An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.

Slides:



Advertisements
Similar presentations
Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Advertisements

Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
Secure Vehicular Communications Speaker: Xiaodong Lin University of Waterloo
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
Improvement of Hwang-Lo-Lin scheme based on an ID-based cryptosystem No author given (Korea information security Agency) Presented by J.Liu.
Secure pseudonym generation for efficient broadcast authentication in VANETs Deepak N Ananth and Manjusha Gadiraju CSC / ECE 774.
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/05 報告人:向峻霈.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
An Authenticated Payword Scheme without Public Key Cryptosystems Author: Chia-Chi Wu, Chin-Chen Chang, and Iuon-Chang Lin. Source: International Journal.
多媒體網路安全實驗室 A novel user authentication and privacy preserving scheme with smartcards for wireless communications 作者 :Chun-Ta Li,Cgeng-Chi Lee 出處 :Mathematical.
Efficient remote mutual authentication and key agreement Improvement of Chien et al. ’ s remote user authentication scheme using smart cards An efficient.
An ID-Based Mutual Authentication and Key Exchange Protocol for Low- Power Mobile Devices Authors: Tsu-Yang Wu and Yuh-Min Tseng Source: The Computer Journal.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Yu-Li Lin and Chien-Lung Hsu Department of Information Management, Chang-Gung University Information Science(SCI) Reporter: Tzer-Long Chen.
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks Hyeran Mun, Kyusuk Han, Yan Sun Lee, Chan Yeob Yeun, Hyo.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
Two-tier authentication for cluster and individual sets in mobile ad hoc networks Authors: Yuh-Ren Tsai and Shiuh-Jeng Wang Sources: Computer Networks,
Department of Computer Engineering, Kyungpook National University Author : Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Speaker : Wan-Soo Lee
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Group-based Source Authentication in VANETs You Lu, Biao Zhou, Fei Jia, Mario Gerla UCLA {youlu, zhb, feijia,
1 Covert Communication based Privacy Preservation in Mobile Vehicular Networks Rasheed Hussain*, Donghyun Kim**, Alade O. Tokuta**, Hayk M. Melikyan**,
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks..
BlindLocation: Supporting User Location Privacy in Mobile Database Using Blind Signature Source: Journal of Computer Science and Technology, reviewing.
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
RSA-based password authenticated key exchange protocol Presenter: Jung-wen Lo( 駱榮問 )
Secured key exchange protocol in wireless mobile ad hoc networks ► Shu-Hwang Liaw; Pin-Chang Su; Henry Ker-Chang Chang; Erl-Huei Lu; Shun-Fu Pon; ► CCST.
A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments Authors: Kui Ren, Wenjing Lou, Kwangjo Kim, and.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
TOMIN: Trustworthy Mobile Cash with Expiration-date Attached Author: Rafael Martínez-Peláez and Francisco Rico-Novella. Source: Journal of Software, 2010,
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
多媒體網路安全實驗室 An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security Date:2012/02/16.
Threshold password authentication against guessing attacks in Ad hoc networks Authors: Zhenchuan Chai, Zhenfu Cao, Rongxing Lu Sources: Ad Hoc Networks,
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/12 報告人:向峻霈.
Smart Card Based Authenticated Key Agreement Schemes
Non-PKI Methods for Public Key Distribution
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Security&Privacy Considerations for IP over p OCB
VANET.
Author:YongBin Zhou, ZhenFeng Zhang, and DengGuo Feng Presenter:戴士桀
Reporter:Chien-Wen Huang
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
A secure and traceable E-DRM system based on mobile device
Efficient password authenticated key agreement using smart cards
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM IEEE International Conference on Computer Communications,
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications, ahead of.
Security of a Remote Users Authentication Scheme Using Smart Cards
IEEE TRANSACTIONS ON INFORMATION THEORY, JULY 1985
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
Efficient CRT-Based RSA Cryptosystems
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Source: Ad Hoc Networks, Vol. 71, pp , 2018
A Novel Latin Square-based Secret Sharing for M2M Communications
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
An Improved Novel Key Management Protocol for RFID Systems
Afzal Hussain Mohammad and Abdul Ahad Yahiya Mohammed
Controllable and Trustworthy Blockchain-based Cloud Data Management
Privacy Protection for E-Health Systems by
A lightweight authentication scheme with privacy protection for smart grid communications Source: Future Generation Computer Systems Volume 100, November.
How to Use Charm Crypto Lib
Presentation transcript:

An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing Presenter: Yung-Chih Lu ( 呂勇志 ) Date: 2011/03/04

Outline 2  Introduction  Proposed Scheme  Security Analysis  Performance Analysis  Conclusion  Comment

Introduction (1/3)  Goal  Message Authentication & Message Encryption  Against attack  Replay attack  Impersonation attack  Outsider attack  Saving resource  computation cost 3

Introduction (2/3) 4  Vehicular Ad Hoc Network (VANET) RSC: Road Side Unit

Introduction (3/3)  The Functions of Proposed Scheme  Traffic control schemes  Message Authentication  Entertainment service scheme  Message Encryption 5

 Vehicle-RSU-Vehicle Communication Proposed Scheme for Traffic Control (1/2) 6 V : Vehicular M: Message T Vi : Timestamp K vi : A pre-shared key x: RSU’s private key t: Random number H(): one way hash function Q: base point over Elliptic Curve X = x . Q Vi (ID Vi, ID Vj, M, T Vi, K vi ⊕ H(M||T Vi )) VjRSU 1.Computes K’ Vi =H(ID Vi || x) 2. Decrypts K vi ⊕ H(M||T Vi ) 3. 4.Checks M,T vi 5. Selects t ∈ Z * n 6. Computes T= t . Q = (x 1,y 1 ) r= x 1 mod n s= t -1 . [H(M||T R )+x . t] 7.Broadcast (ID R, ID Vj, M, (r,s), T R ) 1.Computes (s -1 . H(M||T R )) . Q+s -1 . r . X)= (x 1 ’,y 1 ’ ) 2. Verifies r’ = r r’= x 1 ’ mod n

 CSESPP Scheme Proposed Scheme for Entertainment Service (2/2) 7 V : Vehicular Reg: Request message T Vi : Timestamp K vi : A pre-shared key ES: Entertainment Service R: Random number H(): one way hash function CSESPP: Communication Scheme for Entertainment Services with Privacy Preservation Vi (ID Vi, Reg, T Vi, H(K vi ||T Vi )) RSU 1.Computes K’ Vi =H(K vi ||T Vi ) 2. Verifies H(K’ vi ||T Vi ) =H(K vi ||T Vi ) 3. R ∈ Z * n 4. Computes SK i = H(K vi ||R) {E SKi (ES,R),R} 1.Computes SK i =H(K vi ||R) 2. Decrypts E SKi (ES,R) 3. Check R K’ Vi =H(ID Vi || x)

Security Analysis (1/1)  Against attack  Outsider attack  Secret key  Impersonation attack  Secret key  Replay attack  Timestamp 8

Performance Analysis (1/1) 9  Comparisons Table T EC_Mul : the operation time of point multiplication on the elliptic curve function T exp : the operation time of the modular exponentiation T mul : the operation time of the modular multiplication

Conclusion 10  A vehicle only needs to share one session key with RSU to communicate with the other vehicles.  The proposed scheme is more efficient than other scheme.

Comment (1/2) 11  本文主要貢獻簡述 :  所有認證與加密工作皆透過公認第三方 (RSU) 來進行, 搭 配 ECDSA 簽章,降低 Computation cost 。  優點:  提出橢圓曲線的 point multiplication 比 modular exponentiation 更有效率的概念,來降低 computation cost 。  缺點:  錯字都集中在 proposed scheme 。  Security Analysis 缺乏證明。  當 Vehicular 周圍無 RSU 時,則無法進行 authentication 及 encryption 。

Comment (2/2)  作者需進一步說明 :  請解釋在 Entertainment Service 中,使用隨機值 R 的用意。  明顯錯誤 ( 含 typos):  Page6, 倒數第 3 行 S 應改成 M  Page16, Figure1, 第 8 行 H’(ID Vi ||x) = ⊕ H(ID Vi ||x) 應改成 H’(M||T Vi ) =H(M||T Vi )  Page16, Figure1, 第 13 行 x . t 應改成 x . r  Page18, Figure2, 第 5 行 K’ Vi =H(K vi ||T Vi ) 應改成 K’ Vi =H(ID Vi || x) 12

Li et al.’s Scheme for Traffic Control (1/2) 13 ViVj 1.Computes 1.Decrypts the message by H t (SK) 2.Computes 3.check  Vehicle-to-Vehicle Communication