1 The Security and Privacy of Smart Vehicles Jean-Pierre Hubaux EPFL Joint work with Srdjan Capkun, Jun Luo, and Maxim Raya

Slides:



Advertisements
Similar presentations
Efficient Secure Aggregation in VANETs Maxim Raya, Adel Aziz, and Jean-Pierre Hubaux Laboratory for computer Communications and Applications (LCA) EPFL.
Advertisements

Challenges in Securing Vehicular Networks
Dynamic Location Discovery in Ad-Hoc Networks
Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava.
Driver Behavior Models NSF DriveSense Workshop Norfolk, VA Oct Mario Gerla UCLA, Computer Science Dept.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Survey of Vehicular Network Security Jonathan Van Eenwyk.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 2 – Upcoming networks Generalities.
BILL WHITE Presents… VEHICULAR NETWORKING: A SURVEY AND TUTORIAL ON REQUIREMENTS, ARCHITECTURES, CHALLENGES, STANDARDS, AND SOLUTIONS GEORGIO KARAGIANNIS.
Connected Vehicles AASHTO Annual Meeting | October 17, 2013 | Denver, CO Mike Cammisa Director, Safety Association of Global Automakers.
1 Key Management for Vehicular Networks Maxim Raya and Jean-Pierre Hubaux Secure Vehicular Communications Workshop EPFL - 19/05/2015.
G4 Apps The Impact of Connected Vehicles on Traffic Operations ISMA Traffic Expo October 1, 2014.
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
Mini-Project 2006 Secure positioning in vehicular networks based on map sharing with radars Mini-Project IC-29 Self-Organized Wireless and Sensor Networks.
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
InVANET(Intelligent Vehicular Ad Hoc Network
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 ESAS 2004 New Research Challenges for the Security of Ad Hoc and Sensor Networks Jean-Pierre Hubaux EPFL.
Advanced Public Transit Systems (APTS) Transit ITS CEE582.
Advanced Public Transit Systems (APTS) Transit ITS CEE582.
1. Overview Background Introduction to IntelliDrive SM Preliminary Research/Proof of Concept Potential Applications –Safety –Mobility –Commercial The.
TEMPLATE DESIGN © Privacy Issues of Vehicular Ad-hoc Networks (VANETs) Hang Dok and Ruben Echevarria Advisor: Dr. Huirong.
Cooperative Intersection Collision Avoidance Systems Initiative May 2005, ITS America Annual Meeting Mike Schagrin ITS Joint Program Office U.S. Department.
DSRC & WAVE.
Cooperative crash prevention using human behavior monitoring Susumu Ishihara*† and Mario Gerla† (*Shizuoka University / †UCLA) Danger ! ! !
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
IntelliDrive Policy and Institutional Issues Research Valerie Briggs Team Lead, Knowledge Transfer and Policy, ITS Joint Program Office, RITA May 4, 2010.
NEXTRANS Center Inaugural Summit Exploring Partnerships for Innovative Transportation Solutions Purdue University May 5, 2008 Harry Voccola Senior Vice.
National VII Architecture – Data Perspective Michael Schagrin ITS Joint Program Office US Department of Transportation TRB 2008 Annual Meeting Session.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
Envisioned Role for NTI Concerning ITS Deployment in Egypt by Dr. Mahmoud EL-HADIDI Professor of Telecommunications at Cairo U & Consultant at NTI 3 rd.
Intelligent Transportation System (ITS) ISYM 540 Current Topics in Information System Management Anas Hardan.
University of Maryland Department of Civil & Environmental Engineering By G.L. Chang, M.L. Franz, Y. Liu, Y. Lu & R. Tao BACKGROUND SYSTEM DESIGN DATA.
HYBRID ROUTING PROTOCOL FOR VANET
Innovative ITS services thanks to Future Internet technologies ITS World Congress Orlando, SS42, 18 October 2011.
2. Survey of VANETs A Tutorial Survey on Vehicular Ad Hoc Networks
Doc.: IEEE ae Submission Jan Kenney – Toyota/VSC3Slide 1 Case Study for reduced priority management frames – Vehicular Safety.
Vehicle Infrastructure Integration (VII) FDOT’s Annual ITS Working Group Meeting March 20, 2008 George Gilhooley.
Mike Schagrin US Department of Transportation ITS Joint Program Office IntelliDrive Safety Program Overview.
1 Some Security Challenges for Mesh Networks Jean-Pierre Hubaux EPFL Switzerland Joint work with Imad Aad, Naouel Ben Salem, Levente Buttyan, Srdjan Capkun,
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Transit Signal Priority (TSP). Problem: Transit vehicles are slow Problem: Transit vehicles are effected even more than cars by traffic lights –The number.
IntelliDriveSM Update
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
SAFENET The OSU SAFENET Project The Ohio State University Center for Automotive Research & Center for Intelligent Transportation Research.
C OMMERCIAL V EHICLE S UBSYSTEM A GGREGATED WITH THE V EHICLE S UBSYSTEM On-board CV Safety and Security On-board CV Safety and Security On-board Cargo.
A Vehicle Manufacturer’s Perspective on VII Christopher Wilson ITS Oregon- Feb 1, 2005 Christopher Wilson.
Prof. J.-P. Hubaux Mobile Networks Module I – Part 2 Securing Vehicular Networks 1.
Azam Supervisor : Prof. Raj Jain
doc.: IEEE /0446r0 Submission May 2005 Lee Armstrong, Armstrong Consulting, Inc.Slide 1 WAVE Operational Concepts Notice: This document has been.
1 Vehicular Networks Slides are integrated from researchers at EPFL.
1 IntelliDrive SM Vehicle to Infrastructure Connectivity for Safety Applications Greg Davis FHWA Office of Safety RD&T U.S. Department of Transportation.
DSRC at 5.9GHZ 老師:高永安 學生:楊智安.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
Eyal Hamo Berry Shnaider בס " ד 1.
Intelligent and Non-Intelligent Transportation Systems 32 Foundations of Technology Standard 18 Students will develop an understanding of and be able to.
ITS Virginia 2013 Technologies and Trends Richmond May 16, 2013 Presenter: Brian Taylor Intelligent Imaging Systems Inc. Alternatives for Connecting Commercial.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
“Changing the relationship between everyone and the car, everywhere” 26 January, 2010 North Bethesda TMD Advisory Committee.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Challenge: Numerous Governmental Layers
Intelligent Transportation System
VANET.
Vehicular Communication Technology
SAE DSRC Technical Committee work and outlook
Mike Schagrin ITS Joint Program Office
Developing Vehicular Data Cloud Services in the IoT Environment
Presentation transcript:

1 The Security and Privacy of Smart Vehicles Jean-Pierre Hubaux EPFL Joint work with Srdjan Capkun, Jun Luo, and Maxim Raya

2 The Security and Privacy of Smart Vehicles  Motivation  Proposed model  The case for secure positioning  Security design options  Conclusion

3 The urge for security in Vehicular Communications  Large projects have explored vehicular communications : PATH (UC Berkeley), Fleetnet,…  No solution can be deployed if not properly secured  The problem is non-trivial  Specific requirements (speed, real-time constraints)  Contradictory expectations  Industry front: standards are still under development  IEEE P1556: Security and Privacy of Vehicle and Roadside Communications including Smart Card Communications  Research front  No single paper on vehicular security in IEEE Vehicular Technology Conference (VTC) !

4 A smart vehicle Communication: typically over the Dedicated Short Range Communications (DSRC) (5.9 GHz) Example of protocol: IEEE p Penetration will be progressive (over 2 decades or so) Note: we will consider radars to be optional (GPS) Human-Machine Interface

5 Attack 1 : Bogus traffic information Traffic jam ahead  Attacker: insider, rational, active

6 Attack 2 : Disruption of network operation SLOW DOWN The way is clear  Attacker: malicious, active

7 Attack 3: Cheating with identity, position or speed I was not there!  Attacker: insider, rational, active

8 Attack 4 : Uncovering the identities of other vehicles  Attacker (red car): passive

9 DSRC APPLICATIONS PUBLIC SAFETY and PRIVATE  APPROACHING EMERGENCY VEHICLE (WARNING) ASSISTANT (3)  EMERGENCY VEHICLE SIGNAL PREEMPTION  ROAD CONDITION WARNING  LOW BRIDGE WARNING  WORK ZONE WARNING  IMMINENT COLLISION WARNING (D)  CURVE SPEED ASSISTANCE [ROLLOVER WARNING] (1)  INFRASTRUCTURE BASED – STOP LIGHT ASSISTANT (2)  INTERSECTION COLLISION WARNING/AVOIDANCE (4)  HIGHWAY/RAIL [RAILROAD] COLLISION AVOIDANCE (10)  COOPERATIVE COLLISION WARNING [V-V] (5)  GREEN LIGHT - OPTIMAL SPEED ADVISORY (8)  COOPERATIVE VEHICLE SYSTEM – PLATOONING (9)  COOPERATIVE ADAPTIVE CRUISE CONTROL [ACC] (11)  VEHICLE BASED PROBE DATA COLLECTION (B)  INFRASTRUCTURE BASED PROBE DATA COLLECTION  INFRASTRUCTURE BASED TRAFFIC MANAGEMENT – [DATA COLLECTED from] PROBES (7)  TOLL COLLECTION  TRAFFIC INFORMATION (C)  TRANSIT VEHICLE DATA TRANSFER (gate)  TRANSIT VEHICLE SIGNAL PRIORITY  EMERGENCY VEHICLE VIDEO RELAY  MAINLINE SCREENING  BORDER CLEARANCE  ON-BOARD SAFETY DATA TRANSFER  VEHICLE SAFETY INSPECTION  DRIVER’S DAILY LOG  ACCESS CONTROL  DRIVE-THRU PAYMENT  PARKING LOT PAYMENT  DATA TRANSFER / INFO FUELING (A)  ATIS DATA  DIAGNOSTIC DATA  REPAIR-SERVICE RECORD  VEHICLE COMPUTER PROGRAM UPDATES  MAP and MUSIC DATA UPDATES  VIDEO UPLOADS  DATA TRANSFER / CVO / TRUCK STOP  ENHANCED ROUTE PLANNING and GUIDANCE (6)  RENTAL CAR PROCESSING  UNIQUE CVO FLEET MANAGEMENT  DATA TRANSFER / TRANSIT VEHICLE (yard)  TRANSIT VEHICLE REFUELING MANAGEMENT  LOCOMOTIVE FUEL MONITORING  DATA TRANSFER / LOCOMOTIVE PRIVATE PUBLIC SAFETY ATIS - Advanced Traveler Information Systems CVO - Commercial Vehicle Operations EV - Emergency Vehicles IDB - ITS Data Bus THRU – Through V-V – Vehicle to Vehicle (#) – Applications Submitted by GM/Ford/Chrysler (A- Z) – Applications Submitted by Daimler-Chrysler (Slide borrowed from the DSRC tutorial:

10 Another application : SmartPark Turn right! 50m to go… Park! Turn left! 30m to go… Courtesy: Matt Grossglauser, EPFL

11 Our scope  We consider communications specific to road traffic: safety and traffic optimization (including finding a parking place)  Messages related to traffic information (and parking availability)  Anonymous safety-related messages  Liability-related messages  We do not consider more generic applications, e.g. tolling, access to audio/video files, games,…

12 Message categories and properties Property Category Legitimacy Privacy protection Against other individuals Against the police Traffic information Anonymous safety-related messages Liability-related messages Guaranteed toR, DS, R, D S: Source R: Relay D: Destination Real- time cons- traints

13 Messages related to traffic information

14 Anonymous safety-related messages

15 Liability-related messages The information carried by these messages is susceptible to be stored in the Event Data Recorder of each vehicle

16 Liability vs. Privacy: how to avoid the Big Brother syndrom At 3:00 - Vehicle A spotted at position P1 At 3:15 - Vehicle A spotted at position P2 Protection of privacy can be realized by pseudonyms changing over time Only the law enforcement agencies should be allowed to retrieve the real identities of vehicles (and drivers)

17 Electronic License Plates and Public Key Infrastructure PKI Security services Positioning Confidentiality Privacy... CA P A P B Authentication Shared session key Each vehicle carries a certified identity and public key (electronic license plate) Mutual authentication can be done without involving a server Authorities (national or regional) are cross-certified

18 Attacker’s model in Vehicular Communications  An attacker can be an outsider or an insider and malicious or rational  An attack can be active or passive  Attacks against anonymous messages:  Bogus information  Attacks against liability-related messages:  Cheating with own identity  Cheating with position or speed  Attacks against both:  Uncovering identities of other vehicles  Disruption of network operation (Denial of Service attacks)

19 How to securely locate a vehicle

20 Positioning systems and prototypes Satellites: -GPS, Galileo, Glonass (Outdoor, Radio Frequency (RF) – Time of Flight (ToF)) General systems: - Active Badge (Indoor, Infrared(IR)), Olivetti - Active Bat, Cricket (Indoor, Ultrasound(US)-based), AT&T Lab Cambridge, MIT - RADAR, SpotON, Nibble (Indoor/Outdoor, RF- Received Signal Strength), Microsoft, Univ of Washington, UCLA+Xerox Palo Alto Lab - Ultra Wideband Precision Asset Location System, (Indoor/Outdoor, RF-(UWB)-ToF), Multispectral solutions, Inc. Ad Hoc/Sensor Network positioning systems (without GPS): - Convex position estimation (Centralized), UC Berkeley - Angle of Arrival based positioning (Distributed, Angle of Arrival), Rutgers - Dynamic fine-grained localization (Distributed), UCLA - GPS-less low cost outdoor localization (Distributed, Landmark-based), UCLA - GPS-free positioning (Distributed), EPFL

21 GPS - A constellation of 24 Earth-orbiting operational satellites - Each receiver can see at least 4 satellites simultaneously (to improve accuracy) - Satellites emit low-power signals - Positioning by 3-D trilateration - Differential GPS can improve accuracy from several meters to a few centimeters.

22 GPS Security – Example of attack  A GPS simulator can send strong fake signals to mask authentic weak signals GPS simulator

23 GPS Security  Other vulnerabilities  Relaying attack: connects the receiver to a remote antenna  Signal-synthesis attack: feeds the receiver with false signals  Selective-delay attack: predicts the signal Δt earlier  Security solutions  Tamper-resistant hardware  Symmetric crypto Problem: an authenticated receiver can hack the system  Asymmetric crypto Problem: additional delay

24 Distance measurement techniques - Based on the speed of light (RF, Ir) ts A B (A and B are synchronized - ToF) tr d ABm =(tr-ts)c ts - Based on the speed of sound (Ultrasound) (A and B are NOT synchronized – Round trip ToF) tr d ABm =(tr-ts-t procB )c/2 ts A B tr(RF) d ABm =(tr(RF)-tr(US))s ts tr(US) - Based on Received Signal Strength (RSS)

25 Attacks on RF and US ToF-based techniques - Insider attacker: cheat on the time of sending (ts) or time of reception (tr) ts 1. Overhear and jam 2. Replay with a delay Δt A B (A and B are assumed to be synchronised) tr d ABm =(tr-ts)c ts (encrypted) ts (enc.) B tr+Δt d ABm =(tr+Δt-ts)c ts+Δt M => d ABm >d AB - Outsider attacker: 2 steps: M

26 Summary of possible attacks on distance measurement Outsider attackers RSS (Received Signal Strength) Distance enlargement and reduction Distance enlargement and reduction Ultrasound Time of Flight Distance enlargement and reduction Distance enlargement and reduction Radio Time of Flight Distance enlargement and reduction Distance enlargement only Insider attackers

27 The challenge of secure positioning - Goals: - preventing an insider attacker from cheating about its own position - preventing an outsider attacker from spoofing the position of an honest node - Our proposal: Verifiable Multilateration

28 Distance Bounding (RF) ts BS A N BS tr - Introduced in 1993 by Brands and Chaum (to prevent the Mafia fraud attack) d real ≤ db = (tr-ts)c/2 (db=distance bound)

29 Distance bounding characteristics RSS Distance enlargement and reduction US ToF Distance enlargement and reduction Distance enlargement and reduction RF ToF Distance enlargement and reduction Distance enlargement only RF Distance Bounding Distance enlargement only US Distance Bounding Distance enlargement only Distance enlargement and reduction Outsider attackers Insider attackers - RF distance bounding: - nanosecond precision required, 1ns ~ 30cm - UWB enables clock precision up to 2ns and 1m positioning indoor and outdoor (up to 2km) - US distance bounding: - millisecond precision required,1ms ~ 35cm

30 Verifiable Multilateration (Trilateration) x y (x,y) BS1 BS2 BS3 Verification triangle Distance bounding A

31 Properties of Verifiable Multilateration - an outsider attacker cannot spoof the position of a vehicle such that it seems that the vehicle is at a position different from its real position within the triangle - a vehicle located within the triangle cannot prove to be at another position within the triangle except at its true position. - a vehicle located outside the triangle formed by the verifiers cannot prove to be at any position within the triangle - an outsider attacker cannot spoof the position of a vehicle such that it seems that it is located at a position within the triangle, if the vehicle is out of the triangle The same holds in 3-D, with a triangular pyramid instead of a triangle

32 Conclusion on secure positioning  New research area  Positioning tout court is not yet completely solved (solutions will rely on GPS, on terrestrial base stations, and on mutual distance estimation)  Time of flight seems to be the most appropriate technique  More information available at: Srdjan Capkun and Jean-Pierre Hubaux Secure Positioning of Wireless Devices with Application to Sensor Networks Accepted for Infocom 2005

33 Security design options  Each vehicle possesses a large set of certified anonymous public keys  Keys have short lifetimes  Pseudonyms replace vehicle identities  Authentication of real identities is required for liability- related messages  Police abuse can be prevented by distributing the law enforcement authority  Secure positioning guarantees position correctness

34 Alternative technique to change pseudonyms: Mix zones Mix zone

35 Security analysis  Attacks against anonymous messages:  Bogus information: correlation of traffic reports  Attacks against liability-related messages:  Cheating with own identity: certificates are signed by a trusted authority  Cheating with position or speed: secure positioning  Attacks against privacy:  Uncovering of other vehicles’ identities: anonymous keys + pseudonyms + mix zones  Disruption of network operation  Denial of Service: alternative technologies (e.g., UWB, UTRA-TDD, and Bluetooth) can temporarily support communications

36 Conclusion  The security of vehicular communications urgently needs to be considered  Security includes secure positioning  Major challenge: cope with the conflicting constraints of liability and privacy  Tricky question: who delivers and certifies the cryptographic keys: a governmental agency or the vehicle manufacturers?  More information available at: