vehic icle to to vehicle message content pla lausibil
play

Vehic icle-to to-Vehicle Message Content Pla lausibil ility Check - PowerPoint PPT Presentation

Vehic icle-to to-Vehicle Message Content Pla lausibil ility Check through Low-Power Beaconing Taeho Kim , Hyogon Kim Department of Computer Science and Engineering Korea University VTC2017-Fall September 24-27 2017, Toronto, Canada Outline


  1. Vehic icle-to to-Vehicle Message Content Pla lausibil ility Check through Low-Power Beaconing Taeho Kim , Hyogon Kim Department of Computer Science and Engineering Korea University VTC2017-Fall September 24-27 2017, Toronto, Canada

  2. Outline • Our question! • Why is it a problem? • Solution approach: Neighbor check through low-power beaconing • Simulation and result • Expanded solution • Significance and discussion 2

  3. Background – Basic Safety Message (BSM) Part Ι , Sent at all times with each message 𝑓𝑦. Frequency: 10 Hz Transmission power: 23 dBm msgCnt MsgCount, id TemporaryID, secMark Dsecond, Compulsory lat Latitude, long Longitude, elev Elevation, Speed Speed, Heading Heading, … . Part ΙΙ , Content Part ΙΙ SEQUENCE (SIZE (1..8) ) OF Optional Part ΙΙ Content OPTIONAL, Regional SEQUENCE (SIZE (1..4) ) OF Regional Extension OPTIONAL, … 3

  4. Our Question! • How can we believe vehicle-to-vehicle message contents? • IEEE 1609.2 addresses the security aspect in WAVE except for plausibilility • Authorized vehicle (O), Message credibility (O), Message contents plausibility (X) < A ’s checking list for B > - The existence of B (O) - Not change B ’s BSM after sending (O) - Check whether the data of B are plausible or not (X) - A , B : general vehicles A B 4

  5. Why is it a problem? • An attacker can send its forged message directly near the road • There may exist a myriad of attacks K’ A B < A ’s ways for checking position K’ > < B ’s ways for checking position K’ > - Vehicular communication (O) - Vehicular communication (O) - Sensors (X) - Sensors (O) - A , B : general vehicles - K : an attacker sending the fake BSM - K’ : a false position for an attacker K K 5

  6. Solution approach • Solution: Add low-power beaconing message (Whisper) for BSM contents verification d W • good : not need hardware components or sensors K • The maximum low-power beaconing distance (𝑓𝑦. 170𝑛 ) is lower than the maximum BSM beaconing distance ( 𝑓𝑦. 760𝑛 ) d W - V , U : general vehicles - K : an attacker sending the fake BSM V U - 𝑒 𝑋 : the maximum low-power beaconing d W distance 6

  7. Neighbor check through low-power beaconing (Whisper check) • Vehicle V ’s Whisper • 𝒆𝒋𝒉(𝑫 𝑾 ) : digest of V ’s certificate d W • 𝐽 𝑊 : Whisper identifier (WID) of V • 𝑀 𝑊 : list of WIDs heard by V K V ’s whisper : • Vehicle V ’s BSM + Certificate 𝑒𝑗𝑕(𝑫 𝑾 ) 𝐽 𝑊 𝑀 𝑊 = {𝐽 𝐵 , 𝐽 𝐶 , 𝑱 𝑽 } • 𝒆𝒋𝒉(𝑫 𝑾 ) : digest of V ’s certificate • Part 1 data (Compulsory) U ’s whisper • Part 2 data (Optional) d W d W - V, U, A, B : general vehicles - K : an attacker sending the fake BSM V U - 𝑒 𝑋 : the maximum low-power beaconing A B distance 7

  8. Neighbor check through low-power beaconing (Whisper check) • Vehicle V ’s Whisper • 𝑒𝑗𝑕(𝐷 𝑊 ) : digest of V ’s certificate d W • 𝐽 𝑊 : Whisper identifier (WID) of V • 𝑀 𝑊 : list of WIDs heard by V K V ’s whisper : • Vehicle V ’s BSM + Certificate 𝑒𝑗𝑕(𝑫 𝑾 ) 𝐽 𝑊 𝑀 𝑊 = {𝐽 𝐵 , 𝐽 𝐶 , 𝑱 𝑽 } • 𝑒𝑗𝑕(𝐷 𝑊 ) : digest of V ’s certificate V ’s BSM + Certificate : • Part 1 data (Compulsory) V ’s whisper 𝒆𝒋𝒉(𝑫 𝑾 ) 𝑒𝑏𝑢𝑏 • Part 2 data (Optional) 𝑼 𝑽 𝐽 𝐶 , 𝑒𝑗𝑕(𝑫 𝑪 ) d W d W - V, U, A, B : general vehicles 𝐽 𝑊 , 𝒆𝒋𝒉(𝑫 𝑾 ) - K : an attacker sending the fake BSM V U - 𝑒 𝑋 : the maximum low-power beaconing B A distance - 𝑈 𝑉 : list of trust vehicles’ WID and digest in vehicle U V ’s BSM 8

  9. Neighbor check through low-power beaconing (Whisper check) K ’s whisper : • Vehicle V ’s Whisper 𝑒𝑗𝑕(𝑫 𝑳 ) 𝐽 𝐿 𝑴 𝑳 = { } • 𝑒𝑗𝑕(𝐷 𝑊 ) : digest of V ’s certificate d W • 𝐽 𝑊 : Whisper identifier (WID) of V K ’s BSM + Certificate : • 𝑀 𝑊 : list of WIDs heard by V K 𝑒𝑗𝑕(𝑫 𝑳 ) 𝑒𝑏𝑢𝑏 𝑗𝑜𝑑𝑚𝑣𝑒𝑗𝑜𝑕 𝑔𝑏𝑙𝑓 𝑤𝑏𝑚𝑣𝑓 • Vehicle V ’s BSM + Certificate • 𝑒𝑗𝑕(𝐷 𝑊 ) : digest of V ’s certificate • Part 1 data (Compulsory) U ’s whisper • Part 2 data (Optional) 𝑼 𝑽 𝐽 𝐶 , 𝑒𝑗𝑕(𝑫 𝑪 ) d W d W - V, U, A, B : general vehicles 𝐽 𝑊 , 𝑒𝑗𝑕(𝑫 𝑾 ) - K : an attacker sending the fake BSM V U - 𝑒 𝑋 : the maximum low-power beaconing A B distance - 𝑈 𝑉 : list of trust vehicles’ WID and digest in vehicle U 9

  10. Simulation scenario • An attacker K controls 𝑒 𝐿 and broadcasts its forged messages. 120 km/h 33.3 m d K - BSMs at 10Hz, 23dBm - Whispers at 7Hz, 9dBm - K : an attacker sending the fake BSM - 𝑒 𝐿 : the distance between the attacker K K and the center of the road 10

  11. Whisper check simulation result: “Attack success” • “Attack success”: The case that the attacker delivers its fake message to a certain vehicle at first with passing “Whisper check” • BSM + Whisper increases the Channel Busy Percentage (CBP) in some measure ( ≈ 20%) • The number of attack success per sec: The number of entering vehicles at first in the attack range during one second 4 The number of attack success / s 3.5 - BSMs at 10Hz, 23dBm 3 - Whispers at 7Hz, 9dBm (vehicles/sec) 2.5 - Vehicle speed: 120km/h 2 BSM - Vehicle-to-Vehicle 1.5 BSM + Whisper spacing: 33.3m 1 0.5 0 10 110 210 310 410 510 610 710 Attacker distance from the road (m) 11

  12. How can we cope with much closer attackers from the road? • Attacker K receives Whisper messages from vehicles A and B • K broadcasts its forged BSM with passing “Whisper check” of A and B - 𝑒𝑗𝑕(𝐷 𝑊 ) : digest of V ’s certificate 𝑼 𝑩 𝑼 𝑪 - 𝐽 𝑊 : Whisper identifier (WID) of V d W - 𝑀 𝑊 : list of WIDs heard by V 𝐽 𝐶 , 𝑒𝑗𝑕(𝑫 𝑪 ) 𝐽 𝐵 , 𝑒𝑗𝑕(𝑫 𝑩 ) - 𝑈 𝑊 : list of trust vehicles’ WID and digest 𝐽 𝐿 , 𝒆𝒋𝒉(𝑫 𝑳 ) 𝐽 𝐿 , 𝒆𝒋𝒉(𝑫 𝑳 ) in V A ’s whisper B ’s whisper B A - 𝑒 𝑋 : the maximum low-power beaconing distance K ’s whisper K ’s whisper - A, B : general vehicles K K ’s BSM K ’s BSM - K : an attacker sending the fake BSM K ’s whisper : 𝑒𝑗𝑕(𝑫 𝑳 ) 𝐽 𝐿 𝑀 𝐿 = { 𝑱 𝑩 , 𝑱 𝑪 } K ’s BSM + Certificate : 𝒆𝒋𝒉(𝑫 𝑳 ) 𝑒𝑏𝑢𝑏 𝑗𝑜𝑑𝑚𝑣𝑒𝑗𝑜𝑕 𝑔𝑏𝑙𝑓 𝑤𝑏𝑚𝑣𝑓 12

  13. Expanded solution: Whispering with credit • Expanded solution: Using the maximum number of sending Whispers from a closer attacker to a certain vehicle while the vehicle moves the distance that the closer attacker can attack • First, calculating the attack range of a closer attacker • Second, introduction the concept “Trust credit” and application it 13

  14. Expanded solution: 1. The attack range of a closer attacker • Four sections for the attack range of a closer attacker ⓐ ⓑ ⓒ ⓓ d W v U’’ U’ E F U K d W d W d W d W d(t u ) = v(t u +1/c) d X 14

  15. Expanded solution: 1. The attack range of a closer attacker • Section ⓐ and ⓒ E ’s Whisper : : U ’s Whisper  E ’s Whisper  K ’s Whisper  K ’s 𝑒𝑗𝑕(𝑫 𝑭 ) 𝐽 𝐹 𝑀 𝐹 = {𝑱 𝑽 } 𝑼 𝑽 BSM K ’s Whisper : 𝐽 𝐹 , 𝑒𝑗𝑕(𝑫 𝑭 ) ⓐ ⓑ ⓒ ⓓ 𝑒𝑗𝑕(𝑫 𝑳 ) 𝐽 𝐿 𝑀 𝐿 = {𝑱 𝑭 , 𝑱 𝑽 } 𝐽 𝐿 , 𝒆𝒋𝒉(𝑫 𝑳 ) d W U ’s Whisper E ’s Whisper - 𝑒𝑗𝑕(𝐷 𝑊 ) : digest of V ’s certificate v U’ E F U - 𝐽 𝑊 : Whisper identifier (WID) of V - 𝑀 𝑊 : list of WIDs heard by V K - 𝑈 𝑊 : list of trust vehicles’ WID and digest in V K ’s Whisper - 𝑒 𝑋 : the maximum low-power beaconing d W d W d W d W distance - U, E, F, U’ : general vehicles K ’s BSM + Certificate : - K : an attacker sending the fake BSM 𝒆𝒋𝒉(𝑫 𝑳 ) 𝑔𝑏𝑚𝑡𝑓 𝑒𝑏𝑢𝑏 15

  16. Expanded solution: 1. The attack range of a closer attacker • Section ⓑ K ’s Whisper : : Whispers of E and F  K ’s Whisper  K ’s BSM 𝑒𝑗𝑕(𝑫 𝑳 ) 𝐽 𝐿 𝑀 𝐿 = {𝑱 𝑭 , 𝑱 𝑮 } ⓐ ⓑ ⓒ ⓓ 𝑼 𝑭 𝑼 𝑭 𝑼 𝑮 𝑼 𝑮 𝐽 𝐿 , 𝒆𝒋𝒉(𝑫 𝑳 ) 𝐽 𝐿 , 𝒆𝒋𝒉(𝑫 𝑳 ) E ’s Whisper F ’s Whisper - 𝑒𝑗𝑕(𝐷 𝑊 ) : digest of V ’s certificate E F - 𝐽 𝑊 : Whisper identifier (WID) of V - 𝑀 𝑊 : list of WIDs heard by V - 𝑈 𝑊 : list of trust vehicles’ WID and digest in V K ’s Whisper K ’s Whisper K - 𝑒 𝑋 : the maximum low-power beaconing d W d W distance - E, F : general vehicles K’s BSM + Certificate : - K : an attacker sending the fake BSM 𝒆𝒋𝒉(𝑫 𝑳 ) 𝑔𝑏𝑚𝑡𝑓 𝑒𝑏𝑢𝑏 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend