Upgrade to Pro — share decks privately, control downloads, hide ads and more …

VANET Security

Avatar for Jaram Jaram
March 28, 2017

VANET Security

Explain about one of VANET Security

Source : Toward VANET Utopia by J Son

Avatar for Jaram

Jaram

March 28, 2017
Tweet

More Decks by Jaram

Other Decks in Programming

Transcript

  1. www.dbreed.co.kr Fundamental of VANET Kind of threat and privacy issue

    Preliminaries How it works Analysis and Conclusion CONTENTS
  2. www.dbreed.co.kr • Vehicular ad hoc network(VANET) • Created by connecting

    roadside units and vehicles embedded on-board modules • VANET vehicles collect and broadcast various data • Data include the road condition, traffic jams, accidents, abnormal weather condition etc.. • Representatively VANET has three model. But we will use reputation-based in this seminar Fundamental of VANET
  3. www.dbreed.co.kr • Message broadcasting vehicle (MBV) The MBV broadcasts to

    the other vehicles through a roadside unit or an ad-hoc network • Message evaluation vehicle (MEV) The MEV receives traffic information (TI) along with the sender’s reputation record and decides whether • Reputation management server (RMS) The RMS receives evaluation messages from the vehicles and classifies and accumulates the messages for each of the vehicles Fundamental of VANET
  4. www.dbreed.co.kr Fundamental of VANET 1. MBV Registers/ Updates Reputation Value

    (RV) 2. MBV Broadcasts TI and RV 3. MEV sends Evaluation Message (EV) 4. RMS Accumulates EV for each vehicle
  5. www.dbreed.co.kr • Attacks on privacy Adversary try get another’s ID,

    location, etc… at their broadcasting message • Attack on reputation message Same with attacks on privacy, but, attack reputation message • Attacks on evaluation message If attacker broadcast false TI, then do not update reputation value, attacker can maintain good reputation value Or attacker can try to add good evaluation message multiple times to improve its reputation record Kind of threat and privacy issue
  6. www.dbreed.co.kr • Anonymity Adversary can’t take MBV’s ID • Security

    of reputation values Reputation value must not be forged • Robustness against denial of update Adversary may try to skip reputation update process after sending unreliable information, so, we have to force to update • Robustness against reply attack Adversary may send positive or negative evaluation message multiple times for forge another’s reputation value Kind of threat and privacy issue
  7. www.dbreed.co.kr • Definition 1. Decisional Diffie-Hellman problem (DDHP) - DDHP

    states that, given and for uniformly and independently chosen a, b ∈ , the value looks a random element in -This intuitive notion is formally stated by the following two probability distributions which are computationally indistinguishable (in the security parameter, n = log(q)) : (, b, ab), where and are randomly and independently chosen from (, , ), where , , are randomly and independently chosen from • Definition 2. Bilinear map • Definition 3. Decisional bilinear Diffie-Hellman problem (DBDH) Preliminaries
  8. www.dbreed.co.kr How it works Session Session + 1 1. Registration

    - Register - Receive initial RV and certificate - Generate Pseudonyms - ( , ) Broadcasts 2. Receiving TI - Verify RV using session notification - Check 4. Update - Server accumulates for each MBV with next session secret - MBV retrieve it and update 3. Sending - Evaluate TI - Create and send (, )
  9. www.dbreed.co.kr 1. Setup • On a security parameter 1, determines

    (, , , ) • RMS generates a public/private key pair, ∈ , = • It chooses ∈ , and hash functions ∙ : 0,1 ∗ → • The global parameters are , , , , ∙ How it works
  10. www.dbreed.co.kr 2. Registration • Every vehicles have unchangeable unique ID

    • Vehicle can make pseudonym in every session with UID • A MBV generates a temporary key , picks a random number , encrypts it with the public key of RMS: ⋅ , • The MBV sends , ⋅ , to RMS as meaning of joining • If the is valid and not exist, the RMS generates a default reputation value and computes a signature of it • = , , where ∈ is session secret of current session • The RMS sends , , and { } to the vehicle. • The MBV first generates a pseudonym to preserve the privacy. The MBV computes its pseudonym , and validity information : = , = ⋅ How it works
  11. www.dbreed.co.kr 3. Broadcasting TI • MEV must be able to

    verify a validity of receiving Reputation value • The RMS manages a session and it issues a session notification value ′ = (, ⋅), where ∈ • The MBV broadcasts the TI with the pseudonym, the validity information, the reputation value, and signed reputation: , , , • A vehicle receives the TI and wants to check validity of pseudonym, it can be verified as follows: , ? = ( , ) • And then the receiving vehicle first checks the reliability of the TI using the reputation value. If it is high enough, the vehicle can verify the validity of the reputation value as follows: ′, ? = ⋅ • If the equation is valid, then the vehicle accepts the message, otherwise it rejects How it works
  12. www.dbreed.co.kr 4. Generation of evaluation messages • The MEV generates

    a evaluation message ∈ 0,1 • If the TI is reliable, = 1 but, if the TI is unreliable, = 0 • The MEV computes ( | for the integrity and sends , , , ( ||) with its reputation value to the RMS • The RMS checks validity of the evaluation message. If verified its validity, the RMS accepts the evaluation message How it works
  13. www.dbreed.co.kr 5. Reputation update • Reputation value must be updated

    without revealing the vehicle’s privacy • Find accumulated value from RMS and merge it to their reputation value • If vehicle against update, it cannot pass the verification process • Update process is : ′ = + ′ = ⋅ ⋅ = , ⋅ ⋅ ⋅ , ⋅ +1⋅ = , ⋅ +1⋅′ How it works
  14. www.dbreed.co.kr 1. Anonymity • The pseudonym-based communication provides anonymity •

    Suppose there exist pseudo random generators (PRGs) that have robustness against polynomial-size circuits. Then, a functional pseudonym created with a random number that is generated by the PRG has the polynomial-time indistinguishability under DDHP • An attacker can’t reveal target’s UID from set of pseudonyms • It is computationally difficult for the attacker who has similar level of computing ability as a normal vehicle Analysis and Conclusion
  15. www.dbreed.co.kr 2. Reputation value fraud • Every vehicle have to

    merge accumulated evaluation messages repeatedly at the reputation phase. If didn’t do it, they cannot pass the verification process • If attacker try to use another vehicle’s reputation value, attacker will be blocked unless it obtain UID or () • A reputation value which has not been updated cannot pass the verification process of the broadcasting traffic information phase Analysis and Conclusion
  16. www.dbreed.co.kr 3. Evaluation reply attack • This system can distinguish

    false evaluation messages in every evaluation messages • So RMS can assign penalty to the attackers Analysis and Conclusion
  17. www.dbreed.co.kr Conclusion • Multiple pseudonym scheme was developed for anonymity

    • Session-based management system enforce repeatedly update process • It will help determine the TI is reliable or not Analysis and Conclusion