The trusted Platform module (TPM) is used inside the vehicle and plays a key role to establish trust within the vehicle and also with other vehicles and network infrastructure. In this paper, a protocol is proposed which is based on a property based attestation (PBA) also known as Vehicular Property based attestation Protocol (VPP). In this proposed protocol, it is not based on the properties of the hardware and software of the vehicle; rather it depends on the static or dynamic properties of the system which has been configured. We would expect that the protocol will fulfill the need for a more secure and trusted mechanism for users using the safety and non-safety applications and services in the vehicular network.
2. Vehicular ad-hoc network is a special kind of network in which
nodes (Vehicles) can communicate with each other on the road
and with its Infrastructure.
Road Side Unit (RSU)
V2V
V2V
Basic VANET Architecture
2
V2I
3. Safety Applications
Non Safety Applications
Work
in Progress
Plz! use Alt.
route
Work Zone
Warning:!!!
Work Zone
Warning:!!!
Shopping MALL
( TESCO )
Parking Slot
Available!!!
RSU Parking Slot
Available!!!
3
4. “an entity can be trusted if it always behaves in
the expected manner for intended purpose”.
all components of the network (vehicles and
infrastructure) are behaving in an
expected manner
(secure communication between the
components) and serve the users and save
human lives.
Attacker
Change
the
behavior
5. User Behavior
Node Behavior
Road Side Unit (RSU) Behavior
Attacker RSU
Node
User
Attack
User
Node
RSU
Attacker
Attacks
Exchange
Secure
information
A B
H
F
C
G
Warning:!!!
Accident at location Y.
D E
Broadcast Road
Condition Warning !!!!!
RSU
D
C
A B
6. Security is one of the most important issues in vehicular
network. Applications of vehicular network should be secure
and user receives right information while traversing along
their journey.
Trust is also a key component of security and trust is governs
the behavior all components in the network which must
behave in the expected manner.
User, vehicle and road side unit (RSU) are some components
of trusted vehicular network. If any of these components of
network unexpectedly change their behavior then it would
signify that there is a breach of trust in the network.
7. Tamper Proof Device (TPD)
Event Data Recorder (EDR)
Trusted Platform Module (TPM)
Global Position System (GPS)
Radar Systems (RSs)
Communication Facility (CF)
Computing Platform (CP)
Human Machine Interface (HMI)
8. Trusted Platform Module is a hardware module designed for secure
computing and can be integrated into any device for example in
notebook.
TPM is a piece of hardware and need software to communicate with
it to protect and store data in secure location. It can resist software
attacks but problem is that it cannot control hardware tempering.
9.
10.
11. The proposed protocol is also based on the PBA protocol
which provides attestation on some security properties in a
vehicular environment. We view that attestation is critically
necessary for vehicles and RSU trusted platforms.
In this proposed protocol, the focus is mainly on properties
making attestation on the basis of the required properties
only which should be dynamic and may consist of security,
trust or privacy properties. If users conform to the required
properties for using the applications or services, then they
would be allowed to become a part of the network and use
the services.
12.
13. Trusted computing ensures security and trust in a vehicular
environment. The TPM is the key module of a trusted
computing group (TCG) and plays a key role for the security
of a platform.
The attestation mechanism is to ensure the security of the
platform and the Property based attestation is one of the
possible attestation mechanisms used to attest platforms on
the basis of some particular properties.
In this paper, a protocol has been proposed and this protocol
is based on the property based attestation (PBA).The purpose
of using this attestation method in a vehicular network is due
to its dynamic behavior and the high mobility of the network
node.