/
How ISO 21217 works Please view as a “Slide  Show” How ISO 21217 works Please view as a “Slide  Show”

How ISO 21217 works Please view as a “Slide Show” - PowerPoint Presentation

susan2
susan2 . @susan2
Follow
65 views
Uploaded On 2023-11-04

How ISO 21217 works Please view as a “Slide Show” - PPT Presentation

CEN PT1605 The basic situation Two devices cooperate in a trusted way ie exchange information in secure application sessions September 2018 SSTD Budapest 2 Example Multiple aftermarket services ID: 1028334

transportaccessfacilitiessecurityapplicationsmanagementnetwork amp security authorization amp transportaccessfacilitiessecurityapplicationsmanagementnetwork authorization security authentication managementnetwork secure mngtmanagementnetwork translation stack party transportaccessfacilitiessecurityapplicationscv proprietary transportaccessfacilitiessecurityapplicationsdiagnosticinsurancefleet session

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "How ISO 21217 works Please view as a “..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

1. How ISO 21217 worksPlease view as a “Slide Show”CEN PT1605

2. The basic situationTwo devices cooperate in a trusted way, i.e. exchange information in secure application sessions. September 2018SSTD - Budapest2

3. Example: Multiple after-market servicesusing OEM installed SVIProprietary NetworkNodeProprietary NetworkNodeProprietary NetworkNodeProprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsInterface can be wireless (DSRC, WiFI, 4G/5G, OBD, etc) ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsExternal domainIn-vehicle domainDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManufacturerServicesCV /C-ITSSVI

4. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicySecurity: Authentication / Authorization

5. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicyProof: valid C-ITS ApplicationSecurity: Authentication / Authorization

6. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicyProof: valid C-ITS ApplicationCertificateSecurity: Authentication / Authorization

7. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicyProof: valid C-ITS ApplicationCertificateSecurity: Authentication / AuthorizationI have a C-ITS certificate

8. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicyProof: valid C-ITS ApplicationCertificateSecurity: Authentication / AuthorizationI have a C-ITS certificateYou can do C-ITS activities

9. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicySecurity: Authentication / AuthorizationValid fleet management deviceOwnershipI have a Fleet Management certificateI’m owned by the right fleet owner

10. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicySecurity: Authentication / AuthorizationYou can do Fleet Management activitiesValid fleet management deviceOwnershipI have a Fleet Management certificateI’m owned by the right fleet owner

11. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicySecurity: Authentication / AuthorizationValid diagnosticdeviceOwnershipI have a Diagnostics certificate

12. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicySecurity: Authentication / AuthorizationValid diagnosticdeviceOwnershipI have a Diagnostics certificateI’m owned by the right repair shop

13. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicySecurity: Authentication / AuthorizationValid diagnosticdeviceOwnershipI have a Diagnostics certificateI’m owned by the right repair shop… and I’m right next to you

14. Proprietary stack(security & translation )ManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsDiagnosticInsuranceFleet MngtManagementNetwork & TransportAccessFacilitiesSecurityApplicationsManagementNetwork & TransportAccessFacilitiesSecurityApplicationsCV/C-ITSPolicySecurity: Authentication / AuthorizationYou can do Diagnostic activitiesValid diagnosticdeviceOwnershipI have a Diagnostics certificateI’m owned by the right repair shop… and I’m right next to you

15. ISO 21177Uses internet-standard secure communications protocol, Transport Layer Security (TLS) 1.3Enables use of C-ITS (IEEE 1609.2) certificates to directly state permissionsMore appropriate than identity-based permissions in Mobile Ad Hoc Network (MANET) settingAllows each party to present a series of certificates to establish a detailed “authorization state” with the other partyBecoming adopted by application standardsSAE J2945/3 – authenticate / authorize weather reporting applications

16. RequirementsSecure sessions – confidentiality, integrity, authorization, anti-replayEach party can establish the permissions of the otherEach party can present multiple authorization statements and maintain “authorization state” with respect to the other partyA secure session can be bootstrapped within another secure session so eavesdroppers learn nothing, not even what application is acting

17. RequirementsSecure sessions – confidentiality, integrity, authorization, anti-replayEach party can establish the permissions of the otherEach party can present multiple authorization statements and maintain “authorization state” with respect to the other partyA secure session can be bootstrapped within another secure session so eavesdroppers learn nothing, not even what application is acting

18. RequirementsSecure sessions – confidentiality, integrity, authorization, anti-replayEach party can establish the permissions of the otherEach party can present multiple authorization statements and maintain “authorization state” with respect to the other partyA secure session can be bootstrapped within another secure session so eavesdroppers learn nothing, not even what application is acting

19. RequirementsSecure sessions – confidentiality, integrity, authorization, anti-replayEach party can establish the permissions of the otherEach party can present multiple authorization statements and maintain “authorization state” with respect to the other partyA secure session can be bootstrapped within another secure session so eavesdroppers learn nothing, not even what application is acting

20. RequirementsSecure sessions – confidentiality, integrity, authorization, anti-replayEach party can establish the permissions of the otherEach party can present multiple authorization statements and maintain “authorization state” with respect to the other partyA secure session can be bootstrapped within another secure session so eavesdroppers learn nothing, not even what application is acting

21. PolicyValid diagnosticdeviceOwnershipSecurity: Authentication / AuthorizationPolicy authorities and certificate authorities are already being established to support C-ITSThis organizational structure can also support authentication and authorization for SVIOEMs can enforce reasonable security policies on certificate issuance and freshnessOEM security concerns are real and must be taken into accountHowever, in this model OEMs are not real-time gatekeepers of access to the informationNevertheless, their security requirements are met