Adaptable safety and security in v2x systems

Slides:



Advertisements
Similar presentations
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Advertisements

Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
SAT: Situation Aware Trust Architecture for Vehicular Networks Xiaoyan Hong, Univ of Alabama Dijiang Huang, Arizona State Univ Mario Gerla, UCLA Zhen Cao,
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
CHARLES UNIVERSITY IN PRAGUE faculty of mathematics and physics CHARLES UNIVERSITY IN PRAGUE faculty of mathematics.
Mike Schagrin US Department of Transportation ITS Joint Program Office IntelliDrive Safety Program Overview.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Covilhã, 30 June Atílio Gameiro Page 1 The information in this document is provided as is and no guarantee or warranty is given that the information is.
Hop State Prediction Method using Distance Differential of RSSI on VANET 指導教授:許子衡 教授 學 生:董藝興 學生 1.
Vehicle Traffic Simulator and Intersection Collision Warning System Wireless repeater Rebroadcast received packets (once) Packet transmission behavior.
SAT: Situation Aware Trust Architecture for Vehicular Networks Xiaoyan Hong, Univ of Alabama Dijiang Huang, Arizona State Univ Mario Gerla, UCLA Zhen Cao,
PAC: Perceptive Admission Control for Mobile Wireless Networks Ian D. Chakeres Elizabeth M. Belding-Royer.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
[ [ Inter-Trust Interoperable Trust Assurance Infrastructure Project Presentation.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Network Management Unit 4 Course Name – IT Network Management Instructor – Jan McDanolds, MS,
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
CS457 Introduction to Information Security Systems
MAC Protocols for Sensor Networks
Key management issues in PGP
Presented by Edith Ngai MPhil Term 3 Presentation
TAODV: A Trusted AODV Routing Protocol for MANET
IMPROVING OF WIRELESS MESH NETWORKS.
Koji Nakao, Dai Arisue NICT, Japan
Chapter 9 Optimizing Network Performance
VEHICLE TO VEHICLE COMMUNICATION USING ZIGBEE PROTOCOL
doc.: IEEE <doc#>
Vehicle to Vehicle Communication
VANET.
Comments on 18 mitigations proposed by OICA(TFCS-06-11)
By // Ammar Hussain Aljanabi Dr . Hadi Adineh
Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
VANET.
Jack Pokrzywa Director Ground Vehicle Standards, SAE International
Trusted Routing in IoT Dr Ivana Tomić In collaboration with:
CYBERSECURITY FOR AUTONOMOUS VEHICLES
Overview of Previous Analysis for WAVE
Chapter 1: Introduction
Overview of CV2X Requirements
Connected and Autonomous Vehicle Cybersecurity Controller Area Network
Message Digest Cryptographic checksum One-way function Relevance
Goals Introduce the Windows Server 2003 family of operating systems
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: IG DEP Selected Applications.
Goal Control the amount of traffic in the network
IU: Discriminating between more than 2 information units on a VMS ( condition E) generates increased mental workload resulting in more/longer gazes. Variable.
Miguel Sepulcre, Javier Gozalvez, Onur Altintas, and Haris Kremo
WAVE Enhancement Technologies
Vehicular Ad-hoc Network Survey
Self Organized Networks
doc.: IEEE <doc#>
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Overview of Previous Analysis for WAVE
Security for Safety: Enabling Digitalization of Railway Systems
July 2007 doc.: IEEE p Jan Case Study for reduced priority management frames – Vehicular Safety Communication Date:
<month year> <doc.: IEEE doc> January 2013
A Secure Ad-hoc Routing Approach using Localized Self-healing Communities MobiHoc, 2005 Presented by An Dong-hyeok CNLAB at KAIST.
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
Smart Grid Technology Discussions 2010
Security in SDR & cognitive radio
Cross-layer Analysis for detecting Wireless Misbehavior
ETSI Contribution to 3rd Meeting of EC Expert Group on RRS
A Model For Network Security
Trust-based Privacy Preservation for Peer-to-peer Data Sharing
Presentation transcript:

Adaptable safety and security in v2x systems Miguel Villarreal-Vazquez1, Bharat Bhargava1, Pelin Angin2 1 Department of Computer Science, Purdue University 2 Department of Computer Engineering, Middle East Technical University Acknowledgments: This publication was made possible by NPRP grant # [7-1113-1-199] from the Qatar National Research Fund (a member of Qatar Foundation). The statements made herein are solely the responsibility of the authors. The authors would also like to thank Dr. Weichao Wang and Dr. Leszek Lilien for their valuable comments and discussions.

motivation Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) networks, i.e. V2X systems (Internet of vehicles) receiving increased attention because of significant contribution to improving safety V2X systems hot targets for attackers trying to exploit software vulnerabilities  Compromised security, privacy and safety V2V system needs security to ensure the trustworthiness of communication between vehicles The source of each message needs to be trusted and message content needs to be protected from outside interference

Issues with existing v2x safety and security approaches Safety, security and performance considered separately for V2X systems Networking services have critical shortcomings, hurting time- critical safety applications V2X research based on unrealistic conditions/limited operating conditions Static selection of security, networking and safety features

focus Developing a systematic approach to figure out: How V2X technologies increase safety How much the use of secure communication negatively affects safety Security versus safety analysis Categories of safety messages Semantics of safety messages Different driving scenarios Examples: Highways, Streets on populated areas, Traffic lights Developing an adaptive security model for V2X networks that changes the configuration of the secure channel based on sensitivity, context, safety level

Categories of safety messages Traffic information messages: Used to disseminate the current conditions of specific areas and they indirectly affect safety General safety messages: Used for cooperative driving and collision avoidance, and require an upper bound on the delivery delay of messages Liability-related messages: Exchanged after an accident occurs Our target: Critical-time messages!

Driving Scenario Scenario 1: Sudden stop on a highway Vehicles move at same speed on the highway Pre-determined distance between them Reaction time with and without V2V Reaction time with secured V2V

Driving Scenario Stopping distance: Driver’s perception time Driver’s reaction time Vehicle’s reaction time Vehicle’s braking capability The RSA recommended minimum stopping distance under dry conditions

System Model Network: IEEE 802.11a compliant 6Mbps minimum Security mechanism on V2V: PKI infrastructure Every vehicle is assigned a public and private key Public key distributed through a certificated signed by the CA Authenticated message:

System Model Security costs on V2V: Processing cost Communication cost: Distance: 120m Bandwidth: 6Mbps Speed of communication link: 3x10^8m/s Signature generation and verification times

Safety-security tradeoffs

Adaptable safety/security approach Self-adaptive software solutions capable of adjusting behavior at runtime to achieve functional or QoS goals Self-protecting software detecting security threats and mitigating through runtime adaptation techniques Monitoring activity needs to be isolated from V2X system activities  same resources used AOP to monitor software behavior and adapt

Adaptable security model

Adaptable security system components Message sensitivity measurement unit: Measures the security sensitivity of the messages. Safety level measurement unit: Measures the instantaneous safety level of the vehicle based on the mobility of the vehicles, traffic congestions etc. Context measurement unit: Measures the current network throughput, latency, and packet losses for the vehicle with respect to surrounding vehicles. Based on this information the configuration parameters of the secure channel are adapted dynamically.

Performance metrics Number of outgoing/incoming packets Signature generations/verifications per second Packet delays Transmission delays Message encryption/decryption delays Number of neighboring vehicles, RSUs Signal strength indicator …

Experiments Experiment 1: Measurement of delays of V2V messages with and without security Speed: 120Km/h Distance: 120m

Experiments Experiment 2: Measurement of the capacity of the link Speed: 120Km/h Distance: 120m

Experiments Experiment 3: Reaction time with V2V Size of message: 200 bytes Distance: 120m

Future work Extended evalution with iTETRIS simulation platform under different scenarios and conditions Development of quantitative model of tradeoffs between safety/security/performance aspects Development of full adaptability framework