Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar...

35
Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com CybersecureCar 2016 15/06/2016 1

Transcript of Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar...

Page 1: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Security and Privacy in Car2Car Adhoc Networks

Antonio Kung

Trialog

www.trialog.com

CybersecureCar 2016 15/06/2016 1

Page 2: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Introduction

CybersecureCar 2016

French SME

Involved since 2002 in security and privacy for connected vehicles

15/06/2016 2

Page 3: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Outline

Background

Integration of Security and Privacy

Adhoc network viewpoint

– Experience from ISE project

Connected vehicle viewpoint

– Privacy: Experience from PRIPARE project

– Big data: Experience from AUTOMAT project

Conclusion

15/06/2016 3 CybersecureCar 2016

Page 4: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Security and Privacy Issues

Security A car is connected and

therefore can be hacked

A car is part of the Internet of things

A car is a system within systems

Privacy A car is connected and

therefore can be tracked

A car can collect data – IoT, Big data, Cloud

15/06/2016 4 CybersecureCar 2016

Page 5: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Car-2-Car Infrastructure

CybersecureCar 2016

Adhoc Networks

V2V: Vehicle-to-Vehicle

V2I: Vehicle-to-Infrastructure (RSU: Road Side Unit)

Type of communication

ETSI TC ITS – ITS G5

– allocated spectrum (5,85 – 5,925 Ghz)

IEEE 802.11p link

Type of messages

Broadcast/Geocast

15/06/2016 5

Page 6: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Types of Messages

CybersecureCar 2016

CAM: Cooperative Awareness Messages Vehicle dynamics info

– Position,

– Speed,

– Heading

– …

DENM: Decentralized Environmental Notification Messages Information on dynamic environment

– Accident ahead,

– Traffic jam ahead

– …

15/06/2016 6

Page 7: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Some Research Projects in Europe

7

Secure Vehicle

Communication

2008

ITS Privacy

2011

In-Vehicle

Security

2011 Solution for field

operational tests

2014 Validate

Deployment

2017

Vehicle Big

Data

2017

Privacy-by-

design

2016

15/06/2016 CybersecureCar 2016

Page 8: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Initial Decisions (SEVECOM Project)

Authenticity and Integrity

Use signatures

1000 verifications per second

– PRESERVE and C2C-CC specifications

Avoid tracking / No fixed address

Use pseudonyms certificates (PC)

– Short-term certificates

– Changed according to policies

15/06/2016 8 CybersecureCar 2016

Page 9: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

References today

CybersecureCar 2016

US Secure Message and Certificate Format IEEE 1609.2

US Cryptography IEEE 1609.3

Reference Architecture

ETSI TS 102 940

Trust and Privacy Management (enrollment and PKI) ETSI TS 102 941

Certificate Format ETSI TS 103 097

CAM Format ETSI EN 302 637-2

DENM Format ETSI EN 302 637-3

MoU (2011) Protection Profiles

15/06/2016 9

Page 10: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Outline

Background

Integration of Security and Privacy

Adhoc network viewpoint

– Experience from ISE project

Connected vehicle viewpoint

– Privacy: Experience from PRIPARE project (Privacy)

– Big data: Experience from AUTOMAT project

Conclusion

15/06/2016 10 CybersecureCar 2016

Page 11: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

ISE Project

ITS SEcurity Part of SystemX

– Technology Research Institute) – Member ETSI and Car2Car consortium

http://www.irt-systemx.fr/en/project/ise/

ISE Objectives Cost effective C-ITS security system Integrates infrastructure PKI Methods and tools for assurance and trust

Cooperation with C-ITS pilot (SCOOP@F part 2) https://ec.europa.eu/inea/en/connecting-

europe-facility/cef-transport/projects-by-country/multi-country/2014-eu-ta-0669-s

11 15/06/2016 CybersecureCar 2016

Page 12: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Example of Public Key Infrastructure

Purpose: management of pseudonyms certificates

Enables Authentication &

authorization of senders

Integrity: receivers verify data via digital signatures

Certificate Authority Structure Root CA

Long term CA – Register vehicle

Pseudonym CA – Provides pseudonyms

CybersecureCar 2016 15/06/2016 12

3

Payload: CAM/DENM

Security Header

Signature Over payload

PCi

From C2C-CC presentation

Page 13: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

How Pseudonym Certificates Work

Vehicles and Road side units receive certificates from PCA

Pseudonym certificates frequently changed

Secure communications between nodes

Vehicle and RSU

CAs

CybersecureCar 2016 15/06/2016 13

3

Payload: CAM/DENM

Security Header

Signature Over payload

PCi

From C2C-CC presentation

Page 14: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

From C2C-CC presentation

Extension proposed by ISE for Privacy

Request for pseudonyms to PCA One pseudonym per

request only! – PCA cannot link

pseudonyms

Authentication of vehicles during request by LTCA only – PCA cannot identify

vehicles

– Part of request is encrypted and only readable by LTCA

15/06/2016 14 CybersecureCar 2016

Page 15: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Issues

CybersecureCar 2016

Organisational

PKI deployment

Operational

Pseudonym change policy

Revocation

Maintainability of crypto

Assurance

Integrating security with safety

15/06/2016 15

Page 16: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

PKI Deployment

CybersecureCar 2016

Governance

who is in charge?

– European PKI?

– National PKIs?

– Car Manufacturer PKI?

– Road operators PKI?

Root CAs?

– Cross-certification issues?

– Usage of Trusted-service Status List (TSL) including Root CAs and PCAs certificates?

Protocol with PKI not standardized

15/06/2016 16

Page 17: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Pseudonym Change Policy

Find the suitable policy? Change at startup, periodic change?

– Need for standardization

Communication stack “agility” issue – Implementation still using previous pseudonym

– Node may blocked a while before being able to transmit

Conflicts of interest between stakeholders Road operators

– Needs to track vehicles for a while (traffic monitoring)

– e.g. 1 pseudonym change every 2 hours)

Data protection authorities – Each message has a different pseudonym

15/06/2016 17 CybersecureCar 2016

Page 18: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Revocation of Pseudonym

CybersecureCar 2016

Revoking certificates Retirement

Car stolen

Typical approach Use Certificate Revocation List (CRL)

Issues Millions of vehicles

– CRLs need to be distributed to every vehicle?

– Real-time updates?

– Regional CRLs?

15/06/2016 18

Page 19: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Maintainability of Crypto

CybersecureCar 2016

Need to change encryption algorithms in case of security issue

Maintainability

How to update V2X stack with new algorithms/parameters?

Interoperability

e.g. ETSI standard contains placeholders for extension

But operational process is not decided yet

15/06/2016 19

Page 20: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Assurance

Common Criteria too costly Focus on evaluation

assurance mainly Issues

– Cost – Need to integrate in

automotive engineering process

– System of systems – Product evolutions

ISE multidimensional types of assurance Evaluation + Maintainability

+ Observability assurance level = Overall Trust assurance level?

15/06/2016 20 CybersecureCar 2016

Evaluation Assurance

Level

Maintainability Assurance

Level

Observability Assurance

Level

3

7

Page 21: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Integrating Security with Safety

CybersecureCar 2016

Merge safety risk analysis and security risk analysis

Integrate Security-by-design in automotive design process SAE J3061: Cybersecurity Guidebook for Cyber-Physical Vehicle

Systems

Proposal for ISO standard: Automotive Security Engineering TC22

15/06/2016 21

ASIL Automotive Safety Integration Level

Automotive Trust Integration Level?

?

Page 22: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Outline

Background

Integration of Security and Privacy

Adhoc network viewpoint

– Experience from ISE project

Connected vehicle viewpoint

– Privacy: Experience from PRIPARE project (Privacy)

– Big data: Experience from AUTOMAT project

Conclusion

15/06/2016 22 CybersecureCar 2016

Page 23: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Funded by the European Commission (FP7)

PRIPARE Project

PReparing Industry to Privacy-by-design by supporting its Application in Research

http://pripareproject.eu/

Methodology Handbook for Privacy-by-design

Lifecycle oriented

Proposal for ISO standard: Privacy Engineering (ISO SC27)

CybersecureCar 2016 15/06/2016 23

Page 24: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

GDPR: General Data Protection Regulation

European Regulation Enter into force on May 24th 2016

Fully applied on May 25th 2018

Privacy-by-design (PbD) and by-default Privacy Impact Assessment (PIA) Data Protection Officers All public authorities and companies processing personal

data on a large scale

Sanctions for breaches up to 20,000,000 EUR up to 4% of the annual worldwide turnover

15/06/2016 CybersecureCar 2016 24

Page 25: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Issues

CybersecureCar 2016

Integrating Privacy Management in Supply Chain

Integrating Privacy Management in Lifecycle

New types of threats

New properties

15/06/2016 25

Page 26: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Several Types of Concerns

CybersecureCar 2016 15/06/2016 26

Stakeholder Legal

Compliance Level

Management Level

System Lifecycle

Level

Demand side

Policy maker

e.g. Compliance Check

Operator Data Controller

Regulation Privacy Impact

Assessment

Privacy-by-Design

Supply side

Operator Data processor

Supplier e.g. Operators Requirements

GDPR PIA PbD

Page 27: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Integrating privacy-by-design

CybersecureCar 2016 15/06/2016 27

Privacy concern Privacy

concern

Privacy concern

Privacy concern

Privacy concern

Privacy concern

Page 28: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Lifecycle Process

A Glimpse on the Process

CybersecureCar 2016 15/06/2016 28

Analysis Design Privacy Principles

Requirements Architecture

PETs

PIA PIA

Evaluation v1 Evaluation v1

Page 29: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

STRIDE Security Threats Analysis

CybersecureCar 2016 15/06/2016 29

Property Description Threat

Authentication

The identity of users is

established (or you’re willing to

accept anonymous users). Spoofing

Integrity

Data and system resources are

only changed in appropriate ways

by appropriate people. Tampering

Nonrepudiation Users can’t perform an action

and later deny performing it. Repudiation

Confidentiality Data is only available to the

people intended to access it. Information disclosure

Availability Systems are ready when needed

and perform acceptably. Denial Of Service

Authorization Users are explicitly allowed or

denied access to resources. Elevation of privilege

Page 30: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

LINDDUN Privacy Threats Analysis

CybersecureCar 2016 15/06/2016 30

Type Property Description Threat

Hard privacy

Unlinkability Hiding the link between two or more actions,

identities, and pieces of information. Linkability

Anonymity Hiding the link between an identity and an

action or a piece of information Identifiability

Plausible deniability Ability to deny having performed an action that

other parties can neither confirm nor contradict Non-

repudiation

Undetectability and

unobservability Hiding the user’s actvities Detectability

Security Confidentiality Hiding the data

content or controlled release of data content Disclosure of

information

Soft Privacy

Content awareness User’s consciousness regarding his own data Unawareness

Policy and consent

compliance

Data controller to inform the data subject about

the system’s privacy policy, or allow the data

subject to specify consents in compliance with

legislation

Non

compliance

https://distrinet.cs.kuleuven.be/software/linddun/catalog.php

Page 31: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Beyond CIA

CybersecureCar 2016

Confidentiality

Integrity

Availability

Unlinkability

Intervenability

Transparency

15/06/2016 31

From ULD: ieee-security.org/TC/SPW2015/IWPE/2.pdf

Page 32: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Automat Project

CybersecureCar 2016

Vehicle Big Data Marketplace

http://www.automat-project.eu/

15/06/2016 32

Funded by the European Commission (H2020)

Page 33: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Some Considerations in AUTOMAT

CybersecureCar 2016

Using anonymized vehicle data in other cross-sectorial contexts

Socially beneficial services

Economically relevant services

Protecting customer's legitimate privacy

Example of scenario

Data collected only upon customer consent

Data managed by customer (switch of paradigm from CRM to VRM – Vendor Relationship Management)

15/06/2016 33

Page 34: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Conclusion

Cybersecurity for connected vehicles: a system of system practice in the making Integrate security-by-design Integrate privacy-by-design

New projet in France CTI: Cybersecurity in Intelligent

Transport – Combines automotive, aeronautic

and railway domains

Objective: Guidelines on cybersecurity for ITS – Risk analysis – Assurance process – Merging security and safety

15/06/2016 34 CybersecureCar 2016

Page 35: Security and Privacy in Car2Car Adhoc Networks...–IoT, Big data, Cloud 15/06/2016 4 CybersecureCar 2016 Car-2-Car Infrastructure CybersecureCar 20165 Adhoc Networks V2V: Vehicle-to-Vehicle

Thanks

CybersecureCar 2016 15/06/2016 35