TEMPLATE DESIGN © 2008 www.PosterPresentations.com Privacy Issues of Vehicular Ad-hoc Networks (VANETs) Hang Dok and Ruben Echevarria Advisor: Dr. Huirong.

Slides:



Advertisements
Similar presentations
Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Advertisements

Secure Mobile IP Communication
Urban Multi-Hop Broadcast Protocol for Inter-Vehicle Communication Systems Δημόκας Νικόλαος Data Engineering Laboratory, Aristotle University of Thessaloniki.
Survey of Vehicular Network Security Jonathan Van Eenwyk.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
Crowds: Anonymity for Web Transactions Paper by: Michael K. Reiter and Aviel D. Rubin, Presented by Eric M. Busse Portions excerpt from Crowds: Anonymity.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
InVANET(Intelligent Vehicular Ad Hoc Network
August 6, 2003 Security Systems for Distributed Models in Ptolemy II Rakesh Reddy Carnegie Mellon University Motivation.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
PARROTS Position Altered Random Repetition of Transportation Signature
Wireless and Security CSCI 5857: Encoding and Encryption.
M-Commerce and the Future of Communication in Relationship to Vehicular Networks ISYM 540 – Current Topics Week One – Business Issues Keneth R. Rhodes.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Privacy Issues in Vehicular Ad Hoc Networks.
BUSINESS B1 Information Security.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
報告者:郭茂源 授課老師 : 童曉儒.  Introduction  Dissemination Strategies Overcoming fragmentation Updating the wait time dynamically  Message form and algorithm.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
COEN 351 E-Commerce Security Essentials of Cryptography.
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
Authentication Applications Unit 6. Kerberos In Greek and Roman mythology, is a multi-headed (usually three-headed) dog, or "hellhound” with a serpent's.
Types of Electronic Infection
Chapter 21 Distributed System Security Copyright © 2008.
Doc.: IEEE /875r1 Submission Hyun Seo Oh, ETRI July 2008 Slide 1 Radio Transmission Technology for V2V/V2I Applications Date: Authors:
Vehicle Witnesses as a Service: Leveraging Vehicles as Witnesses on the Road in VANET Clouds Authors: Rasheed Hussain ∗, Fizza Abbas ∗, Junggab Son ∗,
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
Alastair R. Beresford Frank Stajano University of Cambridge Presented by Arcadiy Kantor — CS4440 September 13, 2007.
GameSec 2010 November 22, Berlin Mathias Humbert, Mohammad Hossein Manshaei, Julien Freudiger and Jean-Pierre Hubaux EPFL - Laboratory for Computer communications.
Virtual Trip Lines for Distributed Privacy- Preserving Traffic Monitoring Baik Hoh et al. MobiSys08 Slides based on Dr. Hoh’s MobiSys presentation.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
A Vehicle Manufacturer’s Perspective on VII Christopher Wilson ITS Oregon- Feb 1, 2005 Christopher Wilson.
COEN 351 E-Commerce Security
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
Doc.: IEEE /0361r0 Submission Hyun Seo Oh, ETRI March 2008 Slide 1 March 2008 Slide 1 WAVE Enhancement Technologies Date: Authors:
P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks..
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Fall 2006CS 395: Computer Security1 Key Management.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
Lecture 19 Page 1 CS 236 Online Privacy Privacy vs. security? Data privacy issues Network privacy issues Some privacy solutions.
1 DIVYA K 1RN09IS016 RNSIT. 2 The main purpose in car-to-car networks is to improve communication performance. To demonstrate real scenarios with car-to-car.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
Efficient and secure transborder exchange of patient data
Security&Privacy Considerations for IP over p OCB
VANET.
Towards Measuring Anonymity
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
ONLINE SECURE DATA SERVICE
Norfolk State University Department of Computer Science Colloquium
Privacy Privacy vs. security? Data privacy issues
Presentation transcript:

TEMPLATE DESIGN © Privacy Issues of Vehicular Ad-hoc Networks (VANETs) Hang Dok and Ruben Echevarria Advisor: Dr. Huirong Fu Objectives Introduction Privacy Evaluation Conclusion The Vehicular Ad-Hoc Network, better known as VANET, is a network devoted to communication between vehicles and roadside units. With such technology, vehicle owners could increase safety and simplify their everyday drives. One of the safety increasing features includes warning messages of oncoming accident sites in real time. One of the simplifying features includes messages with traffic updates to warn about possible traffic congestions on a desired route. Privacy is an important aspect for VANET to be successful and accepted by the majority. Proposed Solution To measure the success of the solution proposed, privacy levels need to be measured by finding the anonymity set and entropy level. An anonymity set is the number of possibilities an attacker has to track the vehicle. In the proposed solution, the number of vehicles exiting the combination of zones is the anonymity set. Parameters Number of lanes for vehicle to exit (no U turns) Rate (number of vehicles per given time) for lane i Time (min and max times for vehicle to travel in silent period) Anonymity set to this solution is (SA) SA= Entropy is a measure of the uncertainty of tracking. In this case we are measuring the solution we proposed to see whether high anonymity set is probable. H= Given that the methods of the attacker are unknown, the probabilities for all the anonymity sets are all equal. First we assume that the only attack is listening to transmissions (messages being received and sent). We also assume that there are no surveillance cameras and everyone within the network is not a malicious attacker. Benefits Random busy road intersection consists of combination of Mix Zone, Silent Periods, and Group Navigation Legitimate network has a secret key present at vehicle registration Road Side Unit distribute encrypt group keys, pseudonyms and Mac address Forced to group navigate Groups travel in vehicular network to avoid location tracking Able to switch from group leader to no leader Attacks and Solutions Fig. 1 Group key 13, 12, 72, 41 enter Mix Zone Fig. 2 Group key 13 and 12 enter Silent Period Fig. 3 Group key 13 and 12 are assigned group key 55 Group key 72 and 41 enter Silent Period Fig. 4 Group key 72 and 41 are assigned group key 55 Tracking is very dangerous and attackers could use very little information to track a person using VANET. Example Attack 1: Interception of radio waves and linking pseudonyms By listening to radio transmission Steal identities, private keys, track routes, link pseudonyms Solution: Random Silent Periods-randomly chosen periods which vehicles are forced to remain silent Mix Zones-predetermined regions where vehicles are required to change pseudonyms and Mac address CMixes-extension of the mix zone, vehicles receive a symmetric key used to secure the messages Secure messages in region Dense regions and highest mixing Example Attack 2: Accessing Malware servers Manipulate and steal messages, track location, link pseudonyms Solution: Group navigation-a group traveling avg. velocity in general direction consist of group leader, group members, and a group key Able to communicate outside and inside of group Preserve group identity and reduce pseudonyms Along with our proposed solution to retaining privacy, VANET could be a more trusted and therefore accepted network for vehicle owners. With such technology, vehicle owners could increase safety and simplify their everyday drives. Acknowledgement Understand Privacy Issues of VANET Propose Solution for Location Privacy Protection This research work was conducted at Oakland University in the UnCoRe program - REU funded by the NSF under grant number Therefore, VANET must have a way to validate transmissions and keep security while retaining privacy, ruling out anonymity. Some researched ways to be able to help keep privacy are pseudonyms and keys. Pseudonyms-fictitious names given to vehicles to prevent tracking. Keys-types of pseudonyms that secure the communication between the sender and receiver Symmetric key-a key to encrypt and decrypt messages, only be seen by only certain individuals with some sort of mutual agreement Motor vehicle title/registration Private keys Time/Routine routes Full Name Identification card Bills In reality the network would fail if anonymity was introduced. False messages could be sent and cause traffic jams or accidents. Anonymity would not allow law enforcement to track vehicles.