Mini-Project 2006 Secure positioning in vehicular networks based on map sharing with radars Mini-Project IC-29 Self-Organized Wireless and Sensor Networks.

Slides:



Advertisements
Similar presentations
Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Advertisements

Efficient Secure Aggregation in VANETs Maxim Raya, Adel Aziz, and Jean-Pierre Hubaux Laboratory for computer Communications and Applications (LCA) EPFL.
Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Survey of Vehicular Network Security Jonathan Van Eenwyk.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian Perrig Virgil Gligor Carnegie Mellon UniversityUniversity of Maryland.
Delay bounded Routing in Vehicular Ad-hoc Networks Antonios Skordylis Niki Trigoni MobiHoc 2008 Slides by Alex Papadimitriou.
Digital Signatures and Hash Functions. Digital Signatures.
Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig Carnegie Mellon University Message-In-a-Bottle: User-Friendly and Secure Cryptographic Key Deployment.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
My first aperosentation 9/6/2008 Marios Karagiannis.
The Role of Global Positional Systems in Policing and Crime Prevention William J. Artis Jr. FRS 142: Where’s Waldo April 19, 2004.
Securing OLSR Using Node Locations Daniele Raffo Cédric Adjih Thomas Clausen Paul Mühlethaler 11 th European Wireless Conference 2005 (EW 2005) April
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Mini-Project 2007 On Location Privacy in Vehicular Mix-Networks Julien Freudiger IC-29 Self-Organised Wireless and Sensor Networks Tutors: Maxim Raya Márk.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Security Issues In Sensor Networks By Priya Palanivelu.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
Centre for Wireless Communications University of Oulu, Finland
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Distance-decreasing attack in GPS Final Presentation Horacio Arze Prof. Jean-Pierre Hubaux Assistant: Marcin Poturalski January 2009 Security and Cooperation.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
TrafficView: A Driver Assistant Device for Traffic Monitoring based on Car-to-Car Communication Sasan Dashtinezhad, Tamer Nadeem Department of CS, University.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
1 A Practical Secure Neighbor Verification Protocol for Wireless Sensor Networks Reza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos, and.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Cooperative Intersection Collision Avoidance Systems Initiative May 2005, ITS America Annual Meeting Mike Schagrin ITS Joint Program Office U.S. Department.
By Jyh-haw Yeh Boise State University ICIKM 2013.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
FASEP Presents Is FASEP a 6-sensors or an 8-sensors type Measuring Device?
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Privacy Issues in Vehicular Ad Hoc Networks.
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean Advisor: Panos Papadimitratos.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.
Aditya Wagh.  Importance of Evidence Collection  Present Systems are inadequate ◦ Closed Circuit TV  Scalability issues + Centralized operation  Untapped.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
SMUCSE 8394 BTS – Communication Technologies. SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different.
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks Presented by Neeraj Agrawal, Zifei Zhong.
1 Airport mobiles surveillance and control by means of EGNOS METIS Workshop Benefits of EGNOS in Civil Aviation Istanbul 18 November 2009 Pierre GRUYER.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
1 Security for distributed wireless sensor nodes Ingrid Verbauwhede Department of Electrical Engineering University of California Los Angeles
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
1 Vehicular Networks Slides are integrated from researchers at EPFL.
Computer Science Using Directional Antennas to Prevent Wormhole Attacks Stephen Thomas Acknowledgement: Portions of this presentation have been donated.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
1 The Role and Design of V2X Communications for Automated Driving Gaurav Bansal Toyota InfoTechnology Center, USA Mountain View, CA
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
VANET.
VANET.
Presentation transcript:

Mini-Project 2006 Secure positioning in vehicular networks based on map sharing with radars Mini-Project IC-29 Self-Organized Wireless and Sensor Networks Csaba Árendás Tutors: Maxim Raya Prof. Jean-Pierre Hubaux

Mini-Project Motivation Positioning –Positioning without need for strong evidence –Navigation systems –GPS, GSM Secure positioning –To be sure that the position is correct –Military applications (smart bombs) Secure positioning in vehicular network –Collision warning –Life critical application

Mini-Project Problem statement – secure positioning in vehicular networks

Mini-Project Solution overview Precise distance measurement –ACC radars, relative positions Position authentication –Position keys ID authentication –Conventional cryptography –Public key cryptography Communication –Radar communication –DSRC broadcast radio communication

Mini-Project System model, assumptions Precise ACC radars –Precise distance measurement, –Radar communication –Vehicle's 360 degrees area is covered Broadcast radio communication device TPD for each vehicle –Contains Certificate, ID, public, private keys –Issued by CA at the police station –Given with the number plate registration –Hash, sign, verify a message, RND generation

Mini-Project State of the art Adaptive cruise control systems

Mini-Project Generation of the position key - ideal case

Mini-Project Generation of the position key - real case Since the other vehicle front side figure (or other side) is not a standard the distance measurements might differ from each other The key length in this way is limited by the maximal distance measurement difference

Mini-Project Generation of the position key - final solution

Mini-Project Mutual neighbor authentication

Mini-Project Neighbor map broadcasting (DSRC)

Mini-Project Neighbor map sharing, world map assembly

Mini-Project Evaluation Necessary sensors with minimal precision Effect of precision on position key length Position error Effect of digital signature computation time

Mini-Project Environment sensors

Mini-Project Effect of precision on key length

Mini-Project Position error

Mini-Project Effect of digital signature computation time

Mini-Project Conclusion Independent positioning from other systems, real ad hoc network –Precise positioning (not as distance bounding) –Scalable system Shared map –Containing IDs, distances, speed –Therefore location of a broadcasted emergency message is easy, collision avoidance is possible Strongly valuable against attacks –Position keys –Directional antennae

Mini-Project Back up slides

Mini-Project Problem statement – secure positioning in vehicular networks

Mini-Project

22 Synchronized positioning and authentication

Mini-Project Authentication without angle communication measurement

Mini-Project Distance measuring the radar and the measuring surface are on one axis (ideal case) Since both partners are measuring the same distance it is easy to use it as a key The length of the key is limited by the precision of used radars

Mini-Project Distance measuring problem The radar and the measuring surface are not on the same axes The radar`s position is not on the surface of the vehicle The radars are embedded in the front side of the vehicle –Exact position might differ from vehicle to vehicle –With factory calibration this problem is solvable

Mini-Project Distance measuring problem we might measure the different distance Since the other vehicle front side figure (or other side) is not a standard the distance measurements might differ from each other The key length in this way is limited by the maximal distance measurement difference

Mini-Project Distance measuring problem (solution one) closest point detection factory calibration is necessary Calibrating my most exterior point (factory calibration) –Not easy to do it precisely since sometimes the number plate is the exterior point Measuring neighbors closest point –Calculating the distance between my exterior point and between its closest point Theoretically works but –What if my exterior point is changed by a little accident –Or I use a new, different number plate

Mini-Project Generation of the position key - final solution