policy and organizational challenges for vehicular...

27
Secure Vehicular Communications Secure Vehicular Communications Workshop. EPFL, 20.02.08 Workshop. EPFL, 20.02.08 Emilio Davila Gonzalez Emilio Davila Gonzalez EC DG INFSO.G4 EC DG INFSO.G4 Policy and Organizational Policy and Organizational Challenges for Vehicular Challenges for Vehicular Communications Security Communications Security

Upload: others

Post on 22-Sep-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Secure Vehicular Communications Secure Vehicular Communications Workshop. EPFL, 20.02.08Workshop. EPFL, 20.02.08

Emilio Davila GonzalezEmilio Davila GonzalezEC DG INFSO.G4EC DG INFSO.G4

Policy and Organizational Policy and Organizational Challenges for Vehicular Challenges for Vehicular Communications SecurityCommunications Security

Page 2: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 2

Contents

• The Framework: Trust and Security in electronic communications

• EC research activities on Trust and Security

• The special case of vehicular communications–– The eCall caseThe eCall case–– 11stst Workshop inWorkshop in--vehicle vehicle telematicstelematics and and

cooperative systems cooperative systems ––Privacy and data protectionPrivacy and data protection

– eSecurity Working Group– Research activities

Page 3: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 3

The Framework

• Information Society (r)evolution has caused massive amounts of personal data generated, processed, exchanged and stored

• i2010 Initiative identifies security (trust and privacy) as one of the main challenges posed by digital convergence

• Personalised, dynamic open services need trust and security

• PETs can allow deployment of services while respecting personal privacy

• User centric - empowerment approach, data protection and proportionality are key issues

Page 4: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 4

Relevant EC regulation

• Directive 95/46/EC: Protection of individuals with regard to the processing of personal data and on the free movement of such data.

• Directive 2002/58/EC: The processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications)

• COM(2006) 251: A strategy for a Secure Information Society – “Dialogue, partnership and empowerment”

• COM(2007) 96: Radio Frequency Identification (RFID) in Europe: steps towards a policy framework

• COM(2007) 228: Promoting Data Protection by Privacy Enhancing Technologies (PETs)

Page 5: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 5

Contents

• The Framework: Trust and Security in electronic communications

• EC research activities on Trust and Security

• The special case of vehicular communications–– The eCall caseThe eCall case–– 11stst Workshop inWorkshop in--vehicle vehicle telematicstelematics and and

cooperative systems cooperative systems ––Privacy and data protectionPrivacy and data protection

– eSecurity Working Group– Research activities

Page 6: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 6

ICT WP 2007-08, Objective 1.4:

“Secure, dependable & trusted infrastructures”

SDMMC

E-TowerGame Machine

Telephone

PC

DVD

Audio

TVSTBDVC Map Information

IC Card

SDMMC

SDMMC

SIM

♪Digitalcontents

Intranet Information

PersonalInformation

Car/Railway Mobile Office/Factory

Home Outdoor Street/Shop

Public expectationWeb Technologies

(virtual environments, collaborative communities…)

Enabling TechnologiesEnabling TechnologiesCrypto, trusted computing, secure softwareCrypto, trusted computing, secure software

90 M€

Coordination ActionsCoordination Actions

Page 7: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 7

ICT Objective 1.4:“Secure, dependable & trusted

infrastructures”

Enabling TechnologiesEnabling TechnologiesCrypto, trusted computing, secure softwareCrypto, trusted computing, secure software

Coordination ActionsCoordination Actions

90 M€

Coordination ActionsResearch roadmaps, metrics and benchmarks, international cooperation, coordination activities

4 Projects: 3.3 m€

Networkinfrastructures

4 Projects11 m€

Service infrastructures

4 Projects18 m€

Identity management,privacy, trust policies

3 Projects20.5 m€

6 Projects: 22 m€Enabling technologies for trustworthy infrastructuresBiometrics, trusted computing, cryptography, secure SW

2 Projects5.8 m€

1 Project9.4 m€

Page 8: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

90 M€

7th EU Research Framework Programme (2007-2013)

“Secure, dependable & trusted infrastructures”

privacy

WOMBATFORWARD

AWISSENETINTERSECTION

biometry

secure implementation

SHIELDSCACE

TECOM

AVANTSSARTHINK TRUST

INCO-TRUST

AMBER

PRISM

PICOS

ECRYPT II MASTER

CONSEQUENCE

GEMOM

SWIFT

ACTIBIOMOBIO

SecureSCM

TURBINE

TAS3

PRIMELIFE

Coordination Actions

Type of projects

STREPsNoEs

IP projects

networking &coordination

trusted computing

network services

Page 9: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 9

Main R&D project prioritiesMain R&D project priorities• An integrated security framework and tools for the security and resilience

of heterogeneous networks (INTERSECTIONINTERSECTION)

• A networking protocol stack for security and resilience across ad-hoc PANs& WSNs (AwissenetAwissenet)

• A message-oriented MW platform for increasing resilience of information systems (GEMOMGEMOM)

• Data gathering and analysis for understanding and preventing cyber threats (WOMBATWOMBAT)

Security in network infrastructures:4 projects, 11 m€ EC funding

Page 10: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 10

Main R&D project prioritiesMain R&D project priorities•• Trusted ComputingTrusted Computing IP TIP TECOMECOM

trusted embedded systems: HW platforms with integrated trust components

•• CryptographyCryptography NoENoE eCrypteCrypt IIII

•• MultiMulti--modal Biometricsmodal Biometricsmulti-biometric authentication (based on face and voice) for mobile devices

(MOBIOMOBIO)activity related and soft biometrics technologies for supporting continuous

authentication and monitoring of users in ambient environments (ACTIBIOACTIBIO)

•• Secure SW implementationSecure SW implementationproviding SW developers with the means to prevent occurrences of known

vulnerabilities when building software (SHIELDSSHIELDS)A toolbox for cryptographic software engineering (CACECACE)

Security enabling Technologies6 projects, 22 m€ EC funding

Page 11: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 11

Contents

• The Framework: Trust and Security in electronic communications

• EC research activities on Trust and Security

• The special case of vehicular communications–– The eCall caseThe eCall case–– 11stst Workshop inWorkshop in--vehicle vehicle telematicstelematics and and

cooperative systems cooperative systems ––Privacy and data protectionPrivacy and data protection

– eSecurity Working Group– Research activities

Page 12: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 12

eCall: Data Protection issues (1)

• Legitimate processing of MSD: Solution: Unambiguous consent -7(a) =>

Possibility of easy deactivation

• Adequate processing by data controllers:Publicly appointed organisations to act as PSAPsAdequate storage periods

• Security of the communications and of data storedIVS, MNOs, PSAPs

Page 13: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 13

eCall: Data Protection issues (2)

• Citizen TrustFair, adequate and not excessive processingNo secondary use of informationMSD => Minimum information for effective handling of the emergency call System not permanently trackedUser awareness

Page 14: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 14

• Specific rules for FSD: Service providers should respect the data protection and privacy regulation:

• Clear definition of the use of data• Proportionality• Transparency• Freely given consent

eCall: Data Protection issues (3)

• Service providers (contract)

Page 15: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 15

11stst Workshop inWorkshop in--vehicle vehicle telematicstelematics and and cooperative systems cooperative systems ––

Privacy and data protectionPrivacy and data protection

• Privacy may be a barrier for the deployment of services

• Objective: bring together ITS & DPO experts to discuss common guidelines for the design of applications in this area

• 1st WS: 13/02/2007• 50+ participants, including 8 DPO

Page 16: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 16

1st WS: Conclusions

• Privacy/data protection issues should be integrated from the early design.

• Liaison with Data Protection Authorities to clarify concepts/provide guidelines

• Data protection/limits depend on the type of applications• Use the personal data for the sole purpose is collected.

Anonymous data can be used for other purposes• PETs are important tools to allow services deployment

while improving privacy protection• Inspire public confidence: user awareness about protection

of their privacy is a plus• Transparency and right of choice to the user• Cost effectiveness should be taken into consideration

Page 17: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 17

1st WS: Way forward: Next steps

• Continue collaboration with art. 29 WP• Creation of a CIRCA repository for

exchanging of information• eSafety Forum to elaborate code of

practice in collaboration with art. 29 WP (ITF)– Security and Data protection by better

design

Page 18: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 18

eSecurity Working Group (1)Objectives

• Two focus:– Data protection– Intrusion avoidance

• Support the reliability of eSafety• Protection of eSafety functions• Prevention of critical road safety effects which

result from electronic vehicle systems• Preventing of misuse or malpractice, including

privacy infringement• Establishment of new R&D fields• Providing of recommendations, code of

practice, standardisation

Page 19: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 19

eSecurity Working Group (2)Topics

• Protection against unauthorised mobile remote access and wired access on networked vehicles including the full electronic system and its components and data against manipulation and subsequent misuse (e.g. wired & tele- data / software transfer)

• Protection of electronic motor vehicle components against eassaults (e.g. viruses, trojans, spy-ware, spam, etc.) and of digital data stored in the motor vehicle and road infrastructure against unauthorised access and manipulation

• Protection of motor vehicles, fleets and road infrastructure by securing telematics and cooperative system applications

• Establishment of the legal requirement catalogue on necessities in MS and European legislation, certification, and inspection procedures next to the eSecurity Standards survey

Page 20: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 20

Research Activities in the ICT for mobility: The

Potential of Co-operative Systems

The potential benefits include:• increased road network capacity• reduced congestion and pollution• shorter and more predictable journey times• improved traffic safety for all road users• lower vehicle operating costs• more efficient logistics• improved management and control of the road network

(both urban and inter-urban)• increased efficiency of the public transport systems• better and more efficient response to hazards, incidents and

accidents

Car-to-InfrastructureCommunication

Car-to-CarCommunication

Page 21: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 21

The EU Approach Actions: Not only RTD

RTDRTD CoordinationCoordination& support& support

PolicyPolicy

• COMeSafety• Sevecom• …

• Spectrum policy (CEPT)• eSafety WG on communications• eSafety WG on Security• eSafety WG on Service

oriented architectures

Projects:• GST• CVIS• Safespot• Coopers• …

Right Regulatory EnvironmentResearch & DevelopmentWider Adoption

Best Use

Co-operative Systems will enhance the support available to drivers and other road users

Page 22: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 22

Trust & Security on in-vehicle telematics: GST

– GST functionalities include servicedeployment, service provisioning,access to vehicle and handling ofnomadic devices

– GST has developed and implementedtelematics certification, security andpayment services

– GST architecture and functionalityhas been tested with three services(Rescue/eCall, Safety Channel,Enhanced FCD) on six test sites

– GST results are already used byCVIS

Goal: open and standardised framework architecture enabling end-to-end in-vehicle telematics services

Page 23: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 23

FP6 VC Projects: Collaboration and Synergies

Page 24: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 24

Mission:“define a consistent and future-proof solution to the problem of V2V/V2I security”

Coordinator: TRIALOGTotal costs: ± 5.279 K€EC contribution: 2.999 K€Start date: 1/02/2006Duration: 36 months

Coordinator: TRIALOGTotal costs: ± 5.279 K€EC contribution: 2.999 K€Start date: 1/02/2006Duration: 36 months

On-going projects FP6: SEVECOM

Focus:• Threats, such as bogus

information, denial of service or identity cheating.

• Requirements: authentication, availability, and privacy.

• Operational Properties: network scale, privacy, cost and trust.

Research Topics:gSpecify an architecture and security mechanisms

iwhich provide the right level of protection.iwhich address issues such as liability versus privacy

gFully addressed topicsiKey and identity management,iSecure communication protocols (including secure routing),iTamper proof device and decision on crypto-system,iPrivacy.

gInvestigated topicsiIntrusion Detection,iData consistency,iSecure positioning,iSecure user interface.

Page 25: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 25

Mission:“demonstrate that co-operative systems can comply with privacy regulations using an example application endowed with PET for location data”

Coordinator: TRIALOGTotal costs: ± 2,465 K€EC contribution: 1,667 K€Start date: 1/03/2008Duration: 24 months

Coordinator: TRIALOGTotal costs: ± 2,465 K€EC contribution: 1,667 K€Start date: 1/03/2008Duration: 24 months

FP7 New projects: PRECIOSA

Objectives:g Define an approach for evaluation of co-operative systems in terms of:

iCommunication privacyiData storage privacy

g Define a privacy aware architecture for co-operative systems, involving: iSuitable trust models and ontologiesiV2V and V2I privacy verifiable architecture, including:

iProtectioniInfringement detectioniAuditing

g Define and validate guidelines for privacy aware co-operative systemsg Investigate specific challenges for privacy

Picture: C2C consortium

Under Negotiation

Page 26: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 26

Mission:“avoid un-authorised manipulation of on-board systems to prevent intrusion into the in-vehicular systems and transmission of corrupted data outside”

Coordinator: Fraunhofer (SIT)Total costs: ± 6,000 K€EC contribution: 3,857 K€Start date: ??/??/2008Duration: 36 months

Coordinator: Fraunhofer (SIT)Total costs: ± 6,000 K€EC contribution: 3,857 K€Start date: ??/??/2008Duration: 36 months

Objective:g Develop open standard secure architecture and protocol specification

Methodology:The project will:g Identify idustrial use cases (assembly, field maintenance)g Compile scenarios of possible threatsg Define of overall security requirementsg Compile secure trust modelg Specify, verify, validate and demonstrate a secure on-board architecture

and protocol.

FP7 New projects: EVITA

Under Negotiation

Page 27: Policy and Organizational Challenges for Vehicular ...icapeople.epfl.ch/panos/SVCWCR/presentations/Emilio - EPFL 20082002.pdf• Cryptography ÆNoE eCrypt II • Multi-modal Biometrics

Security in VC, EPFL, 20.02.08, 27

Thank youfor your attention!

www.ec.europa.eu/information_society/activities/esafety/index_en.htm

www.ec.europa.eu/information_society/activities/intelligentcar/index_en.htm

www.esafetysupport.org

[email protected]

http://cordis.europa.eu/fp7/ict/security/home_en.html