23
Outline Introduction Motivation Related Works PACP [2] Secure Com- munication in VANETs with Self-Generated Pseudonym Mechanism [3] Observations and Comparisons Conclusion References Secure Communication with Privacy Preservation in VANET Ankit Gupta M.Tech 2 nd Year Reg. No. 2011IS20 Department of Computer Science and Engineering Motilal Nehru National Institute of Technology Allahabad November 19, 2012 November 19, 2012 Department of Computer Science and Engineering 1/23

Secure Communication with Privacy Preservation in VANET

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Secure Communication with PrivacyPreservation in VANET

Ankit GuptaM.Tech 2nd YearReg. No. 2011IS20

Department of Computer Science and EngineeringMotilal Nehru National Institute of Technology Allahabad

November 19, 2012

November 19, 2012 Department of Computer Science and Engineering 1/23

Page 2: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Outline

1 Introduction

2 Motivation

3 Related Works

4 PACP [2]

5 Secure Communication in VANETs with Self-GeneratedPseudonym Mechanism [3]

6 Observations and Comparisons

7 Conclusion

8 References

November 19, 2012 Department of Computer Science and Engineering 2/23

Page 3: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Introduction

Ad-Hoc Network

Vehicular Ad-Hoc Network (VANET)

Need of VANETs

Privacy Preservation in VANETs

November 19, 2012 Department of Computer Science and Engineering 3/23

Page 4: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Motivation

Tracking mechanisms are getting advanced.

Adversary can track a vehicle by observing itscommunication and movement patterns.

Preserving privacy and anonymous communication insidethe VANET is a double-edged feature.

Vehicles in VANET need conditional privacy.

November 19, 2012 Department of Computer Science and Engineering 4/23

Page 5: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Related Works

Research works on authentication to ensure security inVANET [5, 6].

Vehicle Safety Communication Project (VSC) [7].

Efficient Conditional Privacy Preservation (ECPP)Protocol [4].

Public Key Infrastructure (PKI) is used in most of theschemes designed for anonymity in VANET.

Existing schemes are not truly anonymous.

November 19, 2012 Department of Computer Science and Engineering 5/23

Page 6: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

First Candidate Solution: PACP: An EfficientPseudonymous Authentication-Based Conditional Privacy

Protocol [2].

November 19, 2012 Department of Computer Science and Engineering 6/23

Page 7: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Background Concepts

Conditional Privacy

Bilinear Mapping [1]

Identity-Based Encryption [1]

Elliptic Curve Discrete Logarithmic Problem (ECDLP)

November 19, 2012 Department of Computer Science and Engineering 7/23

Page 8: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Network Model for VANET

Figure: Network Model for VANET[2].

November 19, 2012 Department of Computer Science and Engineering 8/23

Page 9: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Notations used in PACP and Publicly knownsystem parameters

Notation DescriptionID The Identity of the vehicleRi The Identity of RSU Ri (also its public key)SRi

The Private key of RSU Ri

RTH Threshold value of the RSUCertRi

Identity-based Certificate of RSU Ri

SIG(M; K) ECC-based signature of using key K.PMVD The Public Key of the MVDSMVD The Private Key of the MVDM MessageC Ciphertext

Table: Notations used in PACP.

e : G1 × G1 → G2 Mapping from an additive group G1 to a multiplicative group G2PεG1 P is a generator of G1PMVD = αP Public Key of MVDH : G1 → (0, 1)n H, H1, H2 are publicly known hash functionsH1 : G2 → (0, 1)n

H2 : (0, 1)n × (0, 1)n → (0, 1)n

Table: Publicly known system parameters.

November 19, 2012 Department of Computer Science and Engineering 9/23

Page 10: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

PACP Protocols

Registration Protocol

Generation Protocol

Extraction Protocol

Figure: State transition diagram for pseudonym generation inPACP[2].

November 19, 2012 Department of Computer Science and Engineering 10/23

Page 11: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Anonymous Communication in PACP

Encryption Protocol

Decryption Protocol

Revocation Protocol

November 19, 2012 Department of Computer Science and Engineering 11/23

Page 12: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Second Candidate Solution: Secure Communication inVANETs with Self-Generated Pseudonym Mechanism [3].

November 19, 2012 Department of Computer Science and Engineering 12/23

Page 13: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Background Concepts

Identity-Based Encryption

Authorization Server

Vehicle

November 19, 2012 Department of Computer Science and Engineering 13/23

Page 14: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Notations used in second candidate solution

Notation DescriptionPRX /PUX Private/Public key of a vehicle X, X ∈ AS,V.α Pseudonym of vehicle broadcastinge() Weil pairing map⊕ Operator of cyclic additive group G1a · R R self adding a times, R ∈ G1⊗ Operator of cyclic multiplicative group G2tsv Timestamp of vehicle V.Ek (m) Symmetrical encryption by using the secret key k to

encrypt the message m.

Table: Notations used in second candidate solution.

November 19, 2012 Department of Computer Science and Engineering 14/23

Page 15: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Different Phases

Broadcasting Phase

Message Authentication Phase

Revoking Vehicle Phase

Online Secret Key Renewal Phase

Recovering Identity Phase

November 19, 2012 Department of Computer Science and Engineering 15/23

Page 16: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Observations from first candidate solution

Hardness of ECDLP

BLS Short Signature and Encryption

Generation and Decryption Protocols

Secure against linking attacks

Multiple Pseudonyms

November 19, 2012 Department of Computer Science and Engineering 16/23

Page 17: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Observations from second candidate solution

Hardness of ECDLP

Authentication

Anonymity

Unlinkability

Non-Repudiation

November 19, 2012 Department of Computer Science and Engineering 17/23

Page 18: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Comparison of both the solutions with ECPP

First Solution[2]

Second Solu-tion [3]

ECPP [4]

Authentication YES YES YESAnonymity YES YES YESUnlinkability YES YES NOTraceability YES YES YESIntegrity YES YES YESNon-Repudiation YES YES YESRevoking Vehicle FASTER FAST SLOWResisting Replay Attack YES YES YESResisting ImpersonationAttack

YES YES YES

Table: Security comparisons.

November 19, 2012 Department of Computer Science and Engineering 18/23

Page 19: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Comparison of both the candidate solutions

First Solution[2] Second Solution[3]Pseudonym Generation Done at vehicle by communicat-

ing with RSU each time.Done at vehicle by communi-cating with the AuthorizationServer only once.

Vehicle’s Registration Done Offline. Vehicle to bephysically present at MVD.

Done Online. Registers atAuthorization Server via securechannel.

Load at RSU MORE LESSCommunication Overhead inNetwork

MORE LESS

Extent of Anonymity SAME SAMEResisting Compromised RSU at-tack

YES NO

Secret Keys of Vehicle STATIC DYNAMIC

Table: Comparison of two candidate solutions.

November 19, 2012 Department of Computer Science and Engineering 19/23

Page 20: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

Conclusion

Different sides of the same coin.

Aims towards achieving anonymous communication withconditional privacy in VANET.

Second solution is an improvement over the first one insome respect.

Both can be merged to generate a better and efficientsolution.

November 19, 2012 Department of Computer Science and Engineering 20/23

Page 21: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

References I

Boneh, D., and Franklin, M.Identity-based encryption from the weil pairing.SIAM J. Comput. 32, 3 (Mar. 2003), 586–615.

Huang, D., Misra, S., Verma, M., and Xue, G.Pacp: An efficient pseudonymous authentication-basedconditional privacy protocol for vanets.Intelligent Transportation Systems, IEEE Transactions on12, 3 (sept. 2011), 736 –746.

November 19, 2012 Department of Computer Science and Engineering 21/23

Page 22: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

References II

Hwang, R. J., Hsiao, Y.-K., and Liu, Y.-F.Secure communication scheme of vanet with privacypreserving.In Parallel and Distributed Systems (ICPADS), 2011 IEEE17th International Conference on (dec. 2011), pp. 654–659.

Lu, R., Lin, X., Zhu, H., Ho, P.-H., and Shen, X.Ecpp: Efficient conditional privacy preservation protocol forsecure vehicular communications.In INFOCOM 2008. The 27th Conference on ComputerCommunications. IEEE (april 2008), pp. 1229 –1237.

November 19, 2012 Department of Computer Science and Engineering 22/23

Page 23: Secure Communication with Privacy Preservation in VANET

Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]

ObservationsandComparisons

Conclusion

References

References III

Raya, M., and Hubaux, J.-P.Securing vehicular ad hoc networks.J. Comput. Secur. 15, 1 (Jan. 2007), 39–68.

Raya, M., Papadimitratos, P., and Hubaux, J.-P.Securing vehicular communications.Wireless Communications, IEEE 13, 5 (october 2006), 8–15.

US Department of Transportation, N. H. T.S. A.Vehicle safety communication projects-final report.,January 2008.

November 19, 2012 Department of Computer Science and Engineering 23/23