VANET Privacy Protocol

Post on 16-Aug-2015

22 views 3 download

Tags:

Transcript of VANET Privacy Protocol

1

VANET Location Privacy

Dummy Event Overhead and CongestionRISALATUL HOQUE & JOHNATHAN COX (ADVISOR: GEORGE CORSER)

2

Road MapVANET, privacy and congestion/overhead

Security (Privacy) Concerns

Vehicular Network Concerns

VANET protocols

VANET privacy protocols

Location privacy theory

Vehicle Mobility and Location Privacy

Dummy Event Methods

3

VANET, privacy and congestion/overhead

VANET: Vehicular Ad-hoc Network◦ Designed primarily for safety◦ Will also assist with traffic management and

perhaps infotainment

Why is privacy a problem?◦ US DOT is expected to require that ALL cars have

this technology installed and anyone with access to antenna could monitor/track a car

Why is congestion/overhead a problem?◦ If cars send fake messages (“dummy events”)

then it will add more “spam” communications to the system

Image source: http://adrianlatorre.com/projects/pfc/img/vanet_full.jpg

4

Security (Privacy) Concerns Forgery

Jamming (or DOS)

In-transit traffic tampering

Impersonation

On-board tampering

Privacy violation Ensuring liability Protecting personal identifiable information Location privacy

Security (Privacy)

Vehicular Network

[Source: Raya et al. and Lu et al.]

5

Vehicular Network Concerns Idiosyncrasies of VANETs

Efficiency

Throughput

Latency

Overhead / Congestion Security (Privacy)

Vehicular Network

[Source: Kenney paper]

6

VANET protocols WSMP: WAVE Short Message Protocol

WAVE: Wireless Access in Vehicular Environments

DSRC: Dedicated Short Range Communications

TMS

Dummy Event Techniques

Could congest WSMP

7

VANET privacy protocolsMIX ZONES (BERESFORD & STAJANO) GROUP MODEL (SAMPIGETHAYA)

Problems with group model: (a) How do group member stay in

range of group leader?(b) Even while in range, what is

the distance between anonymity set members?

(c) if all group members relay through group leader, what is

congestion?(d) how do members join/leave,

group and how does this affect privacy/overhead/congestion?

8

Location privacy theory Hiding Events

Obfuscation

Anonymization

Adding Dummy Events

[Source: Shokri et al.]

9

Vehicle Mobility and Location Privacy

Image source: http://gmsf.sourceforge.net/screenshot.png

How can vehicles achieve privacy if there are no nearby

vehicles to mix with?

10

Dummy Event Methods Naïve Dummy Event: One car sends two messages: One real, one fake.

Dummy Event Undetectable by RSU: Two cars send messages: One car sends the real one, the other car sends a fake one. Car 1 remains anonymized no matter how far it travels from Car 2.

Problems: Additional Overhead, Congestion. In case of group model, also the problem of communication range.

11

Next Step: SimulationK: The Anonymity Set

D: Distance Deviation

T: Anonymity Time

Performance & Efficiency

Congestion & Overhead

12

The End

Image Source: http://ultimatehealthandage.com/wp-content/uploads/2013/09/Depositphotos_TheEnd.jpg