How ISO 21217 worksPlease view as a “Slide Show”
CEN PT1605
The basic situation
• Two devices cooperate in a trusted way, i.e. exchange information in secure application sessions.
September 2018 SSTD - Budapest 2
Example: Multiple after-market servicesusing OEM installed SVI
Proprietary Network
Node
Proprietary Network
Node
Proprietary Network
Node
Prop
rieta
ry st
ack
(sec
urity
& tr
ansla
tion
)
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Interface can be wireless (DSRC, WiFI, 4G/5G, OBD, etc)
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Exte
rnal
dom
ain
In-v
ehic
le d
omai
n
Diagnostic Insurance Fleet Mngt
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
ManufacturerServices
CV /C-ITS
SVI
Prop
rieta
ry st
ack
(sec
urity
& tr
ansla
tion
)
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Diagnostic
Insurance
Fleet MngtM
anag
emen
t
Network & Transport
Access
FacilitiesSe
curit
y
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
CV/C-ITS
Policy
Security: Authentication / Authorization
Prop
rieta
ry st
ack
(sec
urity
& tr
ansla
tion
)
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Diagnostic
Insurance
Fleet MngtM
anag
emen
t
Network & Transport
Access
FacilitiesSe
curit
y
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
CV/C-ITS Proof: valid C-ITS ApplicationSecurity: Authentication / Authorization
Prop
rieta
ry st
ack
(sec
urity
& tr
ansla
tion
)
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Diagnostic
Insurance
Fleet MngtM
anag
emen
t
Network & Transport
Access
FacilitiesSe
curit
y
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
CV/C-ITS
Certificate
Security: Authentication / Authorization
Prop
rieta
ry st
ack
(sec
urity
& tr
ansla
tion
)
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Diagnostic
Insurance
Fleet MngtM
anag
emen
t
Network & Transport
Access
FacilitiesSe
curit
y
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
CV/C-ITSSecurity: Authentication / Authorization
I have a C-ITS
certificate
Prop
rieta
ry st
ack
(sec
urity
& tr
ansla
tion
)
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Diagnostic
Insurance
Fleet MngtM
anag
emen
t
Network & Transport
Access
FacilitiesSe
curit
y
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
CV/C-ITSSecurity: Authentication / Authorization
I have a C-ITS
certificate
You can do C-ITS activities
Prop
rieta
ry st
ack
(sec
urity
& tr
ansla
tion
)
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Diagnostic
Insurance
Fleet MngtM
anag
emen
t
Network & Transport
Access
FacilitiesSe
curit
y
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
CV/C-ITSSecurity: Authentication / Authorization
I have a Fleet Management
certificate I’m owned by the right fleet owner
Prop
rieta
ry st
ack
(sec
urity
& tr
ansla
tion
)
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Diagnostic
Insurance
Fleet MngtM
anag
emen
t
Network & Transport
Access
FacilitiesSe
curit
y
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
CV/C-ITSSecurity: Authentication / Authorization
You can do Fleet
Management activities
I have a Fleet Management
certificate I’m owned by the right fleet owner
Prop
rieta
ry st
ack
(sec
urity
& tr
ansla
tion
)
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Diagnostic
Insurance
Fleet MngtM
anag
emen
t
Network & Transport
Access
FacilitiesSe
curit
y
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
CV/C-ITSSecurity: Authentication / Authorization
I have a Diagnostics certificate
Prop
rieta
ry st
ack
(sec
urity
& tr
ansla
tion
)
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Diagnostic
Insurance
Fleet MngtM
anag
emen
t
Network & Transport
Access
FacilitiesSe
curit
y
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
CV/C-ITSSecurity: Authentication / Authorization
I have a Diagnostics certificate
I’m owned by the right repair shop
Prop
rieta
ry st
ack
(sec
urity
& tr
ansla
tion
)
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Diagnostic
Insurance
Fleet MngtM
anag
emen
t
Network & Transport
Access
FacilitiesSe
curit
y
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
CV/C-ITSSecurity: Authentication / Authorization
I have a Diagnostics certificate
I’m owned by the right repair shop
… and I’m right next to
you
Prop
rieta
ry st
ack
(sec
urity
& tr
ansla
tion
)
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
Diagnostic
Insurance
Fleet MngtM
anag
emen
t
Network & Transport
Access
FacilitiesSe
curit
y
Applications
Man
agem
ent
Network & Transport
Access
Facilities
Secu
rity
Applications
CV/C-ITSSecurity: Authentication / Authorization
You can do Diagnostic activities
I have a Diagnostics certificate
I’m owned by the right repair shop
… and I’m right next to
you
ISO 21177
• Uses internet-standard secure communications protocol, Transport Layer Security (TLS) 1.3
• Enables use of C-ITS (IEEE 1609.2) certificates to directly state permissions
• More appropriate than identity-based permissions in Mobile Ad Hoc Network (MANET) setting
• Allows each party to present a series of certificates to establish a detailed “authorization state” with the other party
• Becoming adopted by application standards
• SAE J2945/3 – authenticate / authorize weather reporting applications
Access Control Policy
Responder Application
Resource(s) ISO 21177 Security Adaptor Layer
Initiator Application
ISO 21177 Security Adaptor Layer
Secure Session (TLS Server)
Secure Session (TLS Client)
Security Subsystem
Access Control Policy
Security Subsystem
Resource(s)
ITS-SU
Requirements
• Secure sessions – confidentiality, integrity, authorization, anti-replay
• Each party can establish the permissions of the other
• Each party can present multiple authorization statements and maintain “authorization state” with respect to the other party
• A secure session can be bootstrapped within another secure session so eavesdroppers learn nothing, not even what application is acting
TLS handshake proxy
Application
TLS
SAPDUin
Security Subsystem
Access Control
out
APDU out
APDU in
SAPDUout
AccessControlin
Access Control Policy
Pre-send security processing
Post-receive security processing
ISO 21177 Security Adaptor Layer
Requirements
• Secure sessions – confidentiality, integrity, authorization, anti-replay
• Each party can establish the permissions of the other
• Each party can present multiple authorization statements and maintain “authorization state” with respect to the other party
• A secure session can be bootstrapped within another secure session so eavesdroppers learn nothing, not even what application is acting
TLS handshake proxy
Application
TLS
SAPDUin
Security Subsystem
Access Control
out
APDU out
APDU in
SAPDUout
AccessControlin
Access Control Policy
Pre-send security processing
Post-receive security processing
ISO 21177 Security Adaptor Layer
Requirements
• Secure sessions – confidentiality, integrity, authorization, anti-replay
• Each party can establish the permissions of the other
• Each party can present multiple authorization statements and maintain “authorization state” with respect to the other party
• A secure session can be bootstrapped within another secure session so eavesdroppers learn nothing, not even what application is acting
TLS handshake proxy
Application
TLS
SAPDUin
Security Subsystem
Access Control
out
APDU out
APDU in
SAPDUout
AccessControlin
Access Control Policy
Pre-send security processing
Post-receive security processing
ISO 21177 Security Adaptor Layer
Requirements
• Secure sessions – confidentiality, integrity, authorization, anti-replay
• Each party can establish the permissions of the other
• Each party can present multiple authorization statements and maintain “authorization state” with respect to the other party
• A secure session can be bootstrapped within another secure session so eavesdroppers learn nothing, not even what application is acting
TLS handshake proxy
Application
TLS
SAPDUin
Security Subsystem
Access Control
out
APDU out
APDU in
SAPDUout
AccessControlin
Access Control Policy
Pre-send security processing
Post-receive security processing
ISO 21177 Security Adaptor Layer
TLS handshake proxy
Application
TLS
SAPDUin
Security Subsystem
Access Control
out
APDU out
APDU in
SAPDUout
AccessControlin
Access Control Policy
Pre-send security processing
Post-receive security processing
ISO 21177 Security Adaptor Layer
Requirements
• Secure sessions – confidentiality, integrity, authorization, anti-replay
• Each party can establish the permissions of the other
• Each party can present multiple authorization statements and maintain “authorization state” with respect to the other party
• A secure session can be bootstrapped within another secure session so eavesdroppers learn nothing, not even what application is acting
Security: Authentication / Authorization
• Policy authorities and certificate authorities are already being established to support C-ITS
• This organizational structure can also support authentication and authorization for SVI
• OEMs can enforce reasonable security policies on certificate issuance and freshness
• OEM security concerns are real and must be taken into account
• However, in this model OEMs are not real-time gatekeepers of access to the information
• Nevertheless, their security requirements are met