Outline                  Secure Communication with PrivacyIntroductionMotivation                               Preservatio...
Outline                  1 IntroductionOutline                  2 MotivationIntroductionMotivation                  3 Rela...
IntroductionOutlineIntroductionMotivationRelated Works                      Ad-Hoc NetworkPACP [2]              Vehicular ...
MotivationOutlineIntroductionMotivation            Tracking mechanisms are getting advanced.Related Works         Adversar...
Related WorksOutlineIntroduction          Research works on authentication to ensure security inMotivation            VANE...
OutlineIntroductionMotivationRelated Works                       First Candidate Solution: PACP: An EfficientPACP [2]       ...
Background ConceptsOutlineIntroductionMotivationRelated Works                      Conditional PrivacyPACP [2]            ...
Network Model for VANETOutlineIntroductionMotivationRelated WorksPACP [2]Secure Com-munication inVANETs withSelf-Generated...
Notations used in PACP and Publicly known                 system parameters                                           Nota...
PACP Protocols                       Registration ProtocolOutline                       Generation ProtocolIntroduction   ...
Anonymous Communication in PACPOutlineIntroductionMotivationRelated Works                      Encryption ProtocolPACP [2]...
OutlineIntroductionMotivationRelated WorksPACP [2]                   Second Candidate Solution: Secure Communication inSec...
Background ConceptsOutlineIntroductionMotivationRelated Works                      Identity-Based EncryptionPACP [2]Secure...
Notations used in second candidate solutionOutlineIntroduction                      Notation               DescriptionMoti...
Different PhasesOutlineIntroductionMotivation            Broadcasting PhaseRelated Works                      Message Authe...
Observations from first candidate solutionOutlineIntroductionMotivation            Hardness of ECDLPRelated Works          ...
Observations from second candidate solutionOutlineIntroductionMotivation            Hardness of ECDLPRelated Works        ...
Comparison of both the solutions with ECPPOutline                                                    First Solution    Sec...
Comparison of both the candidate solutionsOutline                                                      First Solution[2]  ...
ConclusionOutlineIntroduction                      Different sides of the same coin.MotivationRelated Works                ...
References IOutlineIntroduction          Boneh, D., and Franklin, M.Motivation            Identity-based encryption from t...
References IIOutline               Hwang, R. J., Hsiao, Y.-K., and Liu, Y.-F.Introduction          Secure communication sc...
References IIIOutline                      Raya, M., and Hubaux, J.-P.Introduction                      Securing vehicular...
Upcoming SlideShare
Loading in...5
×

Secure Communication with Privacy Preservation in VANET

847

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
847
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
102
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Secure Communication with Privacy Preservation in VANET

  1. 1. Outline Secure Communication with PrivacyIntroductionMotivation Preservation in VANETRelated WorksPACP [2] Ankit GuptaSecure Com-munication in M.Tech 2nd YearVANETs withSelf-Generated Reg. No. 2011IS20PseudonymMechanism [3] Department of Computer Science and EngineeringObservationsand Motilal Nehru National Institute of Technology AllahabadComparisonsConclusion November 19, 2012References November 19, 2012 Department of Computer Science and Engineering 1/23
  2. 2. Outline 1 IntroductionOutline 2 MotivationIntroductionMotivation 3 Related WorksRelated WorksPACP [2] 4 PACP [2]Secure Com-munication in 5 Secure Communication in VANETs with Self-GeneratedVANETs withSelf-Generated Pseudonym Mechanism [3]PseudonymMechanism [3]Observations 6 Observations and ComparisonsandComparisons 7 ConclusionConclusionReferences 8 References November 19, 2012 Department of Computer Science and Engineering 2/23
  3. 3. IntroductionOutlineIntroductionMotivationRelated Works Ad-Hoc NetworkPACP [2] Vehicular Ad-Hoc Network (VANET)Secure Com-munication in Need of VANETsVANETs withSelf-Generated Privacy Preservation in VANETsPseudonymMechanism [3]ObservationsandComparisonsConclusionReferences November 19, 2012 Department of Computer Science and Engineering 3/23
  4. 4. MotivationOutlineIntroductionMotivation Tracking mechanisms are getting advanced.Related Works Adversary can track a vehicle by observing itsPACP [2] communication and movement patterns.Secure Com-munication in Preserving privacy and anonymous communication insideVANETs withSelf-Generated the VANET is a double-edged feature.PseudonymMechanism [3] Vehicles in VANET need conditional privacy.ObservationsandComparisonsConclusionReferences November 19, 2012 Department of Computer Science and Engineering 4/23
  5. 5. Related WorksOutlineIntroduction Research works on authentication to ensure security inMotivation VANET [5, 6].Related Works Vehicle Safety Communication Project (VSC) [7].PACP [2] Efficient Conditional Privacy Preservation (ECPP)Secure Com-munication in Protocol [4].VANETs withSelf-GeneratedPseudonym Public Key Infrastructure (PKI) is used in most of theMechanism [3] schemes designed for anonymity in VANET.Observationsand Existing schemes are not truly anonymous.ComparisonsConclusionReferences November 19, 2012 Department of Computer Science and Engineering 5/23
  6. 6. OutlineIntroductionMotivationRelated Works First Candidate Solution: PACP: An EfficientPACP [2] Pseudonymous Authentication-Based Conditional PrivacySecure Com-munication in Protocol [2].VANETs withSelf-GeneratedPseudonymMechanism [3]ObservationsandComparisonsConclusionReferences November 19, 2012 Department of Computer Science and Engineering 6/23
  7. 7. Background ConceptsOutlineIntroductionMotivationRelated Works Conditional PrivacyPACP [2] Bilinear Mapping [1]Secure Com-munication in Identity-Based Encryption [1]VANETs withSelf-Generated Elliptic Curve Discrete Logarithmic Problem (ECDLP)PseudonymMechanism [3]ObservationsandComparisonsConclusionReferences November 19, 2012 Department of Computer Science and Engineering 7/23
  8. 8. Network Model for VANETOutlineIntroductionMotivationRelated WorksPACP [2]Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]ObservationsandComparisonsConclusionReferences Figure: Network Model for VANET[2]. November 19, 2012 Department of Computer Science and Engineering 8/23
  9. 9. Notations used in PACP and Publicly known system parameters Notation Description ID The Identity of the vehicle Ri The Identity of RSU Ri (also its public key)Outline SR The Private key of RSU Ri iIntroduction RTH Threshold value of the RSU CertR Identity-based Certificate of RSU Ri iMotivation SIG (M; K ) ECC-based signature of using key K. PMVD The Public Key of the MVDRelated Works SMVD The Private Key of the MVD M MessagePACP [2] C CiphertextSecure Com-munication in Table: Notations used in PACP.VANETs withSelf-GeneratedPseudonymMechanism [3] e : G1 × G1 → G2 ˆ Mapping from an additive group G1 to a multiplicative group G2 P G1 P is a generator of G1Observations PMVD = αP Public Key of MVDand H : G1 → (0, 1)n H, H1 , H2 are publicly known hash functionsComparisons H1 : G2 → (0, 1)n H2 : (0, 1)n × (0, 1)n → (0, 1)nConclusionReferences Table: Publicly known system parameters. November 19, 2012 Department of Computer Science and Engineering 9/23
  10. 10. PACP Protocols Registration ProtocolOutline Generation ProtocolIntroduction Extraction ProtocolMotivationRelated WorksPACP [2]Secure Com-munication inVANETs withSelf-GeneratedPseudonymMechanism [3]ObservationsandComparisonsConclusion Figure: State transition diagram for pseudonym generation inReferences PACP[2]. November 19, 2012 Department of Computer Science and Engineering 10/23
  11. 11. Anonymous Communication in PACPOutlineIntroductionMotivationRelated Works Encryption ProtocolPACP [2]Secure Com- Decryption Protocolmunication inVANETs with Revocation ProtocolSelf-GeneratedPseudonymMechanism [3]ObservationsandComparisonsConclusionReferences November 19, 2012 Department of Computer Science and Engineering 11/23
  12. 12. OutlineIntroductionMotivationRelated WorksPACP [2] Second Candidate Solution: Secure Communication inSecure Com- VANETs with Self-Generated Pseudonym Mechanism [3].munication inVANETs withSelf-GeneratedPseudonymMechanism [3]ObservationsandComparisonsConclusionReferences November 19, 2012 Department of Computer Science and Engineering 12/23
  13. 13. Background ConceptsOutlineIntroductionMotivationRelated Works Identity-Based EncryptionPACP [2]Secure Com- Authorization Servermunication inVANETs with VehicleSelf-GeneratedPseudonymMechanism [3]ObservationsandComparisonsConclusionReferences November 19, 2012 Department of Computer Science and Engineering 13/23
  14. 14. Notations used in second candidate solutionOutlineIntroduction Notation DescriptionMotivation PRX /PUX Private/Public key of a vehicle X, X ∈ AS,V. α Pseudonym of vehicle broadcastingRelated Works e() Weil pairing map ⊕ Operator of cyclic additive group G1PACP [2] a·R R self adding a times, R ∈ G1 ⊗ Operator of cyclic multiplicative group G2Secure Com- tsv Timestamp of vehicle V.munication in Ek (m) Symmetrical encryption by using the secret key k toVANETs with encrypt the message m.Self-GeneratedPseudonymMechanism [3] Table: Notations used in second candidate solution.ObservationsandComparisonsConclusionReferences November 19, 2012 Department of Computer Science and Engineering 14/23
  15. 15. Different PhasesOutlineIntroductionMotivation Broadcasting PhaseRelated Works Message Authentication PhasePACP [2]Secure Com- Revoking Vehicle Phasemunication inVANETs with Online Secret Key Renewal PhaseSelf-GeneratedPseudonymMechanism [3] Recovering Identity PhaseObservationsandComparisonsConclusionReferences November 19, 2012 Department of Computer Science and Engineering 15/23
  16. 16. Observations from first candidate solutionOutlineIntroductionMotivation Hardness of ECDLPRelated Works BLS Short Signature and EncryptionPACP [2]Secure Com- Generation and Decryption Protocolsmunication inVANETs with Secure against linking attacksSelf-GeneratedPseudonymMechanism [3] Multiple PseudonymsObservationsandComparisonsConclusionReferences November 19, 2012 Department of Computer Science and Engineering 16/23
  17. 17. Observations from second candidate solutionOutlineIntroductionMotivation Hardness of ECDLPRelated Works AuthenticationPACP [2]Secure Com- Anonymitymunication inVANETs with UnlinkabilitySelf-GeneratedPseudonymMechanism [3] Non-RepudiationObservationsandComparisonsConclusionReferences November 19, 2012 Department of Computer Science and Engineering 17/23
  18. 18. Comparison of both the solutions with ECPPOutline First Solution Second Solu- ECPP [4]Introduction [2] tion [3]Motivation Authentication YES YES YES Anonymity YES YES YESRelated Works Unlinkability YES YES NO Traceability YES YES YESPACP [2] Integrity YES YES YES Non-Repudiation YES YES YESSecure Com-munication in Revoking Vehicle FASTER FAST SLOWVANETs with Resisting Replay Attack YES YES YESSelf-Generated Resisting Impersonation YES YES YESPseudonym AttackMechanism [3]Observations Table: Security comparisons.andComparisonsConclusionReferences November 19, 2012 Department of Computer Science and Engineering 18/23
  19. 19. Comparison of both the candidate solutionsOutline First Solution[2] Second Solution[3]Introduction Pseudonym Generation Done at vehicle by communicat- Done at vehicle by communi- ing with RSU each time. cating with the AuthorizationMotivation Server only once.Related Works Vehicle’s Registration Done Offline. Vehicle to be Done Online. Registers at physically present at MVD. Authorization Server via securePACP [2] channel. Load at RSU MORE LESSSecure Com- Communication Overhead in MORE LESSmunication in NetworkVANETs with Extent of Anonymity SAME SAMESelf-Generated Resisting Compromised RSU at- YES NOPseudonym tackMechanism [3] Secret Keys of Vehicle STATIC DYNAMICObservationsand Table: Comparison of two candidate solutions.ComparisonsConclusionReferences November 19, 2012 Department of Computer Science and Engineering 19/23
  20. 20. ConclusionOutlineIntroduction Different sides of the same coin.MotivationRelated Works Aims towards achieving anonymous communication withPACP [2] conditional privacy in VANET.Secure Com-munication in Second solution is an improvement over the first one inVANETs with some respect.Self-GeneratedPseudonymMechanism [3] Both can be merged to generate a better and efficientObservations solution.andComparisonsConclusionReferences November 19, 2012 Department of Computer Science and Engineering 20/23
  21. 21. References IOutlineIntroduction Boneh, D., and Franklin, M.Motivation Identity-based encryption from the weil pairing.Related Works SIAM J. Comput. 32, 3 (Mar. 2003), 586–615.PACP [2]Secure Com- Huang, D., Misra, S., Verma, M., and Xue, G.munication inVANETs with Pacp: An efficient pseudonymous authentication-basedSelf-GeneratedPseudonym conditional privacy protocol for vanets.Mechanism [3] Intelligent Transportation Systems, IEEE Transactions onObservationsand 12, 3 (sept. 2011), 736 –746.ComparisonsConclusionReferences November 19, 2012 Department of Computer Science and Engineering 21/23
  22. 22. References IIOutline Hwang, R. J., Hsiao, Y.-K., and Liu, Y.-F.Introduction Secure communication scheme of vanet with privacyMotivation preserving.Related Works In Parallel and Distributed Systems (ICPADS), 2011 IEEEPACP [2] 17th International Conference on (dec. 2011), pp. 654Secure Com-munication in –659.VANETs withSelf-Generated Lu, R., Lin, X., Zhu, H., Ho, P.-H., and Shen, X.PseudonymMechanism [3] Ecpp: Efficient conditional privacy preservation protocol forObservations secure vehicular communications.andComparisons In INFOCOM 2008. The 27th Conference on ComputerConclusion Communications. IEEE (april 2008), pp. 1229 –1237.References November 19, 2012 Department of Computer Science and Engineering 22/23
  23. 23. References IIIOutline Raya, M., and Hubaux, J.-P.Introduction Securing vehicular ad hoc networks.Motivation J. Comput. Secur. 15, 1 (Jan. 2007), 39–68.Related Works Raya, M., Papadimitratos, P., and Hubaux, J.-P.PACP [2] Securing vehicular communications.Secure Com-munication in Wireless Communications, IEEE 13, 5 (october 2006), 8VANETs withSelf-Generated –15.PseudonymMechanism [3] US Department of Transportation, N. H. T.Observationsand S. A.Comparisons Vehicle safety communication projects-final report.,Conclusion January 2008.References November 19, 2012 Department of Computer Science and Engineering 23/23
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×