Secure pseudonym generation for efficient broadcast authentication in VANETs Deepak N Ananth and Manjusha Gadiraju CSC / ECE 774.

Slides:



Advertisements
Similar presentations
By Md Emran Mazumder Ottawa University Student no:
Advertisements

 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
A Survey of Secure Wireless Ad Hoc Routing
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Mini-Project 2007 On Location Privacy in Vehicular Mix-Networks Julien Freudiger IC-29 Self-Organised Wireless and Sensor Networks Tutors: Maxim Raya Márk.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
WSN Simulation Template for OMNeT++
Privacy of Location Information in Vehicular Ad Hoc Networks Walaa El-Din M. Moustafa.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
PARROTS Position Altered Random Repetition of Transportation Signature
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Privacy Issues in Vehicular Ad Hoc Networks.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean Advisor: Panos Papadimitratos.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
SecureMR: A Service Integrity Assurance Framework for MapReduce Author: Wei Wei, Juan Du, Ting Yu, Xiaohui Gu Source: Annual Computer Security Applications.
HYBRID ROUTING PROTOCOL FOR VANET
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
A study of Intelligent Adaptive beaconing approaches on VANET Proposal Presentation Chayanin Thaina Advisor : Dr.Kultida Rojviboonchai.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Multiuser Receiver Aware Multicast in CDMA-based Multihop Wireless Ad-hoc Networks Parmesh Ramanathan Department of ECE University of Wisconsin-Madison.
Group-based Source Authentication in VANETs You Lu, Biao Zhou, Fei Jia, Mario Gerla UCLA {youlu, zhb, feijia,
Ad Hoc Network.
TDMA Slot Reservation in Cluster-Based VANET Ph.D. Gathering By Mohammad S. Almalag Advisor Michele C. Weigle Department of Computer Science Old Dominion.
BY PREETHI.E. * For people living in developed countries the absolute volume of road traffic can be a daily nuisance. In addition, the road traffic.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks..
Weichao Wang, Bharat Bhargava Youngjoo, Shin
Wireless Ad Hoc Networks
1 Vehicular Networks Slides are integrated from researchers at EPFL.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
Eyal Hamo Berry Shnaider בס " ד 1.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
Presented by Edith Ngai MPhil Term 3 Presentation
VANET.
VANET.
Presentation transcript:

Secure pseudonym generation for efficient broadcast authentication in VANETs Deepak N Ananth and Manjusha Gadiraju CSC / ECE 774

Broadcast Authentication in VANETs  Outline:  Introduction to VANET Technology  Security requirements in VANET technology  Privacy protection in VANET  The proposed Protocol  Fast Authentication in VANET  Implementation and Future Work  References 2

Why VANET? - Motivation  Increase traveler safety  10.8 million vehicle crashes from 1990 to 2009  36,000 fatalities in 2009 only  24,000 of these due to collision with other vehicles / objects.  Costs more than $100 billion per year  Boost on-board luxury 3 Source: US Census Bureau :

Broadcast Authentication in VANETs  Outline:  Introduction to VANET Technology  Security requirements in VANET technology  Privacy protection in VANET  The proposed Protocol  Fast Authentication in VANET  Implementation and Future Work  References 4

What is Vehicular Ad-Hoc Network ? 5 Higher Authority RSU m :, loc, Tv S(m) : ECDSA signature cert : Public key certificate m :, loc, Tv S(m) : ECDSA signature cert : Public key certificate OBU

6

Communication in VANET 7 Vehicular communication Vehicular communication Vehicle-Vehicle Vehicle-Infrastructure Single-hop Multi-hop Hybrid

VANET Applications Co-operative Collision WarningLane Change WarningIntersection Collision Warning Approaching Emergency vehicleRollover WarningWork Zone Warning Coupling/DecouplingInter-Vehicle CommunicationsElectronic Toll Collection 8

VANET Characteristics  The main characteristics of VANETs  High mobility of nodes  Rapidly changing network topology (predictable to some extent)  Unbounded network size  Potential support from infrastructure  Real time, time-sensitive data exchange  Crucial effect of security and privacy 9

Broadcast Authentication in VANETs  Outline:  Introduction to VANET Technology  Security in VANET technology  Privacy protection in VANET  The proposed Protocol  Broadcast Authentication in VANET  References 10

Security Requirements  Authentication  Privacy protection  Non-repudiation  Real-time constraints  Availability 11

12 Security Requirements (contd)

 Outline  Introduction to VANET Technology  Security requirements in VANET technology  Privacy protection in VANET  The Proposed Protocol  Fast Authentication in VANET  Security Analysis  Implementation and Future Work  References 13

Privacy – Important for VANETs  Cars = Personal Devices  Tracking of vehicles based on communication messages  The feeling of permanently being monitored by an arbitrary authority

Examples: Privacy threat  A private investigator can easily follow a car without being noticed by extracting position information from the messages sent by the car.  An employer is overhearing the communications from cars on the company parking lot.

How to provide Privacy ???  Enter “pseudonyms” aliases which hide the real identity  Can be implemented using random numbers  Set of pseudonyms used during communication must be mapped to real-world identities in special situations Trusted Authority

How to use pseudonyms?  Single pseudonym all the time –Easy to map alias with real identity –Messages can be related  Store pseudonyms on the OBU and use over a long period of time –How many pseudonyms to load ? –Compromised node ?

Broadcast Authentication in VANETs  Outline  Introduction to VANET Technology  Security requirements in VANET technology  Privacy protection in VANET  The Proposed Protocol  Fast Authentication in VANET  Security Analysis  Implementation and Future Work  References

Protocol Overview  Privacy protection for local broadcast messages.  Short time on-the-fly pseudonym generation.  Estimate the number of pseudonyms required.  Local broadcast via Enhanced Fast Authentication

System Model

System Components  Central Authority (CA) : Centralized authority which registers the vehicles before they are allowed to operate on the road. E.g.: DMV Cannot be compromised  Roadside Authority (RA) : Authorized all road-side units. Cannot be compromised.  Road Side Units (RSU) : Infrastructure nodes installed Road side. Susceptible to compromise  Vehicular nodes: Nodes which transmit the messages. Susceptible to compromise

Assumption Model  Each vehicle V when registered with the CA is provided a public / private key pair and CA pub  The RA periodically pulls information from the CA to get the latest up to date CRL’s and registered vehicles information.  Each RA maintains a topological overview of the entire area under its coverage  Attacker can compromise at most one RSU under a RA’s range.  At any time in the network there are more number of benign nodes than the compromised nodes.

Attacker Model  External Attacker: Such an attacker is limited in the diversity of attacks he can mount. However, he can eavesdrop on all the messages transferred.  Inside Attacker: The attacker can be an authenticated member of the network; such an attacker can communicate with other members of the network. E.g: Compromised RSUs and vehicles 23

Pseudonym generation - Step 1 24 RA RSU -> * {RSU ID, Cert DMV (RSU pub ||RA pub ), RSU loc } RSU-ID A RSU-ID B

Pseudonym generation - Step 2 25 V -> RSU: {ID, RSU ID, T V, (k + t)} RA pub RA

Pseudonym generation - Step 3 26 RA -> RSU: {H(ID,N i ), V pub, (k+t), T v } RA CRL List

Pseudonym generation - Step 4 27 RSU –> V: {SK v 1, SK v 2 … SK v k+I,Cert (PK v 1 ||H(ID, N i )), Cert (PK v 2 || H(ID, N i ))...Cert (PK v k+i - H(ID, N i ))} V pub, T v RA

Revocation Protocol  Malicious vehicles need to be isolated from the network  Revocation of vehicles should be done progressively.  Neighboring vehicles report the violation and the pseudonym used to the next RA via the nearest RSU  RA determines the severity of the violation and forwards the pseudonym to the Central Authority 28

Contd..  CA obtains the mapping of the pseudonym and the vehicle’s identity  Puts the vehicle in the Revocation List  Distributes a copy of the Revocation list to all the RA’s  Takes appropriate action on the malicious vehicle 29

Broadcast Authentication in VANETs  Outline:  Introduction to VANET Technology  Security requirements in VANET technology  Privacy protection in VANET  The proposed Protocol  Fast Authentication in VANET  Security Analysis  Implementation and Future Work  References 30

Enhanced Fast Authentication  First proposed in “Flooding-Resilient Broadcast Authentication for VANETs”  Secures single-hop periodic messages.  Replaces expensive digital signature technique with efficient hash operations. 31

Step 1: Location prediction  Predict location information ( ) over the next “I” beacons  Construct a prediction table for each beacon. 32

Step 2: One Time Signatures  Makes use of Huffman coding for generating OTS.  Construct Huffman binary tree for each beacon.  Chain the “ I ” Huffman trees for the “ I ” beacons to form a Chained Huffman tree (CHT).  The root of the CHT is the one time signature for the authentication of the “ I ” beacons. 33

Step 2: One Time Signatures 34

Step 3: Signature Broadcast  Commitment of the tree Pkots must be authenticated to all receivers via the generated pseudonyms.  Send first beacon B 0 = {m 0,S(m 0 ), cert} where, m 0 = {T 0,L 0,PKots,Dx,Dy}  After commitment is authenticated, send “m i ” and off- path values of the CHT as the signature. 35

Enhanced Pseudonym usage  Construct a Huffman tree for “I” beacons and include the commitment in first beacon B 0  Vehicles cannot authenticate messages if B 0 is not received.  Send PK ots every “ k ” beacons. (k < I).  Include “ k ” when requesting for pseudonyms.  In addition always maintain “t” minimum pseudonyms in OBU.  “ t “ can be varied according to the network conditions. 36

Foreseen Advantages  Parallelize the process of pseudonym generation and beacon prediction. The vehicle can make the request for the pseudonyms and perform the beacon prediction and PK ots generation.  Lesser signature operations.  Not vulnerable to RSU attacks. 37

Broadcast Authentication in VANETs  Outline:  Introduction to VANET Technology  Security requirements in VANET technology  Privacy protection in VANET  The proposed Protocol  Fast Authentication in VANET  Security Analysis  Implementation and Future Work  References 38

Security Analysis  The protocol is secure against DoS attacks: Each vehicle spends a ltd. amount of time in RSU range. Vehicle accepts only the pre-calculated no. of pseudonyms it requested for. RA and RSU have very high computation power. 39

 The protocol is secure against replay attacks: Vehicles and the nodes are tightly synchronized. Include T v in the message  The protocol is secure against vehicular impersonation attacks: Ensure that the vehicle ID is never revealed in the open. TPD ensures that the keys are not revealed to user. 40

 The protocol is secure against RSU impersonation: RA can determine RSU compromise based on the complaints received. An RSU compromise affects communication only in the range of the particular RSU 41

Broadcast Authentication in VANETs  Outline:  Introduction to VANET Technology  Security requirements in VANET technology  Privacy protection in VANET  The proposed Protocol  Fast Authentication in VANET  Security Analysis  Implementation and Future Work  References 42

Simulations in VANET  VANET simulations require both networking component and mobility component.  Usually represented by two different simulators.  Mobility simulator generates the mobility of vehicles  Network simulator provides feedback and modifies trace files accordingly. 43

Our Simulation: Mobility simulation  Simulation of Urban Mobility (SUMO)  Have developed XML scripts to define the topology and the vehicular movement in SUMO. 44

Our Simulation: Network simulation  Use Omnet ++ for network simulation  Veins simulation environment interface between the network simulation and mobility.  INET framework to simulate wireless transmissions 45

Future Work  Continue working on network simulation part for performance evaluation.  Optimize the protocol and enhance the bandwidth efficiency and robustness of this scheme 46

References [1] Hsiao, H.-C., Studer, A., Chen, C., Perrig, A., Bai, F., Bellur, B., Iyer, A.:"Flooding- Resilient Broadcast Authentication for VANETs". [2] Z. Li, Z. Wang, and C. Chigan, “Security of Vehicular Ad Hoc Networks in Intelligent Transportation Systems,” [3] – Nice videoshttp:// [3] 47

Thank You 48