CEN PT1605 The basic situation Two devices cooperate in a trusted way ie exchange information in secure application sessions September 2018 SSTD Budapest 2 Example Multiple aftermarket services ID: 1028334
Download Presentation The PPT/PDF document "How ISO 21217 works Please view as a “..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
1. How ISO 21217 worksPlease view as a “Slide Show”CEN PT1605
2. The basic situationTwo devices cooperate in a trusted way, i.e. exchange information in secure application sessions. September 2018SSTD - Budapest2
3. Example: Multiple after-market servicesusing OEM installed SVIProprietary NetworkNodeProprietary NetworkNodeProprietary NetworkNodeProprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsInterface can be wireless (DSRC, WiFI, 4G/5G, OBD, etc) ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsExternal domainIn-vehicle domainDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManufacturerServicesCV /C-ITSSVI
4. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicySecurity: Authentication / Authorization
5. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicyProof: valid C-ITS ApplicationSecurity: Authentication / Authorization
6. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicyProof: valid C-ITS ApplicationCertificateSecurity: Authentication / Authorization
7. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicyProof: valid C-ITS ApplicationCertificateSecurity: Authentication / AuthorizationI have a C-ITS certificate
8. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicyProof: valid C-ITS ApplicationCertificateSecurity: Authentication / AuthorizationI have a C-ITS certificateYou can do C-ITS activities
9. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicySecurity: Authentication / AuthorizationValid fleet management deviceOwnershipI have a Fleet Management certificateI’m owned by the right fleet owner
10. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicySecurity: Authentication / AuthorizationYou can do Fleet Management activitiesValid fleet management deviceOwnershipI have a Fleet Management certificateI’m owned by the right fleet owner
11. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicySecurity: Authentication / AuthorizationValid diagnosticdeviceOwnershipI have a Diagnostics certificate
12. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicySecurity: Authentication / AuthorizationValid diagnosticdeviceOwnershipI have a Diagnostics certificateI’m owned by the right repair shop
13. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicySecurity: Authentication / AuthorizationValid diagnosticdeviceOwnershipI have a Diagnostics certificateI’m owned by the right repair shop… and I’m right next to you
14. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicySecurity: Authentication / AuthorizationYou can do Diagnostic activitiesValid diagnosticdeviceOwnershipI have a Diagnostics certificateI’m owned by the right repair shop… and I’m right next to you
15. ISO 21177Uses internet-standard secure communications protocol, Transport Layer Security (TLS) 1.3Enables use of C-ITS (IEEE 1609.2) certificates to directly state permissionsMore appropriate than identity-based permissions in Mobile Ad Hoc Network (MANET) settingAllows each party to present a series of certificates to establish a detailed “authorization state” with the other partyBecoming adopted by application standardsSAE J2945/3 – authenticate / authorize weather reporting applications
16. RequirementsSecure sessions – confidentiality, integrity, authorization, anti-replayEach party can establish the permissions of the otherEach party can present multiple authorization statements and maintain “authorization state” with respect to the other partyA secure session can be bootstrapped within another secure session so eavesdroppers learn nothing, not even what application is acting
17. RequirementsSecure sessions – confidentiality, integrity, authorization, anti-replayEach party can establish the permissions of the otherEach party can present multiple authorization statements and maintain “authorization state” with respect to the other partyA secure session can be bootstrapped within another secure session so eavesdroppers learn nothing, not even what application is acting
18. RequirementsSecure sessions – confidentiality, integrity, authorization, anti-replayEach party can establish the permissions of the otherEach party can present multiple authorization statements and maintain “authorization state” with respect to the other partyA secure session can be bootstrapped within another secure session so eavesdroppers learn nothing, not even what application is acting
19. RequirementsSecure sessions – confidentiality, integrity, authorization, anti-replayEach party can establish the permissions of the otherEach party can present multiple authorization statements and maintain “authorization state” with respect to the other partyA secure session can be bootstrapped within another secure session so eavesdroppers learn nothing, not even what application is acting
20. RequirementsSecure sessions – confidentiality, integrity, authorization, anti-replayEach party can establish the permissions of the otherEach party can present multiple authorization statements and maintain “authorization state” with respect to the other partyA secure session can be bootstrapped within another secure session so eavesdroppers learn nothing, not even what application is acting
21. PolicyValid diagnosticdeviceOwnershipSecurity: Authentication / AuthorizationPolicy authorities and certificate authorities are already being established to support C-ITSThis organizational structure can also support authentication and authorization for SVIOEMs can enforce reasonable security policies on certificate issuance and freshnessOEM security concerns are real and must be taken into accountHowever, in this model OEMs are not real-time gatekeepers of access to the informationNevertheless, their security requirements are met