Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen

Slides:



Advertisements
Similar presentations
Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Advertisements

GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
1 Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network University of Waterloo & University of Ontario Institute.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
University of Waterloo & UOIT & INRIA Lille Presenter: Rongxing Lu
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
A Structure-free Aggregation Framework for Vehicular Ad Hoc Networks Stefan Dietzel, Elmar Schoch, Boto Bako, Frank Kargl.
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols Li Lu, Lei Hu State Key Lab of Information Security, Graduate School.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
TEMPLATE DESIGN © Privacy Issues of Vehicular Ad-hoc Networks (VANETs) Hang Dok and Ruben Echevarria Advisor: Dr. Huirong.
Mobility Management, Privacy, and other Issues in Vehicular Networking Sandra L. Céspedes Broadband Communications Research Group (BBCR) University of.
Secure pseudonym generation for efficient broadcast authentication in VANETs Deepak N Ananth and Manjusha Gadiraju CSC / ECE 774.
PARROTS Position Altered Random Repetition of Transportation Signature
Professor Pin-Han Ho Ph.D. Department of Electrical and Computer Engineering University of Waterloo, Canada On Achieving Secure and Privacy- Preserving.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
Tonghong Li, Yuanzhen Li, and Jianxin Liao Department of Computer Science Technical University of Madrid, Spain Beijing University of Posts & Telecommunications.
A Dedicated Multi-channel MAC Protocol Design for VANET with Adaptive Broadcasting Ning Lu 1, Yusheng Ji 2, Fuqiang Liu 1, and Xinhong Wang 1 1 Dept. of.
Ahmed Osama. What is Delay Tolerant Network?What is Delay Tolerant Network? DTN- WINC- Nile University2 IntroductionChallengesSummary S S D D No continuous.
A Security Architecture Concept for Vehicular Network Nodes 蔡嘉翔 許閔傑.
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
1 TBD: Trajectory-Based Data Forwarding for Light-Traffic Vehicular Networks IEEE ICDCS’09, Montreal, Quebec, Canada Jaehoon Jeong, Shuo Gu, Yu Gu, Tian.
Group-based Source Authentication in VANETs You Lu, Biao Zhou, Fei Jia, Mario Gerla UCLA {youlu, zhb, feijia,
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
UCLA ENGINEERING Computer Science RobustGeo: a Disruption-Tolerant Geo-routing Protocol Ruolin Fan, Yu-Ting Yu *, Mario Gerla UCLA, Los Angeles, CA, USA.
An Improved Vehicular Ad Hoc Routing Protocol for City Environments Moez Jerbi, Sidi-Mohammed Senouci, and Rabah Meraihi France Telecom R&D, Core Network.
Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen, Jiming Chen.
指導教授:許子衡 教授 學 生:黃群凱 2016/2/251 Proceedings of the 2008 IEEE International Conference on Vehicular Electronics and Safety Columbus, OH, USA. September 22-24,
Fen Hou 、 Lin X. Cai, University of Waterloo Xuemin Shen, Rutgers University Jianwei Huang, Northwestern University IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov, Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
1 SFS: Secure File Sharing For Dynamic Groups In Cloud Shruthi Suresh M-tech CSE RCET.
Secure, verifiable online voting 29 th June 2016.
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
Wireless Networks Projects Roberto Riggio, PhD CREATE-NET Via Alla Cascata 56/c 38123, Povo (TN)
Realistic Mobility Models for Vehicular Ad hoc Network (VANET) Simulations ITST 高弘毅 洪佳瑜 蔣克欽.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
History and Implementation of the IEEE 802 Security Architecture
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Analysis the performance of vehicles ad hoc network simulation based
VANET.
Zueyong Zhu† and J. William Atwood‡
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
VANET.
Place Identification in Location Based Urban VANETs
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Recognizing Exponential Inter-Contact Time in VANETs
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
OneSwarm: Privacy Preserving P2P
Cryptographic Protocols
MSc Thesis: Mohammad Khodaei Supervisor: Prof. Panos Papadimitratos
Modeling and Simulation of TTEthernet
WAVE Enhancement Technologies
MESSAGE PROJECT CONTRIBUTION
Identity-based secure collaboration in wireless ad hoc networks
Authentication and handoff protocols for wireless mesh networks
Amar B. Patel , Shushan Zhao
A Novel Latin Square-based Secret Sharing for M2M Communications
An Overview of Security Issues in Sensor Network
Presentation transcript:

Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-location Privacy in VANET Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen University of Waterloo, University of Ontario Institute of Technology Presenter: Rongxing Lu Email: rxlu@bbcr.uwaterloo.ca

Our Observation and Solution Security Analysis Simulation Results Outline Introduction VANET, Location Privacy Challenging Issue How to Protect Receiver-Location Privacy Our Observation and Solution Socialspot-Based Solution Security Analysis Simulation Results Conclusion 16/11/2018

Introduction: VANET Architecture Application Safety-Related V-2-I V-2-V Vehicle equipped with OnBoard Unit (OBU) Road Side Unit (RSU) Application Safety-Related Non-Safety-Related V-2-V V-2-I Hybrid Collision Warning Traffic Analysis Talking File Downloading Packet Forwarding 16/11/2018

Introduction: Location Privacy Security Privacy Confidentiality Authentication Integrity Non-repudiation Identity Privacy Location Privacy 16/11/2018

Introduction: Challenging Issue Destination Source Packet Forwarding in VANET ==> Vehicular Delay Tolerant Network [1] R. Lu, X. Lin, and X. Shen, "SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks", Proc. IEEE INFOCOM'10, San Diego, California, USA, March 14 - 19, 2010. 16/11/2018

Introduction: Challenging Issue (2) receiver-location privacy Source However, in order to protect receiver-location privacy, the receiver’s location is unknown, which could cause the existing packet forwarding protocol inefficient. 16/11/2018

Introduction: Challenging Issue (3) receiver-location privacy Source A Possible solution is flooding. However, the flooding technique will result in a large number of duplicate packets in the network. Very inefficient, esp. when the vehicle’s storage is constrained. 16/11/2018

Introduction: Challenging Issue (4) How to simultaneously protect the receiver-location privacy and improve the performance of packet delivery in VANET has become a new challenging issue. To the best our knowledge, this challenging issue has not be explored. Receiver-location privacy Performance of packet delivery (high delivery ratio & low average delay ) challenge 16/11/2018

Our Observation Privacy location sensitive socialspot Home non-sensitive Home Shopping mall School 16/11/2018

Our Solution Sacrificing the Plum Tree for the Peach Tree --- One of the Thirty-Six Strategies of Ancient China It means sacrificing something non-critical to ensure the overall interests. 16/11/2018

Our Solution (2) Sacrificing the Plum Tree for the Peach Tree Each vehicle reveals one socialspot, i.e., shopping mall, that he often visits. The socialspot is non-sensitive, since many vehicles also visit. The socialspot serves as as a stationary relay node (deployed with RSU), to help packet forwarding, at the same time, protect other sensitive location privacy. 16/11/2018

Our Solution (3) Trusted RSU Each vehicle’s trajectory contains at least one socialspot. TA grants each vehicle a large number of (pseudo-id, key) + one special pseudo-id ( ) ( ) 16/11/2018

Security Analysis The packet is encrypted, which can protect the receiver's identity-privacy. Session key is established between Vehicle and RSU to unlink the relation between packet and receiver Social spot serves as a mix server, protects the contextual privacy. Secure channel 16/11/2018

Simulation Results 16/11/2018

Conclusion In this talk, based on the “Sacrificing the Plum Tree for the Peach Tree” — one of the Thirty-Six Strategies of Ancient China, we introduced a socialspot tactic for protecting receiver-location privacy in VANET. In our future work, we are ready to evaluate the performance with the real-world tracing. Thank you! 16/11/2018