Page 68 - Cyber Defense eMagazine - October 2017
P. 68

Open source technology is likely key to ensure regulatory and market requirements are
               met, both today and in the future. First among these requirements is to securely identify
               both  the  vehicle  and  the  user,  in  real-time,  during  even  the  highest  periods  of  local
               network traffic. Imagine hundreds or thousands of moving vehicles interfacing with the
               ITS and third-party services via the ITS at any given moment. Each passenger or driver
               will need identity management mechanisms. Vehicle sharing services and the second-
               hand automotive market will require the ability to securely wipe previous owner or renter
               information, while leaving vehicle and component identities intact. However, there are a
               couple of key challenges the industry will need to overcome to make an operational and
               secure V2I network a reality.

               Interfaces and standardization

               Automotive  industry  convergence  with  payment,  telecommunications  and  road
               infrastructure is a must. Besides instant communication with road infrastructure, V2I will
               enable  automatic  toll  collection,  intelligent  parking  and  intelligent  traffic  services.
               Information like driving conditions, traffic status and road issues will be communicated
               to the driver and vehicle as necessary. But when it comes to laying the foundation for
               V2I,  both  automakers  and  the  ITS  industry  will  face  the  challenge  of  deciding  which
               existing  industry  standards  and  protocols  they  want  to  incorporate,  and  what  new
               standards they need to create to fit their needs.

               In  banking,  certain  regulations  are  already  in  place  to  ensure  customer  data  and
               company information is kept secure, the Payment Card Industry Data Security Standard
               for example. This sort of collaboration can be seen in the 5G Automotive Association,
               where SIM card manufacturers, carmakers and members of the payment industry are
               working together on specific-use cases to set universal standards.

               Technical implementation

               Each connected vehicle, including many of its parts, requires a unique identity to ensure
               data transmitted to and from the vehicle can only be accessed by the right people. This
               unique identity needs to be attributed during the production process, as it is in Industrial
               IoT (IIoT) manufacturing. Key and certificate management will be an essential part of
               this secure over-the-air-updates (OTA) and authentication.

               V2I requires data exchanges to occur instantaneously, often many times per second.
               This means that verifying the identity of the vehicle must happen just as fast. To meet
               these needs, vehicles implementing V2I must be equipped with digital certificates and
               encryption key management.

               Over-the-air  (OTA)  data  exchanges  or  downloads,  for  instance  new  code,  software,
               media content or vehicle usage data, will need to be executed securely. Not only will the
               vehicles  and  infrastructure  need  to  be  secured,  but  the  channels  through  which  the
               information is exchanged needs to be protected. Without security measures in place,
               vehicles risk transmitting the wrong, or even harmful, data to and from ITS.


                    68   Cyber Defense eMagazine – October 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   63   64   65   66   67   68   69   70   71   72   73