etsi tc its wg5 standardization activities etsi its workshop 2011

28
ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Upload: anabel-hutchinson

Post on 26-Dec-2015

220 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES

ETSI ITS Workshop 2011

Page 2: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Purpose and scope of WG5

WG5 exists to provide security standards within the ITS Standards platform• To protect the ITS platform (ITS-S?)

• To protect the ITS infrastructure (RSU and beyond)

• To protect the ITS user

WG5 also exists to provide guidance on the use of security standards to protect the ITS applications

2

Page 3: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Is security necessary?

Yes• Society depends on effective transport and society

needs assurance that it will be free from attack• The scope for manipulation of transport networks

is too extensive to hope it will be able to serve us without security control to prevent ITS serving only the criminal community

• The data gathered from use of ITS is personal data and needs to be protected using Privacy Enhancing Technologies

3

Page 4: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Stakeholders in ITS Security

Society• ITS provides benefit to all of society

Industry• 100s of millions of vehicles, billions of phones, billions

of internet connected devices, billions of people able to move and interact with transport networks

Government• Need to manage ITS as a societal benefit and ensure it

fits to the other government managed societal benefits• Need to ensure global cooperation for ITS

4

Security standardisation aims to protect all the stakeholders

Page 5: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

WG5 WORKING METHODSRisk analysis and countermeasure specification

5

Page 6: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Technical domain of ITS Security

ComSec• Giving assurance to the user that data is transferred without being vulnerable

to interception and misrouting

AppSec• Giving assurance to the user that the ITS application works without harming

the user

SysSec• Giving assurance that the ITS system is not harming its environment (or

spreading harm from the environment to its users)

DataSec• Giving assurance that data in the ITS system is accurate, timely, and free from

manipulation

Regulatory compliance• Data protection, privacy protection, export control of algorithms, etc.

6

Page 7: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Working methods in ITS WG5

7

TR 102 893 TS 102 731 ES 202 867

Page 8: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Security analysis (TVRA)

Understanding the user’s communication scenarios: • Correspondents know and trust one another and

the network• Correspondents know and trust one another but

don’t trust the network• Correspondents know but don’t trust one another

but trust the network• Correspondents don’t know one another (V2V)• Communications network is public (V2I)• Communications network is private• Etc.

Page 9: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Overview

Current work• Standard for deploying signed CAM and DENM using

IEEE 1609.2• PKI design to support IEEE 1690.2 and privacy

• Whilst maintaining regulatory compliance

• Minimum standards to support EU Mandates for ITS

Future work• Extension for full communications technology suite• Extension for full applications technology suite• Extension for non-vehicle centric ITS

9

Page 10: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

THE REGULATORY AND SOCIETAL DIMENSION

10

Page 11: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Basic concepts in ETSI ITS #1

Access to transport infrastructure is highly regulated and policed• Driver and vehicle licensing• Different roads have different restrictions (vehicle and driver)• Infrastructure is operated both commercially and non-commercially

Transport infrastructure supports many different transport uses• Movement of individuals• Movement of livestock• Movement of dangerous goods• Summarised in many licensing schemes:

• Private, Light goods, Heavy Goods, For hire, Multi-user.

11

Page 12: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Basic concepts in ETSI ITS #2

ITS stations send environmental (event) and (vehicle) status data to other ITS stationsITS stations may exist in vehiclesITS stations may exist in roadside furnitureITS stations may be applets on internet connected devices • Android or Apple Apps for example

ITS stations may be networked togetherInterpretation of received data may assist in driver safety• E.g. Collision avoidance

Interpretation of received data may assist in regulatory compliance• E.g. Speed limit notification and adherence

Different data has different authority• E.g. Speed limit notification from an authority versus speed assertion from an ITS

station

12

Page 13: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Regulatory issues

Deployment regulation• Specific to some of the involved ITS industries

R&TTE directive• Placement of radio equipment on the market

Privacy • Article 12 UDHR: • Article 8 EU Convention for the Protection of Human Rights and

Fundamental Freedoms: Right to respect for private and family life

Data protectionCrypto exportSupport to law enforcement• Data retention and lawful interception

13

Page 14: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Privacy, data protection and security

Assigns rights to citizens on how data related to them is protected• Enshrined in law in Directive 95/46/EC of the European

Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data

• Supplemented by Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications)

14

Page 15: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Privacy, data protection and security

Personal data• shall mean any information relating to an identified or identifiable natural person

('data subject'); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity

Processing of personal data• shall mean any operation or set of operations which is performed upon personal

data, whether or not by automatic means, such as collection, recording, organization, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, blocking, erasure or destruction

“data subject’s” consent• shall mean any freely given specific and informed indication of his wishes by

which the data subject signifies his agreement to personal data relating to him being processed

15

Page 16: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Privacy, data protection and security

The means to give assurance of the confidentiality, integrity and availability of data and services• Offers technical and procedural means to support

regulation

Security supports … • Privacy (Privacy Enhancing Technologies)

• COM(2007) 228 final: “COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL on Promoting Data Protection by Privacy Enhancing Technologies (PETs)”

• Data protection16

Page 17: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

CURRENT WORK PROGRAMMEAims of WG5 in the year or so to come

17

Page 18: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Main work focus

Keying strategies for ITS• Assuming correspondents don’t know one another• Assuming limited infrastructure access• Assuming minimising of cryptographic load

(number of algorithms, number of mechanisms, number of keys)

• Assuming need to reinforce regulation frameworks• For telecommunications and all other regulations• Minimal development of “novel” security solutions• Maximum re-use of existing best practices

18

Page 19: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Identity and role

All vehicles have identities• Make and model• Colour and specification• VIN• Registration mark

Many identifiers have an authority• VIN = Manufacturer• Registration mark = National vehicle licensing centre

Some vehicles take on special roles• Emergency services

Some vehicles and their roles imply behaviour• Farm Tractor – slow vehicle• Motorbike

19

Page 20: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

PKI and Certificates

20

Certificate Authority (CA)• Trustworthy entity: OEM,

government, etc.

Alice

Bob

certificate

What is a certificate: • A signed (by the CA) public key (of Alice or Bob)• A certificate binds an identity (Alice) and/or a role (e.g. emergency

vehicle) to a public key • Certificate(Alice) = [Alice, , SigCA(Alice, )

[ ]

1. Verify certificate

2. Verify message

Page 21: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

PKI Design Approach

21

TVRA Countermeasures

Security ServicesStakeholder

Limitations and Interests

PKI Requirements

PKI Design

Design input being gathered

Page 22: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Enrolment Authority: Example

Euro A National Enrolment Authority

European Enrolment

Authority CA

OEM Production Line

Sub-CA

1. Request

2. Enrolment Credential

Euro B National Enrolment Authority

22

Page 23: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

CLOSING AND THANKSAnd some acknowledgments

23

Page 24: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Acknowledgements

Members of ETSI TC ITS WG5 and ISO TC204 WG16.7• Including the members of ETSI STF397 and STF408

FP7 project i-TOUR• The chair is supported in part by the i-TOUR

project funded from European Community’s Seventh Framework Programme (FP7/2007-2013) under the Grant Agreement number 234239.

24

Page 25: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

BACK UP SLIDES (PKI OPTIONS)If really really needed and if time is available

25

Page 26: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Enrolment Authority: Example

Euro A National Enrolment Authority

European Enrolment

Authority CA

OEM Production Line

Sub-CA

1. Request

2. Enrolment Credential

Euro B National Enrolment Authority

OEM 1 Enrolment Authority

OEM 2 Enrolment Authority

Sub-CA

Can this level be omitted?

26

Page 27: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Safety Ticket Authority: Examples

European Safety Ticket Authority CA

European Safety Ticket Authority CA

Euro A National Safety Ticket

Authority

Sub-CA

Euro B National Safety Ticket

Authority

1

2

27

Page 28: ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011

Commercial and Information Ticket Authority: Example

Root authority certifies provider authorities (need to satisfy minimum requirements).

Then basically any structure is allowed• OEMs offering

services• 3rd party service

providers• Government agencies• etc.

European Commercial and Information Ticket Authority

OEM 1 Ticket Authority

Tier 1 Ticket Authority

Euro A Ticket Authority

Sub-CA

Sub-CA

Could include another country-level CA

28