Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber Security for the Connected Car

1,708 views

Published on

Originally aired May 18, 2016
On-Demand: http://ecast.opensystemsmedia.com/637

Published in: Software
  • Be the first to comment

Cyber Security for the Connected Car

  1. 1. Cyber Security for the Connected Car Bob Leigh, Director of Market Development, RTI
  2. 2. RTI’s Experience • ~1000 Projects – Automotive – Healthcare – Communications – Energy – Industrial – Defense • 15+ Standards & Consortia Efforts – Interoperability – Multi-vendor ecosystems
  3. 3. Industrial IoT Key System Characteristics • Reliability • Scalability • Safety • Security • Resiliency Large scale, heterogeneous, built with multi-vendor components, often broadly distributed and evolving
  4. 4. It’s All About the Data Data centricity enables interoperation, scale, integration Unstructured files Database Data Centricity Data at Rest Messaging middleware DataBus Data Centricity Data in Motion
  5. 5. DDS Standards: Layered View DDS v 1.4 RTPS v2.2 DDS-SECURITY DDS-RPC* DDS-XTYPES Application UDP TCP** DTLS** TLS** DDS-C++ DDS-JAVA* DDS-IDL-C DDS-IDL-C# SHARED- MEMORY**IP DDS-WEB HTTP(s) IDL4.0
  6. 6. Unit DataBus Unit DataBus Sensor-to-Cloud • Connect… – Fast – Seamless – QoS controlled – Secure – Data centric • Multiple Platforms • Various Transports In-Car Platform V2V & V2X Public Internet Cloud DataBus Site DataBus Fleet Management Unit DataBus Sense Act Think HMI Machine DataBus
  7. 7. Connected Car: Security Challenges • Sensor to Cloud Integration • Multiple Attack Surfaces – Internet – Cloud – Other cars – In-car • Connecting Autonomous Cars
  8. 8. Cloud Services Connected, Autonomous Car Sensing Planning Radar, LIDAR Vehicle Platform Navigation Error Management Visualization Situation Analysis Situation Awareness Vision Fusion Cameras, LIDAR, Radar … Data Fusion LoggingVehicle Control Localization DDS Bus Traffic Maps DDS Bus
  9. 9. Three Security Boundaries • Boundary security • Transport-Level – Network (layer 3) security – Session (layer 4/5) security • Fine-grained Data-Centric Security Introducing: RTI Connext DDS Secure
  10. 10. Threats • Unauthorized Subscription • Unauthorized Publication • Tampering & Replay Alice Bob Eve Trudy Trent Mallory Local machine is assumed to be trusted
  11. 11. Practical Fine-Grain Security Connext™ DDS Secure • Per-Topic Security – Control r,w access for each function – Ensures proper dataflow operation • Complete Protection – Discovery authentication – Data-centric access control – Cryptography – Tagging & logging – Non-repudiation – Secure multicast – 100% standards compliant • No code changes! • Plugin architecture for advanced uses WatchdogSensor Planning Operator State Alarms SetPoint Topic Security model: • Sensor: State(w) • Watchdog: State(r); Alarms(w) • Planning: State(r), SetPoint(w) • Operator: *(r), Setpoint(w)
  12. 12. Summary • A connected car has multiple attack surfaces, many exposed publicly • Risk, especially with self-driving cars, is high • The system needs reliable, flexible, real- time, secure connectivity • Security should be part of the architecture design, embedded in multiple system layers • Connext™ DDS Secure supports fine grained security
  13. 13. Contact bob.leigh@rti.com 416-606-6677 ©2016 Real-Time Innovations, Inc. Confidential.

×