v2x security privacy and trust overview
play

V2X security, privacy and trust overview Dr. Jo s Ma ra de F ue - PowerPoint PPT Presentation

V2X security, privacy and trust overview Dr. Jo s Ma ra de F ue nte s (jfue nte s@ inf.uc 3m.e s) COSE C L a b Unive rsity Ca rlo s I I I de Ma drid Agenda I ntro : Ve hic ula r c o mmunic a tio ns (V2X), wha t fo r? o Re a


  1. V2X security, privacy and trust overview Dr. Jo sé Ma ría de F ue nte s (jfue nte s@ inf.uc 3m.e s) COSE C L a b Unive rsity Ca rlo s I I I de Ma drid

  2. Agenda • I ntro : Ve hic ula r c o mmunic a tio ns (V2X), wha t fo r? o Re a l-wo rld ne ws • V2X sta ke ho lde rs • Se c urity, priva c y, trust issue s • Our pre vio us re sults • Co nc lusio ns 2

  3. V2X – what for? • Part of smart cities • Road safety + infotainment I ma g e so urc e : T e le ma tic sne ws.o rg , a rm.c o m 3

  4. V2X privacy in the real world 4

  5. V2X security in the real world 5

  6. V2X sec&priv&trust in the real world 6

  7. V2X sec&priv&trust in the real world 7

  8. V2X stakeholders Automakers Governments & car industry Consumers Intelligent Transport Systems (or V2X) • What about V2X security, privacy, trust? 8

  9. V2X active stakeholders • Automakers o Increasingly involved – proof ‐ of ‐ concept, experimental settings o R&D efforts • Governments o Legal framework for ITS: EU directive & action plan on ITS, also in the US… o Also initiatives in the National level: Spanish ITS initiative… • Research community o Reliable connection o Bandwidth improvements o Protocol design o … security, privacy and trust o Standardization (IEEE, SAE…) 9

  10. V2X – design constraints • Short ‐ range communications o Dedicated Short Range Communications (DSRC) – IEEE 802.11p o 1 km nominal range – 300 mts in practice • Short communication period o Vehicles driving at 140 km/h or higher • Embedded platform o Not PC… low computation resources • Lack of global infrastructure o Ad ‐ hoc nature • Regular sec/priv mechanisms cannot be applied “as is” 10

  11. V2X – security • Data may be privileged o On ‐ trip services (e.g. next gas station pre ‐ booking) o Need for confidentiality o IEEE 1609.2 : use of elliptic curves • Data must come from authorized entities o Road safety announcement (e.g. bottleneck ahead) o Need for source authentication o IEEE 1609.2 : public ‐ key certificates • Some actions must be accountable o Illusion attack – forcing a collision o Someone has to be liable! Need for non ‐ repudiation o IEEE 1609.2 : elliptic curves digital signature (ECDSA) 11

  12. V2X – privacy • Beacon permanently sent • Signed with public key certificates • Hot topic – use pseudonyms? Anonymous certificates? How to deal with accountability? 12

  13. V2X – trust • Data must be trustworthy o Avoid false alarms o Building plausibility checks o Data ‐ centric trust establishment • (Low) in ‐ vehicle data security o CAN bus : efficiency vs. Security o Cheap sensors • Safety is at stake! Secure on ‐ board platform o Car ‐ to ‐ car consortium o EU R&D projects: EVITA, OVERSEE o Use of Hardware Security Modules (HSM) 13

  14. V2X sec/priv/trust miscellaneous issues • Over ‐ the ‐ air updates o Flexibility against security • Non ‐ repudiation of receipt o Future issue: “I was not aware of the speed limit in force!” • Data aggregation o Good for efficiency , what about security? 14

  15. V2X sec/priv/trust at COSEC • Ove rvie w o f se c urity issue s in V2X • Hinde ring fa lse e ve nt disse mina tio n in V2X • V2X fo r e nfo rc e me nt ivac y -pre se rving speed c o ntro l o Pr o V2X-b a se d fine notific ation videnc e ma na g e me nt to re po rt misb e ha ving ve hic le s o E o Use o f steganogr aphy to hide info rma tio n in V2X c o mmunic a tio ns o Patent : Priva c y-pre se rving c he c k o f driving a utho riza tio ns witho ut sto p 15

  16. Summary • V2X se c urity, priva c y a nd trust de se rve a tte ntio n in the ne a r te rm I ndustry – upc o ming de ve lo pme nts o Re se a rc h – o pe n c ha lle ng e s o • E xisting sta te -o f-the -a rt te c hno lo g ie s c a ll fo r a fina l ste p a he a d • I n this ta lk, a sho rt o ve rvie w o n se c urity, priva c y a nd trust in V2X ha s b e e n pre se nte d 16

  17. V2X security, privacy and trust overview Dr. Jo sé Ma ría de F ue nte s (jfue nte s@ inf.uc 3m.e s) COSE C L a b Unive rsity Ca rlo s I I I de Ma drid 17

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend