Secure Communication with Privacy Preservation in VANET
-
Upload
ankit-gupta -
Category
Documents
-
view
721 -
download
1
description
Transcript of Secure Communication with Privacy Preservation in VANET
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Secure Communication with PrivacyPreservation in VANET
Ankit GuptaM.Tech 2nd YearReg. No. 2011IS20
Department of Computer Science and EngineeringMotilal Nehru National Institute of Technology Allahabad
November 19, 2012
November 19, 2012 Department of Computer Science and Engineering 1/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Outline
1 Introduction
2 Motivation
3 Related Works
4 PACP [2]
5 Secure Communication in VANETs with Self-GeneratedPseudonym Mechanism [3]
6 Observations and Comparisons
7 Conclusion
8 References
November 19, 2012 Department of Computer Science and Engineering 2/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Introduction
Ad-Hoc Network
Vehicular Ad-Hoc Network (VANET)
Need of VANETs
Privacy Preservation in VANETs
November 19, 2012 Department of Computer Science and Engineering 3/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Motivation
Tracking mechanisms are getting advanced.
Adversary can track a vehicle by observing itscommunication and movement patterns.
Preserving privacy and anonymous communication insidethe VANET is a double-edged feature.
Vehicles in VANET need conditional privacy.
November 19, 2012 Department of Computer Science and Engineering 4/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Related Works
Research works on authentication to ensure security inVANET [5, 6].
Vehicle Safety Communication Project (VSC) [7].
Efficient Conditional Privacy Preservation (ECPP)Protocol [4].
Public Key Infrastructure (PKI) is used in most of theschemes designed for anonymity in VANET.
Existing schemes are not truly anonymous.
November 19, 2012 Department of Computer Science and Engineering 5/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
First Candidate Solution: PACP: An EfficientPseudonymous Authentication-Based Conditional Privacy
Protocol [2].
November 19, 2012 Department of Computer Science and Engineering 6/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Background Concepts
Conditional Privacy
Bilinear Mapping [1]
Identity-Based Encryption [1]
Elliptic Curve Discrete Logarithmic Problem (ECDLP)
November 19, 2012 Department of Computer Science and Engineering 7/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Network Model for VANET
Figure: Network Model for VANET[2].
November 19, 2012 Department of Computer Science and Engineering 8/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Notations used in PACP and Publicly knownsystem parameters
Notation DescriptionID The Identity of the vehicleRi The Identity of RSU Ri (also its public key)SRi
The Private key of RSU Ri
RTH Threshold value of the RSUCertRi
Identity-based Certificate of RSU Ri
SIG(M; K) ECC-based signature of using key K.PMVD The Public Key of the MVDSMVD The Private Key of the MVDM MessageC Ciphertext
Table: Notations used in PACP.
e : G1 × G1 → G2 Mapping from an additive group G1 to a multiplicative group G2PεG1 P is a generator of G1PMVD = αP Public Key of MVDH : G1 → (0, 1)n H, H1, H2 are publicly known hash functionsH1 : G2 → (0, 1)n
H2 : (0, 1)n × (0, 1)n → (0, 1)n
Table: Publicly known system parameters.
November 19, 2012 Department of Computer Science and Engineering 9/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
PACP Protocols
Registration Protocol
Generation Protocol
Extraction Protocol
Figure: State transition diagram for pseudonym generation inPACP[2].
November 19, 2012 Department of Computer Science and Engineering 10/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Anonymous Communication in PACP
Encryption Protocol
Decryption Protocol
Revocation Protocol
November 19, 2012 Department of Computer Science and Engineering 11/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Second Candidate Solution: Secure Communication inVANETs with Self-Generated Pseudonym Mechanism [3].
November 19, 2012 Department of Computer Science and Engineering 12/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Background Concepts
Identity-Based Encryption
Authorization Server
Vehicle
November 19, 2012 Department of Computer Science and Engineering 13/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Notations used in second candidate solution
Notation DescriptionPRX /PUX Private/Public key of a vehicle X, X ∈ AS,V.α Pseudonym of vehicle broadcastinge() Weil pairing map⊕ Operator of cyclic additive group G1a · R R self adding a times, R ∈ G1⊗ Operator of cyclic multiplicative group G2tsv Timestamp of vehicle V.Ek (m) Symmetrical encryption by using the secret key k to
encrypt the message m.
Table: Notations used in second candidate solution.
November 19, 2012 Department of Computer Science and Engineering 14/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Different Phases
Broadcasting Phase
Message Authentication Phase
Revoking Vehicle Phase
Online Secret Key Renewal Phase
Recovering Identity Phase
November 19, 2012 Department of Computer Science and Engineering 15/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Observations from first candidate solution
Hardness of ECDLP
BLS Short Signature and Encryption
Generation and Decryption Protocols
Secure against linking attacks
Multiple Pseudonyms
November 19, 2012 Department of Computer Science and Engineering 16/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Observations from second candidate solution
Hardness of ECDLP
Authentication
Anonymity
Unlinkability
Non-Repudiation
November 19, 2012 Department of Computer Science and Engineering 17/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Comparison of both the solutions with ECPP
First Solution[2]
Second Solu-tion [3]
ECPP [4]
Authentication YES YES YESAnonymity YES YES YESUnlinkability YES YES NOTraceability YES YES YESIntegrity YES YES YESNon-Repudiation YES YES YESRevoking Vehicle FASTER FAST SLOWResisting Replay Attack YES YES YESResisting ImpersonationAttack
YES YES YES
Table: Security comparisons.
November 19, 2012 Department of Computer Science and Engineering 18/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Comparison of both the candidate solutions
First Solution[2] Second Solution[3]Pseudonym Generation Done at vehicle by communicat-
ing with RSU each time.Done at vehicle by communi-cating with the AuthorizationServer only once.
Vehicle’s Registration Done Offline. Vehicle to bephysically present at MVD.
Done Online. Registers atAuthorization Server via securechannel.
Load at RSU MORE LESSCommunication Overhead inNetwork
MORE LESS
Extent of Anonymity SAME SAMEResisting Compromised RSU at-tack
YES NO
Secret Keys of Vehicle STATIC DYNAMIC
Table: Comparison of two candidate solutions.
November 19, 2012 Department of Computer Science and Engineering 19/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
Conclusion
Different sides of the same coin.
Aims towards achieving anonymous communication withconditional privacy in VANET.
Second solution is an improvement over the first one insome respect.
Both can be merged to generate a better and efficientsolution.
November 19, 2012 Department of Computer Science and Engineering 20/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
References I
Boneh, D., and Franklin, M.Identity-based encryption from the weil pairing.SIAM J. Comput. 32, 3 (Mar. 2003), 586–615.
Huang, D., Misra, S., Verma, M., and Xue, G.Pacp: An efficient pseudonymous authentication-basedconditional privacy protocol for vanets.Intelligent Transportation Systems, IEEE Transactions on12, 3 (sept. 2011), 736 –746.
November 19, 2012 Department of Computer Science and Engineering 21/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
References II
Hwang, R. J., Hsiao, Y.-K., and Liu, Y.-F.Secure communication scheme of vanet with privacypreserving.In Parallel and Distributed Systems (ICPADS), 2011 IEEE17th International Conference on (dec. 2011), pp. 654–659.
Lu, R., Lin, X., Zhu, H., Ho, P.-H., and Shen, X.Ecpp: Efficient conditional privacy preservation protocol forsecure vehicular communications.In INFOCOM 2008. The 27th Conference on ComputerCommunications. IEEE (april 2008), pp. 1229 –1237.
November 19, 2012 Department of Computer Science and Engineering 22/23
Outline
Introduction
Motivation
Related Works
PACP [2]
Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]
ObservationsandComparisons
Conclusion
References
References III
Raya, M., and Hubaux, J.-P.Securing vehicular ad hoc networks.J. Comput. Secur. 15, 1 (Jan. 2007), 39–68.
Raya, M., Papadimitratos, P., and Hubaux, J.-P.Securing vehicular communications.Wireless Communications, IEEE 13, 5 (october 2006), 8–15.
US Department of Transportation, N. H. T.S. A.Vehicle safety communication projects-final report.,January 2008.
November 19, 2012 Department of Computer Science and Engineering 23/23