policy and organizational challenges for vehicular...
TRANSCRIPT
Secure Vehicular Communications Secure Vehicular Communications Workshop. EPFL, 20.02.08Workshop. EPFL, 20.02.08
Emilio Davila GonzalezEmilio Davila GonzalezEC DG INFSO.G4EC DG INFSO.G4
Policy and Organizational Policy and Organizational Challenges for Vehicular Challenges for Vehicular Communications SecurityCommunications Security
Security in VC, EPFL, 20.02.08, 2
Contents
• The Framework: Trust and Security in electronic communications
• EC research activities on Trust and Security
• The special case of vehicular communications–– The eCall caseThe eCall case–– 11stst Workshop inWorkshop in--vehicle vehicle telematicstelematics and and
cooperative systems cooperative systems ––Privacy and data protectionPrivacy and data protection
– eSecurity Working Group– Research activities
Security in VC, EPFL, 20.02.08, 3
The Framework
• Information Society (r)evolution has caused massive amounts of personal data generated, processed, exchanged and stored
• i2010 Initiative identifies security (trust and privacy) as one of the main challenges posed by digital convergence
• Personalised, dynamic open services need trust and security
• PETs can allow deployment of services while respecting personal privacy
• User centric - empowerment approach, data protection and proportionality are key issues
Security in VC, EPFL, 20.02.08, 4
Relevant EC regulation
• Directive 95/46/EC: Protection of individuals with regard to the processing of personal data and on the free movement of such data.
• Directive 2002/58/EC: The processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications)
• COM(2006) 251: A strategy for a Secure Information Society – “Dialogue, partnership and empowerment”
• COM(2007) 96: Radio Frequency Identification (RFID) in Europe: steps towards a policy framework
• COM(2007) 228: Promoting Data Protection by Privacy Enhancing Technologies (PETs)
Security in VC, EPFL, 20.02.08, 5
Contents
• The Framework: Trust and Security in electronic communications
• EC research activities on Trust and Security
• The special case of vehicular communications–– The eCall caseThe eCall case–– 11stst Workshop inWorkshop in--vehicle vehicle telematicstelematics and and
cooperative systems cooperative systems ––Privacy and data protectionPrivacy and data protection
– eSecurity Working Group– Research activities
Security in VC, EPFL, 20.02.08, 6
ICT WP 2007-08, Objective 1.4:
“Secure, dependable & trusted infrastructures”
SDMMC
E-TowerGame Machine
Telephone
PC
DVD
Audio
TVSTBDVC Map Information
IC Card
SDMMC
SDMMC
SIM
♪Digitalcontents
Intranet Information
PersonalInformation
Car/Railway Mobile Office/Factory
Home Outdoor Street/Shop
Public expectationWeb Technologies
(virtual environments, collaborative communities…)
Enabling TechnologiesEnabling TechnologiesCrypto, trusted computing, secure softwareCrypto, trusted computing, secure software
90 M€
Coordination ActionsCoordination Actions
Security in VC, EPFL, 20.02.08, 7
ICT Objective 1.4:“Secure, dependable & trusted
infrastructures”
Enabling TechnologiesEnabling TechnologiesCrypto, trusted computing, secure softwareCrypto, trusted computing, secure software
Coordination ActionsCoordination Actions
90 M€
Coordination ActionsResearch roadmaps, metrics and benchmarks, international cooperation, coordination activities
4 Projects: 3.3 m€
Networkinfrastructures
4 Projects11 m€
Service infrastructures
4 Projects18 m€
Identity management,privacy, trust policies
3 Projects20.5 m€
6 Projects: 22 m€Enabling technologies for trustworthy infrastructuresBiometrics, trusted computing, cryptography, secure SW
2 Projects5.8 m€
1 Project9.4 m€
90 M€
7th EU Research Framework Programme (2007-2013)
“Secure, dependable & trusted infrastructures”
privacy
WOMBATFORWARD
AWISSENETINTERSECTION
biometry
secure implementation
SHIELDSCACE
TECOM
AVANTSSARTHINK TRUST
INCO-TRUST
AMBER
PRISM
PICOS
ECRYPT II MASTER
CONSEQUENCE
GEMOM
SWIFT
ACTIBIOMOBIO
SecureSCM
TURBINE
TAS3
PRIMELIFE
Coordination Actions
Type of projects
STREPsNoEs
IP projects
networking &coordination
trusted computing
network services
Security in VC, EPFL, 20.02.08, 9
Main R&D project prioritiesMain R&D project priorities• An integrated security framework and tools for the security and resilience
of heterogeneous networks (INTERSECTIONINTERSECTION)
• A networking protocol stack for security and resilience across ad-hoc PANs& WSNs (AwissenetAwissenet)
• A message-oriented MW platform for increasing resilience of information systems (GEMOMGEMOM)
• Data gathering and analysis for understanding and preventing cyber threats (WOMBATWOMBAT)
Security in network infrastructures:4 projects, 11 m€ EC funding
Security in VC, EPFL, 20.02.08, 10
Main R&D project prioritiesMain R&D project priorities•• Trusted ComputingTrusted Computing IP TIP TECOMECOM
trusted embedded systems: HW platforms with integrated trust components
•• CryptographyCryptography NoENoE eCrypteCrypt IIII
•• MultiMulti--modal Biometricsmodal Biometricsmulti-biometric authentication (based on face and voice) for mobile devices
(MOBIOMOBIO)activity related and soft biometrics technologies for supporting continuous
authentication and monitoring of users in ambient environments (ACTIBIOACTIBIO)
•• Secure SW implementationSecure SW implementationproviding SW developers with the means to prevent occurrences of known
vulnerabilities when building software (SHIELDSSHIELDS)A toolbox for cryptographic software engineering (CACECACE)
Security enabling Technologies6 projects, 22 m€ EC funding
Security in VC, EPFL, 20.02.08, 11
Contents
• The Framework: Trust and Security in electronic communications
• EC research activities on Trust and Security
• The special case of vehicular communications–– The eCall caseThe eCall case–– 11stst Workshop inWorkshop in--vehicle vehicle telematicstelematics and and
cooperative systems cooperative systems ––Privacy and data protectionPrivacy and data protection
– eSecurity Working Group– Research activities
Security in VC, EPFL, 20.02.08, 12
eCall: Data Protection issues (1)
• Legitimate processing of MSD: Solution: Unambiguous consent -7(a) =>
Possibility of easy deactivation
• Adequate processing by data controllers:Publicly appointed organisations to act as PSAPsAdequate storage periods
• Security of the communications and of data storedIVS, MNOs, PSAPs
Security in VC, EPFL, 20.02.08, 13
eCall: Data Protection issues (2)
• Citizen TrustFair, adequate and not excessive processingNo secondary use of informationMSD => Minimum information for effective handling of the emergency call System not permanently trackedUser awareness
Security in VC, EPFL, 20.02.08, 14
• Specific rules for FSD: Service providers should respect the data protection and privacy regulation:
• Clear definition of the use of data• Proportionality• Transparency• Freely given consent
eCall: Data Protection issues (3)
• Service providers (contract)
Security in VC, EPFL, 20.02.08, 15
11stst Workshop inWorkshop in--vehicle vehicle telematicstelematics and and cooperative systems cooperative systems ––
Privacy and data protectionPrivacy and data protection
• Privacy may be a barrier for the deployment of services
• Objective: bring together ITS & DPO experts to discuss common guidelines for the design of applications in this area
• 1st WS: 13/02/2007• 50+ participants, including 8 DPO
Security in VC, EPFL, 20.02.08, 16
1st WS: Conclusions
• Privacy/data protection issues should be integrated from the early design.
• Liaison with Data Protection Authorities to clarify concepts/provide guidelines
• Data protection/limits depend on the type of applications• Use the personal data for the sole purpose is collected.
Anonymous data can be used for other purposes• PETs are important tools to allow services deployment
while improving privacy protection• Inspire public confidence: user awareness about protection
of their privacy is a plus• Transparency and right of choice to the user• Cost effectiveness should be taken into consideration
Security in VC, EPFL, 20.02.08, 17
1st WS: Way forward: Next steps
• Continue collaboration with art. 29 WP• Creation of a CIRCA repository for
exchanging of information• eSafety Forum to elaborate code of
practice in collaboration with art. 29 WP (ITF)– Security and Data protection by better
design
Security in VC, EPFL, 20.02.08, 18
eSecurity Working Group (1)Objectives
• Two focus:– Data protection– Intrusion avoidance
• Support the reliability of eSafety• Protection of eSafety functions• Prevention of critical road safety effects which
result from electronic vehicle systems• Preventing of misuse or malpractice, including
privacy infringement• Establishment of new R&D fields• Providing of recommendations, code of
practice, standardisation
Security in VC, EPFL, 20.02.08, 19
eSecurity Working Group (2)Topics
• Protection against unauthorised mobile remote access and wired access on networked vehicles including the full electronic system and its components and data against manipulation and subsequent misuse (e.g. wired & tele- data / software transfer)
• Protection of electronic motor vehicle components against eassaults (e.g. viruses, trojans, spy-ware, spam, etc.) and of digital data stored in the motor vehicle and road infrastructure against unauthorised access and manipulation
• Protection of motor vehicles, fleets and road infrastructure by securing telematics and cooperative system applications
• Establishment of the legal requirement catalogue on necessities in MS and European legislation, certification, and inspection procedures next to the eSecurity Standards survey
Security in VC, EPFL, 20.02.08, 20
Research Activities in the ICT for mobility: The
Potential of Co-operative Systems
The potential benefits include:• increased road network capacity• reduced congestion and pollution• shorter and more predictable journey times• improved traffic safety for all road users• lower vehicle operating costs• more efficient logistics• improved management and control of the road network
(both urban and inter-urban)• increased efficiency of the public transport systems• better and more efficient response to hazards, incidents and
accidents
Car-to-InfrastructureCommunication
Car-to-CarCommunication
Security in VC, EPFL, 20.02.08, 21
The EU Approach Actions: Not only RTD
RTDRTD CoordinationCoordination& support& support
PolicyPolicy
• COMeSafety• Sevecom• …
• Spectrum policy (CEPT)• eSafety WG on communications• eSafety WG on Security• eSafety WG on Service
oriented architectures
Projects:• GST• CVIS• Safespot• Coopers• …
Right Regulatory EnvironmentResearch & DevelopmentWider Adoption
Best Use
Co-operative Systems will enhance the support available to drivers and other road users
Security in VC, EPFL, 20.02.08, 22
Trust & Security on in-vehicle telematics: GST
– GST functionalities include servicedeployment, service provisioning,access to vehicle and handling ofnomadic devices
– GST has developed and implementedtelematics certification, security andpayment services
– GST architecture and functionalityhas been tested with three services(Rescue/eCall, Safety Channel,Enhanced FCD) on six test sites
– GST results are already used byCVIS
Goal: open and standardised framework architecture enabling end-to-end in-vehicle telematics services
Security in VC, EPFL, 20.02.08, 23
FP6 VC Projects: Collaboration and Synergies
Security in VC, EPFL, 20.02.08, 24
Mission:“define a consistent and future-proof solution to the problem of V2V/V2I security”
Coordinator: TRIALOGTotal costs: ± 5.279 K€EC contribution: 2.999 K€Start date: 1/02/2006Duration: 36 months
Coordinator: TRIALOGTotal costs: ± 5.279 K€EC contribution: 2.999 K€Start date: 1/02/2006Duration: 36 months
On-going projects FP6: SEVECOM
Focus:• Threats, such as bogus
information, denial of service or identity cheating.
• Requirements: authentication, availability, and privacy.
• Operational Properties: network scale, privacy, cost and trust.
Research Topics:gSpecify an architecture and security mechanisms
iwhich provide the right level of protection.iwhich address issues such as liability versus privacy
gFully addressed topicsiKey and identity management,iSecure communication protocols (including secure routing),iTamper proof device and decision on crypto-system,iPrivacy.
gInvestigated topicsiIntrusion Detection,iData consistency,iSecure positioning,iSecure user interface.
Security in VC, EPFL, 20.02.08, 25
Mission:“demonstrate that co-operative systems can comply with privacy regulations using an example application endowed with PET for location data”
Coordinator: TRIALOGTotal costs: ± 2,465 K€EC contribution: 1,667 K€Start date: 1/03/2008Duration: 24 months
Coordinator: TRIALOGTotal costs: ± 2,465 K€EC contribution: 1,667 K€Start date: 1/03/2008Duration: 24 months
FP7 New projects: PRECIOSA
Objectives:g Define an approach for evaluation of co-operative systems in terms of:
iCommunication privacyiData storage privacy
g Define a privacy aware architecture for co-operative systems, involving: iSuitable trust models and ontologiesiV2V and V2I privacy verifiable architecture, including:
iProtectioniInfringement detectioniAuditing
g Define and validate guidelines for privacy aware co-operative systemsg Investigate specific challenges for privacy
Picture: C2C consortium
Under Negotiation
Security in VC, EPFL, 20.02.08, 26
Mission:“avoid un-authorised manipulation of on-board systems to prevent intrusion into the in-vehicular systems and transmission of corrupted data outside”
Coordinator: Fraunhofer (SIT)Total costs: ± 6,000 K€EC contribution: 3,857 K€Start date: ??/??/2008Duration: 36 months
Coordinator: Fraunhofer (SIT)Total costs: ± 6,000 K€EC contribution: 3,857 K€Start date: ??/??/2008Duration: 36 months
Objective:g Develop open standard secure architecture and protocol specification
Methodology:The project will:g Identify idustrial use cases (assembly, field maintenance)g Compile scenarios of possible threatsg Define of overall security requirementsg Compile secure trust modelg Specify, verify, validate and demonstrate a secure on-board architecture
and protocol.
FP7 New projects: EVITA
Under Negotiation
Security in VC, EPFL, 20.02.08, 27
Thank youfor your attention!
www.ec.europa.eu/information_society/activities/esafety/index_en.htm
www.ec.europa.eu/information_society/activities/intelligentcar/index_en.htm
www.esafetysupport.org
http://cordis.europa.eu/fp7/ict/security/home_en.html