• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
 

Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection

on

  • 1,379 views

 

Statistics

Views

Total Views
1,379
Views on SlideShare
1,370
Embed Views
9

Actions

Likes
2
Downloads
9
Comments
0

2 Embeds 9

http://www.linkedin.com 7
https://twitter.com 2

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection Presentation Transcript

    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANETDesign and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography Restricted Usage of Anonymous Credentials in VANET for Misbehavior Detection Ankit Singh Fraunhofer SIT, Darmstadt, Germany June 25, 2012 Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANETDesign and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography 1 Introduction to Vehicular Ad-hoc Network (VANET) Overview of Basic Components in VANETs 2 Problem Statement What is the privacy issue in VANET? 3 IT Security and Privacy requirements in VANET Requirements 4 Design and Implementation of ACS Protocols for VANET Assumptions made for Designing the ACS protocols Players Participating in different Protocols Proposed Protocols Implementation of the Proposed Protocols and Contributions 5 Analysis, Conclusion and Future Work Analysis and Discussions Conclusion of the Thesis Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANETDesign and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography Future work of the Thesis 6 Bibliography Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET Overview of Basic Components in VANETsDesign and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work BibliographyWhat is VANET and Why we need VANET? I Safe and Secure travel Free flow of traffic Infotainment services Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET Overview of Basic Components in VANETsDesign and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work BibliographyOverview of Basic Components in VANETs I Basic Component of VANET Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET What is the privacy issue in VANET?Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work BibliographyProblem Statement I Vehicle A broadcasting message of traffic Jam Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET What is the privacy issue in VANET?Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work BibliographyProblem Statement II Vehicle A broadcasting message signed using a classical certificate Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET What is the privacy issue in VANET?Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work BibliographyProblem Statement III Vehicle A broadcasting message signed using a pseudonymous certificate Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET What is the privacy issue in VANET?Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work BibliographyProblem Statement IV Vehicle A broadcasting same message signed using multiple pseudonymous certificates Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET RequirementsDesign and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work BibliographyRequirements I Security Requirements Privacy Requirements Authentication Anonymity Accountability Unlinkability Verification of Data Consistency Restricted Credential usage Availability Perfect forward privacy Non-repudiation Credential revocation Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Assumptions made for Designing the ACS protocols IT Security and Privacy requirements in VANET Players Participating in different ProtocolsDesign and Implementation of ACS Protocols for VANET Proposed Protocols Analysis, Conclusion and Future Work Implementation of the Proposed Protocols and Contributions BibliographyAssumptions I Strong trust on issuer party Tamper proof storage device. Negotiations on attributes etc. are done before beginning of the protocols. Secure channel. Broadcasting messages. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Assumptions made for Designing the ACS protocols IT Security and Privacy requirements in VANET Players Participating in different ProtocolsDesign and Implementation of ACS Protocols for VANET Proposed Protocols Analysis, Conclusion and Future Work Implementation of the Proposed Protocols and Contributions BibliographyPlayers participating in different protocols I Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Assumptions made for Designing the ACS protocols IT Security and Privacy requirements in VANET Players Participating in different ProtocolsDesign and Implementation of ACS Protocols for VANET Proposed Protocols Analysis, Conclusion and Future Work Implementation of the Proposed Protocols and Contributions BibliographyProposed Protocols I Two versions of protocols are proposed for the problem statements: Setup protocol (common to both versions) Version 1 without revocation Issuance protocol V1: - Strong privacy. Signing protocol V1: - Achieved restricted usage of credential. Verifying protocol V1: - Detects fraud at verifier vehicle side - No revocation request. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Assumptions made for Designing the ACS protocols IT Security and Privacy requirements in VANET Players Participating in different ProtocolsDesign and Implementation of ACS Protocols for VANET Proposed Protocols Analysis, Conclusion and Future Work Implementation of the Proposed Protocols and Contributions BibliographyProposed Protocols II Version 2 with revocation Issuance protocol V2: - Weak privacy. - Adapted from V1. - Generates tracing ID. Signing protocol V2: - Adapted from V1 and randomizes tracing ID. Verifying protocol V2: - Adapted from V1 and revocation request Tracing and Revocation protocol: - Tracing of the fraud vehicle - Revocation of the credential. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Assumptions made for Designing the ACS protocols IT Security and Privacy requirements in VANET Players Participating in different ProtocolsDesign and Implementation of ACS Protocols for VANET Proposed Protocols Analysis, Conclusion and Future Work Implementation of the Proposed Protocols and Contributions BibliographyImplementation and Contributions I Designed Anonymous credential protocols for VANET Idemix java cryptographic library The Library was modified and extended: Support limited spending. Used domain pseudonyms for binding it to a time frame. Generating tracing ID. Generating multiple pseudonyms and saving it to a file. Randomizing tracing ID during signing protocol. Contributed in detecting the fraud at the receiver side. Modified library for preforming revocation. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Analysis and Discussions IT Security and Privacy requirements in VANET Conclusion of the ThesisDesign and Implementation of ACS Protocols for VANET Future work of the Thesis Analysis, Conclusion and Future Work BibliographyAnalysis and Discussions I Security requirements fulfilled ( : achieved; ◦: out of scope of this thesis) of data consistency Restricted cre- Authentication Credential Re- Confidentiality Accountability dential usage Verification repudiation Availability vocation Non- ◦ ◦ Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Analysis and Discussions IT Security and Privacy requirements in VANET Conclusion of the ThesisDesign and Implementation of ACS Protocols for VANET Future work of the Thesis Analysis, Conclusion and Future Work BibliographyAnalysis and Discussions II Privacy requirements fulfilled ( : achieved; ◦: out of scope of this thesis) Minimum dis- for- ward privacy Unlinkability Distributed Anonymity Resolution Authority Perfect closure ◦ Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Analysis and Discussions IT Security and Privacy requirements in VANET Conclusion of the ThesisDesign and Implementation of ACS Protocols for VANET Future work of the Thesis Analysis, Conclusion and Future Work BibliographyConclusion I Successfully ‘achieved restricted usage of anonymous credentials in VANET’. Successfully ‘detected the fraud of overspending anonymous credentials by vehicles’. Successfully ‘achieved revocation of the defaulter vehicle’s anonymous credential’. Challenge in the usage of the proposed protocols in VANET due to: Performance overhead of the protocols Signed message size Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Analysis and Discussions IT Security and Privacy requirements in VANET Conclusion of the ThesisDesign and Implementation of ACS Protocols for VANET Future work of the Thesis Analysis, Conclusion and Future Work BibliographyFuture work I Signing and Verifying protocol must be optimized to reduce the execution time Revocation protocol performance and strategy must be optimized Credential update should be made compulsory for the vehicle (Specially for revocation) Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANETDesign and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work BibliographyBibliography I Handbook of Applied Cryptography, Alfred. J. Menezes, Paul C. van Oorschot, Scott A. Vanstone (http://cacr.uwaterloo.ca/hac/). SECURITY WITHOUT IDENTIFICATION: TRANSACTION SYSTEMS TO MAKE BIG BROTHER OBSOLETE, DAVID CHAUM, Communications of the ACM, October 1985, Volume 28, Number 10. Privacy Requirements in Vehicular Communications Systems, Florian Schaub, Zhendong Ma, and Frank Kargl, Institute of Media Informatics, Ulm University, Germany. A signature scheme with efficient protocols. Jan Camenisch and Anna Lysyanskaya. In Stelvio Cimato, Clemente Galdi, and Giuseppe Persiano, editors, Security in Communication Networks, Third International Conference, SCN 2002, volume 2576 of Lecture Notes in Computer Science, pages 268-289. Springer Verlag, 2003. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, Jan Camenisch1 , Anna Lysyanskaya2 ,1 IBM Research, Zurich Research Laboratory CH-8803, R¨schlikon,2 MIT u LCS, 545 Technology Square, Cambridge, MA 02139 USA. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation, Jan Camenisch and Anna Lysyanskaya. In Birgit Pfitzmann, editor, Advances in Cryptology — EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 93-118. Springer Verlag, 2001. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANETDesign and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work BibliographyBibliography II PRIME - Privacy and Identity Management for Europe. https://www.prime-project.eu/ Last Access: June 25, 2012. IBM software safeguards consumer identity on the Web, IDEMIX, http://www.zurich.ibm.com/news/07/idemix.html and official Idemix blog: http://idemix.wordpress.com/ Last Access: June 25, 2012. Design and Implementation of the idemix Anonymous Credential System, Jan Camenisch and Els Van Herreweghen, IBM Research, Zurich Research Laboratory, Switzerland. Specification of the Identity Mixer Cryptographic Library, Version 2.3.3, IBM Research - Zurich, June 3, 2011. Idemix Java library source download https://prime.inf.tu-dresden.de/idemix/ Last Access: June 25, 2012. How to Explain Zero-Knowledge Protocols to Your Childern. QuisQuater Jean-Jacques(1) , Myriam, Muriel, Micha¨l GUILLOU Louis(2) , Marie Annick, Ga¨ Anna, Gwenol´, Soazig in collaboration with Tom e ıd, e BERSON(3) for the English version. (1) Philips Research Laboratory, Avenue Van Becelaere, 2, B-1170 (2) Brussels, Belgium. CCETT/EPT, BP 59, F-35512 Cesson S´vign´, France. (3) Anagram Laboratories, e e P.O. Box 791, Palo Alto CA 94301, USA. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANETDesign and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work BibliographyBibliography III Threshold Anonymous Announcement in VANETs, March 2011, Liqun Chen Member, IEEE Hewlett Packard Labs, Bristol, United Kingdom, Siaw-Lynn Ng, Department of Mathmatics, Royal Holloway, University of London, Egham, Surrey, United Kingdom and Guilin Wang, School of computer Science and Software Engineering, University of Wollongong, NSW, Australia. DAA: Fixing the pairing based protocols. L. Chen, P. Morrissey and N. P. Smart. Cryptology ePrint Archive: Report 2009/198, Withdrawn due to Major Flaw from http://eprint.iacr.org/2009/198 Last Access: June 25, 2012 K-times anonymous authentication (extended abstract). I. Teranishi, J. Furukawa, and K. Sako. Internet Systems Research Laboratories, NEC Corporation 1753 Shimonumabe, Nakahara-Ku, Kawasaki 211-8666, Japan. Commitment schemes and zero-knowledge protocols, 2007, I. Damg˚rd and J. B. Nielsen. a A GENERIC PUBLIC KEY INFRASTRUCTURE FOR SECURING CAR-TO-X COMMUNICATION. Norbert Bißmeyer1 , Hagen St¨bing2 , Elmar Schoch3 , Stefan G¨tz4 , Jan Peter Stotz1 , Brigitte Lonc5 . 1 Fraunhofer u o SIT, Secure Mobile Systems, 64295 Darmstadt, Germany. 2 Adam Opel AG, Active Safety, 65423 R¨sselsheim, Germany,3 Volkswagen AG, Security and Connectivity, 38436 Wolfsburg, Germany, u 4 Continental Teves AG & Co. oHG, Connected Systems, 60488, Frankfurt/Main, Germany, 5 RENAULT S.A.S., Electronic Systems Engineering Department, 1 Avenue du Golf, 78288 Guyancourt Cedex, France. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANETDesign and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work BibliographyBibliography IV Analysis of Revocation Strategies for Anonymous Idemix Credentials, Jorn Lapon1 , Markulf Kohlweiss3 , Bart de Decker2 , and Vincent Naessens1 , 1 Katholieke Hogeschool Sint-Lieven, Industrial Engineering, 2 Katholieke Universiteit Leuven, CS-DISTRINET, 3 Microsoft Research, Cambridge. Signature Schemes and Applications to Cryptographic Protocol Design. Anna Lysyanskaya. Ph.D. thesis, Massachusetts Institute of Technology, September 2002. Theft and Misuse Protection for Anonymous Credentials, Patrick Bichsel, Master Thesis MA-2007-42, June 2007 to November 2007, ETH, Switzerland. Master Thesis KATHOLIEKE UNIVERSITEIT LEUVEN: Smart Card Implementation of Anonymous Credentials, Josep Balasch, 2007 - 2008, Promotor: Prof. Dr. Ir. Bart Preneel. Smart card integration in the pseudonym system idemix, Luuk Danes, Master Thesis 18 December 2007, University of Groningen, faculty of mathematics and natural sciences. How to Win the Clone Wars: Efficient Periodic nTimes Anonymous Authentication, Jan Camenisch1 , Susan Hohenberger1 , Markulf Kohlweiss2 , Anna Lysyanskaya3 , Mira Meyerovich3 , 1 Zurich Research Lab IBM Research, 2 Dept. of Electrical Engineering, Katholieke Universiteit Leuven, 3 Computer Science Dept., Brown University. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANETDesign and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work BibliographyBibliography V V-tokens for Conditional Pseudonymity in VANETs. Florian Schaub∗ , Frank Kargel† , Zhendong Ma∗ , and Michael Weber∗ . ∗ Institute of Media Informatics, Ulm University, Germany, † Distributed and Embedded Security, University of Twente, The Netherlands. A Restricted Multi-show Credential System and Its Application on E-Voting, Joseph K. Liu1 and Duncan S. Wong2 , 1 Department of Information Engineering, The Chinese University of Hong Kong Shatin, Hong Kong, 2 Department of Computer Science, City University of Hong Kong Kowloon, Hong Kong. Anonymous k-Show Credentials, Mohamed Layouni and Hans Vangheluwe, School of Computer Science, McGill University, 3480 University Street, Montreal, H3A 2A7, Quebec, Canada. An integer commitment scheme based on groups with hidden order. Ivan Damøard and Eiichiro Fujisaki. In Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Sciences, pages 431- 444. Springer Verlag, 2000. Efficient attributes for anonymous credentials. Jan Camenisch and Thomas Gross. In Peng Ning, Paul F. Syverson, and Somesh Jha, editors, ACS Conference on Computer and communications Security, pages 345-356, 2008. Security Engineering for Vehicular IT Systems, Improving the Trustworthiness and Dependability of Automotive IT Applications, Marko Wolf. The Sybil Attack, John R. Douceur, Microsoft Research. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANETDesign and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work BibliographyBibliography VI How much does software add to the cost of today’s vehicles? How about tomorrow’s electric cars? by Sebastian Blanco on Jun 8th 2010, at Auto Blog Green: autobloggreen.com Design of 5.9GHz DSRC-based Vehicular Safety Communication, Daniel Jiang1 , Vikas Taliwal1 , Andreas Meier1 , Wieland Holfelder1 , Ralf Herrtwich2 , 1 DaimlerChrysler Research and Technology North America, Inc., 2 DaimlerChrysler AG, Vehicle IT and Services Research and Advanced Engineering. DSRC range comparison with FM Radio, cellular Phone, Satellite, Check FAQs, http://www.leearmstrong.com/DSRC/DSRCHomeset.htm Last Access: June 25, 2012. Security in Vehicular Ad Hoc Networks, Xiaodong Lin, Rongxing Lu, Chenxi Zhang, Haojin Zhu, Pin-Han Ho, and Xuemin (Sherman) Shen, University of Waterloo. Mandatory Enforcement of Privacy policies using Trusted Computing Principles, Frank Kargl, University of Twente, The Netherlands, Florian Schaub and Stefan Dietzel, Ulm University, Germany, Published in 2010, Association for the Advancement of Artificial Intelligence (www.aaai.org). Security Engineering for VANETs, Frank Kargl, Zhendong Ma, and Elmar Schoch, Ulm University, Institute of Media Informatics. The Security of Vehicular Ad Hoc Networks, Maxim Raya and Jean-Pierre Hubaux, Laboratory of computer Communications and Applications (LCA), School of Computer and Communication Sciences, EPFL, Switzerland. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
    • Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANETDesign and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work BibliographyBibliography VII Securing Vehicular Communications, Maxim Raya, Panos Papadimitratos, Jean-Pierre Hubaux, Laboratory of computer Communications and Applications (LCA), School of Computer and Communication Sciences, EPFL, Switzerland. Trusted Platform Module (TPM) Main Specification, Online Website: Trusted Computer Group (TCG). http://www.trustedcomputinggroup.org/resources/tpm_main_specification Last Access: June 25, 2012. Privacy in VANETs using Changing Pseudonyms - Ideal and Real, Matthias Gerlach and Felix G¨ttler. u M.Sc. Program, High Integrity System, University of Applied Sciences, Frankfurt am Main, Germany: http://tinyurl.com/high-integrity-systems Last Access: June 25, 2012. Database Management Systems, Third Edition, Ramakrishnan and Gehrke Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb