Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.

Slides:



Advertisements
Similar presentations
Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Advertisements

Efficient Secure Aggregation in VANETs Maxim Raya, Adel Aziz, and Jean-Pierre Hubaux Laboratory for computer Communications and Applications (LCA) EPFL.
Challenges in Securing Vehicular Networks
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Cryptography and Network Security Chapter 14
Vehicle-infrastructure integration: creating co-operative mobility systems and services Hearing EU Parliament, 22 January 2009 Hermann Meyer, CEO.
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
© 2004 Mobile VCE 3G © 2004 Mobile VCE 3G th October 2004 Regional Blackouts: Protection of Broadcast.
Survey of Vehicular Network Security Jonathan Van Eenwyk.
1 Performance 2005 October 6, 2005 Juan les Pins Performance Challenges in Secure Vehicular Networks Prof. Jean-Pierre Hubaux EPFL With the help of Srdjan.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 2 – Upcoming networks Generalities.
BILL WHITE Presents… VEHICULAR NETWORKING: A SURVEY AND TUTORIAL ON REQUIREMENTS, ARCHITECTURES, CHALLENGES, STANDARDS, AND SOLUTIONS GEORGIO KARAGIANNIS.
GrooveSim: A Topography- Accurate Simulator for Geographic Routing in Vehicular Networks 簡緯民 P
URSA: Providing Ubiquitous and Robust Security Support for MANET
1 Key Management for Vehicular Networks Maxim Raya and Jean-Pierre Hubaux Secure Vehicular Communications Workshop EPFL - 19/05/2015.
Secure Vehicular Communications Speaker: Xiaodong Lin University of Waterloo
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
FIT3105 Smart card based authentication and identity management Lecture 4.
Securing Vehicular Communications CSCE 790 Wireless Networking - Spring’08 Presented: April 15, 2008 University of South Carolina Sharaf J. Malebary.
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Mini-Project 2006 Secure positioning in vehicular networks based on map sharing with radars Mini-Project IC-29 Self-Organized Wireless and Sensor Networks.
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
1 Credentials Revocation in Vehicular Networks: Design & Evaluation Ghita Mezzour Panos Papadimitratos.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Secure pseudonym generation for efficient broadcast authentication in VANETs Deepak N Ananth and Manjusha Gadiraju CSC / ECE 774.
Overview of Security Research in Ad Hoc Networks Melanie Agnew John Folkerts Cory Virok.
Privacy Issues in Vehicular Ad Hoc Networks.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
National VII Architecture – Data Perspective Michael Schagrin ITS Joint Program Office US Department of Transportation TRB 2008 Annual Meeting Session.
NECTEC-GOC CA APGrid PMA face-to-face meeting. October, Sornthep Vannarat National Electronics and Computer Technology Center, Thailand.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean Advisor: Panos Papadimitratos.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
1 Improving Response Time in Traffic Police Infraction Registration System H. Arasteh Rad, K. B. Samsudin, A. R. Ramli, A. Mohamad Bagher Tehrani, M. A.
Key Management in Mobile and Sensor Networks Class 17.
The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Proposal for device identification PAR. Scope Unique per-device identifiers (DevID) Method or methods for authenticating that device is bound to that.
06 APPLYING CRYPTOGRAPHY
The Fully Networked Car Geneva, 4-5 March Ubiquitous connectivity to improve urban mobility Hermann Meyer ERTICO.
ASYNCHRONOUS LARGE-SCALE CERTIFICATION BASED ON CERTIFICATE VERIFICATION TREES Josep Domingo-Ferrer, Marc Alba and Francesc Sebé Dept. of Computer Engineering.
INTRADE (INTELLIGENT TRANSPORTATION FOR DYNAMIC ENVIRONMENT) PROJECT. FINAL WORKSHOP 4 & 5 DECEMBER 2014 Nacera Bahnes, Bouabdellah Kechar, Hafid Haffaf.
International Telecommunication Union The Fully Networked Car Geneva, 4-5 March 2009 Safety & Security Bernard Dugerdil Freescale Semiconductor.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
BY PREETHI.E. * For people living in developed countries the absolute volume of road traffic can be a daily nuisance. In addition, the road traffic.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Prof. J.-P. Hubaux Mobile Networks Module I – Part 2 Securing Vehicular Networks 1.
Cryptography and Network Security Chapter 14
1 Vehicular Networks Slides are integrated from researchers at EPFL.
Black-Burst-Based Multihop Broadcast Protocols for Vehicular Networks Gökhan Korkmaz, Eylem Ekici, and Füsun Özgüner Member, IEEE IEEE TVT 2007.
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
GEONET Brainstorming Document. Content Purpose of the document Brainstorming process / plan Proposed charter Assumptions Use cases Problem description.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Eyal Hamo Berry Shnaider בס " ד 1.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
VANET.
Developing Vehicular Data Cloud Services in the IoT Environment
Presentation transcript:

Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications, 2006 Presented by Li-yuan Lai

Outline INTRODUCTION VULNERABILITIES CHALLENGES SECURITY ARCHITECTURE OPEN PROBLEMS

Vehicular Networks Vehicular Networks are a cornerstone of the envisioned Intelligent Transportation Systems (ITS). Vehicular networks will contribute to safer and more efficient roads by providing timely information to drivers and concerned authorities. Enable vehicles to communicate with each other via - Inter-Vehicle Communication (IVC) - Roadside-to-Vehicle Communication (RVC) 【 with roadside base stations 】

VULNERABILITIES Jamming Forgery In-transit Traffic Tampering Impersonation Privacy Violation On-board Tampering

Jamming

Message Forgery

Vehicle Tracking

Challenges Network Volatility Network Volatility Liability vs. Privacy Liability vs. Privacy Delay-Sensitive Applications Delay-Sensitive Applications Network Scale Network Scale Heterogeneity Heterogeneity

SECURITY ARCHITECTURE Security Hardware Security Hardware Vehicular Public Key Infrastructure Vehicular Public Key Infrastructure Authentication Authentication Certificate Revocation Certificate Revocation Privacy Privacy

Security Hardware

Event Data Recorder ( EDR ) The EDR will be responsible for recording the vehicle ’ s critical data during emergency events, similar to an airplane ’ s black box. Tamper-Proof Device ( TPD ) The TPD will take care of storing all the cryptographic material and performing cryptographic operations, especially signing and verifying safety messages.

Vehicular Public Key Infrastructure Certificate Authorities (CAs) will issue certified public/private key pairs to vehicles. The different CAs will have to be cross-certified so that vehicles from different regions or different manufacturers can authenticate each other. This will require each vehicle to store the public keys of all the CAs whose certificates it may need to verify.

Authentication To authenticate each other, vehicles will sign each message with their private key and attach the corresponding certificate. When another vehicle receives this message, it verifies the key used to sign the message and once this is done correctly, it verifies the message.

Certificate Revocation The most common way to revoke certificates is the distribution of CRLs (Certificate Revocation Lists) that contain the most recently revoked certificates; CRLs are provided when infrastructure is available. But there are several drawbacks to this approach. 1 、 CRLs can be very long due to the enormous number of vehicles and their high mobility. 2 、 the short lifetime of certificates still creates a vulnerability window. 3 、 the availability of an infrastructure will not be pervasive, especially in the first years of deployment. Solution : Revocation Protocol of the Tamper-Proof Device

RTPD

Privacy To address the privacy vulnerability, we propose using a set of anonymous keys that change frequently according to the driving speed. These keys are preloaded in the vehicle ’ s TPD for a long duration, the TPD takes care of all the operations related to key management and usage. Each key is certified by the issuing CA and has a short lifetime (e.g., a specific week of the year).

Open Problems Secure Positioning Secure Positioning Data Verification Data Verification DoS Resilience DoS Resilience