Cyber Security for the Connected Car
Bob Leigh, Director of Market Development, RTI
RTI’s Experience
• ~1000 Projects
– Automotive
– Healthcare
– Communications
– Energy
– Industrial
– Defense
• 15+ Standards & Consortia Efforts
– Interoperability
– Multi-vendor ecosystems
Industrial IoT Key System Characteristics
• Reliability
• Scalability
• Safety
• Security
• Resiliency
Large scale, heterogeneous, built with multi-vendor components, often broadly
distributed and evolving
It’s All About the Data
Data centricity enables interoperation, scale, integration
Unstructured files
Database
Data Centricity Data at Rest
Messaging middleware
DataBus
Data Centricity Data in Motion
DDS Standards: Layered View
DDS v 1.4
RTPS v2.2
DDS-SECURITY
DDS-RPC*
DDS-XTYPES
Application
UDP TCP** DTLS** TLS**
DDS-C++ DDS-JAVA* DDS-IDL-C DDS-IDL-C#
SHARED-
MEMORY**IP
DDS-WEB
HTTP(s)
IDL4.0
Unit DataBus
Unit DataBus
Sensor-to-Cloud
• Connect…
– Fast
– Seamless
– QoS controlled
– Secure
– Data centric
• Multiple Platforms
• Various Transports
In-Car
Platform
V2V & V2X
Public Internet Cloud DataBus
Site DataBus
Fleet
Management
Unit DataBus
Sense Act
Think HMI
Machine DataBus
Connected Car: Security Challenges
• Sensor to Cloud Integration
• Multiple Attack Surfaces
– Internet
– Cloud
– Other cars
– In-car
• Connecting Autonomous Cars
Cloud Services
Connected, Autonomous Car
Sensing
Planning
Radar, LIDAR Vehicle Platform Navigation
Error
Management
Visualization
Situation Analysis
Situation Awareness
Vision Fusion
Cameras, LIDAR,
Radar
…
Data Fusion
LoggingVehicle Control
Localization
DDS Bus
Traffic Maps
DDS Bus
Three Security Boundaries
• Boundary security
• Transport-Level
– Network (layer 3) security
– Session (layer 4/5) security
• Fine-grained Data-Centric Security
Introducing: RTI Connext DDS Secure
Threats
• Unauthorized Subscription
• Unauthorized Publication
• Tampering & Replay
Alice
Bob
Eve
Trudy
Trent
Mallory
Local machine is assumed to be trusted
Practical Fine-Grain Security
Connext™ DDS Secure
• Per-Topic Security
– Control r,w access for each function
– Ensures proper dataflow operation
• Complete Protection
– Discovery authentication
– Data-centric access control
– Cryptography
– Tagging & logging
– Non-repudiation
– Secure multicast
– 100% standards compliant
• No code changes!
• Plugin architecture for advanced uses
WatchdogSensor Planning Operator
State Alarms SetPoint
Topic Security model:
• Sensor: State(w)
• Watchdog: State(r); Alarms(w)
• Planning: State(r), SetPoint(w)
• Operator: *(r), Setpoint(w)
Summary
• A connected car has multiple attack
surfaces, many exposed publicly
• Risk, especially with self-driving cars, is high
• The system needs reliable, flexible, real-
time, secure connectivity
• Security should be part of the architecture
design, embedded in multiple system layers
• Connext™ DDS Secure supports fine
grained security
Contact
bob.leigh@rti.com
416-606-6677
©2016 Real-Time Innovations, Inc. Confidential.

Cyber Security for the Connected Car

  • 1.
    Cyber Security forthe Connected Car Bob Leigh, Director of Market Development, RTI
  • 2.
    RTI’s Experience • ~1000Projects – Automotive – Healthcare – Communications – Energy – Industrial – Defense • 15+ Standards & Consortia Efforts – Interoperability – Multi-vendor ecosystems
  • 3.
    Industrial IoT KeySystem Characteristics • Reliability • Scalability • Safety • Security • Resiliency Large scale, heterogeneous, built with multi-vendor components, often broadly distributed and evolving
  • 4.
    It’s All Aboutthe Data Data centricity enables interoperation, scale, integration Unstructured files Database Data Centricity Data at Rest Messaging middleware DataBus Data Centricity Data in Motion
  • 5.
    DDS Standards: LayeredView DDS v 1.4 RTPS v2.2 DDS-SECURITY DDS-RPC* DDS-XTYPES Application UDP TCP** DTLS** TLS** DDS-C++ DDS-JAVA* DDS-IDL-C DDS-IDL-C# SHARED- MEMORY**IP DDS-WEB HTTP(s) IDL4.0
  • 6.
    Unit DataBus Unit DataBus Sensor-to-Cloud •Connect… – Fast – Seamless – QoS controlled – Secure – Data centric • Multiple Platforms • Various Transports In-Car Platform V2V & V2X Public Internet Cloud DataBus Site DataBus Fleet Management Unit DataBus Sense Act Think HMI Machine DataBus
  • 7.
    Connected Car: SecurityChallenges • Sensor to Cloud Integration • Multiple Attack Surfaces – Internet – Cloud – Other cars – In-car • Connecting Autonomous Cars
  • 8.
    Cloud Services Connected, AutonomousCar Sensing Planning Radar, LIDAR Vehicle Platform Navigation Error Management Visualization Situation Analysis Situation Awareness Vision Fusion Cameras, LIDAR, Radar … Data Fusion LoggingVehicle Control Localization DDS Bus Traffic Maps DDS Bus
  • 9.
    Three Security Boundaries •Boundary security • Transport-Level – Network (layer 3) security – Session (layer 4/5) security • Fine-grained Data-Centric Security Introducing: RTI Connext DDS Secure
  • 10.
    Threats • Unauthorized Subscription •Unauthorized Publication • Tampering & Replay Alice Bob Eve Trudy Trent Mallory Local machine is assumed to be trusted
  • 11.
    Practical Fine-Grain Security Connext™DDS Secure • Per-Topic Security – Control r,w access for each function – Ensures proper dataflow operation • Complete Protection – Discovery authentication – Data-centric access control – Cryptography – Tagging & logging – Non-repudiation – Secure multicast – 100% standards compliant • No code changes! • Plugin architecture for advanced uses WatchdogSensor Planning Operator State Alarms SetPoint Topic Security model: • Sensor: State(w) • Watchdog: State(r); Alarms(w) • Planning: State(r), SetPoint(w) • Operator: *(r), Setpoint(w)
  • 12.
    Summary • A connectedcar has multiple attack surfaces, many exposed publicly • Risk, especially with self-driving cars, is high • The system needs reliable, flexible, real- time, secure connectivity • Security should be part of the architecture design, embedded in multiple system layers • Connext™ DDS Secure supports fine grained security
  • 13.