Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
1
Connected BUILDINGS
Connected ENERGY & STORAGE
Connected INDUSTRY
Connected MOBILITY
Connected AGRICULTURE
Connected HEALTHCARE
Cross-Domain Solutions from aConnected CompanyStefan Abendroth, Robert Bosch GmbHCorporate ResearchCommunication & Network Technology
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
2
Agenda
1
2
3
4
5
BOSCH – A Connected Company
Plug & Secure
Ultra Reliable
Flexible
SummaryReliability
Energy Efficiency
High Datarate
FlexibilityUltra high
Reliability
Security
IoT
Communication
C/CC | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
3
Bosch – Four business sectorsKey figures 2016*
Bosch Group 73.1 billion euros in sales 389,281 associates
Mobility Solutions One of the world’s largest suppliers of mobility solutions
Industrial Technology Leading in drive and control technology, packaging,
and process technology
Energy and Building Technology One of the leading manufacturers of security and communication technology Leading manufacturer of energy-efficent heating products
and hot-water solutions
Consumer Goods Leading supplier of power tools and accessories Leading supplier of household appliances
60% share of sales
40% share of sales
* As of 12.16
Bosch Corporate Research
CR/DBE | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
4
Figures, Facts & Locations
1 Includes all locations with at least 50 associates (as of December 2016)
59,000Bosch researchers and developers worldwide
In 2016, Bosch invested
7 billion €research and development
3%of them work in Corporate Research
1,600associates in Corporate Research at12 locations in North America, Europe, Russia, Asia-Pacific and India
In 2016,
345 million €were invested in Corporate Research
Off this,5% came from public funding
120Bosch research and development locations worldwide1
Bosch creates a new invention
every 22 minutes
Main Research Campus Renningen / Germany
CR/DBE | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
5
Key Figures
310 million €invested
2 yearsconstruction time
14 buildings of which 11 laboratory and workshop buildings
400labora-tories
100 hatotal area covered by the site
1,400associates on site
Renningen
Bosch – A Connected Company
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
6
Connected Products
Services
Platforms
Sensors andDevices
Connected Mobility Connected BuildingsConnected IndustryConnected Consumer
Products
Connectivity
IaaS
PaaS
Storage Network SecurityCompute
Bosch IoT Cloud Base Services
IoT@Bosch
C/CCM2 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
7
Who is partnering with Bosch on this journey?
Plug & Secure Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
8
Selected Challenges with IoT Security
confidentiality, authenticity, integrity
Huge number of things Unqualified users
No comfortable user interface
Distribution of (symmetric) cryptographic keys as a major challenge
Conventional approaches have serious shortcomings for the given constraints
Resource-constrained devices
Plug & Secure Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
9
How it works
Quantization
Measurement of Channel Properties
Information Reconciliation
Entropy Estimation
Privacy Amplification
Symmetric Cryptographic Key
Quantization
Measurement of Channel Properties
Information Reconciliation
Entropy Estimation
Privacy Amplification
Symmetric Cryptographic Key
Wireless Channel(reciprocal & random)
Plug & Secure Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
10
How it works
Quantization
Measurement of Channel Properties
Information Reconciliation
Entropy Estimation
Privacy Amplification
Symmetric Cryptographic Key
Quantization
Measurement of Channel Properties
Information Reconciliation
Entropy Estimation
Privacy Amplification
Symmetric Cryptographic Key
Wireless Channel(reciprocal & random)
Example RSSI measurements (WiFi, indoor, with mobility)
Initial Key Generation
0
1
Rec
eive
d S
igna
l St
reng
th
Time
0 0 0 1 1 0
Plug & Secure Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
11
How it works
Quantization
Measurement of Channel Properties
Information Reconciliation
Entropy Estimation
Privacy Amplification
Symmetric Cryptographic Key
Quantization
Measurement of Channel Properties
Information Reconciliation
Entropy Estimation
Privacy Amplification
Symmetric Cryptographic Key
Wireless Channel(reciprocal & random)
Information Reconciliation
aligned bit sequences
000110 010110some bits are not equal
Parity bits, FEC1, etc.
000110 000110
1Forward Error Correction
Plug & Secure Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
12
How it works
Quantization
Measurement of Channel Properties
Information Reconciliation
Entropy Estimation
Privacy Amplification
Symmetric Cryptographic Key
Quantization
Measurement of Channel Properties
Information Reconciliation
Entropy Estimation
Privacy Amplification
Symmetric Cryptographic Key
Wireless Channel(reciprocal & random)
Key Evaluation
(Online)Randomness
Tests
How good (=random) are our keys?Adapt procedure if required
Plug & Secure Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
13
How it works
Quantization
Measurement of Channel Properties
Information Reconciliation
Entropy Estimation
Privacy Amplification
Symmetric Cryptographic Key
Quantization
Measurement of Channel Properties
Information Reconciliation
Entropy Estimation
Privacy Amplification
Symmetric Cryptographic Key
Wireless Channel(reciprocal & random)
Key Improvement
alignedbit sequence
Secure (aligned) key
00101001101010
01100101
Hash Function / Compression
Increase effective entropy per bit
Plug & Secure Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
14
How it works
Quantization
Measurement of Channel Properties
Information Reconciliation
Entropy Estimation
Privacy Amplification
Symmetric Cryptographic Key
Quantization
Measurement of Channel Properties
Information Reconciliation
Entropy Estimation
Privacy Amplification
Symmetric Cryptographic Key
Wireless Channel(reciprocal & random)
Secure Communication
AES
Data
AES
Data
Secure Communication
Use generated keys together with standard (symmetric) ciphers
Plug & Secure Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
15
Available Demonstrators
USRP N210
Gigabit Ethernet
Software-Defined Radio
Standard WiFi-Modules
Raspberry Pi / Sensor Nodes
Very high flexibility, proprietary PHY & MACAccess to and modification of all parameters
CSI1-based setup using off-the-shelf hardwareAccess to frequency-selective, complex CSI1
Rapid prototyping & testingVisualization, complete processing chain, etc.
IEEE 802.15.4-based incl. frequency hopping and with flexible power adaptation
802.15.4 Sensor Nodes
Antenna connector
TI CC2538
1Channel State Information
Plug & Secure Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
16
Measurement Results
High channel reciprocity & variability = Solid basis for actual key generation
1.02 1.022 1.024 1.026 1.028 1.03 1.032 1.034 1.036 1.038 1.04
x 104
-10
-8
-6
-4
-2
0
2
4
6
8
Sample
Pos
t-Pro
cess
ed R
ecei
ved
Sig
nal S
treng
th [d
Bm
]
Measurement Setup: Office@Bosch with Moving Alice, Sampling Interval ~10ms
Alice - BobBob - Alice
Typical key generation rates ~ 5-10 bit/s (simple setup) ~ 25-50 bit/s (advanced setup) ~ 60 bit/s (target value)
(Typical key length = 128 bit)
Alice-Bob
Bob-Alice
Measurement setup: Office@Bosch with moving Alice
~2 seconds
Rec
eive
d si
gnal
stre
ngth
[dBm
] af
ter a
ppro
pria
te p
ost-p
roce
ssin
g
Plug & Secure Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
17
Major Benefits
Complexity & Costs It’s New
Works with resource-constrained
IoT devices
Regular re-keying to enhance security
+ true random source
Ease-of-Use Scalability & Costs
Highly scalable & cost-efficient
operation
Completely automated key management
Provide an unprecedenteduser experience
Higher Security
Possible fun factorthrough gamification
Fun-to-Use
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
18
Motivation and Background
malicious counterfeit products
Cloud / Internet
Integration ofCE2 devices
Automotive security threats
New Idea: Novel approach for completely automated & secure key distribution of very low complexity for CAN networks (“plug-and-secure”)
Basic idea: Exploit special properties of CAN bus (dominant / recessive bits)
Potential building block and enabler for future secure CAN networks
Especially suitable against software-based & remote attack scenarios
Motivation Current trends (e.g., Cloud / Internet connectivity) lead
to novel & serious security threats Today‘s CAN1 networks are often hardly secured Cryptographic methods may help
(e.g., message / entity authentication)
But: Distribution of cryptographic keys between devices as a major challenge
1Controller Area Network 2Consumer Electronics
Plug & Secure Communication for CAN
Plug & Secure Communication for CAN
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
19
Fundamental IdeaGenerate a random
bit string of length NSAlice = 1 1 0 0 1 1 0 1 1 1
Generate a random bit string of length N
SBob = 1 0 0 1 0 0 0 1 1 0
1 1
Transmit bit strings simultaneously
Seff = SAlice* AND SBob
*
= 10 00 01 00 00 00 01 10 10 00
3
Replace: 0 011 10
SAlice* = 10 10 01 01 10 10 01 10 10 10 SBob
* = 10 01 01 10 01 01 01 10 10 01
2 2 Replace: 0 011 10
CAN Bus= Alice AND Bob
’10’ or ‘01’ = both users have transmitted identical bits
’00’ = both users have transmitted different bits
Discard bits corresponding to ’01 or ’10’ in Seff in initial bit sequences SAlice / SBob
4
SAlice = 1 1 0 0 1 1 0 1 1 1 SBob = 1 0 0 1 0 0 0 1 1 0X X XXXX X XXX
1 0 1 1 1 0 1 0 0 0Inverse sequences = shared secret
Simultaneous message exchangesufficient to agree on a symmetric key !
Alice Bob Bus0 0 00 1 01 0 01 1 1
Alice Bob
Plug-and-Secure Communication for CAN
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
20
Major Benefits
Plug-and-Secure Communication for CANSimplicity / Ease-of-Use General security enabler
Universal applicability
Low complexity & low cost Works w/ any CAN controller
Confiden-tiality
Authen-ticity Integrity
Seamless integration in CAN ecosystem, simple add-on to existing CAN controllers sufficient
PnS1 for CAN Crypto
Easy & scalable re-keying
010010
Low bandwidth requirements
Approach may be readily extended to other bus systems, such as LIN1, I2C2, etc.1Local Interconnect Network 2Inter-Integrated Circuit
Plug-and-Secure Communication for CAN
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
21
Live Demonstrator
Attacker Eve(Passive Eavesdropper)
BobAlice
Live Visualization
CAN Bus
Previously shown at:
Ultra Reliable Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
22
Wireless as an Enabler for Industry 4.0
UbiquitousConnectivity
High Flexibility
Reconfigurability
(Mobile) Robotics
Smart LogisticsSelf-Guiding
Products
Novel Assistance Systems
Only very limited usage of wireless communications today Existing technologies not specifically designed for industry!
Ultra Reliable Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
23
Consumer vs. Industrial World
Consumer World Industrial World
Market Volume 2.6 bn WiFi chips / year1 800k wireless devices / year2
Major KPIs3 data rate, energy-efficiency reliability, latency, determinism
Cost Sensitivity very high (1-10 US$ / SoC) moderate (higher prices acceptable)
Chip Technology highly optimized ASICs possibly FPGA-based
Typical Propagation Scenario home / office harsh factory environment
Rather different characteristics and constraints for both worlds1Estimate for 2014, Source: ABI Research2Estimate for 2012, Source: IMS Research
3Key Performance Indicators
Ultra Reliable Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
24
Selected Use Cases
Mobile Control Panels Augmented Reality
Source: Microsoft
(Mobile) Robots
Factory Automation Logistics Localization
Ultra Reliable Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
25
Requirements
Security
Coexistence
Integration Localization
Plug & Play
Mobility
Spectrum
Industrial Wireless
QoS1
Highly Scalable & Adaptive Solutions Required to Address Wide Range of Applications!1Quality of Service
Ultra Reliable Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
26
Evolution of WLAN
Target Properties Latency down to ~1 ms Scalable data rate (kbit/s – Gbit/s) Scalable reliability (PER1 ~1e-4 – 1e-9) Evolutionary migration path /
compatibility with existing WLANs Focus: HMIs2 / AR3, logistics, robotics
1Packet Error Rate2Human-Machine-Interfaces
3Augmented Reality
Major Goal New Industrial WLAN with scalable data rate & reliability
High reliabilityLow latency
Low data rate
Moderate reliabilityLow latency
High data rate
Example Applications
Consortium
Ultra Reliable Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
27
Focus use case 1: Augmented Reality
UC-1.2: Remote Live Expert
UC-1.3: AR Manual
Ultra Reliable Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
28
Focus Use Case II: Mobile Control Panel
UC-2.1: Mobile Control Panel
Ultra Reliable Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
29
Project Parsec: Wireless Fieldbus
Target Properties
1Packet Error Rate
Major Goal New Wireless Fieldbus for Factory Automation
Latency < 1 ms Reliability < 1e-9 PER1
High determinism Seamless integration with existing
(wired) fieldbusses Focus: Closed-loop control
Example Application
Consortium
Ultra Reliable Communication
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
30
Focus use case: Closed Loop ControlUC-1.1: Printing Machines
UC-1.2: Machine Tools
UC-1.3: Packaging Machines
Service-Oriented Communication (SOC) –Enabler for flexible connected vehicle systems
SOC – Enabler for next generation connected vehicle systems
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
32
Coming from a static world
Up to now, network communications in the vehicle is predominantly statically configured
Changes to the in-vehicle network configurations lead to the regeneration of communication stacks and subsequent reflashing of ECUs
The communication stack, other parts of the operating system and the applications are all within one single binary image
AUTOSAR-XML
FIBEX
DBC code generation
CAN
.hexcommunication
operating systemapplications…
SOC – Enabler for next generation connected vehicle systems
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
33
Evolution of ECU Upgradability
Past Present Future
Flashing in workshop only- Download of complete images
Firmware-Over-The-Air (FOTA)- Download of complete images
Software-Over-The-Air (SOTA)- Download of single applications
.hex
.hex
SOC – Enabler for next generation connected vehicle systems
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
34
Service-Oriented Communication (SOC)
Technology already proven in other industries
Allows dynamic discovery and connection between service providers and consumers
With SOME/IP already a first protocol for service-oriented communication on Ethernet is standardized in AUTOSAR
ECU A ECU B
Find()
Offer()
loop
Subscribe()
ACK()
Publish()
SOC is the chosen method for flexible adjustment of the communication in Adaptive AUTOSAR
SOC – Enabler for next generation connected vehicle systems
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
35
Extension of SOC to other communication layers Adaptive AUTOSAR has focus only on service-oriented communication on Ethernet
Extension of SOC to all layers of automotive communication towards a Vehicle Service Space Abstraction from vehicle specific E/E architecture Seamless service-based connectivity from embedded ECU to cloud backend Bridging the communication gap between the IT and the AUTOSAR world
Data . .
POSIX
OSEK
Ethernet
CANCAN-FDFlexRay
LTE
UMTS802.11p
Inter-ECU Ethernet
Inter-ECU classic
Vehicle-to-Backend
SOME/IPAdaptive
SOC – Enabler for next generation connected vehicle systems
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
36
embedded SOC Protocol eSOC supports all major SOC patterns but respects the limited CAN bandwidth Service Discovery, Publish/Subscribe, Request/Response Protocol nested in the 29-bit extended CAN identifier Avoids protocol overhead wherever possible
Interoperability with SOME/IP Ensures straight forward conversion between eSOC and SOME/IP
Migration path Allows various levels of dynamic behavior Allows parallel deployment of classic CAN communication and eSOC on a single CAN
GW
Avai
labl
e Ba
ndw
idth Dynamic
Band for eSOC
Static Band for classic CAN communication
SOME/IP
SOC – Enabler for next generation connected vehicle systems
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
37
Use Case: Service Instance SwitchingNext connectivity step is shifting of functions to the cloud Easier upgradability, more functionality as more data and computing power Potential cost savings for ECUs (CPU, RAM, ROM)
Availability of connectivity is a crucial factor Bandwidth variations and connection losses Better predictability by use of a coverage map
But what if no availability is no option? Fallback function in the vehicle necessary Connectivity dependent switching between the instances
SOC enables flexible instance switching Discoverability and dynamic selection of available instances HW and location independency for flexible function deployment
DataµC
DataµC
f(x)
f(x)
f(x)f(x)
SOC – Enabler for next generation connected vehicle systems
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
38
Use Case: IoT Data Acquisition
New IoT and Big Data services are of high business potential
Requirement to access valuable data embedded in ECUs. But today this data is deeply buried in a manufacturer specific E/E architecture. The in-vehicle communication is statically configured and changes lead to reflashing of ECUs
With SOC cost/benefit trade-off: Flexible usage of the limited in-vehicle bandwidth and on-demand acquisition of the data most valuable based on parameters like location, time and user
static Vehicle Service Space
Cross domain solutions from a connected company
CR/AEX1 | 7/20/2017© Robert Bosch GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.
39
Cyber-Physical Systems need to be dependable (especially in automotive and industrial automation)
Communication technology as a key enabler for dependable systems
New domain specific solutions are required for Security Reliability Flexibility Simplicity
Summary
THANK [email protected]