2015-6-1 1 Secure Vehicular Communications Speaker: Xiaodong Lin University of Waterloo

Slides:



Advertisements
Similar presentations
Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Advertisements

Efficient Secure Aggregation in VANETs Maxim Raya, Adel Aziz, and Jean-Pierre Hubaux Laboratory for computer Communications and Applications (LCA) EPFL.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
A Survey of Secure Wireless Ad Hoc Routing
EPIDEMIC DENSITY ADAPTIVE DATA DISSEMINATION EXPLOITING OPPOSITE LANE IN VANETS Irem Nizamoglu Computer Science & Engineering.
Digital Signatures and Hash Functions. Digital Signatures.
CSLI 5350G - Pervasive and Mobile Computing Week 3 - Paper Presentation “RPB-MD: Providing robust message dissemination for vehicular ad hoc networks”
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
1 Key Management for Vehicular Networks Maxim Raya and Jean-Pierre Hubaux Secure Vehicular Communications Workshop EPFL - 19/05/2015.
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
Security Issues In Sensor Networks By Priya Palanivelu.
Mini-Project 2006 Secure positioning in vehicular networks based on map sharing with radars Mini-Project IC-29 Self-Organized Wireless and Sensor Networks.
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
A Secure Network Access Protocol (SNAP) A. F. Al Shahri, D. G. Smith and J. M. Irvine Proceedings of the Eighth IEEE International Symposium on Computers.
Timed Efficient Stream Loss-Tolerant Authentication. (RFC 4082) Habib Moukalled 1/29/08.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
1 Measure and model vehicular- to-infrastructure communication.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
TEMPLATE DESIGN © Privacy Issues of Vehicular Ad-hoc Networks (VANETs) Hang Dok and Ruben Echevarria Advisor: Dr. Huirong.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
1 Timed Efficient Stream Loss-tolerant Authentication.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
Secure pseudonym generation for efficient broadcast authentication in VANETs Deepak N Ananth and Manjusha Gadiraju CSC / ECE 774.
Professor Pin-Han Ho Ph.D. Department of Electrical and Computer Engineering University of Waterloo, Canada On Achieving Secure and Privacy- Preserving.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean Advisor: Panos Papadimitratos.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
A study of Intelligent Adaptive beaconing approaches on VANET Proposal Presentation Chayanin Thaina Advisor : Dr.Kultida Rojviboonchai.
Security on Sensor Networks Presented by Min-gyu Cho SPINS: Security Protocol for Sensor Networks TinySec: Security for TinyOS SPINS: Security Protocol.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Group-based Source Authentication in VANETs You Lu, Biao Zhou, Fei Jia, Mario Gerla UCLA {youlu, zhb, feijia,
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Efficient and Secure Source Authentication for Multicast 報告者 : 李宗穎 Proceedings of the Internet Society Network and Distributed System Security Symposium.
Security for Broadcast Network
1 Vehicular Networks Slides are integrated from researchers at EPFL.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
Black-Burst-Based Multihop Broadcast Protocols for Vehicular Networks Gökhan Korkmaz, Eylem Ekici, and Füsun Özgüner Member, IEEE IEEE TVT 2007.
Author: Na Ruan, Yoshiaki Hori Published in:
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
TrafficGather: An Efficient and Scalable Data Collection Protocol for Vehicular Ad Hoc Networks Wang-Rong Chang Department of Electrical Engineering, National.
Eyal Hamo Berry Shnaider בס " ד 1.
Presented by: Reut Barazani Limor Levy. Contents Introduction Digital signature broadcast message authentication TESLA broadcast message authentication.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
VANET.
A secure and traceable E-DRM system based on mobile device
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
SPINS: Security Protocols for Sensor Networks
BROADCAST AUTHENTICATION
SPINS: Security Protocols for Sensor Networks
Norfolk State University Department of Computer Science Colloquium
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

Secure Vehicular Communications Speaker: Xiaodong Lin University of Waterloo

Outline Introduction Related work TSV C TESLA-based Security protocol for Vehicular Communication (TSVC) Conclusion and future work

Introduction Curve speed warning, work zone warning etc position, current time, direction, velocity, acceleration/ deceleration, etc Traffic Message Emergency Message

Introduction (cont’d) Vehicular Communications Network Vehicles are equipped with communication, positioning and computation devices. They form a huge self-organized ad hoc network (VANET) to communicate with each other as well as roadside units. VANET is a promising approach to road safety, such as avoid collision. increase road safety, such as avoid collision. traffic management facilitate traffic management Tremendous benefits Traffic jam ahead

Vehicular Communication Networks are Emerging Many applications Vehicle safety applications Intersection Collision Warning However : securityprivacy There are many security and privacy concerns with respect to the messages exchanged and transmitted in VANETs.  Need secure and privacy-preserving communication protocols [VSCP2006] Vehicle Safety Communications Project. 12/ /PDFTOC.htm

Traffic jam ahead Introduction (cont’d) An Example of attack : Bogus traffic information [RH07] M. Raya and J. P. Hubaux, Securing vehicular ad hoc networks, Journal of Computer Security, Vol. 15, No. 1, pp , 2007.

At 3:00 - Vehicle A spotted at position P1 At 3:15 - Vehicle A spotted at position P2 Note: Privacy is a very important issue in vehicular networks Vehicle A belongs to John! Introduction (cont’d) An Example of user privacy attack: Movement tracking John was somewhere at when!

An Example of Traceability Note: Traceability is another very crucial issue in vehicular networks We need to find someone who may be able to provide valuable information about the accident.

Security and Privacy Concerns: Sending bogus traffic information Message integrity attack Message replay attack Impersonation attack Denial of Service Movement tracking – Anonymity One desirable requirement Identity traceability in exceptional cases Conditional Anonymity Messages should be transmitted unaltered from a trusted party Introduction (cont’d)

Related Work Previous PKI based approach [RH2005] M. Raya, J.P. Hubaux. The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks SASN '05. November, ELP(ID a ) ELP(ID b ) ELP(ID a ) ELP(ID b ) … ELP(ID j ) Anonymous certificate list M

Related Work (cont’d) Group signature based approach [LSHS2007] X. Lin, X. Sun, P.-H. Ho and X. Shen. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications. IEEE Transactions on Vehicular Technology. Vol. 56, No. 6, November, group manager Vehicle private key, group public key Group signature: 1. A Group signature scheme is a method for allowing a member of a group to anonymously sign a message on behalf of the group. 2. Essential to a group signature scheme is a group manager, who is in charge of adding group members and has the ability to reveal the original signer in the event of disputes.

Facts: Message are sent 100ms~300ms. 666~2000 cars within the communication range. 666~2000 messages to verify per second. Achieving the goals of verifying all the messages in a timely manner and lower cryptographic overhead is a challenging work for all existed public key schemes. 666 messages to be verified for each vechile! Challenges facing nowadays in VANETs

Motivation Design an efficient and secure scheme, which can allow each vehicle to verify all the received messages in a timely manner with lower message loss ratio and lower cryptographic overhead.

Broadcast Authentication Broadcast is basic communication mechanism; Vehicular communication is broadcast in nature. Sender broadcasts data; Each receiver verifies data origin and integrity. Sender Bob M Carol M JohnAlice MM

TESLA (Time Efficient Stream Loss-Tolerant Authentication) Uses purely symmetric primitives In TESLA, each message is attached with a MAC tag only. Self-authenticating keys The sender makes use of a hash chain as cryptographic keys in the MAC operations. Delayed authentication technique Message receivers are loosely synchronized. Provides fast source authentication (1 MAC operation) with lower cryptographic overhead (20 bytes). [PCTS2002] Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Song. The TESLA Broadcast Authentication Protocol. In CryptoBytes, vol. 5, No. 2, Summer/Fall 2002, pp

Proposed TESLA-based security protocol  Fact: each vehicle will receive a serial of messages from the same source.  Vehicle Group Formation [LZSHS2007] X. Lin, C. Zhang, X. Sun, P.-H. Ho and X. Shen. Performance Enhancement for Secure Vehicular Communications. IEEE Global Communications Conference (GLOBECOM'07), Washington, DC, USA, Nov , 2007.

Each vehicle generates a hash chain initiated from a random seed S, where,, (i<j), according to each anonymous key pair and Cert i. Verify Signature Verify MAC sender receiver Interval 1 Interval 2 Interval i Delayed authentication Proposed TESLA-based security protocol

Some other discussions (1/4) The choice of key release delay Keys are released after all nodes have received the previous data packet. (We set as 100ms) Before verifying the message, the receiver should first check if the corresponding key has been released or not. M h source MAC h (M’)|M’

Some other discussions (2/4) The capability to deal with message loss. If data packet is lost, ignore it. If key release packet is lost, suppose h i is the last received value: Check if ? If so, go on to verify the message. hihi h i+1 h i+2 hjhj lost received

Some other discussions (3/4) Group member fluctuation The neighborhood of each car does not change seriously, but it is subject to fluctuation occasionally. The new comer will catch up with the new messages by repeatedly applying the hash function. Stores its information for a while Send the signed tip of the hash chain 1

Communication overhead (4/4) The comparison of the communication overhead Lifetime of the certificate10mins Message generating frequency300ms Group member fluctuation frequency10sec The length of ECDSA certificate125bytes Total information needs to be transmitted for ECDSA-2048 scheme576,000bytes Total information needs to be transmitted for TSVC scheme333,020bytes

Performance evaluation Impact of the traffic load on the MLR in highway scenario Impact of the traffic load on the MD in highway scenario Impact of the traffic load on the MLR in city scenario Impact of traffic load on the MD in city scenario

Conclusions Proposes a TSVC protocol to reduce the computation overhead. Retains the security properties. Allow each vehicle to verify all the received messages in a timely manner with lower message loss ratio and lower cryptographic overhead.

Future work How to improve the efficiency of the CRL check up procedure? Migrating the CRL check-up operations to the RSU side, which will instead perform the process and broadcast the check-up result to the vehicles in its communication range will be an interesting solution.

Questions & Comments ? 25 Thanks!