Vehicle Witnesses as a Service: Leveraging Vehicles as Witnesses on the Road in VANET Clouds Authors: Rasheed Hussain ∗, Fizza Abbas ∗, Junggab Son ∗,

Slides:



Advertisements
Similar presentations
Revocation Mechanisms for Hybrid Group Communication with Asymmetric Links Abstract Wildcard identity-based encryption (IBE) provides an effective means.
Advertisements

Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks Einar Mykletun, Joao Girao, Dirk Westhoff IEEE ICC 2006, /06.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5 Group Key Management.
CSLI 5350G - Pervasive and Mobile Computing Week 3 - Paper Presentation “RPB-MD: Providing robust message dissemination for vehicular ad hoc networks”
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
1 Complexity of Network Synchronization Raeda Naamnieh.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Establishment of Conference Keys in Heterogeneous Networks Wade Trappe, Yuke Wang, K. J. Ray Liu ICC IEEE International Conference.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
TEMPLATE DESIGN © Privacy Issues of Vehicular Ad-hoc Networks (VANETs) Hang Dok and Ruben Echevarria Advisor: Dr. Huirong.
Privacy of Location Information in Vehicular Ad Hoc Networks Walaa El-Din M. Moustafa.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Aggregation in Sensor Networks
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
Yu-Li Lin and Chien-Lung Hsu Department of Information Management, Chang-Gung University Information Science(SCI) Reporter: Tzer-Long Chen.
Cryptography and Network Security (CS435) Part One (Introduction)
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 Data Naming in Vehicle-to-Vehicle Communications HU Yao Goto Lab
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Multicast Security: A Taxonomy and Some Efficient Constructions By Cannetti et al, appeared in INFOCOMM 99. Presenter: Ankur Gupta.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Vehicular Cloud Networking: Architecture and Design Principles
Optimizing CASCADE Data Aggregation for VANETs Khaled Ibrahim and Michele C. Weigle Department of Computer Science, Old Dominion University MASS 2008.
1 Covert Communication based Privacy Preservation in Mobile Vehicular Networks Rasheed Hussain*, Donghyun Kim**, Alade O. Tokuta**, Hayk M. Melikyan**,
*** School of Information, Renmin University of China, China
1 Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication Junggab Son*, Donghyun Kim*, Rasheed Hussain**, Sung-Sik Kwon*,
A Social Approach to Security: Using Social Networks to Help Detect Malicious Web Content Michael Robertson, Yin Pan, and Bo Yuan Department of Networking,
Computer Science Revocation and Tracing Schemes for Stateless Receivers Dalit Naor, Moni Naor, Jeff Lotspiech Presented by Attila Altay Yavuz CSC 774 In-Class.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks..
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
2011 IEEE TrustCom-11 Sushmita Ruj Amiya Nayak and Ivan Stojmenovic Regular Seminar Tae Hoon Kim.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
National Taiwan University Department of Computer Science and Information Engineering Vinod Namboodiri and Lixin Gao University of Massachusetts Amherst.
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
VANET.
Information and Network Security
Presentation transcript:

Vehicle Witnesses as a Service: Leveraging Vehicles as Witnesses on the Road in VANET Clouds Authors: Rasheed Hussain ∗, Fizza Abbas ∗, Junggab Son ∗, Donghyun Kim, Sangjin Kim, and Heekuck Oh ∗ 2013 IEEE International Conference on Cloud Computing Technology and Science Speaker: 資工碩研一甲 MA2G0101 林韋呈

OUTLINE Introduction System and Network Module Proposed Vehicle Witnesses As A Service Evaluation Conclusion

Introduction Today’s high-end cars are not the same century- old boxes with four wheels anymore, but rather more complex and sophisticated machines that are dreamed to bring reliablity and safety to our driving experience.

Introduction Recently, a number of services were proposed for VANET-based clouds. TIaaS (Traffic Information as a Service), and POW (Pics-On-Wheels) are two of them POW is the first approach to use vehicles to collect lively images of an area specified by a query from a user. Once the query is broadcasted, each vehicle nearby the scene will take a picture of its surroundings using an onboard camera and send it back to the user.

Introduction Nevertheless, security and privacy issues are still hot topics in VANET concept of Mix Zone which is used as a hotspot for changing pseudonyms in order to provide unlinkability among pseudonyms that are sent by the same vehicle. Unfortunately, changing pseudonyms does not necessarily preserve privacy. Wiedersheim et al. figured out that even if a unique pseudonym is used with each message, movement profiles could still be generated and the vehicles could be traced.

System and Network Module Proposed Network Model

Proposed Vehicle Witnesses As A Service Vehicle Witnesses as a Service(VWaas) Active service refers to a scenario where participating vehicles take pictures of the vicinity after specified time interval and then upload the pictures to the cloud. Passive service, vehicles proactively take pictures as a result of certain events or unless they are directed to do so.

Proposed Vehicle Witnesses As A Service System Initialization ◦ We use ElGamal encryption algorithm over the ECC (Elliptic Curve Cryptography) to encrypt Ki and KVi, and save them into RAs. Let G be a cyclic group of prime order q where G is generated by P. DMV first chooses s ∈ Z. ◦ Each RAi holds a share si and si = (s1, s2, s3,..., sj).In order to construct s from individual si, RAs must elect one of them to be group leader and construct s from combination of si.

Proposed Vehicle Witnesses As A Service TRH Initialization ◦ preloads TRH with vehicles individual secret key KVi and pseudonym generation key Ki. Pseudonym Generation: ◦ DMV (Department of Motor Vehicles)generates n number of pseudonyms by taking vehicle V’s secret counter uV and increment it by vehicle V’s incrementing factor oV.

Proposed Vehicle Witnesses As A Service On the other hand, in case of a busy street, it is highly possible that there might be more vehicles than enough nearby willing to collaborate. However, it is not desirable for all of them to upload the picture of the SoI since this will incur excessive amount of wireless (Wifi, 3G and/or 4G) traffic.

Proposed Vehicle Witnesses As A Service One way to elect a smaller subset of cameras to obtain the full-view image of the SOI while minimizing the wireless traffics from the Vehicles would be ◦ (a) allowing all the static cameras around the streets to transmit the pictures ◦ (b)iteratively allowing a vehicle with a camera covering the most amount of uncovered direction to transmit until the sufficient condition is met

Proposed Vehicle Witnesses As A Service

Identity Exchange When a vehicle wants to exchange its pseudonym for privacy preservation, it shows its intention in its beacon messages PEHT-Pseudonym Exchange History Table

Proposed Vehicle Witnesses As A Service Pseudonym Exchange History Table Example

Evaluation Security Analysis ◦ We assume a passive adversary where he/she can overhear the transmission between the vehicles and cloud service provider ◦ The effect of keys compromise is critical for our proposed scheme. However the compromise of Ki alone does not have severe consequences because the adversary can get only α which is a part of pseudonym. In the worst case if both Ki and KVi are compromised, then the consequences will be dire. In such case the adversary not only has the actual pseudonym, but also can manipulate or reuse it.

Evaluation Computation and Communication Overhead

Conclusion In this paper, we proposed VWaaS (Vehicles Witnesses as a Service) in VANET-based clouds. Cloud,on the other hand, provides the stored forensic evidences to the law enforcement or insurance agencies for investigation. We provide conditional anonymity to the vehicles that contribute to this service.