VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.

Slides:



Advertisements
Similar presentations
Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Advertisements

Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 3.1 Overview of Authentication.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Authors: Yanchao Zhang, Member, IEEE, Wei Liu, Wenjing Lou,Member, IEEE, and Yuguang Fang, Senior Member, IEEE Source: IEEE TRANSACTIONS ON DEPENDABLE.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Secure Vehicular Communications Speaker: Xiaodong Lin University of Waterloo
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Mini-Project 2007 On Location Privacy in Vehicular Mix-Networks Julien Freudiger IC-29 Self-Organised Wireless and Sensor Networks Tutors: Maxim Raya Márk.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Mini-Project 2006 Secure positioning in vehicular networks based on map sharing with radars Mini-Project IC-29 Self-Organized Wireless and Sensor Networks.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
Proposal for an achievable, cost effective Security Concept for EOBRs C. Hardinge / A. Lindinger.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
1 Credentials Revocation in Vehicular Networks: Design & Evaluation Ghita Mezzour Panos Papadimitratos.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
Dedicated Short Range Communication. What is DSRC? A short to medium range communications service Aimed as a replacement to the wireless standards.
Secure pseudonym generation for efficient broadcast authentication in VANETs Deepak N Ananth and Manjusha Gadiraju CSC / ECE 774.
PARROTS Position Altered Random Repetition of Transportation Signature
Chapter 10: Authentication Guide to Computer Network Security.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
Professor Pin-Han Ho Ph.D. Department of Electrical and Computer Engineering University of Waterloo, Canada On Achieving Secure and Privacy- Preserving.
Privacy Issues in Vehicular Ad Hoc Networks.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean Advisor: Panos Papadimitratos.
Enhancing the Security of Corporate Wi-Fi Networks using DAIR PRESENTED BY SRAVANI KAMBAM 1.
HYBRID ROUTING PROTOCOL FOR VANET
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
WAVE: A Tutorial Roberto A. Uzcátegui Guillermo Acosta-Marum IEEE Communications Magazine,May Presenter – Renato Iida.
EAACK—A Secure Intrusion-Detection System for MANETs
Configuring Directory Certificate Services Lesson 13.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Vehicular Cloud Networking: Architecture and Design Principles
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
BY PREETHI.E. * For people living in developed countries the absolute volume of road traffic can be a daily nuisance. In addition, the road traffic.
Prof. J.-P. Hubaux Mobile Networks Module I – Part 2 Securing Vehicular Networks 1.
Using Public Key Cryptography Key management and public key infrastructures.
Doc.: IEEE /403r0 Submission July 2001 Albert Young, 3Com, et alSlide 1 Supplementary Functional Requirements for Tgi ESS Networks Submitted to.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
Eyal Hamo Berry Shnaider בס " ד 1.
Network model of VANET modeling Shlomy Nahum
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
Key management issues in PGP
Presented by Edith Ngai MPhil Term 3 Presentation
VANET.
VANET.
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
Vehicular Communication Technology
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
Identity-based secure collaboration in wireless ad hoc networks
Developing Vehicular Data Cloud Services in the IoT Environment
Presentation transcript:

VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA

Origins Based on the principles of Mobile ad hoc networks. Continuously self-configuring, infrastructure-less network of mobile devices connected without wires. Why explore this path?

The players Onboard Units (OBUs) Road side Units (RSUs) The resulting network: VANET RVCs and IVCs

Where do the issues come in? Inherits all the advantages and the disadvantages of MANETs. Some of the issues with regards to security and safety are: High speed mobility of the network entity coupled with the extremely large amount of entities. Conditional privacy preservation.

A good example: Google Driverless Car Google’s state of the art project for ushering in a new era of private cars. Cars are equipped with LIDAR and GPS. Sensors monitor every element in the surrounding. What could go wrong?

IEEE Security and the VSC Project Also known as Dedicated Short Range Communications (DSRC) protocols. Emerged recently to enhance to support wireless communications among vehicles for the roadside infrastructure. The IEEE standard addresses the issues of securing WAVE messages against eavesdropping, spoofing, and other attacks. The security infrastructure is also responsible for the administrative functions necessary to support core security functions such as certificate revocation.

VSC Project Evaluates the feasibility of supporting vehicle safety related applications through the DSRC standards. Proposes to maintain a list of short-lived anonymous certificates. The certificates are blindly signed by the certificate authority (CA). Uses the certificate revocation list (CRL). Obvious disadvantage: Too long CRL.

Continued… For achieving traceability, a unique electronic identity is assigned to each vehicle by which the identity of the vehicle owner can be inspected by the police and authorities in any dispute. Not a scalable and reliable approach because the ID management authority has to keep all the anonymous certificates for the vehicles in the administrative region. Once a malicious message is detected, the authority has to exhaustively search a very large database to find the identity related to the compromised anonymous certificate.

RSU-aided Certificate Revocation With a public key certificate, various attacks can be prevented. However, a certificate of a user may need to be revoked sometimes. In traditional PKI, the most common scheme is CRL. Alternatives to this are a certificate revocation system (CRS), certificate revocation tree (CRT), the Online Certificate Status Protocol (OCSP) among others. However, all of them need a centralized CA. Problem?

To design a suitable and efficient certificate revocation scheme, the following four observations are made: In this case, it is considered that timely notification of certificate revocation events to centralized CAs is infeasible. Insufficient space in OBU to keep an entire CRL. Assumed that CRL kept at OBUs could be incomplete or inaccurate. The movement of a vehicle can be predicted. The RSU can notify OBUs about revoked certificates in the neighborhood.

RCR mechanism Three types of entities: Certificate authority(CA), RSUs and Vehicles. The CAs manage the RSUs and both of them are assumed to be trustworthy. The CA provides each RSU a secret key, while the corresponding public key is an identity string containing the name of the RSU, the physical location, and the authorized message type.

Conditional Privacy Preservation The source privacy of safety messages is a key security issue. Source privacy preservation is critical for a VANET to be considered for practical implementation and commercialization. In, M. Raya and J.P. Hubaux, “Securing Vehicular Ad Hoc Networks”, the authors proposed a security protocol based on anonymous key pairs. It involved installing a large number of short-lived anonymous credentials (probably 43,800) in a vehicle and randomly selecting one of them to sign each message, to ensure the vehicle’s anonymity requirement could be met. Again, problems?

GSIS Protocol Integrating group signatures(GS) and identity based signatures(IS). Meets the security and conditional anonymity requirements for VANETs. Simplifies certificate and ID traceability management. More significantly, it reduces the size of the CRL and minimize the effort of deploying PKI for RSUs.

References “Security in Vehicular Ad Hoc Networks” by Xiaodong Lin, Rongxing Lu, Chenxi Zhang, Haojin Zhu, Pin-Han Ho and Xuemin (Sherman) Shen, University of Waterloo, IEEE Communications Magazine, April 2008