phil hawkes, rick wietfeldt

13
© 2021 MIPI Alliance, Inc. Phil Hawkes, Rick Wietfeldt Qualcomm Inc. Security Working Group Co-Chairs MIPI Security for Automotive & IoT – Initial Focus on MASS

Upload: others

Post on 01-Nov-2021

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Phil Hawkes, Rick Wietfeldt

© 2021 MIPI Alliance, Inc.

Phil Hawkes, Rick WietfeldtQualcomm Inc. Security Working Group Co-Chairs

MIPI Security for Automotive & IoT –Initial Focus on MASS

Page 2: Phil Hawkes, Rick Wietfeldt

© 2021 MIPI Alliance, Inc. 2

Overview• MIPI Data Security Services

– Mitigate attacks on image data, control messages, IoT debug messages

• Flexible MIPI Security Framework– System Security Mgmt (SSM) Suite establishes Data Security Services

• Security for MIPI Automotive SerDes Solutions (MASS)– Overlays MIPI Security Framework on the 1-5 Automotive Model– SSM Suite: leverages DMTF security protocols– Data Security Services for MIPI CSI-2SM, MIPI DSI-2SM, VESA eDP/DP,

MIPI CCISM and MIPI A-PHYSM control

• StatusDMTF: Distributed

Management Task Force

Page 3: Phil Hawkes, Rick Wietfeldt

© 2021 MIPI Alliance, Inc. 3

MIPI Automotive SerDes Solution (MASS) in the carElectronic Control Unit (ECU)

– Advanced driver assistance system (ADAS) based on sensor feeds

– Produces display feedsSensors

– Camera– Radar, Lidar

Displays– Dashboard– Console– Side view mirrors– Entertainment

(Opt) A-PHY Bridges– Translates between

short-range MIPI C-PHYSM/ D-PHYSM

& long-range MIPI A-PHYSM

Dashboard

Rear sensors

Front sensors

Console

ECU

MIPI Interconnects via Automotive PHY (A-PHY)

A-PHY Bridge

Page 4: Phil Hawkes, Rick Wietfeldt

© 2021 MIPI Alliance, Inc. 4

Security Concepts 101• Authentication establishes trust

– Securely identifying a component– Mutual authentication – two components authenticate each other

• Once trust is established, then address– Integrity

• Being sure that information came from the expected source and is unaltered

• Provided by Message Authentication Code (MAC)– Confidentiality

• Protecting information against unauthorized access • Provided by encrypting messages

Page 5: Phil Hawkes, Rick Wietfeldt

© 2021 MIPI Alliance, Inc. 5

What are the Data Security Services protecting?• Image Data Security Considerations

– Integrity of Sensor images Manipulating ADAS– Confidentiality of Sensor images Privacy: location-revealing images– Integrity of Display images Incorrect dashboard display

• Control Data– Integrity of Sensors Capabilities/config Disable/manipulate sensor– Integrity of Display Capabilities/config Disable/manipulate display– Integrity of A-PHY Capabilities/config Disrupt A-PHY network– Confidentiality of all config Proprietary/sensitive/privacy

• IoT Debug Data– Integrity of read/write config Disable/manipulate component– Confidentiality of proprietary data Proprietary/sensitive/privacy– Not discussed further in this presentation. Will leverage some of MIPI security framework

Page 6: Phil Hawkes, Rick Wietfeldt

© 2021 MIPI Alliance, Inc. 6

MASS 1-5 Model & MIPI ProtocolsController ~ SoC ; Target is either Camera sensor or Display

(Opt)(Opt)#1

Controller(SoC)

#5

Target(Peripheral)

(SNS orDisplay TCON/DDIC)

(C/D/DP-PHY) A-PHY A-PHY (C/D/DP-

PHY)Display Display

Camera Camera

(Application)Control Plane Messages

(in-band or sideband) Sideband PHY

Sideband PHY (Opt)

#2

C.Bridge(Opt)

#3

A-PHY Forwarding

Element(Opt)

#4

T.Bridge(Opt)

(Application)Data Plane Messages

(in-band)

in-band

sideband

A-PHY Network

A-PHY Control Plane Messages (sideband)

(Opt)(Opt)

(Opt)(Opt)

Page 7: Phil Hawkes, Rick Wietfeldt

© 2021 MIPI Alliance, Inc. 7

(Opt)(Opt)#1

Controller(SoC)

#5

Target(Peripheral)

(SNS orDisplay TCON/DDIC)

(C/D/DP-PHY) A-PHY A-PHY (C/D/DP-

PHY)Display Display

Camera Camera

(Application)Control Plane Messages

(in-band or sideband) Sideband PHY

Sideband PHY (Opt)

#2

C.Bridge(Opt)

#3

A-PHY Forwarding

Element(Opt)

#4

T.Bridge(Opt)

(Application)Data Plane Messages

(in-band)

in-band

sideband

A-PHY Network

A-PHY Control Plane Messages (sideband)

(Opt)(Opt)

(Opt)(Opt)

Data Security ServicesIn-band security and side-band security

In-band security (CSI-2, DSI-2, DP/eDP)

Side-band security(CCI, A-PHY Control)

Page 8: Phil Hawkes, Rick Wietfeldt

© 2021 MIPI Alliance, Inc. 8

MIPI Security FlowApplies to all Data Security Services (DSS)

2. Read

CapabilitiesRead/Identify DSS supported

security algorithms per

component

3.Build multiple DSS

configurationsCombo of DSS security

algorithms, keys.Built based on

supported DSS security algorithms and desired

DSS operation

5. Build Real-time

Operating ControlPer-message DSS controls,

selecting• A DSS config• payload encryption on/off• payload integrity on/off)

System Security Management (SSM) SuiteComponent Configuration over secure connection

established by Controller

Out of scopeImplementation details depending

on policy of Integrator.

Data Security Service (DSS)

6. Communicate &

execute per-message DSS

controls

1. Authenticate & establish secure

sessionFor protecting Steps 1 & 2.

4.Provision

multiple DSS configurations

SSM Suite Establishes Data Security Services

Page 9: Phil Hawkes, Rick Wietfeldt

© 2021 MIPI Alliance, Inc. 9

System Security Management (SSM) Suite.SSMC = SSM Controller (in #1)SSMT = SSM Target (in #2/3/4/5)1. Authenticate & establish secure session

DMTF protocols (DSP0274, DSP0277)2. Read support security algorithms3. (Out of scope) Build DSS config4. Write DSS config5. (Out of scope) Build real time operating control

6. Apply Data Security Services

0. (Out of scope) Integrator provisions authentication credentials

This can be applied directly from Controller #1 to Target #5 over any MIPI

PHY – does not require presence of A-PHY

MIPI Security Framework#1

Controller

#5

Target(C/D/DP-PHY) A-PHY A-PHY (C/D/DP-

PHY)

Sideband PHY

Sideband PHY (Opt)

#2

C.Bridge

#3

A-PHY Forwarding

Element

#4

T.Bridge

SSMC

Camera Control Interface (CCI) Security

SSMT

SSMT SSMT

SSM Suite SSMT

Page 10: Phil Hawkes, Rick Wietfeldt

© 2021 MIPI Alliance, Inc. 10

System Security Management (SSM) SuiteSet of protocols between Controller #1 and other Components (#2-#5)• DMTF’s SPDM (DSP0274) performs symmetric or

asymmetric mutual authentication to establish secure session

• DMTF’s Secured Messages (DSP0277) protects MIPI SACP– Encryption and integrity protection

• MIPI’s Service Association Configuration Protocol (SACP)– Read Security Capability Registers for Data

Security Services– Write Security SA Registers for Data Security Services

MIPI’s SSM Suite is defined in MIPI Security Specification

SPDM: Security Protocol and Data Model

DMTF: Distributed Management Task Force

#1

Controller

#5

Target(C/D/DP-PHY) A-PHY A-PHY (C/D/DP-

PHY)

Sideband PHY

Sideband PHY (Opt)

#2

C.Bridge

#3

A-PHY Forwarding

Element

#4

T.Bridge

SSMC

Camera Control Interface (CCI) Security

SSMT

SSMT SSMT

SSM Suite SSMT

Page 11: Phil Hawkes, Rick Wietfeldt

© 2021 MIPI Alliance, Inc. 11

Data Security Services• SEP Security

– MIPI CSI-2SM, MIPI DSI-2SM, VESA eDP/DP – To be defined in Camera/Display Service Extensions

(MIPI CSESM/MIPI DSESM) specifications• ESS CCI2 Security for CCI (Camera Control Interface)

– I2C-based register access – To be defined in MIPI CSESM specification

• ACMP2 Security for MIPI A-PHYSM Control– I2C-based register access – Reuse ESS CCI2 protocol– To be defined in MIPI A-PHYSM specification

Integrity protection via Message Authentication Code (MAC) adds communication and computation overhead

– Sending MAC Per-frame vs per-message reduces communication overhead

– Protecting a fraction of image payloads reduces computation overhead with security trade-off

SEP: Service Extension Packet

ESS CCI2: Extended Safety & Security CCI

ACMP2: A-PHY Configuration& Management Protocol

#1

Controller

#5

Target(C/D/DP-PHY) A-PHY A-PHY (C/D/DP-

PHY)

Sideband PHY

Sideband PHY (Opt)

#2

C.Bridge

#3

A-PHY Forwarding

Element

#4

T.Bridge

SSMC

Camera Control Interface (CCI) Security

SSMT

SSMT SSMT

SSM Suite SSMT

Page 12: Phil Hawkes, Rick Wietfeldt

© 2021 MIPI Alliance, Inc. 12

Conclusion• MIPI Security Framework

– Supports various topologies, with and without A-PHY integration– System Security Management (SSM) Suite managing Data Security Services

• System Security Management (SSM) Suite– Provides mutual authentication & configuration of Data Security Services– Defined in MIPI Security Specification

• Data Security Services (DSS)– Protects image data (MIPI CSI-2SM, MIPI DSI-2SM, VESA eDP/DP) and control data – Provides end-to-end security– Defined in MIPI CSESM, MIPI DSESM, MIPI A-PHYSM Specifications

• Set of security specifications expected mid 2022

Page 13: Phil Hawkes, Rick Wietfeldt

© 2021 MIPI Alliance, Inc.