The Key to Intelligent Transportation: Identity and Credential - - PowerPoint PPT Presentation

the key to intelligent transportation identity and
SMART_READER_LITE
LIVE PREVIEW

The Key to Intelligent Transportation: Identity and Credential - - PowerPoint PPT Presentation

The Key to Intelligent Transportation: Identity and Credential Management in Vehicular Communication Systems Mohammad Khodaei and Panos Papadimitratos Networked Systems Security Group Dec, 2015 M. Khodaei and P. Papadimitratos (KTH) LCN


slide-1
SLIDE 1

The Key to Intelligent Transportation: Identity and Credential Management in Vehicular Communication Systems

Mohammad Khodaei and Panos Papadimitratos

Networked Systems Security Group

Dec, 2015

  • M. Khodaei and P. Papadimitratos (KTH)

LCN Seminar Dec, 2015 1 / 11

slide-2
SLIDE 2

Secure Vehicular Communication (VC) System

RSU 3/4G

PCA LTCA PCA LTCA RCA PCA LTCA B A A certifies B Cross-certification Communication link Domain A Domain B Domain C RA RA RA B

X-Cetify

LDAP LDAP Message dissemination

  • M. Khodaei and P. Papadimitratos (KTH)

LCN Seminar Dec, 2015 2 / 11

slide-3
SLIDE 3

Hierarchical Organization of the VC Security Infrastructure

LTCA1 LTCA2 LTCA3 LTCAL PCA1 PCA2 PCA3 PCA4 PCA5 PCAM HCA1 HCA2 HCAK

B A

A Certifies B Cross-Certification Communication Link

  • M. Khodaei and P. Papadimitratos (KTH)

LCN Seminar Dec, 2015 3 / 11

slide-4
SLIDE 4

VPKI Architecture

  • M. Khodaei and P. Papadimitratos (KTH)

LCN Seminar Dec, 2015 4 / 11

slide-5
SLIDE 5

State-of-the-art

Projects

SEVECOM, EVITA, PRECIOSA, OVERSEE, DRIVE-C2X, PRESERVE, CAMP-VSC3

Standarization and Harmonization

IEEE 1609.2, ETSI and C2C-CC: VC related specifications for privacy-preserving architectures

Vehicular Public Key Infrastructure (VPKI)

Do we indeed have a corner-stone to build upon secure and privacy-protecting VC systems? More precisely, do we have all answers needed to deploy an identity and credential management infrastructure for VC?

  • M. Khodaei and P. Papadimitratos (KTH)

LCN Seminar Dec, 2015 5 / 11

slide-6
SLIDE 6

Privacy Challenges

Stronger adversarial model1 User privacy protection against honest-but-curious entities Inference of service provider or time LTCA infers relevant information from the requests2 Direct (C2C-CC design) or indirect (ticket-based designs) approaches Actual pseudonym acquisition period Targeted PCA that the vehicle seeks to obtain credentials from Trivially linking pseudonyms issued by the PCA Fully-trusted proxy-based scheme (CAMP)3 that shuffles the requests Honest-but-curious proxy?

1Gisdakis et al., 2013 and Khodaei et al., 2014. 2Khodaei et al., 2014. 3Whyte et al. 2013

  • M. Khodaei and P. Papadimitratos (KTH)

LCN Seminar Dec, 2015 6 / 11

slide-7
SLIDE 7

Resilience Considerations

Sybil-based misbehavior Acquisition of multiple simultaneously valid credentials Allow several pseudonymous valid simultaneously for a specific period

  • f time (C2C-CC or CAMP project)

Changing the certificate in a critical traffic situation (e.g., intersection, accident) Safety applications necessitate partial linkability But what if a vehicle gets compromised? Injecting multiple erroneous hazard notification

VPKI should ensure a compromised vehicle cannot obtain multiple pseudonyms valid simultaneously4

along with enforcing a policy on the vehicle side

Standardization bodies and harmonization efforts do not preclude such misbehavior

4Khodaei et al., 2014.

  • M. Khodaei and P. Papadimitratos (KTH)

LCN Seminar Dec, 2015 7 / 11

slide-8
SLIDE 8

Pseudonym Lifetime Policy

Ideally one pseudonym for a single message authentication

But costly, e.g. 10 beacons per sec.

Safety applications necessitate partial linkability

E.g. collision avoidance: inferring a collision hazard based on unlinkable CAMs is hard; requires precise location information

No conclusive view or guideline for pseudonym lifetime policy

Sybil-based misbehavior → Non-overlapping lifetime Flexible access to PCA → undermine unlinkability Timing information makes sets of pseudonyms linkable

5 10 15 20 25 30 35 40 45 50 55 60 1 2 3 4 5 6 7 8 9 10

Pseudonym Lifetime [sec]

  • M. Khodaei, et. al, “Towards Deploying a Scalable & Robust Vehicular Identity and Credential Management

Infrastructure,” in IEEE VNC, Paderborn, Germany, Dec. 2014.

  • M. Khodaei and P. Papadimitratos (KTH)

LCN Seminar Dec, 2015 8 / 11

slide-9
SLIDE 9

Revocation

Eviction of the wrong doers in case of misbehavior Not straightforward in the VC systems

Multiplicity of pseudonyms Very large number of pseudonyms, thus huge revocation list Efficient distribution of the revocation list among mobile entities Limited memory and bandwidth consumption for OBU through usage of CRL

Diminish such vulnerability Requiring the vehicles to interact with the VPKI regularly

  • r at least as frequently as dissemination of information by PCA

The remaining challenge: No consensus on the need and the method

C2C-CC recommendation to preload with 1500 pseudonyms for a year and let them expire (no revocation)

Timely dissemination of credential validity information

Time, cost, bandwidth, network accessibility, etc.

  • M. Khodaei and P. Papadimitratos (KTH)

LCN Seminar Dec, 2015 9 / 11

slide-10
SLIDE 10

Other Challenges

Extending to anonymous authentication primitives

Group signature schemes5 Zero-knowledge proof6

Extensive experimental validation

SEROSA7 SR-VPKI8

Operational challenges:

Who is in charge of the identity and credential management How to establish the trust: [Saab, Scania, Volvo] and [Volkswagen, BMW] [EU] and [US]

5Papadimitratos et al., 2007 & Perrig et al., 2009 6F¨

  • rster et al., 2014

7Gisdakis et al., 2013 8Khodaei et al., 2014

  • M. Khodaei and P. Papadimitratos (KTH)

LCN Seminar Dec, 2015 10 / 11

slide-11
SLIDE 11

Identity and Credential Management in Vehicular Communication Systems Questions and Discussion

Mohammad Khodaei (KTH) LCN Seminar 11 / 11

slide-12
SLIDE 12

Pseudonym Lifetime Policy

5 10 15 20 25 30 35 40 45 50 55 60 1 2 3 4 5 6 7 8 9 10

Pseudonym Lifetime [sec]

5 10 15 20 25 30 35 40 45 50 55 60 1 2 3 4 5 6 7 8 9 10

Pseudonym Lifetime [sec] Flexible lifetimes Fixed lifetimes

Non-overlapping pseudonym lifetimes from eavesdroppers’ perspective Distinct lifetimes per vehicle make linkability easier Uniform pseudonym lifetime in a domain No distinction among obtained pseudonyms set, thus less probable to link pseudonyms

Mohammad Khodaei (KTH) LCN Seminar 11 / 11