Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen

Slides:



Advertisements
Similar presentations
Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Advertisements

GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
1 Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network University of Waterloo & University of Ontario Institute.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
University of Waterloo & UOIT & INRIA Lille Presenter: Rongxing Lu
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
WS-Denial_of_Service Dariusz Grabka M.Sc. Candidate University of Guelph February 13 th 2007.
SSH: An Internet Protocol By Anja Kastl IS World Wide Web Standards.
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
TEMPLATE DESIGN © Privacy Issues of Vehicular Ad-hoc Networks (VANETs) Hang Dok and Ruben Echevarria Advisor: Dr. Huirong.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Secure pseudonym generation for efficient broadcast authentication in VANETs Deepak N Ananth and Manjusha Gadiraju CSC / ECE 774.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Privacy Issues in Vehicular Ad Hoc Networks.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Software Firewalls © N. Ganesan, Ph.D.. Module Objectives Explore the features of a software firewall such as Zone Alarm Pro.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
Tonghong Li, Yuanzhen Li, and Jianxin Liao Department of Computer Science Technical University of Madrid, Spain Beijing University of Posts & Telecommunications.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
Preserving Privacy GPS Traces via Uncertainty-Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presenter:Yao Lu ECE 256, Spring.
Black-Burst-Based Multihop Broadcast Protocols for Vehicular Networks Gökhan Korkmaz, Eylem Ekici, and Füsun Özgüner Member, IEEE IEEE TVT 2007.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
Intrusion Resilience via the Bounded-Storage Model Stefan Dziembowski Warsaw University and CNR Pisa.
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
© 2015 Digital Rights Management in a 3G Mobile Phone and Beyond Thomas S.Messerges, Ezzat A. Dabbish ILKOO LEE.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
Presented by Edith Ngai MPhil Term 3 Presentation
Security&Privacy Considerations for IP over p OCB
VANET.
Security of In-Vehicle Software
Module 8: Securing Network Traffic by Using IPSec and Certificates
Location Cloaking for Location Safety Protection of Ad Hoc Networks
pVault Sharing Architecture
563.10: Bloom Cookies Web Search Personalization without User Tracking
When Security Games Go Green
International Collaboration Project on Information Security
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
Providing Secure Storage on the Internet
Anupam Das , Nikita Borisov
draft-ipdvb-sec-01.txt ULE Security Requirements
WAVE Enhancement Technologies
MESSAGE PROJECT CONTRIBUTION
Identity-based secure collaboration in wireless ad hoc networks
Amar B. Patel , Shushan Zhao
January 2006 doc.: IEEE wng0 January 2006
Module 8: Securing Network Traffic by Using IPSec and Certificates
Motion-Aware Routing in Vehicular Ad-hoc Networks
Chinese wall model in the internet Environment
Norfolk State University Department of Computer Science Colloquium
Developing Vehicular Data Cloud Services in the IoT Environment
Security in SDR & cognitive radio
Introduction to Cryptography
Secure Diffie-Hellman Algorithm
SPINE: Surveillance protection in the network Elements
Trust-based Privacy Preservation for Peer-to-peer Data Sharing
November 2008 Hybrid MAC for VANET Date: Authors:
Presentation transcript:

Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen FLIP: An Efficient Privacy-preserving Protocol for Finding Like-minded Vehicles on the Road Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen University of Waterloo, University of Ontario Institute of Technology Presenter: Rongxing Lu Email: rxlu@bbcr.uwaterloo.ca

System & Security Model Proposed FLIP Protocol Security Proof Outline Introduction VANET, Vehicle Chatting Application System & Security Model Proposed FLIP Protocol Security Proof Performance Evaluation Conclusion 17/09/2018

Introduction: VANET VANET V-2-I V-2-V Vehicle equipped with OnBoard Unit (OBU) Road Side Unit (RSU) Server (traffic monitoring, location based service) Vehicular Ad hoc Networks (VANETs), as a special instantiate of mobile ad hoc network, have been subject to extensive research efforts not only from the government, but also from the academia and automobile industry in recent years. 17/09/2018

Safety-Related Application Nonsafety-Related Application Introduction: VANET Application V-2-V V-2-V Warning Sharing MP3 Accident Chatting Server (traffic monitoring) V-2-I V-2-I Server Downloading MP3, Map, Software Booking hotel road info. Safety-Related Application Nonsafety-Related Application 17/09/2018

Introduction: Vehicle Chatting Future Carpool New Movie Music Chatting Vehicle chatting is one of the most promising applications in VANETs, which allows vehicles moving along the same road to chat with each other on some topics of common interest, for the purpose of passing the time during the commute or asking for a help on the road. However, the success of vehicle chatting application in VANET still hinges up the fully understanding and managing the security and privacy challenges that the public concerns, for example, the identity privacy, location privacy, and interest privacy. 17/09/2018

Introduction: Contribution How to identify a vehicle who is like-minded and establish a shared session key for secure chatting, and how to prevent other vehicles who are not like-minded from knowing one vehicle’s interest have become two newly emerging privacy challenges in vehicle chatting application. Contribution: we propose an efficient privacy-preserving finding like-minded vehicle protocol, called FLIP, which allows two vehicles with the common interest to identify each other and establish a shared session key, and at the same time, protects their Interest-Privacy (IP) from other vehicles who don’t have the same interest on the road. 17/09/2018

System Model FLIP: try to find a physically nearby like-minded vehicle without directly disclosing own interest; and establish a secure key to protect the future chatting content Trusted Authority: Assign a family of pseudo-IDs to vehicle Each Vehicle: Periodically change pseudo-IDs 17/09/2018

Preconditions: 1)The size of the Interest Set I should be large. Security Model Rationale: For a given interest set of k items, if Vb really has the same interest with Va, with high probability, both Va and Vb can choose the same interest. Otherwise, Vb can choose the same interest of Va only with probability 1/k. FLIP Preconditions: 1)The size of the Interest Set I should be large. 2) In each execution of FLIP, the Interest Ia varies (pseudo-id fixed) 17/09/2018

Security Model (2) Adversarial Model We allow the adversary A to access to all transcripts in the FLIP. All oracles only communicate with each other via A. The adversary A can replay, modify, delay, interleave or delete transcripts. FLIP Passive Eavesdropping 17/09/2018

Security Model (3) Adversarial Model FLIP Use the query to perform active attacks by modifying and inserting the transcript of the protocol to identify the IP of the requestor and responsor 17/09/2018

Security Model (4) Adversarial Model FLIP This query models the known session key attack. The adversary A can get access to an old session key that has been previously established. This query models exposure of the private key corresponding to PIDi to the adversary Reveal models the known session key attack. The adversary A can get access to an old session key that has been previously established. Which shows if one vehicle once chat with in previous session, he cannot know the interest in the new session. Corrup This query models exposure of the private key corresponding to PIDi to the adversary Test, with the above attack capability, Test shows if an adversary has advantage to identify an interest from k interests, and identify a real session key from random one. 17/09/2018

Proposed FLIP Protocol 17/09/2018

Security Proof Full version: http://bbcr.uwaterloo.ca/~rxlu/paper/GLOBECOM10FLIP.pdf 17/09/2018

Performance Evaluation 40 km/h - 80 km/h, 300 m Interest set size [1; 2; . . . ; 10] Finding Delay Mean passing-by rate =[20 /h; 40 /h; 60 /h; 80 /h; 100 /h; 120 /h] The larger the Interest Set, the longer the average FD; but at the same time, the average FD can be reduced with the increase of λ. Therefore, by setting a proper size of |I| on considering of λ, a vehicle V can find a like-minded vehicle within an expected time on the road while keeping his IP from non-like-minded vehicles. 17/09/2018

Conclusion In this work, we propose a secure finding like-minded vehicles protocol (FLIP), which can protect vehicle’s IP and is of vital importance to the success of vehicle chatting application on the road How to find a group of like-minded vehicles on the road is one of future work. Thank you! 17/09/2018