Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

Slides:



Advertisements
Similar presentations
CodeTorrent: Content Distribution using Network Coding in VANET Uichin Lee, JoonSang Park, Joseph Yeh, Giovanni Pau, Mario Gerla Computer Science Dept,
Advertisements

Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Survey of Vehicular Network Security Jonathan Van Eenwyk.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
GrooveSim: A Topography- Accurate Simulator for Geographic Routing in Vehicular Networks 簡緯民 P
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
A Structure-free Aggregation Framework for Vehicular Ad Hoc Networks Stefan Dietzel, Elmar Schoch, Boto Bako, Frank Kargl.
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
Mini-Project 2006 Secure positioning in vehicular networks based on map sharing with radars Mini-Project IC-29 Self-Organized Wireless and Sensor Networks.
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
EE 400 Term Project A Survey of Vehicular Networks. Done by Saif AL Mustanier ID# Ali AL-Yami ID#
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
TEMPLATE DESIGN © Privacy Issues of Vehicular Ad-hoc Networks (VANETs) Hang Dok and Ruben Echevarria Advisor: Dr. Huirong.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
CCH: Cognitive Channel Hopping in Vehicular Ad Hoc Networks Brian Sung Chul Choi, Hyungjune Im, Kevin C. Lee, and Mario Gerla UCLA Computer Science Department.
Privacy Issues in Vehicular Ad Hoc Networks.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
KAIS T Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks 임 형 인 Ananya Gupta, Anindo Mukherjee, Bin.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Wireless traffic service platform for combined vehicle-to-vehicle and vehicle-to-infrastructure communications Authors : T. Sukuvaara and P. Nurmi IEEE.
Evgueni (Eugene) Khokhlov1 A Mobility-Centric Data Dissemination Algorithm for Vehicular Networks (MDDV) Evgueni (Eugene) Khokhlov.
A Dedicated Multi-channel MAC Protocol Design for VANET with Adaptive Broadcasting Ning Lu 1, Yusheng Ji 2, Fuqiang Liu 1, and Xinhong Wang 1 1 Dept. of.
Zhen Huang Student number
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
A study of Intelligent Adaptive beaconing approaches on VANET Proposal Presentation Chayanin Thaina Advisor : Dr.Kultida Rojviboonchai.
1 Data Naming in Vehicle-to-Vehicle Communications HU Yao Goto Lab
A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks Anand Patwardhan, Anupam Joshi, Tim Finin, and Yelena Yesha Anand Patwardhan.
International Telecommunication Union The Fully Networked Car Geneva, 4-5 March 2009 Safety & Security Bernard Dugerdil Freescale Semiconductor.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Broadcast Methods for Inter-Vehicle Communications System T. Fukuhara, T. Warabino, T. Ohseki, K. Saito, K. Sugiyama, T. Nishida, K. Eguchi IEEE Communications.
P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks..
1 Vehicular Networks Slides are integrated from researchers at EPFL.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
Eyal Hamo Berry Shnaider בס " ד 1.
1 DIVYA K 1RN09IS016 RNSIT. 2 The main purpose in car-to-car networks is to improve communication performance. To demonstrate real scenarios with car-to-car.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
TAODV: A Trusted AODV Routing Protocol for MANET
Grid Computing Security Mechanisms: the state-of-the-art
VANET.
VANET.
Vehicular Public Key Infrastructure Scalability
Recognizing Exponential Inter-Contact Time in VANETs
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
Mobile ad hoc networking: imperatives and challenges
You Lu, Zhiyang Wang, Yu-Ting Yu, Mario Gerla
Install AD Certificate Services
Developing Vehicular Data Cloud Services in the IoT Environment
Presentation transcript:

Wenmao Liu Harbin Institute of Technology China

Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion

Problems in current TS Congestions Accidents

ITS & VANETs Intelligent Transportation Systems(ITS) Systems adding information and communications technology to transport infrastructure and vehicles. Vehicular Ad-Hoc Networks(VANETs) Subset of MANETs Vehicles talk to each other and the road side infrastructures with wireless devices Intelligent ?

Benefits of VANETs Congestions : reduced Accidents : avoided

Benefit of VANETs Improve entertainment WIFI access Online music Real time position Find restaurants …

Security Issues Driving is a life-or-death matter Many attackers for many purposes Terrorists Crackers Message Blockers Illusion makers

Solutions Cryptography Intrusion Detection Authentication (PKI) Pseudonym (fake ID)

Scenario

An autonomous architecture

Servers CA clusters Log servers Application Servers Roadside infrastructures Vehicles

Autonomous system setup Node deployment Backbone node generation Autonomous gather

Vehicle authentication Authentication process of a vehicle o to a roadside infrastructure r. r broadcasts its certificate. o verifies rs certificate. o challenges r and sends its own certificate as piggyback to save time r verifies os identity, and then answers the challenge o checks whether the return message value equal the challenge message, if yes, r is legal, vice versa. Then o calculates the challenge n and sends it back. r verifies os validity by checking the response

Secure Communication Pseudonym scope Certificate Cache & Forward T cache = Length/ Speed n Length = (r 2 (d mn sin ) 2 + d mn cos α) 1/2

Conclusion ITS and VANETs offer promising future for transportation. Reducing overheads of roadside infrastructures A complete authentication Regional trust relationship and autonomy guarantee scalability

The End