57
Urban defense using mobile sensor platforms: surveillance, protection and privacy Homeland Security Workshop, Baia, Naples Sept 21, 2009 Mario Gerla Computer Science Dept, UCLA www.cs.ucla.edu/NRL

Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

  • Upload
    liora

  • View
    41

  • Download
    0

Embed Size (px)

DESCRIPTION

Urban defense using mobile sensor platforms: surveillance, protection and privacy Homeland Security Workshop, Baia, Naples Sept 21, 2009. Mario Gerla Computer Science Dept, UCLA www.cs.ucla.edu/NRL. Outline. Vehicular Ad Hoc Networks (VANETs) Opportunistic ad hoc networking - PowerPoint PPT Presentation

Citation preview

Page 1: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Urban defense using mobile sensor platforms:

surveillance, protection and privacy

Homeland Security Workshop, Baia, Naples Sept 21, 2009

Mario GerlaComputer Science Dept, UCLA

www.cs.ucla.edu/NRL

Page 2: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Outline

• Vehicular Ad Hoc Networks (VANETs)– Opportunistic ad hoc networking

• V2V applications– Content distribution– Urban surveillance - MobEyes (UCLA)– MobEyes vs roadside CCTV

• Case study: tracking terrorist attack path

• Security and Privacy in urban surveillance

• UCLA CAMPUS Testbed

Page 3: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Traditional Mobile Ad Hoc Network

• Instantly deployable, re-configurable (no fixed infrastructure)

• Satisfy a “temporary” need• Mobile (eg, PDAs)

– Low energy

• Multi-hopping ( to overcome obstacles, etc.)

• Challenges: Ad hoc routing, multicast, TCP, etc

Examples: military, civilian disaster recovery

Page 4: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Vehicular Ad Hoc Network (VANET)

• No fixed infrastructure?– Several “infrastructures”: WiFi, Cellular, WiMAX, Satellite..

• “Temporary” need?– For vehicles, well defined, permanent applications

• Mobile?– YES!!! But not “energy starved”

• Multi-hop routing?– Most of the applications require broadcast or “proximity”

routing– Infrastructure offers short cuts to distant destinations– Multihop routing required only in limited situations (eg,

Katrina scenario)

• VANET => Opportunistic Ad Hoc Network– Access to Internet readily available, but..– opportunistically “bypass it” with “ad hoc” if too costly or

inadequate

Page 5: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

The Enabling Standard: DSRC / IEEE 802.11p

• Car-Car communications at 5.9Ghz

• Derived from 802.11a

• three types of channels: Vehicle-Vehicle service, a Vehicle-Roadside service and a control broadcast channel .

• Ad hoc mode; and infrastructure mode

• 802.11p: IEEE Task Group for Car-Car communications

Forward radar

Computing platform

Event data recorder (EDR)

Positioning system

Rear radar

Communication facility

Display

Page 6: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

V2V Applications

• Safe Navigation• Efficient Navigation/Commuting (ITS)

• Location Relevant Content Distr.

• Urban Sensing• Advertising, Commerce, Games, etc

Page 7: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

V2V for Safe navigation

•Forward Collision Warning, •Intersection Collision Warning…….

•Advisories to other vehicles about road perils– “Ice on bridge”, “Congestion ahead”,….

Page 8: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Car to Car communications for Safe Driving

Vehicle type: Cadillac XLRCurb weight: 3,547 lbsSpeed: 65 mphAcceleration: - 5m/sec^2Coefficient of friction: .65Driver Attention: YesEtc.

Vehicle type: Cadillac XLRCurb weight: 3,547 lbsSpeed: 45 mphAcceleration: - 20m/sec^2Coefficient of friction: .65Driver Attention: NoEtc.

Vehicle type: Cadillac XLRCurb weight: 3,547 lbsSpeed: 75 mphAcceleration: + 20m/sec^2Coefficient of friction: .65Driver Attention: YesEtc.

Vehicle type: Cadillac XLRCurb weight: 3,547 lbsSpeed: 75 mphAcceleration: + 10m/sec^2Coefficient of friction: .65Driver Attention: YesEtc.

Alert Status: None

Alert Status: Passing Vehicle on left

Alert Status: Inattentive Driver on Right

Alert Status: None

Alert Status: Slowing vehicle aheadAlert Status: Passing vehicle on left

Page 9: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

V2V for Efficient Navigation• GPS Based Navigators• Dash Express (just came to market in 2008):

• Synergy between Navigator Server and Dept of Transp

Page 10: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Location relevant content delivery

• Traffic information• Local attractions• Tourist information, etc

CarTorrent : cooperative download of location multimedia files

Page 11: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

You are driving to VegasYou hear of this new show on the radio

Video preview on the web (10MB)

Page 12: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

One option: Highway Infostation download

Internet

file

Page 13: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Incentive for opportunistic “ad hoc networking”

Problems: Stopping at gas station for full download is a

nuisance Downloading from GPRS/3G too slow and quite

expensive3G broadcast services (MBMS, MediaFLO) only for

TV

Observation: many other drivers are interested in download sharing

Solution: Co-operative P2P Downloading via Car-Torrent (like Bit Torrent in the Internet)

Page 14: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

CarTorrent: Basic Idea

Download a piece

Internet

Transferring Piece of File from Gateway

Outside Range of Gateway

Page 15: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Co-operative Download: Car Torrent

Vehicle-Vehicle Communication

Internet

Exchanging Pieces of File Later

Page 16: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Car Torrent inspired by BitTorrent: Internet P2P file downloading

Uploader/downloader

Uploader/downloader

Uploader/downloader

Uploader/downloader

TrackerUploader/downloader

Page 17: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Selection Strategy Critical

Page 18: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Simulation Results

• Completion time density

200 nodes40% popularity

Time (seconds)

Page 19: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Vehicles as Mobile Sensor Platforms

• Environment– Traffic density/congestion monitoring– Urban pollution monitoring– Pavement, visibility conditions

• Civic and Homeland security– Forensic accident or crime site investigations

– Terrorist alerts

Page 20: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Vehicular Sensor Network

VSN-enabled vehicle

Inter -vehiclecommunications

Vehicle -to-roadsidecommunications

Roadside base station

Vid e o Ch e m.

Sensors

S to ra g e

Systems

P ro c.

Page 21: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Accident Scenario: storage and retrieval

• Public/Private Cars (eg, busses, taxicabs, police, commuters, etc): – Continuously collect images on the street (store data locally)– Process the data and detect an event– Classify the event as Meta-data (Type, Option, Loc,

time,Vehicle ID)– Distribute Metadata to neighbors probabilistically (ie,

“gossip”)• Police retrieve data from public/private cars

Meta-data : Img, -. (10,10), V10

CRASH

- Sensing - P rocessing

Crash Summary Reporting

Summary Harvesting

Page 22: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Mobility-assisted Meta-data Diffusion/Harvesting

+ Broadcasting meta-data to neighbors+ Listen/store received meta-data

Periodical meta-data broadcasting

Agent harvests a set of missing meta-data from neighbors

HREQ

HREP

Page 23: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

How to store/retrieve the Metadata?

Several options:

• Upload to nearest Access Point (Dash Express; Cartel project, MIT)

• “Flood” data to all vehicles (eg, bomb threat)

• Publish/subscribe model: publish to a mobile server (eg, an “elected”vehicle)

• Distributed Hash Tables (eg, Virtual Ring Routing - Sigcomm 06)

• “Epidemic diffusion” -> our proposed approach

Page 24: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

MobEyes: Mobility-assisted Diffusion/Harvesting

• Mobeyes exploit “mobility” to disseminate meta-data!

• Source periodically broadcasts meta-data to neighbors– Only source advertises meta-data to neighbors– Neighbors store advertisements in their local

memory– Drop stale data

• A mobile agent (the police) harvests meta-data from vehicles by actively querying them (with Bloom filter)

Page 25: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Simulation Experiment

• Simulation Setup– NS-2 simulator– 802.11: 11Mbps, 250m tx range– Average speed: 5 to 25 m/s– Mobility Models

• Random waypoint (RWP) • Real-track model (RT) :

– Group mobility model– merge and split at intersections

• Westwood map

Page 26: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Meta-data harvesting delay with RWP

• Higher mobility decreases harvesting delay

Time (seconds)

Nu

mbe

r of

Har

vest

ed S

um

mar

ies V=25m/s

V=5m/s

Page 27: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Harvesting Results with “Real Track”

• Restricted mobility results in larger delay

Time (seconds)

Nu

mbe

r of

Har

vest

ed S

um

mar

ies V=25m/s

V=5m/s

Page 28: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Urban Surveillance via CCTV

• In urban areas, the first line of defense has traditionally been fixed video cameras

• Chicago, the leader in the US:– 2,000 remote-control cameras and motion-sensing software

are planned to spot crimes or terrorist acts– 1,000 already installed at O'Hare International Airport

• A few links below:– 1. http://www.usatoday.com/news/nation/2004-09-09-

chicago-surveillance_x.htm– 2.

http://www.securityinfowatch.com/online/The-Latest/Chicago-to-Increase-Presence-of-Surveillance-Cameras-on-Streets/9578SIW306

– 3. http://blog.publiceye.silkblogs.com/City-of-Chicago.1771.category

Page 29: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

With 4 millions CCTV cameras around the country, Britain is to become the first country in the world where the movements of all vehicles on the roads are recorded.

CHICAGO — A surveillance system that uses 2,000 remote-control cameras and motion-sensing software to spot crimes or terrorist acts as they happen is being planned for the city.

Emerging City Wide Surveillance Systems

Jennifer Carlile, MSNBC

Debbie Howlett, USA TODAY

Page 30: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Urban Defense - Britain

• More than 4 million CCTV cameras operating around the country:– Britain has more video surveillance than anywhere else

in the world.– 96 cameras at Heathrow airport, 1,800 in train stations, – 6,000 on the London Underground, – 260 around parliament, – 230 used for license plate recognition in the city

center, and the dozens surveying West End streets.

• In London it's said that the average resident is viewed by 300 cameras a day.

• References http://www.msnbc.msn.com/id/5942513

http://news.independent.co.uk/uk/transport/

Page 31: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

CCTV Limitations

• CCTV surveillance has benefits:– Data centrally collected via high speed wired

infrastructure– High resolution video enables face recognition

• However:– Cameras cannot be installed at all locations– Cameras can be taken out (avoided) by terrorists– Central data collection facility can be sabotaged

• Mobile video collection/storage platforms:– Vehicles, People, Robots– Cannot be predicted, avoided, sabotaged

• Mobile “eyes” are an excellent complement to CCTV

Page 32: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Terrorist Bomb Van Tracking

• The American Embassy in Paris has been bombed by a suicide truck

• Police wants to reconstruct the approach path to uncover possible “escort” vehicles - eg conspirators who guided the VAN until the last few minutes before the attack

• Street Video cameras may not be dense enough - they may also be “avoided” by motivated terrorists

• Proposed solution: forensic investigation of civilian vehicles (unconscious witnesses)

Page 33: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Simulated Urban Scenario

– Each car reads a license plate every 2 s; it generates a 60 record summary every 120 s. • Each car continually transmits (every few

seconds) own last summary (no forwarding of summaries received by other cars)

• Average car speed: 5 to 25 m/s• Mobility Model: Random waypoint (RWP)

– Westwood map– Data Harvesting: 100 cars are “interrogated”

by single agent immediately after the attack

Page 34: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Attack Scenario map (Westwood)

Embassy

Page 35: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Uncovered time gap per monitored node

QuickTime™ and a decompressor

are needed to see this picture.

Agent monitors 100 nodes to extract their tracesLooking for “conspirators”

Page 36: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Actual vs monitored trajectory

QuickTime™ and a decompressor

are needed to see this picture.

Sample points collected by agent for the “worst” vehicle (ie, 200 s gap)

START

Embassy

Page 37: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

How secure must vehicle apps be?How secure must vehicle apps be?

• Safe navigation:– Forward collision warning – Advisories to other vehicles: ice on bridge, congestion ahead, etc

Potholes

Forward Collision Warning

Non safety applications◦ Traffic monitoring (with

navigator)◦ Pollution probing◦ Pavement conditions (e.g.,

potholes)◦ Content distribution◦ Urban surveillance

• Primary security goals: – Message integrity, secrecy and authentication

– Detect misuse by naïve or malicious drivers.

– Guarantee message sender privacy

Page 38: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Vehicular Security requirements

Sender authenticationVerification of data consistencyProtection from Denial of Service Non-repudiationPrivacy

Challenge: Real-time constraint

Page 39: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Privacy Attack: Tracking

Page 40: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

New security requirements for urban dissemination/sensing

Dissemination must be selective, private :

• Example #1: A driver wants to alert all taxicabs of company A on Washington Street between 10-11pm that convention attendees need rides

• Example #2: A Police Agent has detected a dangerous radiation leak:– He selectively warns private cars in the radiation

area ONLY (to avid panic and chaos!)– He alerts ALL paramedics and firemen in a larger

surrounding area • Example #3: FBI broadcast request to participating

cars to look for specific drivers– Operation is covered; also only vehicles with proper

equipment and going in a specific direction should be “volunteered”

Page 41: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Situation Aware Trust (SAT)Situation Aware Trust (SAT)critical for “selective” critical for “selective”

disseminationdissemination

time place

affiliation

Attribute based Trust • Situation elements are encoded into some attributes• Static attributes (affiliation)• Dynamic attributes (time and place)

Dynamic attributes can be predicted

Proactive Trust • predict dyn attributes based on mobility and location service• establish trust in advance

Attributes bootstrapped by social networks

Social Trust • Bootstrap initial trust• Transitive trust relations

Situation?

An attribute based situation example:Yellow Cab AND Taxi AND Washington Street AND 10-11pm 8/22/08

Page 42: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Security: Security: attributes attributes and and policy policy groupgroup

A driver wants to alert all taxicabs of company A on Washington Street between 10-11pm that convention attendees need rides

Extension of Attribute based Encryption (ABE) scheme [IEEE S&P 07] to incorporate dynamic access tree Attribute (companyA AND

taxi AND Washington St. AND 10-11am)

Extended ABE Module

Ciphertext

Signature

plaintext

Receivers who satisfy those encoded attributes (have the corresponding private key) can decrypt the message

Central Key Master

Page 43: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

56

Attribute-Based Encryption(ABE)Attribute-Based Encryption(ABE)

Encrypt Data with descriptive “Attributes”

Users’ Private Keys reflect Attributes and Decryption Policies

Based on Identity based Encryption and Secret Sharing; no need for “published key” (as in PKI) as long as the “attribute based policy” is known

master-key

CA/PKG

Authority is offline

Encryptw/attributessender

receiver

Page 44: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

57

Access Control via Situation-aware Policy TreeAccess Control via Situation-aware Policy Tree

MSK=Master Secret Key

SKSarah:“companyA”“10:30am”“Washtington St.”

SKKevin:“companyA”“10: 20 am”“Westwood”

AND

companyA AND

10-11 am Washington St.

Sandra thesender

Authority

Page 45: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Social Trust to overcome failuresSocial Trust to overcome failures

How are you? People like to socialize => Social trust

• Suppose infrastructure fails, e.g., Road Side Unit is attacked/destroyed

• Social network helps maintain trust– People gang up into communities– Elected Leader plays role of RSU– ie, becomes MASTER and constructs policy group (ie,

Attribute Tree)– Mobile users are situation aware– ABE based Authenticate and encrypt

Future work:◦ establish social networks securely (eg authentication of social

graph)◦ incorporate social relations into SAT: social network => dynamic

attributes

Leader

Page 46: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Do NOT hire a cab without SAT

Page 47: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

CC--VVee TTCampus - Vehicular TestbedCampus - Vehicular Testbed

E. Giordano, A. Ghosh, G. Marfia, S. Ho, J.S. Park, PhDSystem Design: Giovanni Pau, PhD

Advisor: Mario Gerla, PhD

Page 48: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

The Plan

• We plan to install our node equipment in:– 30 Campus operated vehicles (including shuttles and

facility management trucks). • Exploit “on a schedule” and “random” campus fleet mobility patterns

– 30 Commuting Vans: Measure urban pollution, traffic congestion etc

– 12 Private Vehicles: controlled motion experiments – Cross campus connectivity using 10 node Mesh (Poli

Milano).

Page 49: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

C-VeT Goals

Provide:

• A shared virtualized environment to test new protocols and applications

• Full Virtualization – MadWiFi Virtualization (with on demand exclusive use)– Multiple OS support (Linux, Windows).

Allow:• Collection of mobility traces and network statistics• Provide a platform for Urban Sensing, Geo routing etc• Deployment of innovative V2V/V2I applications

Page 50: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Preliminary Experiments

• Equipment:– 6 Cars roaming the UCLA Campus– 802.11g radios– Routing protocol: OLSR– 1 EVDO interface in the Lead Car – 1 Remote Monitor connected to the Lead Car through EVDO and Internet

• Experiments:– Connectivity map computed by OLSR– Azureus P2P application

Page 51: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Campus Initial Coverage Using MobiMesh

QuickTime™ and a decompressor

are needed to see this picture.

Page 52: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL
Page 53: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

“Instrumenting” the vehicle

Page 54: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Campus Demo: connectivity via OLSR

Page 55: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Conclusions

VANETs will play important urban surveillance role

Key research still required in several areas:

• Mobility models: – Impact data collection, dissemination, harvesting

• Network layer protocols: – Geo routing, Delay tolerant routing, Network Coding,

• Robust Applications: – Content storage, harvesting– Pollution monitoring– Emergency Networking

• Security:– Private dissemination– Situation Aware Trust

Page 56: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

The Future

• Still, lots of exciting research ahead

• And, need a testbed to validate it!– Realistic assessment of radio, mobility

characteristics– Account for user behavior – Interaction with (and support of ) the

Infrastructure– Scalability to thousands of vehicles using hybrid

simulation

• We are building C-VeT at UCLA - come and share!

Page 57: Mario Gerla Computer Science Dept, UCLA cs.ucla/NRL

Thank You!