+ All Categories
Home > Documents > SCMS overview - ITS California

SCMS overview - ITS California

Date post: 10-Jan-2022
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
15
1 SCMS overview ITS California Annual Meeting 18-20 Sept 2017, Burlingame CA
Transcript

1

SCMS overviewITS California Annual Meeting18-20 Sept 2017, Burlingame CA

29/18/2017

• Communications security required as traditional: integrity, authenticity, authorization,

confidentiality.

• Specific to the ITS application.

• Additional challenges for ITS communications:

• Privacy (untrackability) of user/device,

• Limited channel resources

• Device constraints (heavy processing, integrity a must)

• Additional network architecture challenges:

• Complex due to privacy requirements and intermittent connectivity of vehicles.

ITS: Security requirements and challenges

ITS – car to car communications: Wireless Access in Vehicular Environments (WAVE)

2

39/18/2017

Integrity in V2X systems means ability of receiver devices to verify that

− V2X message sender is a trustworthy/authorized device

− V2X message was not modified between sender and receiver

Privacy means

− No single device or network entity is able to track another device beyond a short time interval

Trust part of security means misbehaving devices are identified

− Other devices can know not to trust messages from misbehaving devices

Solution

Use digital signatures to guarantee integrity of V2 messages

Change credentials on a regular and frequent basis to prevent tracking

Use a central authority employing Public Key Infra as trust anchor–(privacy)

Disseminate Cert Revocation Lists (CRL)

Use secure links vehicle to network, encrypt confidential information

Vehicle to everything (V2X) communications security details

49/18/2017

ITS communication security for WAVE

Simplified

Certificate

SafetyMsg

Signature

Certificate

Certificate Authority

CRL

CA Signature

5

WAVE security standards aspects

The Security Credential Management System (SCMS) was developed

over many years under a cooperative agreement by CAMP with the

United States Department of Transportation (USDOT). According to the

NPRM, SCMS is currently the leading candidate for vehicle-to-vehicle

(V2V) security backend design in the United States

69/18/2017

Device OSI layers and Relevant Standards (US)

WAVE IEEE 1609 Wireless Access in Vehicular Environments stack

WAVE

Security

Services

CRL

Verification

Service

P2P

Certificate

Distribution

ServiceUDP / TCP

IPv6

WSMP Transport

WSMP Networking

WAVE MAC

(including channel coordination)

PHY

SAE J2735SAE J2945

Family

Message Sublayer

Safety

Applications

Non-Safety

Applications

IEEE 802-2012

IEEE 1609

Family

79/18/2017

V2V WAVE security aspects

Vehicles have no prior relationship at an instance in time and space

security data security

BSM: basic safety message*Processed at the app layer

Each vehicle is securely provisioned with many short-lived pseudonym certificates

Each sender uses one of its certs to sign BSMs, sends them broadcast

Each vehicle who can hear it can verify BSM legitimacy on its own

Authentication, authorization, privacy, un-trackability enforced

Security components

BSM

89/18/2017

The challenges of WAVE security designPrivacy

99/18/2017

Phases of configuration for vehicle security module

Supported by SCMS

To Enrollment

Authority: prove

eligibility

Receive ONE

enrollment

certificate

Certificate

Provisioning

Participate

in V2VEnrollment

To Registration

Authority: Show

enrollment

certificate

Receive SET of

pseudonym

certificates

Manufacture

-eligible

-Cert

Authorities

Enrollment Authority validates that Device can be trusted to function

correctly; issues long-term enrollment cert, temporary ID for the Device.

Registration Authority is the one interface of the Device to the SCMS

network from here on (provision, CRL); makes available short-term

pseudonym certs (via location obscurer function)

109/18/2017

Simplified cert provisioning flow

How the vehicles get certs for signing safety messages

Request Certs

RegistrationAuthority

Pseudonym CertAuthority

Location obscurer

RA acts as anonymizer

proxy: process, validates &

shuffles the requests; then

forwards individual certificate

requests to PCA.

RA aggregates responses

and encrypts batches of

certificates for each vehicle

Request Certs Request Certs

Request Certs

PCA issues certificates without knowing which certificate is for which vehicle.

Encrypts them with device’s private key

Encrypted Certs

Encrypted CertsEncrypted Certs

Encrypted Certs

.

.

.

Devices

119/18/2017

SCMS architecture

This is standard PKI

Courtesy IEEE 1609.2 2016

12

Trials/POCs of SCMS

Jim Misener

139/18/2017

Base Document (now in version 2): Security Credential Management System Proof–of–

Concept Implementation EE Requirements and Specifications Supporting SCMS Software

Release 1.1:

− https://www.its.dot.gov/pilots/pdf/SCMS_POC_EE_Requirements.pdf

Developed by CAMP (OEMs/NHTSA).

Under testing:

− US DSRC Connected Vehicle Pilots: NYC, Tampa, and Montana. NYC is the prime test site.

− Next: Columbus Smart City (USDOT-funded initiative with DSRC as a requirement)

− Promoted as a model for rest of world by US-EU-Japan-Australia governments “Harmonization Task Group”

SCMS on the Road

149/18/2017

New for SCMS since its stable version:

− Modified IEEE 1609.2 (security services) to accommodate SCMS

− Specified interfaces of vehicle to network

− Standardized Peer to peer certificate distribution

− Completed specification of policies

Next:

− Make technical changes based on trials. This may be 1 – 2 years downstream

− Have SCMS ready for 1st US deployment (2020 – 2021)

− Need to address objections/comments and variants stated in the NPRM.

− Need to develop sustainable business model.

SCMS next steps

15

All data and information contained in or disclosed by this document is confidential and proprietary information of Qualcomm I ncorporated and all rights therein are

expressly reserved. By accepting this material the recipient agrees that this material and the information contained therein is to be held in confidence and in trust and

will not be used, copied, reproduced in whole or in part, nor its contents revealed in any manner to others without the expre ss written permission of Qualcomm

Incorporated.

© 2013 QUALCOMM Incorporated and/or its subsidiaries. All Rights Reserved.

Qualcomm is a trademark of Qualcomm Incorporated, registered in the United States and other countries.

Other products and brand names may be trademarks or registered trademarks of their respective owners

References in this presentation to “Qualcomm” may mean Qualcomm Incorporated, Qualcomm Technologies, Inc., and/or other subsi diaries or business units within the

Qualcomm corporate structure, as applicable.

Qualcomm Incorporated includes Qualcomm’s licensing business, QTL, and the vast majority of its patent portfolio. Qualcomm Te chnologies, Inc., a wholly-owned

subsidiary of Qualcomm Incorporated, operates, along with its subsidiaries, substantially all of Qualcomm’s engineering, rese arch and development functions, and

substantially all of its product and services businesses,

including its semiconductor business.

Thank you


Recommended