 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.

Slides:



Advertisements
Similar presentations
Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Advertisements

Internet Protocol Security (IP Sec)
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
By Md Emran Mazumder Ottawa University Student no:
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
Chapter 11: Cryptography
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Lecture 2: Security Rachana Ananthakrishnan Argonne National Lab.
Public Key Management and X.509 Certificates
1 Key Management for Vehicular Networks Maxim Raya and Jean-Pierre Hubaux Secure Vehicular Communications Workshop EPFL - 19/05/2015.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Mini-Project 2006 Secure positioning in vehicular networks based on map sharing with radars Mini-Project IC-29 Self-Organized Wireless and Sensor Networks.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Chapter 21 Distributed System Security Copyright © 2008.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Prof. J.-P. Hubaux Mobile Networks Module I – Part 2 Securing Vehicular Networks 1.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Fall 2006CS 395: Computer Security1 Key Management.
Eyal Hamo Berry Shnaider בס " ד 1.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Presented by Edith Ngai MPhil Term 3 Presentation
VANET.
Message Digest Cryptographic checksum One-way function Relevance
Presentation transcript:

 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates

 Bogus information attack Adversaries send bogus information to influence decisions of other drivers.  Disrupt the VANET (Denial of Service) Attacker sends too many messages and jams the wireless channel.  Vehicle Tracking  Masquerading Attacker pretends to be another driver by using fake identities with malicious objectives.

Attacker reports a non-existing jam for better driving condition to himself

Attacker track another vehicle for malicious objectives

 Time sensitivity & dynamic topology Vehicles move at a fast rate.  Scalability and high density Extremely large amount of network entities  Adaptive privacy Diverse privacy degrees. Users can choose their own privacy degree.  Real-time response

 Some users misbehave or have malfunctioning equipment  Such entities should be EXCLUDED from the network in order to limit the damage caused by them

 signatures authentication › Stops malicious parties from impersonating OBUs or RSUs › Identifies misbehaving or malfunctioning vehicles  signatures verification › Prevent creation of fake vehicles › Easy removal of destroyed or misbehaving OBUs

 vehicle registration and certificate issuance  key distribution  key renewal  vehicle revocation

 Tamper-Proof Device (TPD): possesses cryptographic processing capabilities. Main responsible: 1: store cryptographic material. 2: perform cryptographic procedure. 3: sign and verify safety messages. Tamper-proof device Vehicle sensors (GPS, speed and acceleration,…) On-board CPU Transmission system ((( )))

Symmetric Approach  Online central server required  each communication require a session establishment Due to lack of a reliable online connection this approach is not suitable for VANET - messages are standalone & large scale

Public Key Approach binding public keys to corresponding identities using certificate authority Each message should :  signed with a digital signature  achieve mutual authentication without involving a server Public Key Infrastructure is the answer…….

 Safety data should be bound to vehicles certificates, In order to distinct trusted vehicles and exclude untrusted vehicles  The goal of a certificate Invalidation is to remove an untrusted vehicle. - This process is called revocation. * Multiple certificates can be bound to one vehicle

 Certificate Authorities (CAs)  CA issues certified public/private key pairs to vehicles.  The different CAs should be synchronized. Vehicles from different countries or  The preferred way: Nodes generate the key pairs and provide only the public key to CA, which will issue a certificate

Car A Car B Governmental Transportation Authorities  Governments control certification  Long certificate chain  Keys are re-certified on borders to ensure mutual certification  OBUs near each other update simultaneously  OBU needs to update its key to operate in a new region

Car A Car B Manuf. 1 Manuf. 2 Manufacturers Authorities  Vehicle manufacturers can be trusted  Only one certificate is needed  Each car has to store the keys of all vehicle manufacturers

 To authenticate each other, vehicles will sign each message with their private key and attach the corresponding CA’s certificate.  When another vehicle receives this message, it verifies the key used to sign the message and once this is done correctly, it verifies the message.

 A certificate is a vehicle’s public key and ID, signed by the CA:  Certificate = Sig-CA (PK || ID), PK, ID

 There are 4 parts:  1: message header;  2: the certificate;  3: message payload;  4:the signature of the signed message.

 Security protocols adds overhead to data transferred  Certificate are twice as large as signatures  Optimizing the distribution mechanism is a proper means of considerably reducing the over-the-air bandwidth overhead

 1–1 : Two communicating nodes will possibly establish a session. - certificates exchanged during session setup  1–n : Single node broadcasts to many nodes, without establishing a session - receiver needs to obtain the sender’s certificate before verifying the message - Sender attach its certificate to each message.

 a unique digest that can easily be computed, by applying a hash function to the certificate. When received a certificate : 1. Check If received the certificate digest in the past 2. If not : Verify Certificate 3. If verified: Store Certificate digest

 Periodic Broadcast certificate is sent in a piggy-back fashion together with a message  Certificate on demand send certificate only when not stored locally on the receiver’s side  Hybrid Certificate broadcast certificate on demand by default, until no certificate is demanded for a certain amount of time