SlideShare una empresa de Scribd logo
1 de 29
Secure Drone-to-X
Communication:
Applicability of IEEE 1609.2
Jonathan Petit, Drew Van Duren
IEEE1609.2
authenticated message
Broadcast or unicast communication 2
Outline
 Drone Communications Overview
 Needs
 Threats
 IEEE 1609.2 Security Model
 Experimental Demo
3
Drone Communications
 Drone-to-Drone
– Not standardized today
 Drone-to-Controller
– Proprietary
 Drone-to-Network
– Various options such as Cellular
 Drone-to-Backhaul (through Network)
– Traditional network security approaches
– X.509/TLS/OATH, etc.
Network
Backhaul
Services
Backhaul
Services
Backhaul /
UTM
4
Drone Communications: Drone to Drone
 Not standardized, though standardization efforts underway
 May be via network or P2P
 Airborne applications will highly depend on these links
– Communicating state (traffic separation / sense-and-avoid / intent)
– Collaboration and swarming models
 Some considering DSRC-type solution as well as C-V2X
(LTE/3GPP); both support network modes as well
5
Drone Communications: Drone to Ground Station
 Proprietary or common industry protocols
 Various radio modems, Link and higher-layer protocols
 Examples:
– WiFi 802.11, 433MHz, 900MHz, 2.4GHz
– Mavlink protocol
– Lightbridge (DJI) for telemetry and payload comms
 Under development for larger drones: CNPC link (RTCA SC-228
and NASA)
6
Drone Communications: Drone to Network
 “Choose your Network”
 Cellular / Cellular gateways
 Proprietary gateways
 Large role in safe/secure drone communications
 Doesn’t provide end-to-end security (i.e., app-to-app, machine-to-
machine)
7
Drone to Services (backhaul, UTM, etc.)
 Traditional network/web security approaches:
– TLS
– X.509 certificates
– Authorization and Identity
 (e.g., OAuth2, OpenID Connect, etc.)
– Can provide App-to-App or App-to-Gateway security approaches
Backhaul
Services
Backhaul
Services
Backhaul /
UTM
8
What’s missing?
9
Needs
 Drone identification and tracking
– FAA ATC awareness, UTM, law enforcement
 Realtime: Sense/detect-and-avoid, Collision avoidance
 Secure communications for drone apps that haven’t been invented
yet (e.g., collaboration apps between ground and air vehicles)
 Security, for all of the above
– Authentication, integrity, non-repudiation, and confidentiality when needed
10
UAS Identification & Tracking
 High Level Recommendations (ID & Tracking ARC)
– Employ a solution that supports
 DIRECT BROADCAST
 NETWORK PUBLISHING
– Possible Tier-based Approach
 Tier-0 (No Identification needed)
 Tier-1 (Option to publish via network)
 Tier-2 (Broadcast AND network publish ID & tracking data)
 Tier-3 (Adhere to Part 91 requirements)
– Mandatory transmission of identifier, tracking info, owner, etc.
 Optional transmission of other data (e.g., route or state info)
11
Threats
 Identity and/or position spoofing
– E.g., ADS-B easily spoofed today – requires
direction-of-arrival/multi-lateration techniques
to help mitigate
 Message spoofing, masquerading
 Unauthorized message content (based
on sender)
 Replay attacks
 RF or network jamming
– will always be an issue for every medium
 Eavesdropping (for private messaging)
ALL of these spell
‘DISTRUST IN DRONES’ at a
time when we want to scale
Communications and
Applications security for
manned aviation are slow in
coming
12
Overview of IEEE1609.2
Security in Connected Vehicle
Systems
1609.2 Purpose
 1609.2 was engineered to provide security and privacy in a large,
scalable, heterogeneous community of vehicles based on the
assumption that network connectivity is NOT always present
14
The Connected Vehicle V2X 1609.2 Security Stack
 IEEE 1609.2 is an application-to-
application security layer
independent of the transport
 Engineered for use on top of DSRC,
but is self-contained and may be
used outside of it
 Works at data layer, so also works
over networks, C-V2X, etc.
15
1609.2 Signing
An application on a device has a
credential that it cryptographically
binds to a message
 Demonstrates it originated a given message and
the message has not been altered
 Credential is called a “certificate” (1609.2, NOT
X.509!)
 Cryptographic binding is called “signing”
 Credential is issued by a Certificate Authority or
CA
16
1609.2 Signing
An application on a device has a credential
that it cryptographically binds to a message
 Credentials state your permissions
– Provider Service Identifier (PSID) – “application
area” (e.g. sending BSMs, traffic management)
– Service Specific Permissions
 Specific to application (PSID)
 E.g. BSM: Can set LightBarInUse
 E.g. SPAT/MAP: Can do one or the other
 If you don’t have a police car certificate, you
can’t claim to be a police car
17
Using credentials (1)
How does the receiver
trust received credentials?
 The CA has a certificate itself which it binds
cryptographically to the device’s certificate
 The receiver knows the CA certificate
– Checks that the CA certificate authorizes and is
bound to the device’s certificate
– Checks that the device’s certificate authorizes
and
is bound to the message
– Trusts the message!
18
Using credentials (2): PKI
How does the receiver
know the CA certificate?
CA certificate might be known already
If it’s new, the receiver can construct
a trust chain back to a root CA.
There’s a relatively small set of root
CAs
– These can authorize an arbitrarily large
number of intermediate and end-entity CAs
19
Using credentials (3): Bad actors
A device that sends false messages
should no longer be trusted
 Misbehavior Detection functionality
detects false messages
 An enforcement function removes the
bad device’s privileges
– Either its credentials are “revoked” via a
Certificate Revocation List (CRL)
– Or it uses its existing credentials till they
expire (some apps may use very short-lived
ones) but then does not get any more
20
1609.2 Certificate Under the Hood
(adds message authorization)
PSID A
SSP
SSP
Application
Identifier
Service-Specific
Permissions
(SSP)
21
Mechanisms in 1609.2
 Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I)
message security
– Authentication
– Integrity
– Replay Protection (timing and message equivalency consistency checks)
– Confidentiality – Optional unicast encryption via recipient public key (ECIES)
– Geographic consistency
 Certificates can be constrained to be trusted only in a designated Geographic
area
 Message recipients can validate that the message sender was authorized to
communicate a given message ‘in that area’
– Fine-grained Permissions (Service Specific Permissions – SSP)
22
1609.2 and its Security “Profiles”
 Application-specific, even if common data dictionary used
 Dictated by application specifier
 Set or constrain 1609.2 sender/receiver security behavior
 Dictates uses, consistency and relevance checking of of 1609.2 credential
attributes against message contents signed by that credential
– PSID (application ID)
– SSP (Security Specific Permissions)
– Permitted Geographic Region
– Start validity time
– Expiry time
– Trust chain
23
1609.2 for UAS
and Proof-of-Concept
Uses for Unmanned Aircraft
 Security model independent of underlying transport(s)
 Drones may be on networks….or not
 Able to secure messages/data in transit and at rest
 Small credential (~1/2 size of X.509) – nice for bandwidth-
constrained environments
 Geotemporal authorizations – static or role-based authorization
capability already built right into this credential
– Note: some authorizations are permissions ‘to ask for permission’ – this is
important in airspace operations!
25
Proof of Concept
 Wanted to demonstrate utility of 1609.2 in an aviation-centric
message
 Partnered with esteemed academic institution, Johns Hopkins
University
 Collaborated and selected ADS-B (Automated Dependent
Surveillance Broadcast)
– The ‘identity and location’ beacon for aircraft today
– Critical part of NextGen
– Today, this message is completely insecure (no source authentication, easy to
spoof)
– Only some spoofing mitigations are feasible using RF techniques (i.e., multi-
lateration)
26
Proof of Concept
 Test collision avoidance
scenarios in insecure and
secure (w/1609.2) modes
 Demonstrate aircraft response to
spoofed or corrupted message
vs. legit one
Test Cases
1. Digital signing disabled on both the sender and the receiver
2. Digital signing enabled on the receiver but not the sender
3. Sending a malformed message from the sender and verifying it on the receiver
4. Sending a stored message from the past (more than 600 seconds old)
5. Sending a fake message from future by changing system time
6. Sending a message with a modified payload
7. Digital signing enabled on the sender and the receiver 27
Conclusion
 IEEE1609.2 can be used for secure remote identification and
tracking
 Leverage existing infrastructure (PKI) developed for ground vehicles
 Proof-of-Concept showed its ease of integration and how 1609.2
mitigated message replay, modification, forging, and MITM attacks
 More detail in our paper!
28
Thank you!!
 Dr. Seth Nielson
 Purushottam A. Kulkarni
 Ritvik Sachdev
 Praveen Malhan
Experiments
(Johns Hopkins University
Information Security Institute)
 Drew Van Duren
 Dr. Jonathan Petit
Project Consulting & Support
(OnBoard Security, Inc. )
29

Más contenido relacionado

La actualidad más candente

Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iinventionjournals
 
Cyber Security and Cyber-Resilience for RPAS
Cyber Security and  Cyber-Resilience for RPASCyber Security and  Cyber-Resilience for RPAS
Cyber Security and Cyber-Resilience for RPASGiovanni Panice
 
Enhancement of the Authentication and Key Agreement Protocol in 4G Mobile Net...
Enhancement of the Authentication and Key Agreement Protocol in 4G Mobile Net...Enhancement of the Authentication and Key Agreement Protocol in 4G Mobile Net...
Enhancement of the Authentication and Key Agreement Protocol in 4G Mobile Net...Ahmad K. Kabbara
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationeSAT Publishing House
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocolcsandit
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4Deepak John
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 

La actualidad más candente (10)

Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
Cyber Security and Cyber-Resilience for RPAS
Cyber Security and  Cyber-Resilience for RPASCyber Security and  Cyber-Resilience for RPAS
Cyber Security and Cyber-Resilience for RPAS
 
K43066774
K43066774K43066774
K43066774
 
Enhancement of the Authentication and Key Agreement Protocol in 4G Mobile Net...
Enhancement of the Authentication and Key Agreement Protocol in 4G Mobile Net...Enhancement of the Authentication and Key Agreement Protocol in 4G Mobile Net...
Enhancement of the Authentication and Key Agreement Protocol in 4G Mobile Net...
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 

Similar a Secure Drone-to-X Communication - AUVSI XPONENTIAL 2018

Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guideSigfox
 
Eidws 109 communications
Eidws 109 communicationsEidws 109 communications
Eidws 109 communicationsIT2Alcorn
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesJohn Rhoton
 
A Review on security issues in WiMAX
A Review on security issues in WiMAXA Review on security issues in WiMAX
A Review on security issues in WiMAXEditor IJMTER
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptgocokir267
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYIJCI JOURNAL
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-JM code group
 
osi model ppt (1).pptx
osi model ppt (1).pptxosi model ppt (1).pptx
osi model ppt (1).pptxRafshidRappu
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsPalani Kumar
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKijwmn
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
Wireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication AttacksWireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication AttacksDavid Sweigert
 
Cross domain security reference architecture
Cross domain security reference architectureCross domain security reference architecture
Cross domain security reference architectureWen Zhu
 
Transmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperTransmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperST Engineering iDirect
 

Similar a Secure Drone-to-X Communication - AUVSI XPONENTIAL 2018 (20)

Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guide
 
Eidws 109 communications
Eidws 109 communicationsEidws 109 communications
Eidws 109 communications
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
A Review on security issues in WiMAX
A Review on security issues in WiMAXA Review on security issues in WiMAX
A Review on security issues in WiMAX
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
 
osi model ppt (1).pptx
osi model ppt (1).pptxosi model ppt (1).pptx
osi model ppt (1).pptx
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
 
Security for Connected Vehicle: Successes and Challenges
Security for Connected Vehicle: Successes and ChallengesSecurity for Connected Vehicle: Successes and Challenges
Security for Connected Vehicle: Successes and Challenges
 
CNS UNIT-VI.pptx
CNS UNIT-VI.pptxCNS UNIT-VI.pptx
CNS UNIT-VI.pptx
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Wireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication AttacksWireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication Attacks
 
Cross domain security reference architecture
Cross domain security reference architectureCross domain security reference architecture
Cross domain security reference architecture
 
IoT Meets Security
IoT Meets SecurityIoT Meets Security
IoT Meets Security
 
Transmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperTransmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White Paper
 

Más de OnBoard Security, Inc. - a Qualcomm Company

Binary Hash Tree based Certificate Access Management for Connected Vehicles (...
Binary Hash Tree based Certificate Access Management for Connected Vehicles (...Binary Hash Tree based Certificate Access Management for Connected Vehicles (...
Binary Hash Tree based Certificate Access Management for Connected Vehicles (...OnBoard Security, Inc. - a Qualcomm Company
 
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...OnBoard Security, Inc. - a Qualcomm Company
 

Más de OnBoard Security, Inc. - a Qualcomm Company (12)

Garbled Circuits for Secure Credential Management Services
Garbled Circuits for Secure Credential Management ServicesGarbled Circuits for Secure Credential Management Services
Garbled Circuits for Secure Credential Management Services
 
Lattice-based Signatures
Lattice-based SignaturesLattice-based Signatures
Lattice-based Signatures
 
Binary Hash Tree based Certificate Access Management for Connected Vehicles (...
Binary Hash Tree based Certificate Access Management for Connected Vehicles (...Binary Hash Tree based Certificate Access Management for Connected Vehicles (...
Binary Hash Tree based Certificate Access Management for Connected Vehicles (...
 
A Short Review of the NTRU Cryptosystem
A Short Review of the NTRU CryptosystemA Short Review of the NTRU Cryptosystem
A Short Review of the NTRU Cryptosystem
 
Automotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still ExistsAutomotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still Exists
 
Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?
 
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
 
Connected Cars: What Could Possibly Go Wrong
Connected Cars: What Could Possibly Go WrongConnected Cars: What Could Possibly Go Wrong
Connected Cars: What Could Possibly Go Wrong
 
Certificate Management Protocols for 1609.2 Certificates
Certificate Management Protocols for 1609.2 CertificatesCertificate Management Protocols for 1609.2 Certificates
Certificate Management Protocols for 1609.2 Certificates
 
Scaling Systems Securely: Challenges and Risks
Scaling Systems Securely: Challenges and RisksScaling Systems Securely: Challenges and Risks
Scaling Systems Securely: Challenges and Risks
 
Misbehavior Handling Throughout the V2V System Lifecycle
Misbehavior Handling Throughout the V2V System LifecycleMisbehavior Handling Throughout the V2V System Lifecycle
Misbehavior Handling Throughout the V2V System Lifecycle
 
Quantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic ModulesQuantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic Modules
 

Último

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Último (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Secure Drone-to-X Communication - AUVSI XPONENTIAL 2018

  • 1. Secure Drone-to-X Communication: Applicability of IEEE 1609.2 Jonathan Petit, Drew Van Duren
  • 3. Outline  Drone Communications Overview  Needs  Threats  IEEE 1609.2 Security Model  Experimental Demo 3
  • 4. Drone Communications  Drone-to-Drone – Not standardized today  Drone-to-Controller – Proprietary  Drone-to-Network – Various options such as Cellular  Drone-to-Backhaul (through Network) – Traditional network security approaches – X.509/TLS/OATH, etc. Network Backhaul Services Backhaul Services Backhaul / UTM 4
  • 5. Drone Communications: Drone to Drone  Not standardized, though standardization efforts underway  May be via network or P2P  Airborne applications will highly depend on these links – Communicating state (traffic separation / sense-and-avoid / intent) – Collaboration and swarming models  Some considering DSRC-type solution as well as C-V2X (LTE/3GPP); both support network modes as well 5
  • 6. Drone Communications: Drone to Ground Station  Proprietary or common industry protocols  Various radio modems, Link and higher-layer protocols  Examples: – WiFi 802.11, 433MHz, 900MHz, 2.4GHz – Mavlink protocol – Lightbridge (DJI) for telemetry and payload comms  Under development for larger drones: CNPC link (RTCA SC-228 and NASA) 6
  • 7. Drone Communications: Drone to Network  “Choose your Network”  Cellular / Cellular gateways  Proprietary gateways  Large role in safe/secure drone communications  Doesn’t provide end-to-end security (i.e., app-to-app, machine-to- machine) 7
  • 8. Drone to Services (backhaul, UTM, etc.)  Traditional network/web security approaches: – TLS – X.509 certificates – Authorization and Identity  (e.g., OAuth2, OpenID Connect, etc.) – Can provide App-to-App or App-to-Gateway security approaches Backhaul Services Backhaul Services Backhaul / UTM 8
  • 10. Needs  Drone identification and tracking – FAA ATC awareness, UTM, law enforcement  Realtime: Sense/detect-and-avoid, Collision avoidance  Secure communications for drone apps that haven’t been invented yet (e.g., collaboration apps between ground and air vehicles)  Security, for all of the above – Authentication, integrity, non-repudiation, and confidentiality when needed 10
  • 11. UAS Identification & Tracking  High Level Recommendations (ID & Tracking ARC) – Employ a solution that supports  DIRECT BROADCAST  NETWORK PUBLISHING – Possible Tier-based Approach  Tier-0 (No Identification needed)  Tier-1 (Option to publish via network)  Tier-2 (Broadcast AND network publish ID & tracking data)  Tier-3 (Adhere to Part 91 requirements) – Mandatory transmission of identifier, tracking info, owner, etc.  Optional transmission of other data (e.g., route or state info) 11
  • 12. Threats  Identity and/or position spoofing – E.g., ADS-B easily spoofed today – requires direction-of-arrival/multi-lateration techniques to help mitigate  Message spoofing, masquerading  Unauthorized message content (based on sender)  Replay attacks  RF or network jamming – will always be an issue for every medium  Eavesdropping (for private messaging) ALL of these spell ‘DISTRUST IN DRONES’ at a time when we want to scale Communications and Applications security for manned aviation are slow in coming 12
  • 13. Overview of IEEE1609.2 Security in Connected Vehicle Systems
  • 14. 1609.2 Purpose  1609.2 was engineered to provide security and privacy in a large, scalable, heterogeneous community of vehicles based on the assumption that network connectivity is NOT always present 14
  • 15. The Connected Vehicle V2X 1609.2 Security Stack  IEEE 1609.2 is an application-to- application security layer independent of the transport  Engineered for use on top of DSRC, but is self-contained and may be used outside of it  Works at data layer, so also works over networks, C-V2X, etc. 15
  • 16. 1609.2 Signing An application on a device has a credential that it cryptographically binds to a message  Demonstrates it originated a given message and the message has not been altered  Credential is called a “certificate” (1609.2, NOT X.509!)  Cryptographic binding is called “signing”  Credential is issued by a Certificate Authority or CA 16
  • 17. 1609.2 Signing An application on a device has a credential that it cryptographically binds to a message  Credentials state your permissions – Provider Service Identifier (PSID) – “application area” (e.g. sending BSMs, traffic management) – Service Specific Permissions  Specific to application (PSID)  E.g. BSM: Can set LightBarInUse  E.g. SPAT/MAP: Can do one or the other  If you don’t have a police car certificate, you can’t claim to be a police car 17
  • 18. Using credentials (1) How does the receiver trust received credentials?  The CA has a certificate itself which it binds cryptographically to the device’s certificate  The receiver knows the CA certificate – Checks that the CA certificate authorizes and is bound to the device’s certificate – Checks that the device’s certificate authorizes and is bound to the message – Trusts the message! 18
  • 19. Using credentials (2): PKI How does the receiver know the CA certificate? CA certificate might be known already If it’s new, the receiver can construct a trust chain back to a root CA. There’s a relatively small set of root CAs – These can authorize an arbitrarily large number of intermediate and end-entity CAs 19
  • 20. Using credentials (3): Bad actors A device that sends false messages should no longer be trusted  Misbehavior Detection functionality detects false messages  An enforcement function removes the bad device’s privileges – Either its credentials are “revoked” via a Certificate Revocation List (CRL) – Or it uses its existing credentials till they expire (some apps may use very short-lived ones) but then does not get any more 20
  • 21. 1609.2 Certificate Under the Hood (adds message authorization) PSID A SSP SSP Application Identifier Service-Specific Permissions (SSP) 21
  • 22. Mechanisms in 1609.2  Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) message security – Authentication – Integrity – Replay Protection (timing and message equivalency consistency checks) – Confidentiality – Optional unicast encryption via recipient public key (ECIES) – Geographic consistency  Certificates can be constrained to be trusted only in a designated Geographic area  Message recipients can validate that the message sender was authorized to communicate a given message ‘in that area’ – Fine-grained Permissions (Service Specific Permissions – SSP) 22
  • 23. 1609.2 and its Security “Profiles”  Application-specific, even if common data dictionary used  Dictated by application specifier  Set or constrain 1609.2 sender/receiver security behavior  Dictates uses, consistency and relevance checking of of 1609.2 credential attributes against message contents signed by that credential – PSID (application ID) – SSP (Security Specific Permissions) – Permitted Geographic Region – Start validity time – Expiry time – Trust chain 23
  • 24. 1609.2 for UAS and Proof-of-Concept
  • 25. Uses for Unmanned Aircraft  Security model independent of underlying transport(s)  Drones may be on networks….or not  Able to secure messages/data in transit and at rest  Small credential (~1/2 size of X.509) – nice for bandwidth- constrained environments  Geotemporal authorizations – static or role-based authorization capability already built right into this credential – Note: some authorizations are permissions ‘to ask for permission’ – this is important in airspace operations! 25
  • 26. Proof of Concept  Wanted to demonstrate utility of 1609.2 in an aviation-centric message  Partnered with esteemed academic institution, Johns Hopkins University  Collaborated and selected ADS-B (Automated Dependent Surveillance Broadcast) – The ‘identity and location’ beacon for aircraft today – Critical part of NextGen – Today, this message is completely insecure (no source authentication, easy to spoof) – Only some spoofing mitigations are feasible using RF techniques (i.e., multi- lateration) 26
  • 27. Proof of Concept  Test collision avoidance scenarios in insecure and secure (w/1609.2) modes  Demonstrate aircraft response to spoofed or corrupted message vs. legit one Test Cases 1. Digital signing disabled on both the sender and the receiver 2. Digital signing enabled on the receiver but not the sender 3. Sending a malformed message from the sender and verifying it on the receiver 4. Sending a stored message from the past (more than 600 seconds old) 5. Sending a fake message from future by changing system time 6. Sending a message with a modified payload 7. Digital signing enabled on the sender and the receiver 27
  • 28. Conclusion  IEEE1609.2 can be used for secure remote identification and tracking  Leverage existing infrastructure (PKI) developed for ground vehicles  Proof-of-Concept showed its ease of integration and how 1609.2 mitigated message replay, modification, forging, and MITM attacks  More detail in our paper! 28
  • 29. Thank you!!  Dr. Seth Nielson  Purushottam A. Kulkarni  Ritvik Sachdev  Praveen Malhan Experiments (Johns Hopkins University Information Security Institute)  Drew Van Duren  Dr. Jonathan Petit Project Consulting & Support (OnBoard Security, Inc. ) 29

Notas del editor

  1. In this talk we are presenting you how Drone-to-X communication can be authenticated via leveraging the technology developed for ground vehicles. This technology has been tested on real drones.