An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.

Slides:



Advertisements
Similar presentations
Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Advertisements

E W H A W U New Nominative Proxy Signature Scheme for Mobile Communication April Seo, Seung-Hyun Dept. of Computer Science and.
A key agreement protocol using mutual Authentication for Ad-Hoc Networks IEEE 2005 Authors : Chichun Lo, Chunchieh Huang, Yongxin Huang Date : 2005_11_29.
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Secure Vehicular Communications Speaker: Xiaodong Lin University of Waterloo
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Mini-Project 2007 On Location Privacy in Vehicular Mix-Networks Julien Freudiger IC-29 Self-Organised Wireless and Sensor Networks Tutors: Maxim Raya Márk.
Department of Electrical and Computer Engineering Development of a Portable Work Zone Traffic Safety Information System using DSRC Based V2I and V2V Communication.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Mini-Project 2006 Secure positioning in vehicular networks based on map sharing with radars Mini-Project IC-29 Self-Organized Wireless and Sensor Networks.
Privacy-Preserving Cross-Domain Network Reachability Quantification
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes Author: Stanislaw Jarecki and Xiaomin Liu University of California, Irvine From:
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
Secure pseudonym generation for efficient broadcast authentication in VANETs Deepak N Ananth and Manjusha Gadiraju CSC / ECE 774.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Professor Pin-Han Ho Ph.D. Department of Electrical and Computer Engineering University of Waterloo, Canada On Achieving Secure and Privacy- Preserving.
An Efficient Identity-based Cryptosystem for
National VII Architecture – Data Perspective Michael Schagrin ITS Joint Program Office US Department of Transportation TRB 2008 Annual Meeting Session.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean Advisor: Panos Papadimitratos.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
ASYNCHRONOUS LARGE-SCALE CERTIFICATION BASED ON CERTIFICATE VERIFICATION TREES Josep Domingo-Ferrer, Marc Alba and Francesc Sebé Dept. of Computer Engineering.
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Vehicular Cloud Networking: Architecture and Design Principles
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
1 Covert Communication based Privacy Preservation in Mobile Vehicular Networks Rasheed Hussain*, Donghyun Kim**, Alade O. Tokuta**, Hayk M. Melikyan**,
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
1 Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication Junggab Son*, Donghyun Kim*, Rasheed Hussain**, Sung-Sik Kwon*,
P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks..
Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments Authors: Kui Ren, Wenjing Lou, Kwangjo Kim, and.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
Key Generation Protocol in IBC Author : Dhruti Sharma and Devesh Jinwala 論文報告 2015/12/24 董晏彰 1.
Eyal Hamo Berry Shnaider בס " ד 1.
Network model of VANET modeling Shlomy Nahum
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Security of the Internet of Things: perspectives and challenges
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
Presented by Edith Ngai MPhil Term 3 Presentation
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
VANET.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
You Lu, Zhiyang Wang, Yu-Ting Yu, Mario Gerla
Source: Ad Hoc Networks, Vol. 71, pp , 2018
Presentation transcript:

An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu presented by Jiaqi Gui Networked Systems Laboratory Electrical and Computer Engineering Department

An Efficient and Spontaneous Privacy-Preserving 2  Life-critical  alerting and monitoring functionality during intersection crossing, lane merging, etc.  Value-added  enhancing drivers’ traveling experience by providing convenient Internet access, navigation, toll payment services, etc. 2 Types of Applications

An Efficient and Spontaneous Privacy-Preserving 3  Life-critical  alerting and monitoring functionality during intersection crossing, lane merging, etc. Security is critical!  Think of the damage a malicious attack could do  Value-added  enhancing drivers’ traveling experience by providing convenient Internet access, navigation, toll payment services, etc. 3 Types of Applications

An Efficient and Spontaneous Privacy-Preserving 4  Life-critical  alerting and monitoring functionality during intersection crossing, lane merging, etc. Security is critical!  Think of the damage a malicious attack could do  Value-added  enhancing drivers’ traveling experience by providing convenient Internet access, navigation, toll payment services, etc. 4 Types of Applications

An Efficient and Spontaneous Privacy-Preserving 5  Wireless communication devices installed on vehicles (On-Board Units - OBUs)  Road-side access points (RSUs)  Transportation Regulation Center (TRC) 5 Structure of Proposed Infrastructure for Vehicular Networks Vehicular networks

An Efficient and Spontaneous Privacy-Preserving 6  Conditional privacy preservation  Spontaneous  Efficient Security Requirements for a Vehicular Communication Protocol

An Efficient and Spontaneous Privacy-Preserving 7  Conditional privacy preservation The identity of vehicles should be protected However, incident investigation may require revealing identities of participating vehicles  Offline  Only by authorized parties  Spontaneous  Efficient Security Requirements …

An Efficient and Spontaneous Privacy-Preserving 8  Conditional privacy preservation  Spontaneous Protocol should not require communication between cooperating vehicles in the critical path before sending each new message Protocol should not require support from the RSUs  RSUs may not cover all road segments at least in the initial deployment stages,  Efficient Security Requirements …

An Efficient and Spontaneous Privacy-Preserving 9  Conditional privacy preservation  Spontaneous  Efficient Low communication overheads Low storage overhead  Should not rely on  a large storage space at each vehicle, or  updating the group public key and private key at all unrevoked vehicles in case of a growing revocation list Low computational requirements Security Requirements …

An Efficient and Spontaneous Privacy-Preserving 10 Existing/Proposed Solutions SpontaeousEfficiency Storage Overhead Verification Overh. Solutions using a large numbers of anonymous keys (LAB) YesHighLow Solutions based on pure group signature (GSB) YesLowHigh Solutions based on using the roadside infrastructure (RSUB) No (RSU aided) Low Proposed solution (based on revocable ring signature) YesLow [LAB] M. Raya, J. P. Hubaux, Securing Vehicular Ad Hoc Networks, Journal of Computer Security, 15(1), [GSB] X. Lin et al., GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications, IEEE Trans on Vehicular Technology, 56(6), [RSUB] R. Lu et al., ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications, INFOCOM 2008 (Note: only solutions that provide conditional privacy are presented)

An Efficient and Spontaneous Privacy-Preserving 11  Introduction & Motivation  Past Solutions  The Proposed Solution  Analysis  Conclusions Outline

An Efficient and Spontaneous Privacy-Preserving 12 Key Ingredients Public/private keys. Ring signature [Rivest et al. 2001]  Provides: Anonymity: attacker can not infer which member of a group has signed. Spontaneity: any member of a group can sign without additional setup Revocable ring signature [Liu et al. 2007]  Provides conditional anonymity: an authority can reveal the identity of the real signer

An Efficient and Spontaneous Privacy-Preserving 13 Outline of the Proposed Solution Actual Message Signer Vehicle initialized with: Its own public/private key pair: (x i, y i ) The public key of TRC: y TRC Constants of the signature protocol

An Efficient and Spontaneous Privacy-Preserving 14 Outline of the Proposed Solution y1y1 y2y2 ynyn … Actual Message Signer Vehicles encountered in the past y k – public keys Vehicle initialized with: Its own public/private key pair: (x i, y i ) The public key of TRC: y TRC Constants of the signature protocol

An Efficient and Spontaneous Privacy-Preserving 15 Outline of the Proposed Solution y1y1 y2y2 ynyn … Actual Message Signer Vehicles encountered in the past Vehicle initialized with: Its own public/private key pair: (x i, y i ) The public key of TRC: y TRC Constants of the signature protocol Vehicle collects public keys of other vehicles encountered in the past

An Efficient and Spontaneous Privacy-Preserving 16 Outline of the Proposed Solution y1y1 y2y2 ynyn … Actual Message Signer Message Generation: (y 1 +y 2 +…+y n, M,y TRC,x i ) Vehicle generates the revocable ring signature using: Its own private key: x i A set of public keys of other N vehicles: y 1,y 2,…y n The public key of TRC: y TRC The message M Vehicles encountered in the past

An Efficient and Spontaneous Privacy-Preserving 17  Introduction & Motivation  Past Solutions  Outline of the Proposed Solution  Analysis  Conclusions Outline

An Efficient and Spontaneous Privacy-Preserving 18  Identity privacy preservation  Given a valid ring signature of a message, it is computationally difficult to identify the actual signer by any adversary  Property provided by ring signatures  Tracing to a real identity  Given the signature, the TRC who knows x TRC, can reveal the real identity of a message sender Conditional Privacy Preservation

An Efficient and Spontaneous Privacy-Preserving 19  Spontaneity  The vehicle can specify the ring (the set of vehicles) needed to generate the signature arbitrarily (i.e., without any new interaction with other vehicles or RSUs)  [Additional property] Multi-level privacy  Each vehicle can select the degree of privacy that fits its own requirements by choosing the number of public keys used in the message generation phase. Spontaneous and Multi-Level

An Efficient and Spontaneous Privacy-Preserving 20 Comparing Overheads to Existing/Proposed Solutions SpontaeousEfficiency Storage Overhead Verification Overh. Solutions using a large numbers of anonymous keys (LAB) YesHighLow Solutions based on pure group signature (GSB) YesLowHigh Solutions based on using the roadside infrastructure (RRUB) No (RSU aided) Low Proposed solution (RSUB) (based on revocable ring signature) YesLow [LAB] M. Raya, J. P. Hubaux, Securing Vehicular Ad Hoc Networks, Journal of Computer Security, 15(1), [GSB] X. Lin et al., GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications, IEEE Trans on Vehicular Technology, 56(6), [RSUB] R. Lu et al., ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications, INFOCOM 2008 Hundreds or thousands of keys for each vehicle (all others schemes have one key pair per vehicle)

An Efficient and Spontaneous Privacy-Preserving 21 Comparing Overheads to Existing/Proposed Solutions SpontaeousEfficiency Storage Overhead Verification Overh. Solutions using a large numbers of anonymous keys (LAB) YesHighLow Solutions based on pure group signature (GSB) YesLow High Solutions based on using the roadside infrastructure (RRUB) No (RSU aided) Low Proposed solution (RSUB) (based on revocable ring signature) YesLow [LAB] M. Raya, J. P. Hubaux, Securing Vehicular Ad Hoc Networks, Journal of Computer Security, 15(1), [GSB] X. Lin et al., GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications, IEEE Trans on Vehicular Technology, 56(6), [RSUB] R. Lu et al., ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications, INFOCOM 2008 Grows linearly with the number of revoked keys

An Efficient and Spontaneous Privacy-Preserving 22  Introduction  Motivation  The proposed Scheme  Analysis  Conclusion Outline

An Efficient and Spontaneous Privacy-Preserving 23 The proposed protocol provides  conditional privacy,  improves efficiency in terms of the number of keys stored at each vehicle, and complexity of sender authentication and verification.  does not require support from the roadside infrastructure  provides multi-level privacy Conclusions

For more information: TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A Thank you