Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.

Slides:



Advertisements
Similar presentations
Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
CSLI 5350G - Pervasive and Mobile Computing Week 3 - Paper Presentation “RPB-MD: Providing robust message dissemination for vehicular ad hoc networks”
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Secure Vehicular Communications Speaker: Xiaodong Lin University of Waterloo
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
InVANET(Intelligent Vehicular Ad Hoc Network
1 Credentials Revocation in Vehicular Networks: Design & Evaluation Ghita Mezzour Panos Papadimitratos.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
1 Measure and model vehicular- to-infrastructure communication.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
TEMPLATE DESIGN © Privacy Issues of Vehicular Ad-hoc Networks (VANETs) Hang Dok and Ruben Echevarria Advisor: Dr. Huirong.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
Privacy Issues in Vehicular Ad Hoc Networks.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean Advisor: Panos Papadimitratos.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
HYBRID ROUTING PROTOCOL FOR VANET
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
指導教授:許子衡 教授 報告學生:馬敏修 2010/5/ Introduction 2.Multi-Channel MAC Protocol 3.CMMP(Clustering-Based Multi-Channel MAC Protocol ) 4.Evaluation and Analysis.
A Dedicated Multi-channel MAC Protocol Design for VANET with Adaptive Broadcasting Ning Lu 1, Yusheng Ji 2, Fuqiang Liu 1, and Xinhong Wang 1 1 Dept. of.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
A Security Architecture Concept for Vehicular Network Nodes 蔡嘉翔 許閔傑.
INTRADE (INTELLIGENT TRANSPORTATION FOR DYNAMIC ENVIRONMENT) PROJECT. FINAL WORKSHOP 4 & 5 DECEMBER 2014 Nacera Bahnes, Bouabdellah Kechar, Hafid Haffaf.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
1 Vehicular Networks Slides are integrated from researchers at EPFL.
Black-Burst-Based Multihop Broadcast Protocols for Vehicular Networks Gökhan Korkmaz, Eylem Ekici, and Füsun Özgüner Member, IEEE IEEE TVT 2007.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
Network model of VANET modeling Shlomy Nahum
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
Technische Universität München WISTP 2007 Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication 10 th May 2007 W. Bamberger, O. Welter.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
TAODV: A Trusted AODV Routing Protocol for MANET
Chapter 5 Network Security Protocols in Practice Part I
Analysis the performance of vehicles ad hoc network simulation based
VANET.
Security Models in Vehicular Ad-hoc Networks: A Survey
VANET.
Jack Pokrzywa Director Ground Vehicle Standards, SAE International
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Vehicular Communication Technology
Connected and Autonomous Vehicle Cybersecurity Controller Area Network
Goals Introduce the Windows Server 2003 family of operating systems
Environmental Data Exchange in Cooperating Driving Systems
Vehicular Ad-hoc Network Survey
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Vehicular Ad-hoc Networks
Motion-Aware Routing in Vehicular Ad-hoc Networks
Developing Vehicular Data Cloud Services in the IoT Environment
Presentation transcript:

Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513 Supervisor: Arzad A. Kherani

Indian Institute Of Technology, Delhi Page 2 Introduction to VANETs Mobile ad hoc networks (MANETs) with vehicles as mobile nodes Application classification Safety Related - Early Warning Messages Best Effort – Traffic Optimization Secure Transactions – Toll collection Application to enhance safety of passengers

Indian Institute Of Technology, Delhi Page 3 VANET jargon VANET – Vehicular Ad hoc networks OBU – On Board Unit – communication equipment in vehicles RSU – Road Side Unit - provides infrastructure WAVE – Wireless Access in Vehicular Environment DSRC – Dedicated Short Range Communication

Indian Institute Of Technology, Delhi Page 4 PKI: A brief overview Asymmetric Keys (Pu -> Public key, Pr ->Private Key) M = Pr(Pu(M)) & M = Pu(Pr(M)) -- where M is the message to be secured Certificate contains the public key & signature of CA Certificate sent with signed message to verify the signature of message Certificate shouldn't be revoked for message to be accepted

Indian Institute Of Technology, Delhi Page 5 Security in VANETs Security essential to the protect critical messages Mechanism providing security need to address Authenticity – genuine v/s malicious source Anonymity – sender having right to privacy Data Integrity – messages received as-is Low Overheads – to retain usefulness of messages Use of PKI based security proposed in IEEE

Indian Institute Of Technology, Delhi Page Protocol Stack Data Flows and Resources Secure Message formats and their processing Network & Transport Layer Services Enhancement to the MAC

Indian Institute Of Technology, Delhi Page 7 Revocation of Certificates Required to distinguish genuine and malicious nodes When does the PKI revoke a certificate ? It is compromised It is used for malicious activity Other reasons like terminating the V2V service Problems Revocation information to be propagated to all concerned

Indian Institute Of Technology, Delhi Page 8 Certificate Revocation Lists (CRLs) PKI propagates revocation information using CRLs CRLs are signed by the CA Problems with CRLs in VANETs Communication with infrastructure at irregular intervals Varying contact times with infrastructure Number of CRLs limited to storage space in OBU Time to search the certificate in CRLs Operating time of malicious node = avg. CRL update interval

Indian Institute Of Technology, Delhi Page 9 Accept/Drop Mechanism (Security Layer)

Indian Institute Of Technology, Delhi Page 10 Confidence In Security Infrastructure What is the probability that a certificate is a good certificate if it is not available in the CRLs at OBU? How recent are the CRLs in the OBU? How recent is the certificate under consideration? With how much confidence can you accept the signed message? On what parameters is this confidence related to ?

Indian Institute Of Technology, Delhi Page 11 Parameters affecting CoS r – the revocation rate Var( T ) – variance in inter-CRL update times E[ T ] - Expected CRL update interval If Var(T) = 0 then

Indian Institute Of Technology, Delhi Page 12 Freshness checks Sender and receiver have equal access to PKI Sender checks if one of its certificates is revoked The CA modifies the freshness check field in the certificate if it is not revoked Freshness check field is part of the certificate For receiver of messages to confirm freshness checks For non-malicious senders to validate the genuineness of their certificates

Indian Institute Of Technology, Delhi Page 13 Freshness Checks

Indian Institute Of Technology, Delhi Page 14 Algorithm to Accept/Drop Messages

Indian Institute Of Technology, Delhi Page 15 Advantages of Freshness Checks Time for verifying signed messages Independent of number of CRLs and certificates in CRLs OBUs need not store CRLs Reduced storage requirement of OBU Solves problem of CRL propagation The validity of certificate dependent on the current value of CoS and not determined at time of issue.

Indian Institute Of Technology, Delhi Page 16 Reduced Operating Time Of Malicious Nodes Time at which a certificate was revoked

Indian Institute Of Technology, Delhi Page 17 Impact of Freshness checks Fraction of packets from compromised nodes Fraction of packets from non-compromised nodes

Indian Institute Of Technology, Delhi Page 18 FutureTasks Relation between CoS and probability of messages from non-compromised nodes getting dropped Impact of the overheads of security on performance of secure messages Impact of periodic transmission on the performance of secure messages Adapting rate of transmission V/S Adapting transmission range of messages

Indian Institute Of Technology, Delhi Page 19 Conclusion Minimize some of the security overheads of verifying the messages by providing a constant time algorithm to accept/drop messages Robust security infrastructure equally important for effective security

Indian Institute Of Technology, Delhi Page 20 Q&A

Indian Institute Of Technology, Delhi Page 21 Extra Slides (BACKUP)

Indian Institute Of Technology, Delhi Page 22 IEEE 1609 protocol stack Resource Manager Data flows and Resources at all points Security Services Secure message formats and processing based on PKI – Networking Services Network and Transport layer services – Multi-channel operations Enhancement to IEEE MAC

Indian Institute Of Technology, Delhi Page 23 Research Agenda Implement essential features of 1609.x protocol stack Incorporate vehicular traffic & data traffic models Simulate V2V messaging at each node. Propose algorithm to accept and drop messages Study the performance metrics across widely varying system parameters (with and without security) in V2V networks.

Indian Institute Of Technology, Delhi Page 24 Accept/Drop Mechanism (at Security Layer) Received message signed using a certificate present in CRLs at OBU Drop the packet Received message signed using a certificate absent from the CRLs at OBU Is the certificate revoked by the PKI ? Is the certificate compromised but not revoked at the PKI ? Is the certificate a genuine non-compromised certificate?