Top Banner
2017 ITS-NY TWENTY-FOURTH ANNUAL MEETING “ITS Mobility – A New World” June 15-16, 2017; Saratoga Springs, NY AGENDA -continued- Friday, June 16, 2017 7:30 a.m. ITS-NY Board of Directors Meeting, Garden Room 7:30 Registration Desk and Exhibit Hall Open; Full Breakfast in Exhibit Hall 9:00 Panel 4: Using ITS for Performance Assessment Panel Moderator: Dr. Camille Kamga, UTRC2 “Analyze This: Using NPMRDS for Multi-Geographic-Resolution (MGR) Performance Assessment,” Dr. Catherine Lawson, SUNY “Artificial Intelligence Saving Lives on Highways (with Existing Infrastructure)," Branko Glad, Telegra “ITS and Performance Assessment for Freight Transportation,” Shobna Varma, StarIsis Corp. 10:15 Break in Exhibit Hall (Exhibit Hall Closes at 10:45 a.m.) 10:45 Panel 5: ITS Security Panel Moderator: John Bassett, NYSDOT “Considering Cybersecurity,” Roderick Link, FBI Cyber Task Force Unit/Albany “Cybersecurity,” Siva Narla, ITE “Security for Connected Vehicles: Successes and Challenges,” Dr. Virendra Kumar, Security Innovation Inc. Noon ITS-NY Closing Luncheon ITS-NY Officers and Board of Directors Election Results; Free Weekend and CITE Course Drawings 1:15 p.m. Adjourn
60

OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Mar 19, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

2017 ITS-NY TWENTY-FOURTH ANNUAL MEETING “ITS Mobility – A New World”

June 15-16, 2017; Saratoga Springs, NY

AGENDA -continued-

Friday, June 16, 2017 7:30 a.m. ITS-NY Board of Directors Meeting, Garden Room 7:30 Registration Desk and Exhibit Hall Open; Full Breakfast in Exhibit Hall 9:00 Panel 4: Using ITS for Performance Assessment

Panel Moderator: Dr. Camille Kamga, UTRC2 “Analyze This: Using NPMRDS for Multi-Geographic-Resolution (MGR) Performance

Assessment,” Dr. Catherine Lawson, SUNY “Artificial Intelligence Saving Lives on Highways (with Existing Infrastructure)," Branko Glad, Telegra “ITS and Performance Assessment for Freight Transportation,” Shobna Varma, StarIsis Corp.

10:15 Break in Exhibit Hall (Exhibit Hall Closes at 10:45 a.m.) 10:45 Panel 5: ITS Security Panel Moderator: John Bassett, NYSDOT

“Considering Cybersecurity,” Roderick Link, FBI Cyber Task Force Unit/Albany “Cybersecurity,” Siva Narla, ITE “Security for Connected Vehicles: Successes and Challenges,” Dr. Virendra Kumar,

Security Innovation Inc. Noon ITS-NY Closing Luncheon

ITS-NY Officers and Board of Directors Election Results; Free Weekend and CITE Course Drawings

1:15 p.m. Adjourn

Page 2: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Security for Connected

Vehicle: Successes and

Challenges

Dr. Virendra Kumar

Principal Scientist, OnBoard Security

Page 3: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Outline

Connected vehicle security: what and why?

Successes

– SCMS: developed and ready for use

– CIA analysis: a framework for device security

Challenges

– Provisioning of certificates into devices

– Misbehavior detection and revocation

Page 4: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Traffic Safety

32k US road deaths, and 3.8M injuries annually

Fatalities and injuries = $300B/year

Congestion = $230B/year

Leading cause of death for ages 15-34 in US

Technology Evolution

Passive Active

Proactive

Page 5: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Connected Vehicle

Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless

communications for 360o warning applications.

– 300 m range, 802.11-derived medium access

– Basic Safety Message (BSM)

Contains location, velocity, steering angle…

Transmitted up to 10x second

Allows receiving unit to predict collisions and warn driver

– “Prevent 80% of unimpaired 2-vehicle accidents”

Availability of wireless communications may also enable other applications

– Signal phase and timing

– Point of interest notification

Page 6: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Security Considerations

Risk of false messages

– Reduce users’ faith in system and cause warnings to be ignored

– (not safety-related): Messages may affect choice of route or have other mobility/efficiency

impacts

– Requirement: must be able to detect untrustworthy senders or messages and let receivers

know not to trust them

Impact on privacy

– Don’t want the system to be used as a tracking system

Tracking is always possible, don’t want this option to be the cheapest

– Prevent eavesdroppers or insiders from collecting Personally Identifiable Information (PII)

– Conflict with requirement to detect and remove untrustworthy senders

Page 7: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Protection Against False Messages

Protect against false messages:

– Messages are signed and not encrypted

Signed using ECDSA over the NISTp256 curve with ECQV certs

– Message signing certificate specifies permissions (not identity) of holder

– Misbehaving units can have their certificates identified and revoked

Use different certs for different types of operation

– Security management, application A, application B

Page 8: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Protection of Privacy

Don’t directly reveal information: No personal information included in broadcast

messages

Prevent tracking: “Identifiers” at application, network and other levels should be

transient

Vehicles have a number of simultaneously valid BSM certificates, can choose which

certificate to use to sign each message

– Baseline number of certs = 20 per week

– When cert changes, all other identifiers change too: currently no standardized

algorithm for cert change

Page 9: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Successes in CV Security

Page 10: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

SCMS Design

Secure Credential Management System

(SCMS – think PKI-on-steroids) for V2V

includes privacy-preserving mechanisms

Shuffle at RA to protect against CA learning

certificates

Linkage authorities to allow tracing

misbehaving devices without revealing their

identity, and revoking in a way that only

allows them to be tracked after revocation

Organization separation ensures no single

insider / no single database breach can

track any car

Page 11: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

SCMS Development

SCMS Proof-of-Concept Implementation

– EE requirements and specifications available since May 04, 2016 (https://www.its.dot.gov/pilots/pdf/SCMS_POC_EE_Requirements.pdf)

– SCMS QA environment available since May 19, 2017. (https://cvcs.samanage.com/catalog_items.portal?category=SCMS+-+POC)

Support for Connected Vehicle Pilot Deployment Program

– New York City DOT Pilot (https://www.its.dot.gov/pilots/pilots_nycdot.htm)

– Tampa-Hillsborough Expressway Authority Pilot (https://www.its.dot.gov/pilots/pilots_thea.htm)

– Wyoming DOT Pilot (https://www.its.dot.gov/pilots/pilots_wydot.htm)

Page 12: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Device Security

Certificates should be issued to a device only when it is considered to be secure enough.

– Where do security requirements come from?

– What are they?

– How can one make conformance statements about device security?

– Whose responsibility is it to check those conformance statements?

– …

Page 13: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Threat model is application specific

Connected Vehicle applications –not just vehicles!

– Traffic signals, signs, gates, toll plazas, back-end systems, …

– Signal preemption, border crossing, pedestrian in signalized intersection warning...

Many devices playing many different roles in different applications

Deriving security requirements

Page 14: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

False positives

– Unlikely to cause physical harm

– “Something bad round the corner!swerve now!”

– But invalid alerts reducedriver faith in system

– Appropriate security approach: Authentication + misbehavior detection

False negatives

– Need to warn about denial of service once system is widely deployed

Threat model for crash avoidance

!!!

Page 15: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

General Approach

FIPS-199 Confidentiality, Integrity, Availability (C-I-A) low/medium/high (little/significant/catastrophic)

Focus on the flow of information/data in and out of the device

Analyze a representative subset of projected applications from the CVRIA

Use the devices data C-I-A requirements to derive the device’s requirements

See which C-I-A combinations turn up most frequently

Define a “minimal useful” set of device classes that cover all the identified C-I-A combinations

Specify security controls for each device class based on NIST SP 800-53

Page 16: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Goals of SCMS Device Requirements for CV Pilots

Enable Privileged applications to securely use different cryptographic keys

– Privileged vs. unprivileged applications

– Privileged application crypto key access

Prohibit read access to key material!

Public key (signature verification) protected from unauthorized replacement

Control access to data by application

Secure software/firmware update

https://wiki.campllc.org/display/SCP/Hardware%2C+Software+and+OS+Security+Requirements

Page 17: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Enforcement

Vendors self-certify for Pilot Deployments

There are interoperability tests but no platform security tests yet

Note, FIPS 140-2 level 2 or 3 hardware *equivalent*

Page 18: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Challenges in CV Security

Page 19: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Device Credentials

Device enrollment

– Enrollment interfaces are not standardized, and may differ from one manufacturer to another.

– How can small manufacturers participate without being overburdened with understanding and designing these interfaces?

– How can special vehicles like police, emergency, etc. get regional authorization? How can their authorization be changed?

Once enrolled, how can devices get authorization credentials in the absence of frequent connectivity?

Page 20: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Misbehavior Detection and Revocation

Privacy vs. misbehavior detection

– How can one restrict Misbehavior Authority (MA) to maintain honest users’ privacy, yet keep it powerful enough to detect misbehaving users?

– How can one prevent MA from colluding with rest of the SCMS to undermine honest users’ privacy?

– …

Revocation

– How to enforce revocation in the absence of frequent connectivity?

– How to “unrevoke” someone who was revoked by mistake or whose malfunction has now been fixed?

– …

Page 21: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Thank you!

Page 22: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Cyberattacks on the Public

Sector

Trends and Perspectives CS Roderick Link > FBI Albany

//GCFA, GPEN, GREM, GCIH, GCIA

Page 23: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

//In the Battle for New Cybertron…

Page 24: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

//The Good

FireEyeSymantecCisco CarbonBlack

NSA

Page 25: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

The Bad >

Hactivists

Ransomware

Russian APT

Chinese APT

Account Compromise

Page 26: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

//The Ugly

Former Employees

Insider Threat

NSA

Page 27: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Reality is a Little Less Hollywood

The adversary is not always sophisticated.

An actual sophisticated adversary does not always equal

sophisticated attack or require sophisticated response.

Page 28: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

//Know the Enemy

75%

25%

POINT OF ORIGIN

Outsiders Insiders

51%

18%

31%

OUTSIDERS

Organize Crime Nation State Other

73%

21%

6%

MOTIVATION

Financial Espionage / Intel Other

Source: 2017 Verizon Data Breach Investigations Report 10th Ed.

Page 29: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Know the Enemy > Points

Insiders on average are a way larger threat than most organizations

expect

Outsiders are overwhelmingly not nation-state

Mostly, cyber attacks come down to money

Page 30: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

//Know the Weapon

62%

38%

METHOD

Hacking Other

51%43%

6%

TACTIC

Malware Social Other

66%

34%

VECTOR

Email Attachment Other

Source: 2017 Verizon Data Breach Investigations Report 10th Ed.

Page 31: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

//Know the Weapon

Emails contain malware

1

141 Phishing attempts per email

1

2329

Source: Internet Security Threat Report – Vol 22, April 2017 - Symantec

Attack Rates for Public Sector

Page 32: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Trends > Malware

New ransomware family discoveries increased nearly 600% from 2015 to 2016, despite overall malware families decreasing ~8%

Magnitude (purple), Angler (black), Rig (red), Neutrino (white), Sundown (pink) all deteriorated by the beginning of 2017.

Source: F-Secure State of Cyber Security 2017

Page 33: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Know the Weapon > Points

Hacking is often not required because of poor configurations

Social attacks are almost as frequent as malware.

The overwhelming majority of malware is delivered by email.

Despite shrinking field, large shift to ransomware

Page 34: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Public Sector > Perspective

36%

23%

18%

23%

SECTOR

Finance Healthcare Public Other

Source: 2017 Verizon Data Breach Investigations Report 10th Ed.

Page 35: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Public Sector > Perspective

75%

25%

OVERALL

Outsiders Insiders

Source: 2017 Verizon Data Breach Investigations Report 10th Ed.

60%

40%

PUBLIC SECTOR

Outsiders Insiders

POINT OF ORIGIN

Page 36: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Public Sector > Perspective

Source: 2017 Verizon Data Breach Investigations Report 10th Ed.

73%

21%

6%

OVERALL

Financial Espionage / Intel Other

20%

64%

16%

PUBLIC SECTOR

Financial Espionage / Intel Other

MOTIVATION

Page 37: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Public Sector > Points

Insider threat is far outsized compared to Private Sector

The motivations are much more destructive

Page 38: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Trends > Mobile

Source: Internet Security Threat Report – Vol 22, April 2017 - Symantec

Page 39: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Trends >

Internet of

Things

Source: Internet Security Threat Report – Vol 22, April 2017 - Symantec

Page 40: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Trends > Malware for Breaking Things

Shamoon reappeared in Saudi Arabia in November of 2016. This malware

compiles a list of files from targeted directories, uploads them to the attacker,

then erases the victims MBR. Shamoon has been targeted at the Middle East Energy sector and bares similarity to Flame.

Campaigns in late 2015 and early 2016 that initially used BlackEnergy malware

targeting the Ukranian Energy sector transitioned to using KillDisk malware,

triggering blackouts across the country.

Page 41: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Planning a Defense > Outsiders

Source: 2017 Verizon Data Breach Investigations Report 10th Ed.

If half of all compromises are a result of malware, what resources can you spend

on endpoint AV services, OS upgrades?

If (nearly) the other half of compromises are a result of social engineering, what amount of time are you dedicating to user training?

Do you have the resources available to identify phishing attempts against your

domain and can you revoke messages?

Do you have the rapport between IT and end users to encourage compromise

reporting and to reactively change credentials?

Page 42: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Planning a Defense > Insiders

In what ways are access privileges limited by group role?

How are actions by administrators audited?

What happens to credentials when a user changes roles or separates from the

organization?

Page 43: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

//Planning a Defense

Are your access points secured against simple packet captures?

Do you have the ability to alert on foreign IP addresses attempting

authentication at a gateway?

Can field devices be accessed without credentials or with default credentials?

Are you building partnerships with intelligence value?

Page 44: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

“Our obligation is to refuse to let bad win, to refuse to let

evil hold the field.”

< James Comey

Page 45: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

Roadway Transportation System

Cyber Security Framework (RTCSF)

Update on Stakeholder driven effort in US

Supported by US DOT

Siva R. K. Narla

Senior Director

Institute of Transportation Engineers (ITE)

Email: [email protected]

Page 46: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

2

Topics

• Need - Improving Critical Infrastructure

Cybersecurity

• Transportation System Cyber-Security

Framework (TSCSF)

• TSCSF Services – Products and Tools

• TSCSF Stakeholder Partnership

Page 47: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

3

Need - Improving Critical Infrastructure

Cybersecurity

• Driver - Executive Order (EO) 13636 “Improving

Critical Infrastructure Cybersecurity”

• NIST Framework for Improving Critical

Infrastructure Cybersecurity

• USDOT Framework for Improving Critical

Infrastructure Cybersecurity

Page 48: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

4

Transportation System Cyber-Security

Framework (TSCSF) - WHY

Source: Edward Fok

USDOT/Resource Centers

Page 49: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

5

TSCSF – What are We Trying to

Protect

Source: Edward Fok

USDOT/Resource Centers

Page 50: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

6

TSCSF Services – Phase I (Q4 2016)

• US DOT funded effort to create the TSCSF

• Objectives of the task order is to develop a

TSCSF Partnership

• Develop a BETA NoCOE Cyber Security website

as a prototype for transportation owners and

operators to identify needs and develop detailed

requirements and testing

• Define additional needs such as implementation

guidance, affiliated resources, training materials

and outreach to stakeholders nationwide

Page 51: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

7

TSCSF Services – Phase I (Q4 2016)

• Define Mission, vision and goals for TSCSF

• Invite stakeholders from all five associations

representing transportation infrastructure and

form groups representing

Owner/operators

Industry

Practioners

State, and local governments

• Define tools and services needed for the TSCSF

Page 52: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

8

Transportation System Cyber-Security

Framework (TSCSF) Partnership

Establishment of the TSCSF Partnership with a MOU

between transportation industry’s associations

• American Association of State Highway and

Transportation Officials (AASHTO)

• ITS America

• National Electrical Manufacturers Association

• (NEMA) and

• Institute of Transportation Engineers (ITE)

• National Association of City Transportation Officials

(NACTO)

Page 53: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

9

Transportation System Cyber-Security

Framework (TSCSF) Partnership

MOU helps establish a cooperative partnership with each

association’s membership uniquely has a voice and stake

in the success.

• Invite Experts in the field of cybersecurity, industrial

cybersecurity standards, as well as other domains such

as National Institute of Standards (NIST), Department of

Homeland Security (DHS) and others as advised by US

DOT

Page 54: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

10

Proposed Phase II

Needs Assessment and ConOps

Objectives: To create an initial needs assessment

outline, create a Concept of Operations and hold a

Concept of Operations Walkthrough.

Deliverables:

• Stakeholder Interview List and Questionnaire

• Stakeholder Interview Summary Document

• Needs Assessment and Operational Scenarios

presentation

• Final Concept of Operations Document

Page 55: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

11

Proposed Phase II

Research Dimensions of Threat

Objectives: Identify gaps, redundancies, and

unknowns on comparing to the NIST Framework.

Build (Functional) requirements from the Concept

of Operations.

Deliverables:

Contract Summary/Report of TSC Framework and

additional research needs

Page 56: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

12

Proposed Phase II

NoCOE Outreach Site

Objectives: Build outreach site facilitating:

Discussion Forum,

Outreach/Informational, and

Site characteristics.

Information sharing with ISAC, ICS-CERT alerts

Outreach and Training material

Deliverables:

• NOCoE outreach site for Transportation System Cyber-

Security Framework with security features

Page 57: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

13

Proposed Phase II

Monitor/Alert/Advisory System

Objectives:

• Develop a TSCF specification

• Develop the TSCF Monitor/Alert/Advisory prototype

• Implement a fully functional TSCF

Monitor/Alert/Advisory system

• Operate the TSCF Monitor/Alert/Advisory system

• Maintain a database for input and a comment

resolution plan

Page 58: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

14

Proposed Phase II

Monitor/Alert/Advisory System

Deliverables:

• TSCF specification

• TSCF Monitor/Alert/Advisory prototype

• TSCF Monitor/Alert/Advisory system

• Comment Resolution Database

Page 59: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

15

Proposed Phase II

Self-Assessment Tool

Objectives: Build self-assessment tool facilitating:

Self assessment by agencies

Requirements Verification

Testing and Validation Reports

Deliverables:

• Self Assessment Tool with secure access and

confidential reporting features

Page 60: OnBoard Security Presentation Title - ITS-NYConnected Vehicle Significant reduction in deaths may be possible from vehicle-to-vehicle (V2V) wireless communications for 360o warning

16

Contact

To get more involved with US Transportation

System Cyber-Security Framework (TSCSF) effort,

please contact:

Siva Narla, Institute of Transportation Engineers (ITE)

Phone: 202-785-0060 x119

Fax: 202 785 0609

Email: [email protected]