mobile networks module i part 2 securing vehicular
play

Mobile Networks Module I Part 2 Securing Vehicular Networks Prof. - PowerPoint PPT Presentation

Mobile Networks Module I Part 2 Securing Vehicular Networks Prof. J.-P. Hubaux 1 Outline Motivation Threat model and specific attacks Security architecture Security analysis Certificate revocation


  1. Mobile Networks Module I – Part 2 Securing Vehicular Networks Prof. J.-P. Hubaux 1

  2. Outline � Motivation � Threat model and specific attacks � Security architecture � Security analysis � Certificate revocation � Data-centric trust � Conclusion 2

  3. What is a VANET (Vehicular Ad hoc NETwork)? • Communication: typically over the Dedicated Short Range Communications (DSRC) (5.9 GHz) • Example of protocol: IEEE 802.11p 3 • Penetration will be progressive (over 2 decades or so)

  4. Vehicular communications: why? � Combat the awful side-effects of road traffic • In the EU, around 40’000 people die yearly on the roads; more than 1.5 millions are injured • Traffic jams generate a tremendous waste of time and of fuel � Most of these problems can be solved by providing appropriate information to the driver or to the vehicle 4

  5. Why is VANET security important? � Large projects have explored vehicular communications: Fleetnet, PATH (UC Berkeley),… No solution can be deployed if not properly secured � � The problem is non-trivial • Specific requirements (speed, real-time constraints) • Contradictory expectations � Industry front: standards are still under development and suffer from serious weaknesses • IEEE P1609.2: Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages Research front � • A growing number of papers 5

  6. A modern vehicle Event data recorder (EDR) (GPS) Positioning system Forward radar Communication facility Rear radar Display Computing platform Human-Machine Interface A modern vehicle is a network of sensors/actuators on wheels ! 6

  7. Threat model � An attacker can be: • Insider / Outsider • Malicious / Rational • Active / Passive • Local / Extended � Attacks can be mounted on: • Safety-related applications • Traffic optimization applications • Payment-based applications • Privacy 7

  8. Attack 1 : Bogus traffic information Traffic jam ahead � Attacker: insider, rational, active 8

  9. Attack 2 : Generate “Intelligent Collisions” SLOW DOWN The way is clear � Attacker: insider, malicious, active 9

  10. Attack 3: Cheating with identity, speed, or position Wasn’t me! � Attacker: insider, rational, active 10

  11. Attack 4: Jamming Roadside base station Jammer 11

  12. 12 Attack 5: Tunnel

  13. Attack 6: Tracking A * A enters the parking lot at time 3 t3 * A downloads from server X A B * A refuels at time 2 A t2 and location (x2,y2,z2) 1 * A at (x1,y1,z1) at time t1 13 * A communicates with B

  14. Our scope � We consider communications specific to road traffic: safety and traffic optimization • Safety-related messages • Messages related to traffic information � We do not focus on more generic applications, e.g., toll collect, access to audio/video files, games,… 14

  15. Security system requirements � Sender authentication � Verification of data consistency � Availability � Non-repudiation � Privacy � Real-time constraints 15

  16. 16 Security Architecture

  17. Tamper-proof device � Each vehicle carries a tamper-proof device • Contains the secrets of the vehicle itself • Has its own battery • Has its own clock (notably in order to be able to sign timestamps) • Is in charge of all security operations • Is accessible only by authorized personnel Tamper-proof device ((( ))) Vehicle sensors Transmission On-board (GPS, speed and system CPU acceleration,…) 17

  18. Digital signatures Symmetric cryptography is not suitable: messages are � standalone, large scale, non-repudiation requirement � Hence each message should be signed with a DS Liability-related messages should be stored in the EDR � Safety Verifier Verifier Cryptographic material message Signer {Position, speed, {Signer’s DS, Signer’s acceleration, direction, PK, CA’s certificate of PK} time, safety events} Verifier 18

  19. VPKI (Vehicular PKI) Security services Positioning Confidentiality Privacy Shared session key ... PKI CA P A P B Authentication Authentication � Each vehicle carries in its T amper- P roof D evice ( TPD ): • A unique and certified identity: E lectronic L icense P late ( ELP ) • A set of certified anonymous public/private key pairs � Mutual authentication can be done without involving a server Authorities (national or regional) are cross-certified � 19

  20. The CA hierarchy: two options 1. Governmental 2. Manufacturers Transportation Authorities Country 1 Manuf. 1 Manuf. 2 Region 1 Region 2 District 1 District 2 Car B Car A Car B Car A The governments control certification � � Vehicle manufacturers are trusted � Long certificate chain � Only one certificate is needed � Keys should be recertified on borders to � Each car has to store the keys of all ensure mutual certification vehicle manufacturers 20

  21. Secure VC Building Blocks � Authorities • Trusted entities issuing and managing identities and credentials 21

  22. Secure VC Building Blocks � Authorities • Hierarchical organization • ‘Forest’ 22

  23. Secure VC Building Blocks (cont’d) � Identity and Credentials Management ‘Re-filling’ with or obtaining new credentials Roadside Unit Wire-line Providing revocation Connections information Roadside Unit 23

  24. Anonymous keys � Preserve identity and location privacy � Keys can be preloaded at periodic checkups � The certificate of V ’s i th key: [ ] [ ] = | | Cert PuK PuK Sig PuK ID V i i SK i CA CA � Keys renewal algorithm according to vehicle speed (e.g., ≈ 1 min at 100 km/h) � Anonymity is conditional on the scenario � The authorization to link keys with ELPs is distributed 24

  25. What about privacy: how to avoid the Big Brother syndrome? At 3:15 - Vehicle A spotted at position P2 At 3:00 - Vehicle A spotted at position P1 � Keys change over time � Liability has to be enforced Only law enforcement agencies should be allowed to retrieve � the real identities of vehicles (and drivers) 25

  26. DoS resilience � Vehicles will probably have several wireless technologies onboard � In most of them, several channels can be used � To thwart DoS, vehicles can switch channels or communication technologies Network layer DSRC UTRA-TDD Bluetooth Other � In the worst case, the system can be deactivated 26

  27. Data verification by correlation � Bogus info attack relies on false data � Authenticated vehicles can also send wrong data (on purpose or not) � The correctness of the data should be verified => data-centric trust � Correlation can help 27

  28. Security analysis � How much can we secure VANETs? � Messages are authenticated by their signatures � Authentication protects the network from outsiders � Correlation and fast revocation reinforce correctness � Availability remains a problem that can be alleviated � Non-repudiation is achieved because: • ELP and anonymous keys are specific to one vehicle • Position is correct if secure positioning is in place 28

  29. Certificate revocation in VANETs � The CA has to revoke invalid certificates: • Compromised keys • Wrongly issued certificates • A vehicle constantly sends erroneous information � Using Certificate Revocation Lists (CRL) or online status checking is not appropriate � There is a need to detect and revoke attackers fast 29

  30. System model � There is a CA (Certification Authority) � Each vehicle has a public/private key pair, a TC (Trusted Component = TPD), and an EDR (Event Data Recorder) � Safety messages: • Are broadcast and signed • Include time and position � Several possible communication channels: • DSRC • Cellular • WiMax • Low-speed FM 30

  31. Adversary model � The adversary can be: • Faulty node • Misbehaving node � Example attack: false information dissemination � Adversaries have valid credentials � Honest majority in the attacker’s neighborhood 31

  32. Scheme overview CA (Certification Authority) and Vehicle Functionality Infrastructure Functionality Local Warning CA Policies Messages Evidence Collection LEAVE Revocation Decision ( L ocal E viction of A ttackers by V oting E valuators) Node ID MDS (Misbehavior Detection System) Revocation Information RC 2 RL ( R ev. by C ompressed TPD CRL s) (Tamper-Proof Device) RTC Fail Message validation ( R ev. of the (ID) T rusted Revocation Command 32 C omponent )

  33. Revocation protocols � We propose 2 protocols to revoke a vehicle’s keys: • R ev. of the T rusted C omponent ( RTC ): CA revokes all keys • R ev. by C ompressed CRL s ( RC2RL ): if TC is not reachable � L ocal E viction of A ttackers by V oting E valuators ( LEAVE ): • Initiated by peers • Generates a report to the CA, which triggers the actual revocation by RTC/RC2RL 33

  34. Revocation of the Trusted Component (RTC) 34 RSU: Road Side Unit; PuK = Public Key; T = Timestamp

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend