security issues related to the future networked car...2019/03/08  · itu-t recommendation x.1373...

27
Security issues related to the future Networked Car Koji Nakao Distinguished Researcher, Cybersecurity Research Institute, NICT Collaboration on ITS communication standards (Geneva, Switzerland, 8 March 2019)

Upload: others

Post on 26-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

Security issues related to the future Networked Car

Koji Nakao

Distinguished Researcher,

Cybersecurity Research Institute, NICT

Collaboration on ITS communication standards(Geneva, Switzerland, 8 March 2019)

Page 2: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

Reference Model to be used for Vehicle Threats

assessment (discussed in UNECE WP29-TFCS)

2

2

Page 3: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

3

IoT era

3

Page 4: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

Classification of IoT business (services)

Managed Un-managed

fixed

movable

Electricity

Trains

Critical Infra

Smart Phone

Life Support Robots

Smart Home

Smart City/Town

ATM

SmartElec. Meter

Smart Health

HEMS

Smart Home Apps

IoTHome GW

ref: Dr. Tokuda, Keio Univ.

Automotive

SIP: Strategic Innovation Promotion Project by Cabinet Office, Gov. of Japan

4

Page 5: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

Copyright 2018 Connected Consumer Device Security Council Proprietary 5

IoT Applied Domain in Japan

Res:ITR/2017

1. Automobile2. Objects3. Human4. Livestock

Tracking

MonitoringAnalysis

5. Agri-Field6. Factory7. Home/Building8. Shops9. Public Facility10. Energy Plant11. Transport

Condition12. Truck Operation13. Human Health14. Livestock15. Physical Security16. Disaster17. Nature Environment

Optimization18. Energy Consumption19. Factory Production20. Supply-Chain21. Delivery Route

NewServices

22. Sharing service23. Wearable Device24. Smart Product25. Connected Car26. Smart/Telematics

Insurance27. Smart retails28. IoT Payment Device

https://www.itr.co.jp/company/press/171012PR.html

Page 6: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

- Emergency Report Service “HELPNET”

- Leading Safe Driving “Smiling Road”

- Managing your own driving skills “YouDrive”

- V2V/V2I communication service “ITS Connect”

- IoT Platform Service「Vehicle manager」

- Various Navigation Services “T-Connect”

- Remote Parking System

- Anomaly Detection Service for Automotive

6

Examples for use of IoT in Automotive Environment

Source:https://itiger.jp/case/643.html

Page 7: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

7

Observation of IoT devices/systems

Page 8: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for
Page 9: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

Worldwide spread infection

• Observed from 218 countries and/or regions

• Especially from

Asian Countries

9

Page 10: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

IP CameraDVR

Device categories

60+ categories of IoT devices are observed. IoT devices and IoT services, implemented in Vehicle system can be attack targets. Threats related to IoT in connection with Vehicle environment should be carefully considered.

10

Page 11: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

ITS security standards in ITU-T SG17 (Security)

11

Page 12: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

ITU-T SG17 ITS Recommendations(under development)

X.1373(rev):Secure software update capability for intelligent transportation

system communication devices

X.itssec-2: Security guidelines for V2X communication systems

X.itssec-3: Security requirements for vehicle accessible external devices

X.itssec-4: Methodologies for intrusion detection system on in-vehicle systems

X.itssec-5: Security guidelines for vehicular edge computing

X.stcv: Security threats in connected vehicles

X.edrsec: Security guidelines for cloud-based event data recorders in

automotive environment

X.fstiscv: Framework of security threat information sharing for connected

vehicles

X.eivnsec: Security guidelines for the Ethernet-based in-vehicle networks

X.mdcv: Security-related mis-behavior detection mechanism based on big

data analysis for connected vehicles

X.srcd: Security requirements for categorized data in V2X communication

12

Page 13: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

ITU-T Recommendation X.1373

• Title of Recommendation

– Rec. X.1373 “Secure software update capability for ITS communications devices” (Revision work is on-going)

• Scope

In the context of updates of software modules in the electric devices of vehicles in the intelligent transportation system (ITS) communication environment, this Recommendation aims to provide a procedure of secure software updating for ITS communication devices for the application layer in order to prevent threats such as tampering of and malicious intrusion to communication devices in vehicles. This includes a basic model of software update, security controls for software update and a specification of abstract data format of update software module.

13

Page 14: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

Secure Communication

Introduction of Rec. X.1373“Scope”

Embedded Information Device

Power Management Control ECU

Seat Belt Control ECU

Driving Support ECU

Parking Assist ECU

Skid Control ECU

etc.,

Communication Head Unit

Aftermarket Communication Device

Update Server and Log Repositoryat Car Manufacturer / Garage center

........

.

Functionality of Head Unit

! Status check of ECUs! Log collection! In-car diagnosis function

Diagnosis of on-board devices

! Status check of ECUs! Log collection! Verification of update module

Communication protocol

! Between Car and Manufacturer / Garage

! Encryption! Authentication

Functionality of Server

! Stored Data Definition✓ Auth info✓ Log Audit

✓ With considerations of privacy concerns

14

Page 15: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

Basic Procedure for OTA Update

Request of diagnose of software status

Result of diagnose with software status

Report of results of ECUs in a vehicle

Receipt for submit of diagnose report

Request of update module

Update module is provided

Notification to User (driver) for Updates

Confirmation for the update

Request for updates to ECUs

Results for updates in ECUs

Report of application of the update

Conformation from the Update server

15

Revision work is now started!

Page 16: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

Draft Recommendation X.itssec-2

Security guidelines for V2X communication systems (X.itssec-2) – under development

Scope:• This Recommendation provides security guidelines for V2X

communication systems. V2X (or "vehicle-to-everything") is a generic term comprising the communication modes termed as vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), vehicle-to-nomadic devices (V2ND) and vehicle-to-pedestrian (V2P) discussed in this Recommendation. This Recommendation identifies threats in the V2X communications environment and specifies security requirements for V2X communication systems.

• In-vehicle network/communication is out of scope of this Recommendation.

16

Page 17: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

Image of V2X Communications

17

Page 18: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

Threats in Confidenciality

18

Page 19: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

Threats in Integrity

19

Page 20: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

X.stcv: Security threats in connected vehicles

Under Development: Based on the result of UNECE WP29 TFCS (Recommendation Cybersecurity)

Scope:Recommendation X.stcv describes security threats to connected

vehicles (vehicle eco-system), for reference and use in other

Recommendations developed by ITU-T . It first specifies the

model of a connected vehicle (vehicle eco-system) and identifies

security threats to the connected vehicle (eco-system).

This will be completed and determined in September, 2019.

20

Page 21: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

A concept of connected vehicle (vehicle ecosystem)

21

Page 22: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

Content

22

1. Scope

2. Reference

3. Definitions

4. Abbreviation and acronyms, 5. Convention

6. Model of connected vehicle (vehicle ecosystem)

7. Threats to vehicle systems and ecosystem7.1 Threats regarding back-end servers

7.2 Threats to vehicles regarding their communication channels

7.3 Threats to vehicles regarding their update procedures

7.4 Threats to vehicles regarding unintended human actions

7.5 Threats to vehicles regarding their external connectivity and

connections

7.6 Potential targets of, or motivations for, an attack

7.7 Potential vulnerabilities that could be exploited if not sufficiently

protected or hardened Potential targets of, or motivations for, an attack

Page 23: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

Draft Rec. X.itssec-3 Title: Security requirements for vehicle accessible external devices

Summary• The purpose of this draft new Recommendation is to standardize security

requirements for vehicle accessible external devices in telecommunication network environments.

• This draft new Recommendation provides security threats in vulnerable points like OBD-II port or wireless connectivity and security requirements for vehicle accessible external devices to secure access to the vehicle internal systems and safe usage of their information.

The following figure illustrates a set of assumed interfaces for accessing external devices.

23

Page 24: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

Telematics

Bluetooth

Wi-Fi

SD/USB

OBD

PLC

InternalGateway

Head Unit(AVN/IVI)

ChassisControl

BodyControl

PowertrainControl

ADAS

External communications on Vehicle Internal communications on Vehicle

ExternalGateway

Draft Rec. X.itssec-4

Title: Methodologies for intrusion detection system on in-vehicle systems (under development)

Scope: This new Recommendation aims to provide the Methodologies for intrusion detection system on in-vehicle systems. This Recommendation will include detection models and pattern rules to recognize for the impact and likelihood of threats on vehicle systems throughout the monitoring on internal communications in the vehicle. This Recommendation will contain classifying and understanding threats on the internal communication network as CAN in vehicles which is working with specialized protocols.This Recommendation mainly focuses on the internal communications on the In-vehicle network as CAN which cannot be supported by general IDS, to ensure detecting threats which are impacting ECUs communications by using various efficient light-weight detection models such as Signature based model, Entropy based model, Self-Similarity based model, Hazard Survival based model, etc.

24

Page 25: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

Title: Security guidelines for vehicular edge computingScope: Vehicular edge computing (VEC) is a model that supports the core cloud’s capacity for decentralising the concentration of computing resources in data centers. VEC also provides more localized storage and application services to road users, thereby making it possible to achieve lower latency delays, faster response times providing mobility support, location awareness, high availability and Quality of Service for streaming real-time applications since data processing is conducted closer to the vehicle.

This Recommendation provides security guidelines for vehicular edge computing based on an analysis of the threats and vulnerabilities identified within VEC.

25

Draft Rec. X.itssec-5

Page 26: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

ITU-T SG17 ITS Recommendations(under development)

X.1373(rev):Secure software update capability for intelligent transportation

system communication devices

X.itssec-2: Security guidelines for V2X communication systems

X.itssec-3: Security requirements for vehicle accessible external devices

X.itssec-4: Methodologies for intrusion detection system on in-vehicle systems

X.itssec-5: Security guidelines for vehicular edge computing

X.stcv: Security threats in connected vehicles

X.edrsec: Security guidelines for cloud-based event data recorders in

automotive environment

X.fstiscv: Framework of security threat information sharing for connected

vehicles

X.eivnsec: Security guidelines for the Ethernet-based in-vehicle networks

X.mdcv: Security-related mis-behavior detection mechanism based on big

data analysis for connected vehicles

X.srcd: Security requirements for categorized data in V2X communication

26

Page 27: Security issues related to the future Networked Car...2019/03/08  · ITU-T Recommendation X.1373 •Title of Recommendation –Rec. X.1373 “Secure software update capability for

Security issues and standardization

<Security issues under ITS environment>1. Observe and Analyze “Threats” & “Vulnerabilities” including emerging

IoT threats;2. Detection of injected Malwares/Mal-functions in vehicle;3. Conducting Threat assessment and risk management (for vehicle eco-

system);4. Establishment of Remote Software/Firmware update (OTA);5. Research of Appropriate security capabilities (Data confidentiality,

Privacy protection, Authentication. Access control, incl. Lightweight crypto)

6. Remote Maintenance (e.g. Remote Kill Switch) including for IoT devices7. Global Incident handling and Information Sharing capabilities

27

<For ITS security standardization>1. Related SDOs should be coordinated and collaborated;2. Threats assessment methodology for Vehicle eco-system can be

standardized (not only for threat assessment on Vehicle);3. Standards can produce a certain level of security requirements which

will be related to “Certification of Vehicle and Vehicle eco-system”;4. Is there any requirements for establishing global incident handling

and information sharing scheme? Do we need a capability of AUTO-ISAC?