Prof. J.-P. Hubaux Mobile Networks Module I – Part 2 Securing Vehicular Networks 1.

Slides:



Advertisements
Similar presentations
Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Advertisements

Efficient Secure Aggregation in VANETs Maxim Raya, Adel Aziz, and Jean-Pierre Hubaux Laboratory for computer Communications and Applications (LCA) EPFL.
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Survey of Vehicular Network Security Jonathan Van Eenwyk.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
1 Performance 2005 October 6, 2005 Juan les Pins Performance Challenges in Secure Vehicular Networks Prof. Jean-Pierre Hubaux EPFL With the help of Srdjan.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 2 – Upcoming networks Generalities.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
1 Key Management for Vehicular Networks Maxim Raya and Jean-Pierre Hubaux Secure Vehicular Communications Workshop EPFL - 19/05/2015.
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks Maxim Raya, Panos Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux INFOCOM 2008.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
Mini-Project 2006 Secure positioning in vehicular networks based on map sharing with radars Mini-Project IC-29 Self-Organized Wireless and Sensor Networks.
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
Proposal for an achievable, cost effective Security Concept for EOBRs C. Hardinge / A. Lindinger.
Centre for Wireless Communications University of Oulu, Finland
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
1 Credentials Revocation in Vehicular Networks: Design & Evaluation Ghita Mezzour Panos Papadimitratos.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Secure pseudonym generation for efficient broadcast authentication in VANETs Deepak N Ananth and Manjusha Gadiraju CSC / ECE 774.
Design of Cooperative Vehicle Safety Systems Based on Tight Coupling of Communication, Computing and Physical Vehicle Dynamics Yaser P. Fallah, ChingLing.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Privacy Issues in Vehicular Ad Hoc Networks.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks Maxim Raya, Panagiotis Papadimitratos, Virgil D. Gligory, Jean-Pierre Hubaux Presented.
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean Advisor: Panos Papadimitratos.
SecureMR: A Service Integrity Assurance Framework for MapReduce Author: Wei Wei, Juan Du, Ting Yu, Xiaohui Gu Source: Annual Computer Security Applications.
1 Secure Ad-Hoc Network Eunjin Jung
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
A Security Architecture Concept for Vehicular Network Nodes 蔡嘉翔 許閔傑.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
DIGITAL SIGNATURE.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks..
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
1 Vehicular Networks Slides are integrated from researchers at EPFL.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
Eyal Hamo Berry Shnaider בס " ד 1.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
Key management issues in PGP
Presented by Edith Ngai MPhil Term 3 Presentation
VANET.
VANET.
Presentation transcript:

Prof. J.-P. Hubaux Mobile Networks Module I – Part 2 Securing Vehicular Networks 1

Outline  Motivation  Threat model and specific attacks  Security architecture  Security analysis  Certificate revocation  Data-centric trust  Conclusion 2

What is a VANET (Vehicular Ad hoc NETwork)? Communication: typically over the Dedicated Short Range Communications (DSRC) (5.9 GHz) Example of protocol: IEEE p Penetration will be progressive (over 2 decades or so) 3

Vehicular communications: why?  Combat the awful side-effects of road traffic In the EU, around 40’000 people die yearly on the roads; more than 1.5 millions are injured Traffic jams generate a tremendous waste of time and of fuel  Most of these problems can be solved by providing appropriate information to the driver or to the vehicle 4

Why is VANET security important?  Large projects have explored vehicular communications: Fleetnet, PATH (UC Berkeley),…  No solution can be deployed if not properly secured  The problem is non-trivial Specific requirements (speed, real-time constraints) Contradictory expectations  Industry front: standards are still under development and suffer from serious weaknesses IEEE P1609.2: Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages  Research front A growing number of papers 5

A modern vehicle (GPS) Human-Machine Interface A modern vehicle is a network of sensors/actuators on wheels ! 6

Threat model  An attacker can be: Insider / Outsider Malicious / Rational Active / Passive Local / Extended  Attacks can be mounted on: Safety-related applications Traffic optimization applications Payment-based applications Privacy 7

Attack 1 : Bogus traffic information Traffic jam ahead  Attacker: insider, rational, active 8

Attack 2 : Generate “Intelligent Collisions” SLOW DOWN The way is clear  Attacker: insider, malicious, active 9

Attack 3: Cheating with identity, speed, or position Wasn’t me!  Attacker: insider, rational, active 10

Attack 4: Jamming 11

Attack 5: Tunnel 12

Attack 6: Tracking 13

Our scope  We consider communications specific to road traffic: safety and traffic optimization Safety-related messages Messages related to traffic information  We do not focus on more generic applications, e.g., toll collect, access to audio/video files, games,… 14

Security system requirements  Sender authentication  Verification of data consistency  Availability  Non-repudiation  Privacy  Real-time constraints 15

Security Architecture 16

Tamper-proof device  Each vehicle carries a tamper-proof device Contains the secrets of the vehicle itself Has its own battery Has its own clock (notably in order to be able to sign timestamps) Is in charge of all security operations Is accessible only by authorized personnel Tamper-proof device Vehicle sensors (GPS, speed and acceleration,…) On-board CPU Transmission system ((( ))) 17

Digital signatures  Symmetric cryptography is not suitable: messages are standalone, large scale, non-repudiation requirement  Hence each message should be signed with a DS  Liability-related messages should be stored in the EDR 18

VPKI (Vehicular PKI) PKI Security services Positioning Confidentiality Privacy... CA P A P B Authentication Shared session key  Each vehicle carries in its Tamper-Proof Device (TPD): A unique and certified identity: Electronic License Plate (ELP) A set of certified anonymous public/private key pairs  Mutual authentication can be done without involving a server  Authorities (national or regional) are cross-certified 19

The CA hierarchy: two options Car A Car B Car A Car B Manuf. 1 Manuf Governmental Transportation Authorities 2. Manufacturers  The governments control certification  Long certificate chain  Keys should be recertified on borders to ensure mutual certification  Vehicle manufacturers are trusted  Only one certificate is needed  Each car has to store the keys of all vehicle manufacturers 20

Secure VC Building Blocks  Authorities Trusted entities issuing and managing identities and credentials 21

Secure VC Building Blocks  Authorities Hierarchical organization ‘Forest’ 22

Secure VC Building Blocks (cont’d) Roadside Unit ‘Re-filling’ with or obtaining new credentials Providing revocation information Roadside Unit Wire-line Connections  Identity and Credentials Management 23

Anonymous keys  Preserve identity and location privacy  Keys can be preloaded at periodic checkups  The certificate of V’s i th key:  Keys renewal algorithm according to vehicle speed (e.g., ≈ 1 min at 100 km/h)  Anonymity is conditional on the scenario  The authorization to link keys with ELPs is distributed 24

What about privacy: how to avoid the Big Brother syndrome? At 3:00 - Vehicle A spotted at position P1 At 3:15 - Vehicle A spotted at position P2  Keys change over time  Liability has to be enforced  Only law enforcement agencies should be allowed to retrieve the real identities of vehicles (and drivers) 25

DoS resilience  Vehicles will probably have several wireless technologies onboard  In most of them, several channels can be used  To thwart DoS, vehicles can switch channels or communication technologies  In the worst case, the system can be deactivated Network layer DSRC UTRA-TDD Bluetooth Other 26

Data verification by correlation  Bogus info attack relies on false data  Authenticated vehicles can also send wrong data (on purpose or not)  The correctness of the data should be verified => data-centric trust  Correlation can help 27

Security analysis  How much can we secure VANETs?  Messages are authenticated by their signatures  Authentication protects the network from outsiders  Correlation and fast revocation reinforce correctness  Availability remains a problem that can be alleviated  Non-repudiation is achieved because: ELP and anonymous keys are specific to one vehicle Position is correct if secure positioning is in place 28

Certificate revocation in VANETs  The CA has to revoke invalid certificates: Compromised keys Wrongly issued certificates A vehicle constantly sends erroneous information  Using Certificate Revocation Lists (CRL) or online status checking is not appropriate  There is a need to detect and revoke attackers fast 29

System model  There is a CA (Certification Authority)  Each vehicle has a public/private key pair, a TC (Trusted Component = TPD), and an EDR (Event Data Recorder)  Safety messages: Are broadcast and signed Include time and position  Several possible communication channels: DSRC Cellular WiMax Low-speed FM 30

Adversary model  The adversary can be: Faulty node Misbehaving node  Example attack: false information dissemination  Adversaries have valid credentials  Honest majority in the attacker’s neighborhood 31

Message validation TPD (Tamper-Proof Device) RTC (Rev. of the Trusted Component ) LEAVE (Local Eviction of Attackers by Voting Evaluators) MDS (Misbehavior Detection System) Evidence Collection Revocation Information CA (Certification Authority) and Infrastructure Functionality Fail (ID) Revocation Decision RC 2 RL (Rev. by Compressed CRLs) Node ID Vehicle Functionality CA Policies Local Warning Messages Revocation Command Scheme overview 32

Revocation protocols  We propose 2 protocols to revoke a vehicle’s keys: Rev. of the Trusted Component (RTC): CA revokes all keys Rev. by Compressed CRLs (RC2RL): if TC is not reachable  Local Eviction of Attackers by Voting Evaluators (LEAVE): Initiated by peers Generates a report to the CA, which triggers the actual revocation by RTC/RC2RL 33

Revocation of the Trusted Component (RTC) 34 RSU: Road Side Unit; PuK = Public Key; T = Timestamp

Revocation by Compressed CRLs (RC2RL)  CRLs are compressed using Bloom filters  Bloom filter: space-efficient probabilistic data-structure Can be queried to check if an element is in a set or not Configurable rate of false positives (but no false negatives) 123m vector with m bits element “a” k different hash functions with range 1…m … H 1 (a)H 2 (a)H k (a)…

Local Eviction of Attackers by Voting Evaluators (LEAVE) 36

Data-Centric Trust 37 Data Trust Decision on event

What is Data-Centric Trust?

Data-Centric Trust in Networks  Packet forwarding  Security associations  Reputation A M B Data dissemination Insufficient Hard 39 Traditional ad hoc networks Ephemeral networks Data Trust = Entity TrustData Trust = F(Entity Trust, context)

Event-specific trust Dynamic trust metric Security status A C B M General Framework Trust Computation Weights (data-centric trust levels) is the default trustworthiness Location Time Event reports of type from nodes

A C B M General Framework Evidence Evaluation Decision Logic Decision on Reported Event Report contents Event reports of type from nodes

Decision Logics  Most trusted report  Weighted voting  Bayesian inference Takes into account prior knowledge  Dempster-Shafer Theory probability is bounded by belief and plausibility Uncertainty (lack of evidence) does not refute nor support evidence

Conclusion  Vehicular communications could lead to the largest mobile ad hoc network (around 1 billion nodes)  The security of that network is a difficult and highly relevant problem  Car manufacturers seem to be poised to massively invest in this area  Slow penetration makes connectivity more difficult  Security leads to a substantial overhead and must be taken into account from the beginning of the design process  The field offers plenty of novel research challenges  Pitfalls Defer the design of security Security by obscurity  More information at 43