Professor Pin-Han Ho Ph.D. Department of Electrical and Computer Engineering University of Waterloo, Canada On Achieving Secure and Privacy- Preserving.

Slides:



Advertisements
Similar presentations
Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Advertisements

Efficient Secure Aggregation in VANETs Maxim Raya, Adel Aziz, and Jean-Pierre Hubaux Laboratory for computer Communications and Applications (LCA) EPFL.
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
CSLI 5350G - Pervasive and Mobile Computing Week 6 - Paper Presentation “Exploiting Beacons for Scalable Broadcast Data Dissemination in VANETs” Name:
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
CSLI 5350G - Pervasive and Mobile Computing Week 3 - Paper Presentation “RPB-MD: Providing robust message dissemination for vehicular ad hoc networks”
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Secure Vehicular Communications Speaker: Xiaodong Lin University of Waterloo
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
Vehicle-to-Vehicle Wireless Communication Protocols for Enhancing Highway Traffic Safety - A Comparative Study of Data Dissemination Models for VANETs.
Security Issues In Sensor Networks By Priya Palanivelu.
Mini-Project 2006 Secure positioning in vehicular networks based on map sharing with radars Mini-Project IC-29 Self-Organized Wireless and Sensor Networks.
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Department of Computer Engineering Koc University, Istanbul, Turkey
TEMPLATE DESIGN © Privacy Issues of Vehicular Ad-hoc Networks (VANETs) Hang Dok and Ruben Echevarria Advisor: Dr. Huirong.
TrafficView: A Driver Assistant Device for Traffic Monitoring based on Car-to-Car Communication Sasan Dashtinezhad, Tamer Nadeem Department of CS, University.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
Design of Cooperative Vehicle Safety Systems Based on Tight Coupling of Communication, Computing and Physical Vehicle Dynamics Yaser P. Fallah, ChingLing.
An Efficient Identity-based Cryptosystem for
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean Advisor: Panos Papadimitratos.
HYBRID ROUTING PROTOCOL FOR VANET
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
2. Survey of VANETs A Tutorial Survey on Vehicular Ad Hoc Networks
Doc.: IEEE ae Submission Jan Kenney – Toyota/VSC3Slide 1 Case Study for reduced priority management frames – Vehicular Safety.
A study of Intelligent Adaptive beaconing approaches on VANET Proposal Presentation Chayanin Thaina Advisor : Dr.Kultida Rojviboonchai.
Small-Scale and Large-Scale Routing in Vehicular Ad Hoc Networks Wenjing Wang 1, Fei Xie 2 and Mainak Chatterjee 1 1 School of Electrical Engineering and.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
A Probabilistic Model for Message Propagation in Two-Dimensional Vehicular Ad-Hoc Networks Yanyan Zhuang, Jianping Pan and Lin Cai University of Victoria,
ABSTRACT Currently, drivers must utilize a third-party, such as a radio or broadband device, to learn about local traffic conditions. However, this information.
INTRADE (INTELLIGENT TRANSPORTATION FOR DYNAMIC ENVIRONMENT) PROJECT. FINAL WORKSHOP 4 & 5 DECEMBER 2014 Nacera Bahnes, Bouabdellah Kechar, Hafid Haffaf.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
1 TBD: Trajectory-Based Data Forwarding for Light-Traffic Vehicular Networks IEEE ICDCS’09, Montreal, Quebec, Canada Jaehoon Jeong, Shuo Gu, Yu Gu, Tian.
Group-based Source Authentication in VANETs You Lu, Biao Zhou, Fei Jia, Mario Gerla UCLA {youlu, zhb, feijia,
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
A Vehicle Manufacturer’s Perspective on VII Christopher Wilson ITS Oregon- Feb 1, 2005 Christopher Wilson.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
1 Vehicular Networks Slides are integrated from researchers at EPFL.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Presented by: Reut Barazani Limor Levy. Contents Introduction Digital signature broadcast message authentication TESLA broadcast message authentication.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
National Taiwan University Department of Computer Science and Information Engineering Vinod Namboodiri and Lixin Gao University of Massachusetts Amherst.
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
VANET.
VANET.
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
Vehicular Ad-hoc Network Survey
July 2007 doc.: IEEE p Jan Case Study for reduced priority management frames – Vehicular Safety Communication Date:
Channel usage in NGV: follow-up
Presentation transcript:

Professor Pin-Han Ho Ph.D. Department of Electrical and Computer Engineering University of Waterloo, Canada On Achieving Secure and Privacy- Preserving Vehicular Communications

Agenda  Some briefs  Introduction of VANETs  Privacy Issues  Verification Issues  Conclusions 2Speaker: Pin-Han Ho University of Waterloo

 Traffic accidents – According to the Traffic Safety Facts Annual Report, over 6 million police- reported motor vehicle crashes occurred in the United States alone in Nearly 1.95 million resulted in an injury, and 42,352 resulted in a death.  Millions of people daily commute in the city or the highway – Congestion control is of importance Why do we need Vehicular networks ? 3 Introduction Speaker : Pin-Han Ho

 System Model Vehicular Ad Hoc Networks 4  Vehicle-to-Vehicle (V2V) Communication  Vehicle-to- Infrastructure (V2I or V2R) Communication Vehicular ad hoc networks (VANETs) Each vehicle is embedded with a WiFi-enable device Introduction Speaker : Pin-Han Ho

Dedicated Short Range Communications MHz  Before December 17, 2003  Range < 30 meters  Data rate = 0.5 mbps  Designed for Electronic Toll Collection (ETC), but can be used for other applications  Single unlicensed channel  Vehicle to roadside  C ommand-response New 5.9 GHz  On December 17, 2003  Range to 1000 meters  Data rate 6 to 27 mbps  Designed for general internet access, can be used for ETC  7 licensed channels  Vehicle to roadside & vehicle to vehicle  Command-response & peer to peer Reference: Introduction Speaker : Pin-Han Ho

DSRC at 5.9G 6  75 MHz band has been allocated by the Federal Communication Commission (FCC) at 5.9 GHz  Band allows both safety and commercial applications to coexist  Safety application typically need <15% of capacity  Broadcast safety message every ms Introduction Speaker : Pin-Han Ho

 Safety-related Applications – According to Dedicated Short Range Communications (DSRC) protocol, each vehicle one-hop broadcasts its traffic-related information every ms. Applications 7 What’s in front of that bus ? On rainy days On foggy days From: TrafficView Outdoors Introduction Speaker : Pin-Han Ho

8 Curve speed warning, work zone warning etc position, current time, direction, velocity, acceleration/ deceleration, etc Traffic Message Emergent Message Introduction Speaker : Pin-Han Ho Applications

 Entertainment-related Applications – Digital data downloading/uploading ( , mp3, video) – Location Information requiring (map, the nearest restaurant/gas station/plaza, etc. ) Applications 9Introduction Speaker : Pin-Han Ho

 Commercial applications – Commercial advertisements forwarding Applications 10Introduction Speaker : Pin-Han Ho

 Traffic control applications Applications 11Introduction Speaker : Pin-Han Ho –Optimize traffic flow –Road side unit (RSU) at intersections real time collects traffic information (# of vehicle) –A control center controls the traffic light

Privacy Issues

 Protect user privacy – Each driver does not like expose his/her identity and the corresponding location information to the third party.  Achieve conditional privacy – There should exist a trust authority (TA) – In case that an abuse happens, TA can trace the real identity of a user/driver. Privacy 13Privacy issues Speaker : Pin-Han Ho

Anonymous Certificate Approach 14 ELP(ID a ) ELP(ID b ) ELP(ID a ) ELP(ID b ) … ELP(ID j ) Disadvantage: 1. Huge storage cost 2. Management overhead Anonymous certificate list M  Public Key Infrastructure (PKI)-based approach Speaker : Pin-Han Ho Privacy issues M. Raya and J.-P. Hubaux, “The Security of Vehicular Ad Hoc Networks,” ACM workshop on Security of ad hoc and sensor networks (SASN'05), pp , 2005.

Group signature Approach 15  Divide the communications into two parts: no anonymity requirement X. Lin, X. Sun, P.-H. Ho and X. Shen. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications. IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp , Group Signature Scheme Id-based Signature scheme RSU Speaker : Pin-Han Ho Privacy issues

 Communications between vehicles – Why use group signature scheme? It provides anonymity of the signers. The verifiers can judge whether the signer belongs to a group without knowing who the signer is in the group. However, in exceptional situations, the group manager is able to reveal the unique identity of the signature’s originator. – Choose ‘short group signature’ scheme proposed by Dan Boneh [1] 16 [1] D. Boneh, X. Boyen, and H. Shacham. Short group signatures, In Proceedings of Crypto '04,2004. Speaker : Pin-Han Ho Group signature Approach Privacy issues

 Brief protocol diagram 17 Speaker : Pin-Han Ho Group signature Approach Privacy issues

 Advantage: – GSIS reduce the number of private and public key pairs stored at both vehicle side and TA side – Conditional privacy preservation. It is easy for TA to trace the real identity of an internal attacker  Disadvantage: – High computation overhead (slow verify speed) 18 Speaker: Pin-Han Ho Group signature Approach Privacy issues

 Combine above two schemes – Each vehicle generates multiple public and private key pairs, which are used for signing messages. – Each vehicle is assigned a group private key, which is used for signing a certificate instead of for signing messages. – The generated public and private key pairs are signed with a vehicle’s group private key. The signature is used as a certificate. Hybrid Approach 19 Speaker: Pin-Han Ho G. Calandriello, P. Papadimitratos,.A. Lioy, J.-P. Hubaux, “Efficient and Robust seudonymous Authentication in VANET, ” ACM Workshop on VANET, Privacy issues

20 Speaker: Pin-Han Ho Hybrid Approach  Advantage: – The hybrid approach can achieve a computation tradeoff between the group signature scheme and the anonymous certificate approach  Disadvantage: – Still have scalability issues – Slow verification speed – A bottleneck in a high traffic density scenario Privacy issues

21  With a VANET, a company (such as McDonald’s) could locate multiple access points (APs) on the road. These APs can provide an internet access.  Any two adjacent APs should overlap each other such as a vehicle can access the Internet seamlessly. Speaker: Pin-Han Ho Privacy issues during a handover Issues: 1.Two adjacent APs can distinguish the same car. 2. APs can know the trajectory of the vehicle. Privacy issues

 Vehicle v1 and v2 pre-obtain a blind signature of the access point AP1. The blind signature are used for credentials when vehicles hand over.  AP1 can only verify whether a signature is valid or not, but cannot know which vehicle (i.e., v1 or v2) holds the signature  AP1 cannot distinguish v1 and v2 in this figure The blind signature based solution 22 Speaker: Pin-Han Ho C. Zhang, R. Lu, P.-H. Ho, and A. Chen, A Location Privacy Preserving Authentication Scheme in Vehicular Networks, The IEEE Wireless Communications & Network Conference (WCNC), Las Vegas, Nevada, USA, Privacy issues

 Analysis 23Speaker: Pin-Han Ho Blind Zone The blind signature based solution The tracking probability depends on ―the number of vehicles in a blind zone ―the distance that a vehicle travels Privacy issues

Verification Issues

25  Scalability Verification issues Facts According to DSRC, messages are sent in every100 ~ 300 ms, e.g., 300 ms Communication range of a vehicle is 300 m, i.e., radius = 300, for each vehicle, its communication range is π300 2 sq.m. Suppose that vehicles use ECDSA to sign a message. Verifying a signature takes 3.87 ms, i.e., maximally 78 vehicles can be verified in a cycle Goal Speaker: Pin-Han Ho Verification Issues Challenge It is hard for the existing public- key based signature schemes to verify a large number of signatures in 300 ms

26 IEEE Std IEEE Trial-Use Standard for wireless access in vehicular environments – Security Services Challenge How to reduce communication overhead as much as possible. At the same time, other security issues (e.g., privacy, scalability, etc.) should also be addressed The second Goal Communication Overhead Speaker: Pin-Han Ho Verification Issues

27 The proposed scheme: RAISE  Comparison Public key based Symmetric key based Speed slow fast Communication Overhead high low Broadcast Authentication Yes No (if using only key)  A hybrid approach RAISE: An RSU-aided Message Authentication Scheme RSU Suppose the RSU is trusted Speaker: Pin-Han Ho Verification Issues -- Approach I C. Zhang, X. Lin, R. Lu, P. –H. Ho, and X. Shen, “An Efficient Message Authentication Scheme for Vehicular Communications”, IEEE Transactions on Vehicular Technology, Vol. 57, Issue 6, Nov. 2008

28 key1 key2  Mutual authentication v1v1 v2v2  Message sending (on the vehicle side ) Each vehicle periodically broadcasts messages, which can be received by its neighbors and the RSU v1v1 Message and signature signed with key1 v2v2 RSU The Protocols of RAISE Speaker: Pin-Han Ho Vehicles and RSU authenticate each other. Only the RSU can verify Key1 and Key2 are different! Verification Issues -- Approach I

29  Authenticity reporting After the RSU verifies the message of V1, the RSU reports the result to its neighbors The Protocols of RAISE Speaker: Pin-Han Ho v1v1 Message and signature signed with key1 v3v3 RSU v2v2  Result aggregation (on the RSU side ) In a short time interval Δt, the RSU received multiple messages and signatures. Then, the RSU reports all the results accumulated during Δt. Verification Issues -- Approach I

30  The whole process The Protocols of RAISE Speaker: Pin-Han Ho v1v1 RSU v2v2 v3v3 : Result Aggregation Verification Issues -- Approach I

31  Issues caused by loss in contention and lossy channel RSU-to-vehicle Make the vehicle, which does not receive result aggregation, fail in verifying a message Vehicle-to-RSU Make the RSU fail in receiving a message, thus all the other surrounding vehicles cannot verify the message from the vehicle Issues in RAISE Speaker: Pin-Han Ho Verification Issues -- Approach I

32 Performance Evaluation of RAISE Fig. 1. Average loss ratio vs. Traffic load As the number of vehicles increases, the loss ratio increases. However, RAISE has the lowest loss ratio. Clearly, RAISE has the lowest communication overhead since it uses MAC tag instead of PKI-based signatures Fig. 2. Communication overhead (in 1min) vs. Traffic load Speaker: Pin-Han Ho Verification Issues -- Approach I

33 To Further Probe  RSU may not be pervasive – RSUs may not cover all the busy streets of a city or a highway (e.g., at the early stage of VANETs' deployment) – Physical damage of some RSUs, or simply for economic considerations  What if there is no RSU? – TESLA-based approach (called TSVC ) – Batch verification approach Speaker: Pin-Han Ho Verification Issues -- Approach I

34 TSVC:TESLA based security protocol  What is TESLA ( Time Efficient Stream Loss-Tolerant Authentication ) – In TESLA, Each message is attached a MAC tag only. – The sender makes use of a hash chain as cryptographic keys in the MAC operations. – The hash keys are released a certain period of time later than the messages. – Message receivers are loosely synchronized.  Provides fast source authentication with lower communication overhead. X. Lin, X. Sun, X. Wang, C. Zhang, P.-H. Ho and X. Shen. TSVC: Timed Efficient and Secure Vehicular Communications with Privacy Preserving. IEEE Transactions on Wireless Communications, to appear. Speaker: Pin-Han Ho Verification Issues -- Approach II

35  Each vehicle generates a hash chain initiated from a random seed S, where,,(i<j), according to each anonymous Verify Signature Verify MAC sender receiver Interval 1 Interval 2 Interval i TSVC:TESLA based security protocol Speaker: Pin-Han Ho Verification Issues -- Approach II

36  The choice of key release delay – Keys are released after all nodes have received the previous data packet. (We set as 100ms) – Before verifying the message, the receiver should first check if the corresponding key has been released or not. M h source MAC h (M’)|M’ TSVC:TESLA based security protocol Speaker: Pin-Han Ho Verification Issues -- Approach II

37  We compare the performances of the four schemes: – PKI, GSIS, TSVC(GSIS), TSVC(PKI) Impact of the vehicle’s moving speed on Message Delay in highway scenario Impact of the vehicle’s moving speed on Message Loss Ratio in highway scenario Performance Evaluation of TSVC Verification Issues -- Approach II

 Accelerate verification speed  Choose Batch verification – The speed of verifying a batch of signatures is faster than that of verifying each of signatures one by one – We use a pairing technique to achieve this [ZLLHS08] 38 Speaker: Pin-Han Ho Batch verification Verification Issues -- Approach III [ZLLHS08] C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, “An Efficient Identity- based Batch Verification Scheme for Vehicular Sensor Networks”, The IEEE Conference on Computer Communications (INFOCOM), Phoenix, USA, 2008.

 Analogy Batch verification 39 Speaker: Pin-Han Ho Energy ++ = > Verification Issues -- Approach III

Batch verification  To accelerate verify speed, we do verification on a batch of signatures once. M1, Sig(M1)M2, Sig(M2)Mn, Sig(Mn) … Batch: Sig(M1)+Sig(M2)+…+Sig(Mn), then verify the summation Accelerate the speed of verifying multiple signatures 40 Speaker: Pin-Han Ho Verification Issues -- Approach III

 We compare our scheme with BLS signature and ECDSA signature schemes  The larger the total number of signature is, the faster the whole verify speed is 41 Verify speed Speaker: Pin-Han Ho Verification Issues -- Approach III Verification delay vs. Traffic density

 Since our scheme is identity-based, a message does not included a certificate  Here, 30,000 corresponds to the number of messages sent by 150 vehicles in 1 minute 42 Communication overhead Speaker: Pin-Han Ho Verification Issues -- Approach III Transmission overhead vs. the number of messages received by an RSU in 1 minute

Conclusions  Introduction of VANETs - Applications - Issues on Privacy Preservation and Verification 43 Speaker: Pin-Han Ho

Thanks! Questions?