value as well as locally stored secrete key, DataId CNT/MAC truncation can be used if message length is very limited. DataId DataId Source: AUTOSAR 4.2 SecOC SWS 14

Level 2: Secure onboard communication (IV) Design principles for key usage (for encryption and authentication) Distinct keys for different functions, e.g. Traffic Authentication Key (TAK): used for authentication of traffic Traffic Encryption Key (TEK): used for encryption/decryption of traffic Key Encryption Key (KEK): unique for each ECU and used only for en/decryption of new keys If TEK gets compromised, a new TEK can be distributed via KEK If KEK of an ECU gets compromised, a new TEK can still be securely distributed to the other ECUs (as they are using all different KEKs) Akey shall only be used for securing a limited number of data TEK is only valid for a certain period to limit the exposure in case of compromise Furthermore critical communication is clustered into secure communication groups, e.g. separate TEKs for ADAS sensors, chassis and powertrain communication. For efficient execution of cryptographic functions and secure key storage a hardware security module (HSM) is used in combination with software crypto libraries. 15

Level 2: Secure onboard communication (V) Design principle for Key Management (Generation, Distribution and Storage) SB Service Backend Server KM Key Master SB Internet KM ECU Asym/Sym Off-board Based on: The EVITA Project Sym On-board Service Backend (off-board) >> KeyMaster (on-board): Communication between SB and KM is encrypted using asymmetric cryptography SB configures and triggers key exchange at KM KeyMaster >> ECUs: Communication between KM and ECUs is encrypted using symmetric cryptography KM generates communication group session keys (TEK) if triggered, e.g. by the SB, a timeout or a diagnostic request KM assigns TEKs to ECUs by using the related Key Encryption Key (KEK) of the ECU ECU securely stores the keys in its HSM 16

Multi-Level Security Architecture Level 1: Restrict access to the network Level 2: Secure onboard communication Level 3: Apply data usage policies Level 4: Detect anomalies and defend 17

Level 3: Apply data usage policies Define data usage policies to limit the exposure Use service specific know how to implement policies in the application Examples Control Data: accept control commands only in specific application states, define priorities of requester Sensor data: validate the contents of data (context, history, ) allow diagnostic messages only in specific vehicle state, e.g. speed is less than 5mph or drivers door open allow massive steering/braking/acceleration change only in certain vehicle state (e.g. crash indication, driver request in sport mode, ) use more than one sensor (instance) to determine if the vehicle is not moving Challenges Highly application dependent Side-effect must be considered 18

Multi-Level Security Architecture Level 1: Restrict access to the network Level 2: Secure onboard communication Level 3: Apply data usage policies Level 4: Detect anomalies and defend 19

Level 4: Detect anomalies at the network and defend Anomalies: deviations to specified communication matrices e.g. cyclic message is received more often than defined, very high network load, 1:n message received with different source addresses, Detection: via central device or at the receiver e.g. plausibility check based on diverse input data or data sequence, failed integrity checks Defend: report (e.g. DTC, involvement of driver, ) and start mitigation mask (e.g. block messages from infotainment ECU, block messages from babbling idiot by enforcing bandwidth limitation at switches) or Stream1 Stream2 ECU 40 20 20 20 Switch reconfigure (e.g. deactivation of critical functions, initiate hand-over in case of autonomous driving, request change of session key ) 20

Security Level Overview Levels protecting against attacks violating the availability, integrity and confidentiality: Level Availability Integrity Confidentiality Level 1: restrict access to the network Yes Yes Yes Level 2: secure onboard communication Level 3: apply data usage policies No (DoS attacks) No (DoS attacks) Level 4: detect anomalies and defend Yes (Yes) Yes Yes Yes No (eavesdropping) No (eavesdropping). 21

Multi-level security architecture with AUTOSAR Level 3 SecKeyM Level 2 Csm Interface layer Csm SecMon CryHsm Implementation layer Cry Level 1 Level 4 Hardware Security Module 22

Summary Autonomous driving requires secure communication to protect against malicious attacks Multi-level security architecture ensures availability, integrity and confidentiality Security mechanisms Lots of experience from IT industry Adaptations for automotive necessary and implemented First steps of standardization for security in automotive achieved, more needed. Solutions are available, use them to secure Ethernet for autonomous driving. 23

Thank you! automotive.elektrobit.com/ethernet Would you like to know more? Tech Paper: https://www.elektrobit.com/tech-corner Secure automotive Ethernet for automated driving Roman.Pallierer@elektrobit.com Michael.Ziehensack@elektrobit.com Jared.Combs@elektrobit.com We take you to the fast lane! We take you to the fast lane!