Download presentation
Presentation is loading. Please wait.
Published byCaroline Ellis Modified over 8 years ago
2
Attacks and threats Security challenge & Solution Communication Infrastructure The CA hierarchy Vehicular Public Key Certificates
4
Bogus information attack Adversaries send bogus information to influence decisions of other drivers. Disrupt the VANET (Denial of Service) Attacker sends too many messages and jams the wireless channel. Vehicle Tracking Masquerading Attacker pretends to be another driver by using fake identities with malicious objectives.
5
Attacker reports a non-existing jam for better driving condition to himself
6
Attacker track another vehicle for malicious objectives
8
Time sensitivity & dynamic topology Vehicles move at a fast rate. Scalability and high density Extremely large amount of network entities Adaptive privacy Diverse privacy degrees. Users can choose their own privacy degree. Real-time response
9
Some users misbehave or have malfunctioning equipment Such entities should be EXCLUDED from the network in order to limit the damage caused by them
10
signatures authentication › Stops malicious parties from impersonating OBUs or RSUs › Identifies misbehaving or malfunctioning vehicles signatures verification › Prevent creation of fake vehicles › Easy removal of destroyed or misbehaving OBUs
11
vehicle registration and certificate issuance key distribution key renewal vehicle revocation
12
Tamper-Proof Device (TPD): possesses cryptographic processing capabilities. Main responsible: 1: store cryptographic material. 2: perform cryptographic procedure. 3: sign and verify safety messages. Tamper-proof device Vehicle sensors (GPS, speed and acceleration,…) On-board CPU Transmission system ((( )))
14
Symmetric Approach Online central server required each communication require a session establishment Due to lack of a reliable online connection this approach is not suitable for VANET - messages are standalone & large scale
15
Public Key Approach binding public keys to corresponding identities using certificate authority Each message should : signed with a digital signature achieve mutual authentication without involving a server Public Key Infrastructure is the answer…….
16
Safety data should be bound to vehicles certificates, In order to distinct trusted vehicles and exclude untrusted vehicles The goal of a certificate Invalidation is to remove an untrusted vehicle. - This process is called revocation. * Multiple certificates can be bound to one vehicle
18
Certificate Authorities (CAs) CA issues certified public/private key pairs to vehicles. The different CAs should be synchronized. Vehicles from different countries or The preferred way: Nodes generate the key pairs and provide only the public key to CA, which will issue a certificate
19
Car A Car B Governmental Transportation Authorities Governments control certification Long certificate chain Keys are re-certified on borders to ensure mutual certification OBUs near each other update simultaneously OBU needs to update its key to operate in a new region
20
Car A Car B Manuf. 1 Manuf. 2 Manufacturers Authorities Vehicle manufacturers can be trusted Only one certificate is needed Each car has to store the keys of all vehicle manufacturers
23
To authenticate each other, vehicles will sign each message with their private key and attach the corresponding CA’s certificate. When another vehicle receives this message, it verifies the key used to sign the message and once this is done correctly, it verifies the message.
28
A certificate is a vehicle’s public key and ID, signed by the CA: Certificate = Sig-CA (PK || ID), PK, ID
29
There are 4 parts: 1: message header; 2: the certificate; 3: message payload; 4:the signature of the signed message.
30
Security protocols adds overhead to data transferred Certificate are twice as large as signatures Optimizing the distribution mechanism is a proper means of considerably reducing the over-the-air bandwidth overhead
31
1–1 : Two communicating nodes will possibly establish a session. - certificates exchanged during session setup 1–n : Single node broadcasts to many nodes, without establishing a session - receiver needs to obtain the sender’s certificate before verifying the message - Sender attach its certificate to each message.
32
a unique digest that can easily be computed, by applying a hash function to the certificate. When received a certificate : 1. Check If received the certificate digest in the past 2. If not : Verify Certificate 3. If verified: Store Certificate digest
33
Periodic Broadcast certificate is sent in a piggy-back fashion together with a message Certificate on demand send certificate only when not stored locally on the receiver’s side Hybrid Certificate broadcast certificate on demand by default, until no certificate is demanded for a certain amount of time
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.