Automotive Cyber Security

Similar documents
Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Agenda. About TRL. What is the issue? Security Analysis. Consequences of a Cyber attack. Concluding remarks. Page 2

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

Future Implications for the Vehicle When Considering the Internet of Things (IoT)

Emerging Trends in Vehicular Communications

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle

Examining future priorities for cyber security management

DEx. Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy.

WeVe: When Smart Wearables Meet Intelligent Vehicles

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017

Authentication with Privacy for Connected Cars - A research perspective -

Automotive Anomaly Monitors and Threat Analysis in the Cloud

To realize Connected Vehicle Society. Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan

Connected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is

Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security

13W-AutoSPIN Automotive Cybersecurity

Electrification of Mobility

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division

Security for V2X Communications

Copyright 2017 Ford Motor Company, All Rights Reserved

Cooperative Vehicles Opportunity and Challenges

Turbocharging Connectivity Beyond Cellular

Uptane: Securely Updating Automobiles. Sam Weber NYU 14 June 2017

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

Secure Product Design Lifecycle for Connected Vehicles

Next Generation Infotainment Systems

Accelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation

Controlling traffic In a Connected world

SGS CYBER SECURITY GROWTH OPPORTUNITIES

Automotive Gateway: A Key Component to Securing the Connected Car

SECURITY OF VEHICLE TELEMATICS SYSTEMS. Daniel Xiapu Luo Department of Computing The Hong Kong Polytechnic University

Securing the Autonomous Automobile

Cybersecurity Engineering and Assurance for Connected and Automated Vehicles

Security enhancing CAN transceivers. Bernd Elend Principal Engineer March 8 th, 2017

All rights reserved. ITS at ETSI. Presented by Luis Jorge Romero on behalf of ETSI TC ITS

Securing V2X communications with Infineon HSM

ARM processors driving automotive innovation

Vehicle To Android Communication Mode

Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego

Innovation policy for Industry 4.0

Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection

National Institute of Standards and Technology

Development of Intrusion Detection System for vehicle CAN bus cyber security

AUTOMOTIVE FOUNDATIONAL SOFTWARE SOLUTIONS FOR THE MODERN VEHICLE

Automotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017

Roger C. Lanctot Director, Automotive Connected Mobility

Trusted Platform Modules Automotive applications and differentiation from HSM

Heavy Vehicle Cybersecurity Update. National Motor Freight Traffic Association, Inc.

Cyber security of automated vehicles

GNU Radio Software Defined DSRC Radio

Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University

5G promotes the intelligence connected vehicles. Dr. Menghua Tao Senior Solution Manager China Unicom

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017

Offense & Defense in IoT World. Samuel Lv Keen Security Lab, Tencent

Trust & Privacy: Information Security and Identity Management for Autonomous Vehicles. March 31, failure analysis & prevention

Applying Lessons Learned to V2X Communications for China

A Perspective on V2X in the United States

Introduction to VANET

TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS

WardsAuto Interiors Conference Creating the Ultimate User Experience

Integrated C4isr and Cyber Solutions

Dedicated Short Range Communication: What, Why and How?

Using and Customizing Microsoft Threat Modeling Tool 2016

Smart Connected Vehicles: Driving to the Bottom Line!

Extreme automation of today s technological marvel - connected cars

Security in sensors, an important requirement for embedded systems

A. SERVEL. EuCNC Special Sessions 5G connected car 01/07/2015

Security Challenges with ITS : A law enforcement view

VEHICLE FORENSICS. Infotainment & Telematics Systems. Berla Corporation Copyright 2015 by Berla. All Rights Reserved.

Industry 4.0 & Transport for Digital Infrastructure

M2MD Communications Gateway: fast, secure, efficient

Security and Privacy in Car2Car Adhoc Networks

SIP Automated Driving System SEIGO KUZUMAKI Program Director. Nov

Automotive Security Standardization activities and attacking trend

Securing the future of mobility

CompTIA Security+ Study Guide (SY0-501)

Internet of Things: Driving the Transformation

Security Analysis of modern Automobile

ETSI ITS Security Assessment

Build a Driver Information System with IoT Technology

Cyber security mechanisms for connected vehicles

Connect Vehicles: A Security Throwback

ITU activities on secure vehicle software updates

4G and 5G Cellular Technologies Enable Intelligent Transportation Use Cases

IRF and UNECE ITS Event

Automotive Security through New Communication Lockdown Utilizing Programmable Logic Solutions

Computer Science 461 Final Exam May 22, :30-3:30pm

V2X: Beyond the Horizon. IBTTA AET Meeting July 18, 2017

Securing the Connected Car. Eystein Stenberg Product Manager Mender.io

Connected Car. Dr. Sania Irwin. Head of Systems & Applications May 27, Nokia Solutions and Networks 2014 For internal use

CyberFence Protection for DNP3

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

The NIST Cybersecurity Framework

to Address Cyber Physical Systems Security (CPSSEC)

Voertuigconstructeurs en data economie

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use

Secure Ethernet Communication for Autonomous Driving. Jared Combs June 2016

Risk-based design for automotive networks. Eric Evenchik, Linklayer labs & Motivum.io Stefano Zanero, Politecnico di Milano & Motivum.

Network, Policy & Privacy Considerations for Connected Autonomous Vehicle Initiatives

Transcription:

Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18 January 2017 1

Smart Cars 2

Driverless Car by Google Velodyne 64-beam laser. San Francisco s Lombard Street 3 3

The GM OnStar System: The First Smart Telematics Solution in the World Enterprise Telematics Platform Cellular Channel Backend Cellular Communication 4

Key Challenge in the Automotive Sector Copyright 2013 Tata Consultancy Services Limited 5

GOAL KEY QUESTIONS CATEGORIES Categories of Automotive Cyber Security Automotive Cybersecurity: Our View Cybersecurity is Critical to Connected Customer Value In-Vehicular Security V2X Security Security of Services Design Build Use How to co-design software and hardware for cybersecurity? How to offer a trusted platform? How to ensure interoperability? How to conform to standards in cybersecurity? How to build connected products that are secure? How to ensure that latest design changes are integrated in production? How to ensure secure usage of connected architecture? How to handle vulnerabilities before, during & after threats? How to allow customers configure features at low risks? Manage Trade-offs for Robust Auto Security Securing content, Authenticating Sender and Receiver of Messages, And Protecting Privacy and Data Across Stakeholders 6

Attack & Defense Scenario Framework for Threat Modeling Attack & Defence Database uses a list of attacks by vulnerable subsystems ensuring that response mechanisms are effective in cost and speed at all levels POTENTIAL VULNERABLE SUBSYSTEMS ATTACK CATEGORIES : EXAMPLES Infotainment Web Applications are Provided In the Vehicle Broken Authentication & Session Management Insecure Direct Object References Sensitive Data Exposure Security Misconfiguration Missing Function Level Access Control Cross-site Request Forgery Unvalidated redirects and forwards 7

What makes Security Critical? Increasing Electronics, Control & Software (ECS) Increasing & Complex Features Infotainment & Entertainment Wireless Links (Bluetooth, WiFi, Cellular, Radio, etc) Drive towards Autonomous Vehicles CISCO world in the Vehicle CAN, Flexray bus ECUs Compute Platform/Gateway Firewalls, 8

Example: V2X Communications X: Vehicle or Infrastructure Copyright 2013 Tata Consultancy Services Limited 9

V2X Communications Avoiding lane change collision Collision mitigation Avoiding rear-end collision Vehicle brakes hard Avoiding intersection collision V2V: Vehicle to Vehicle V2I: Vehicle to Infrastructure V2P: Vehicle to Pedestrian Traffic signal 10

Security Threats in V2V & V2I Figure Source : http://ivc.epfl.ch/ 11

Communication for Active safety Design Drivers & Security Attributes for V2X Safety Applications V2V or V2I scenarios Balancing customer safety and connectivity in a transient multi-modal communication environment is a major challenge Design Drivers for PKI Resource Constrained Platform Limited computation, storage, memory System-wide scalability Many-to-many localized interactions Communication transmission Intermittent connections with lossy or unreliable transmission Interoperability Extensible security framework Message Integrity & Entity Authentication Transmitter is genuine, not tampered in transit Non-repudiation Receiver can prove that it s the sender who transmitted the message Privacy Anonymity, Un-linkability Correctness Detecting compromised units Security Attributes for V2X Robust V2X interfaces developed with rapid validation is an innovation opportunity 12

Concluding Remarks Cyber Security offers rich challenges for both Industry & Academia An excellent example is Autonomous Cars Automotive Cyber Security is an extremely challenging area There are a plethora of technical and business challenges in the space The area is attracting huge interest within OEMs, Tier 1 and Tier 2 organizations 13

Thank You rajeev.shorey@tcs.com rajeevshorey@gmail.com Copyright 2013 Tata Consultancy Services Limited 14