Security Models in Vehicular Ad-hoc Networks: A Survey

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
Secure Communication Architectures.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Wireless Sensor Network Security Anuj Nagar CS 590.
TEMPLATE DESIGN © Privacy Issues of Vehicular Ad-hoc Networks (VANETs) Hang Dok and Ruben Echevarria Advisor: Dr. Huirong.
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Privacy Issues in Vehicular Ad Hoc Networks.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Protocol Security Date Submitted: December, 2007 Presented.
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
A Security Architecture Concept for Vehicular Network Nodes 蔡嘉翔 許閔傑.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
Doc.: IEEE /0098r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide Security Procedures Notice: This document has been.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Project: EaP countries cooperation for promoting quality assurance in higher education Maria Stratan European Institute for Political Studies of Moldova.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
TAG Presentation 18th May 2004 Paul Butler
Presented by Edith Ngai MPhil Term 3 Presentation
Suggestion for Summarizing Process of the Principles
VANET.
Evaluation Forms for Blockchain- Based System ver. 1.0
Information Security.
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
VANET.
TAG Presentation 18th May 2004 Paul Butler
ASSET - Automotive Software cyber SEcuriTy
Data & Network Security
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx
CNET334 - Network Security
Information and Network Security
Computer and Network Security
Presentation to TRAN Committee
Maryna Komarova (ENST)
Goals Introduce the Windows Server 2003 family of operating systems
PLUG-N-HARVEST ID: H2020-EU
IS4680 Security Auditing for Compliance
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Multi-party Authentication in Web Services
Cryptography and Network Security
Vehicular Ad-hoc Network Survey
IEEE MEDIA INDEPENDENT HANDOVER
CS385T Software Engineering Dr.Doaa Sami
Working Group on Data, Information and Knowledge Exchange
Developing Vehicular Data Cloud Services in the IoT Environment
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-0sec
Security in SDR & cognitive radio
Introduction to Cryptography
ETSI Contribution to 3rd Meeting of EC Expert Group on RRS
Cryptography and Network Security
Presentation transcript:

Security Models in Vehicular Ad-hoc Networks: A Survey J.M de Fuentes, L. Gonzalez-Manzano, A.I Gonzalez-Tablas and J.Blasco Presented By: Chandra Bhatt CSCE813 22 Nov 2016

Agenda Introduction to VANETs Survey Introduction Security Requirements over VANETs Survey Overview Security Models Security Model Standards Survey Relevance Survey Compatibility Future Work Conclusion Questions

VANETs The Vehicular Ad-Hoc Network, or VANET, is a technology that uses moves cars as nodes in a network to create a mobile network.  VANET turns every participating car into a wireless router or node, allowing cars approximately 100 to 300 metres of each other to connect and, in turn, create a network with a wide range. Vehicular Ad Hoc Networks (VANETs) are created by applying the principles of mobile ad- hoc networks(MANETs) - the spontaneous creation of a wireless network for data exchange - to the domain of vehicles. They are a key component of intelligent transportation systems(ITS).

VANET: Vehicular ad-hoc networks Main functional units of a VANET system: Vehicular Devices RSU’s (Road Side Unit) TTP’s (Trusted Third Parties) Attacker

Introduction This survey mainly addresses the security and privacy issues of the VANET’s. Several security model (academic and industrial)proposals for VANET’s have been studied and presented. Goal of this work is to perform a survey on assumptions that are the basis of several security model proposals. A comparative detailed study of 41 security model proposals from last six years has been discussed. Four key aspects of VANET’s studied are: Trust on vehicles Trust on Infrastructure entities Trusted Third Parties Attacker features

Security requirements over VANET Major security requirements over VANETs include: Anonymity/Privacy Data Integrity Sender Authentication Data trust and availability The ultimate goal of the paper is to propose a compatibility evaluation mechanism for these proposals, based on the survey results.

Survey Overview Pictorial representation of the vehicular network. Elements covered in this survey: Infrastructure Nodes Road Side Units(RSU) Vehicle Attacker

Type of Connections Infrastructure Connections: Ad-hoc Connections: These connections includes entities which offer some services such as traffic management, emergency services etc. The infrastructure entities may include legal authorities, service providers, vehicle manufacturers., etc. These entities depending on their trustworthiness may be categorised as Trusted third Parties(TTP). Ad-hoc Connections: Ad-hoc communications mainly includes communication to/from vehicles to/from RSU’s. Vehicles mostly communicate via On-board Units(OBUs) installed in vehicles. These type of communications are usually untrusted.

Why is security needed in VANETs? As all other communication networks, VANETs require some level of security and privacy to ensure a successful use and public acceptance of these vehicular networks. Identification and authentication of each communicating node (e.g. to track the malicious actions by a vehicle). Non-Repudiation: This security is an essential feature required by VANETs so that entity performing the action couldn’t deny having done it. Privacy Preservation: An unauthorized party shouldn’t be able to track a path followed by a vehicle or its current location. Also an unauthorized person shouldn’t be able to link a vehicle’s identity to its owner/driver.

Why is security needed in VANETs? (contd.) Confidentiality: This security feature ensuring that messages will only be accessed by the intended parties. Data Integrity: This feature ensures that data has not been altered since its creation. Data Trust: This security feature ensuring that data is fresh, updated and reliable. Availability: This ensures that information is readily available to every node and is processed timely. Why is security needed in VANETs? (contd.)

Survey Overview (contd..) The block diagram here represents the contents and scope of the survey. For serving the needs of authentication and privacy, different types of vehicular credentials are surveyed. Infrastructure entities are analysed on basis of trust, i.e. Trusted Third Parties(TTPs). Attacker features have been surveyed which includes malicious actions such as: What it can do(e.g. injecting packets) Attacker location(e.g. in vehicles) Attacker dimension(e.g. is it affecting the majority)

Limitations of the Survey: Limitations enlist the aspects which are beyond the scope of this survey. The credentials of RSU’s are not reviewed since RSU’s have higher computational resources than vehicles hence are more trusted. Sensor trust is not addressed as they have low reliability in vehicles(Sensors only being part of vehicular entities and OBUs). Connections between RSU’s and infrastructure nodes is also not considered since all the infrastructure entities have a reliable and established communication network which incorporates all the security measures.

Security Models: Vehicle related assumptions Vehicular Trust: (22 of 41 proposals) studied do not trust vehicular entities. Cryptographic operations have to be explicitly deployed with a reliable storage device and time source units. Few proposal have also introduced a concept of Trusted Platform Module(TPM) which provides secured storage, cryptographic computation and an internal reliable clock. 8 of 19 proposals have incorporated tamper-resistant hardware. These components can react to physical manipulation. Whereas, 6 of 19 proposals have totally tamper proof devices. Vehicular Credentials: Vehicular credentials enable electronic identification and authentication within the network. Some proposals have also used identifiers for identification purposes while public key cryptography for authentication purposes. Group keys, pseudonym based short-lived and anonymous certificates have also been used for this purpose.

Security Models: RSU related assumptions There are mixed views of RSUs being trusted in several proposals studied but most of them agree on the fact that RSU’s perform cryptographic operations. Similar to the vehicular entities RSUs are found to have tamper-resistant hardware that provides with secured storage, processing and time information. A few RSUs are proposed with a complete tamper proof device.

Security Models: TTP related assumptions Trusted Third Parties(TTPs) can include any of the government or legal authorities, emergency services, service providers, automobile manufacturers etc. Most common TTP is a Certification Authority(CA). CAs can be centralized, distributed, fully trusted and semi-trusted. Proposals addressing group of vehicles assume that there is an entity called Group Manager that manages the group. Group manager efficiently reduces the chances of performing malicious actions since it divides the task management into two sub entities: Membership Manager Tracing Manager

Security Models: Attacker related assumptions The degree of threat or the seriousness of an attack can be analysed by two main features of an attacker: Attacker’s Nature: If the attacking unit is placed in one or more vehicle/RSUs. Attacker’s dimension: If the attacker is an independent body or has a larger coverage. Types of attacks/malicious activities: Information security: Eavesdropping, modification, injection Privacy: Tracking, Impersonation Availability: Jam Physical Integrity: OBU hacking The scope of attackers/adversaries mainly depends on its dimensions. The larger the number of attackers in a group more is the coverage of the attacks.

Security Standards There are two types of standardizations relevant to the field of information security: CALM(Communication Access for Land Mobiles) by ISO ISO 21217 ISO 11776 ISO 11769 ISO 12859 WAVE(Wireless access in vehicular environments) by IEEE. IEEE 1609.2 IEEE 1609.0

ISO 21217: CALM security standard This standard defines general architecture and security issues for communication networks. Under ISO21217, there are two security related documents ISO11776 and ISO11769, both of which cover security considerations for lawful interception and data retention. Both of these standards define how interception must be performed and for how long data must be retained. Another security standard ISO12859 comes under ISO21217 which covers privacy in Intelligent Transport Systems(ITS). ISO12859 states that special attention should be put on storage, transmission, processing of information, providing required access control. This standard proposes a security module that manages three main security elements Firewall, authentication and identity and cryptographic material.

IEEE 1609.2: WAVE Security standard This standard mainly describes the administrative functions necessary to support the core security operations. The security services considered are Confidentiality, Authentication, Authorization and Integrity. Each network node stores several key pairs and keys can be public or private. While to refer to a concrete key pair an identifier called Crypto-material Handle is used. For message revocations, Certification Revocation Lists have been introduced which mainly assesses the trust and validity of a certificate.

Survey Relevance 41 security models from the past six years have been studied by the authors in the survey. There is a representative proposal studied for each of the years shown in the histogram. One of the survey was taken from year 2004 since it had an high impact (to more than 270 cities).

Survey Relevance Histogram representing the proposals considered in the survey are sorted from diverse sources. Security models have been referred from several Conferences, Journals and Thomson’s Journal Citation Report (JCR). Almost half of the security models studied are from the renowned conferences and other half belong to highly impacting security models in JCRs.

Survey Relevance (contd..) Distribution of security services covered by selected articles in the survey.

Comparing Security Models Comparison and determining the compatibility of different security models is important to develop a holistic security framework for a network. The survey has also proposed a systematic comparison chart which could distinctively analyse key aspects of a security model. There is a scope of future enhancement to this approach in which the prospective cases do not have similar features.

Previous works: A previous survey by Stampoulis and Chai has been done which contained the overview of security requirements. This survey is an expansion to this previous work which incorporates newer security models. Revisions made to the previous work: Trustworthiness on each node/device. Security considerations by IEEE & ISO standards are defined. A systematic comparing mechanism is proposed.

Future Work on VANET security models A future scope of improvement on this research, can be an extension to the studied security models. If more amount of proposals are take into scope of the survey it shall be helpful in addressing other issues impacting the global security. Also, an improved comparing mechanism will fine-grain the research to determine if two security proposals with different assumptions can coexist.

Conclusion The survey of 41 security related works in vehicular networks has been presented. This survey has focused on taking assumptions over the vehicular devices, Road-side units(RSUs), Trusted Third parties and Attacker features. Significant amount of proposals studied do not clarify on trusting vehicular devices or RSUs. This survey aims to bring together standards and scientific contributions carefully analysing their compatibility with respect to different assumptions made.

Questions. . . ? Thank You !