SlideShare a Scribd company logo
Pietro Marchetta, Eduard Natale, Alessandro Salvi,
Antonio Tirri, Manuela Tufo, and Davide De Pasquale

Trusted Information and Security
in Smart Mobility Scenarios:
the case of S2-Move Project*
www.s2-move.it
*grant number PON04A3_00058
The S2-Move project (1/3)
}
}

Soft-real time information exchange among citizens, public
administrations and transportation systems
Services
} Road traffic estimation
} Fleet Management and Fleet Control (platooning)

!2
The S2-Move project (2/3)
}

Each vehicle is equipped with a OBU (On-Board Unit)
} Collecting in-vehicle data 

(e.g. speed, fuel consumption)

}

Sending data to a remote CPS 

(Central Processing System)


}

V2V (Vehicle-to-Vehicle) 

V2I (Vehicle-to-Infrastructure)

communication

!3
The S2-Move project (3/3)
}

CPS (Central Processing System)
}

Data acquisition
}

}
}

Urban probes 

(smartphone, vehicles, etc.)

Data processing
Services providing on annotated map

Data
Transmission
Manager

Presentation
Layer
Logical
Units
Data
Layer

!4
Protocol for data transmission
}

IEEE 802.11p is based on a communication outside the
BSS (Basic Service Set)
} Does not provide any kind of security

Fabrication Attacks

Replay Attacks

(e.g. accident ahead!)

(e.g. wrong traffic estimation)

Sybil Attacks
(e.g subvert reputation system)
1

1.Traffic Jam!
2

2.Traffic Jam!
Traffic Jam!

3

!5

3.Traffic Jam!
Security Services
}

IEEE 1609.2 uses PKI (Public Key Infrastructure)
} Each vehicle comes with:
IEEE 1609.2
} TPM (Trusted Platform Module)
IEEE 802.11p
} stores public and private key
}

Certificate (proves the vehicle identity)
}

}
}
}

CA (Certification Authority) needed
!

Integrity, Authenticity
Confidentiality (optional)
Privacy, Trustworthiness

Symmetric (AES-CCM)
Asymmetric (ECIES)

!6
IEEE 1609.2 Authentication
!
!
!
!
!
!
!
!
!

PUB

ECDSA
TPM

PRV

MEX

}

CERT

…do we need confidentiality?
!7
Certification lacks
}

Certificate ⇏
} Privacy
}

Vehicle recognition/tracking

Correct behavior of a user
!
Suspicious vehicles identification
} Revocation of the Trusted Component (RTC)
} - if an attacker is able to block RTC messages

- then use Certificate Revocation Lists (CRL)
} RSU forwards the list to the vehicles
}

}

All clear!
Increase speed!

!8
Communication Privacy
}

Possible solutions
1. Aliases
} ELP (Electronic License Plate) - by CA or TPM
2. Group Keys (signatures)
} The group provides anonymity outside its membership
}
}

Group private and public keys
Group Manager
id_c

TPM

id_b
id_a

GK_B
!9

GK_A
Messages propagation
}

Symmetric key: leader generates and sends the key to members, encrypted
with their public key
} Areas must overlap
} Vehicle V owns both keys

!
}

Advantages
} reduced overhead
} doesn’t need to contact the CA

V

!
}

GK_B

GK_A

Disadvantages
} This system does not guarantee:
} non-repudiation → solution: unique group-key pair (assigned and
revoked by CA)
} privacy
!10
Trust Models
}

}

}

Traditional models
} Each vehicle assigns a reputation to other vehicles
} Scalability?
Novel techniques
} Each vehicle assigns a reputation to a group
} What about short-living groups?
!
Data-oriented trust models → message-related
} Vehicle type (ambulance, police, bus, etc.)
} Dempster-Shafer Theory
} Opinion piggybacking
!11
The case of S2-Move Project (1/2)
}

CPS (Central Processing System)
}
}

}

Certification Server
Group management (keys assignment)
!

CPS may be unattainable
}

relies on network availability

Data
Transmission
Manager

Presentation
Layer
Logical
Units
Data
Layer

!12
The case of S2-Move Project (2/2)
}

}

Solution
} Symmetric key when network is unavailable
} Integrity and Authenticity guaranteed
} Group Management
} Privacy guaranteed
Hybrid trust models
M1

M1

M2

M2

CA - GM

CA - GM
!13
Future work
}

Experimental evaluation
} 802.11p - 1609.2 on-road analysis
} delay measurement
} different speed conditions

!
}

Investigating on particular events
} Followers exits a fleet
} Leader pushes a follower out of a fleet

!
}

Issues
} cars may not be on the road - how to deal with it?
} fleet control
!14
Thanks!
www.s2-move.it
!16
ECDSA Algorithm

!17
Dempster-Shafer Theory (DST)
}
}

Bayesian theory → probabilities
Belief functions (DST) → degrees of belief
!
belief ≤ plausibility

!
e.g. accident on a certain road
Vehicle A P(R1)=0.1, P(R2)=0.9
Vehicle B P(R1)=0.1, P(R3)=0.9
Vehicle C P(R1)=0.1, P(R4)=0.9

R1

R4

R2
R3

!18

More Related Content

Similar to Trusted Information and Security in Smart Mobility Scenarios: the case of S2-move project

A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
University of Piraeus
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANET
Pallavi Agarwal
 
IRJET- Accident Detection and Vehicle Safety using Zigbee
IRJET-  	  Accident Detection and Vehicle Safety using ZigbeeIRJET-  	  Accident Detection and Vehicle Safety using Zigbee
IRJET- Accident Detection and Vehicle Safety using Zigbee
IRJET Journal
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
csandit
 
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityA novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud security
TELKOMNIKA JOURNAL
 
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanets
csandit
 
Realtime Big Data Analytics for Event Detection in Highways
Realtime Big Data Analytics for Event Detection in HighwaysRealtime Big Data Analytics for Event Detection in Highways
Realtime Big Data Analytics for Event Detection in Highways
York University
 
IRJET- Smart Card Based Automated Toll Plaza System
IRJET-  	  Smart Card Based Automated Toll Plaza SystemIRJET-  	  Smart Card Based Automated Toll Plaza System
IRJET- Smart Card Based Automated Toll Plaza System
IRJET Journal
 
Congestion control & collision avoidance algorithm in intelligent transportation
Congestion control & collision avoidance algorithm in intelligent transportationCongestion control & collision avoidance algorithm in intelligent transportation
Congestion control & collision avoidance algorithm in intelligent transportation
IAEME Publication
 
VANET overview & technical review
VANET overview &  technical reviewVANET overview &  technical review
VANET Security and Trust
VANET Security and TrustVANET Security and Trust
VANET Security and Trust
Dr.Irshad Ahmed Sumra
 
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET- Survey on Delivering Hazardous Event Messages to Distinct VehiclesIRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET Journal
 
IMPROVE THE PERFORMANCE OF THE CNPV PROTOCOL IN VANET NETWORKS
IMPROVE THE PERFORMANCE OF THE CNPV PROTOCOL IN VANET NETWORKSIMPROVE THE PERFORMANCE OF THE CNPV PROTOCOL IN VANET NETWORKS
IMPROVE THE PERFORMANCE OF THE CNPV PROTOCOL IN VANET NETWORKS
IAEME Publication
 
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure VanetIRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Intelligent Intersection Management: A Survey
Intelligent Intersection Management: A SurveyIntelligent Intersection Management: A Survey
Intelligent Intersection Management: A Survey
IRJET Journal
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18
raymurphy9533
 
Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in Vanet
DhruvMarothi
 
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET  A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
IJECEIAES
 
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET Journal
 

Similar to Trusted Information and Security in Smart Mobility Scenarios: the case of S2-move project (20)

A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANET
 
IRJET- Accident Detection and Vehicle Safety using Zigbee
IRJET-  	  Accident Detection and Vehicle Safety using ZigbeeIRJET-  	  Accident Detection and Vehicle Safety using Zigbee
IRJET- Accident Detection and Vehicle Safety using Zigbee
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
 
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityA novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud security
 
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanets
 
Realtime Big Data Analytics for Event Detection in Highways
Realtime Big Data Analytics for Event Detection in HighwaysRealtime Big Data Analytics for Event Detection in Highways
Realtime Big Data Analytics for Event Detection in Highways
 
IRJET- Smart Card Based Automated Toll Plaza System
IRJET-  	  Smart Card Based Automated Toll Plaza SystemIRJET-  	  Smart Card Based Automated Toll Plaza System
IRJET- Smart Card Based Automated Toll Plaza System
 
Congestion control & collision avoidance algorithm in intelligent transportation
Congestion control & collision avoidance algorithm in intelligent transportationCongestion control & collision avoidance algorithm in intelligent transportation
Congestion control & collision avoidance algorithm in intelligent transportation
 
VANET overview & technical review
VANET overview &  technical reviewVANET overview &  technical review
VANET overview & technical review
 
VANET Security and Trust
VANET Security and TrustVANET Security and Trust
VANET Security and Trust
 
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET- Survey on Delivering Hazardous Event Messages to Distinct VehiclesIRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
 
IMPROVE THE PERFORMANCE OF THE CNPV PROTOCOL IN VANET NETWORKS
IMPROVE THE PERFORMANCE OF THE CNPV PROTOCOL IN VANET NETWORKSIMPROVE THE PERFORMANCE OF THE CNPV PROTOCOL IN VANET NETWORKS
IMPROVE THE PERFORMANCE OF THE CNPV PROTOCOL IN VANET NETWORKS
 
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure VanetIRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Intelligent Intersection Management: A Survey
Intelligent Intersection Management: A SurveyIntelligent Intersection Management: A Survey
Intelligent Intersection Management: A Survey
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18
 
Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in Vanet
 
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET  A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
 
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
 

Recently uploaded

Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 

Recently uploaded (20)

Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 

Trusted Information and Security in Smart Mobility Scenarios: the case of S2-move project

  • 1. Pietro Marchetta, Eduard Natale, Alessandro Salvi, Antonio Tirri, Manuela Tufo, and Davide De Pasquale Trusted Information and Security in Smart Mobility Scenarios: the case of S2-Move Project* www.s2-move.it *grant number PON04A3_00058
  • 2. The S2-Move project (1/3) } } Soft-real time information exchange among citizens, public administrations and transportation systems Services } Road traffic estimation } Fleet Management and Fleet Control (platooning) !2
  • 3. The S2-Move project (2/3) } Each vehicle is equipped with a OBU (On-Board Unit) } Collecting in-vehicle data 
 (e.g. speed, fuel consumption)
 } Sending data to a remote CPS 
 (Central Processing System)
 } V2V (Vehicle-to-Vehicle) 
 V2I (Vehicle-to-Infrastructure)
 communication !3
  • 4. The S2-Move project (3/3) } CPS (Central Processing System) } Data acquisition } } } Urban probes 
 (smartphone, vehicles, etc.) Data processing Services providing on annotated map Data Transmission Manager Presentation Layer Logical Units Data Layer !4
  • 5. Protocol for data transmission } IEEE 802.11p is based on a communication outside the BSS (Basic Service Set) } Does not provide any kind of security Fabrication Attacks Replay Attacks (e.g. accident ahead!) (e.g. wrong traffic estimation) Sybil Attacks (e.g subvert reputation system) 1 1.Traffic Jam! 2 2.Traffic Jam! Traffic Jam! 3 !5 3.Traffic Jam!
  • 6. Security Services } IEEE 1609.2 uses PKI (Public Key Infrastructure) } Each vehicle comes with: IEEE 1609.2 } TPM (Trusted Platform Module) IEEE 802.11p } stores public and private key } Certificate (proves the vehicle identity) } } } } CA (Certification Authority) needed ! Integrity, Authenticity Confidentiality (optional) Privacy, Trustworthiness Symmetric (AES-CCM) Asymmetric (ECIES) !6
  • 8. Certification lacks } Certificate ⇏ } Privacy } Vehicle recognition/tracking Correct behavior of a user ! Suspicious vehicles identification } Revocation of the Trusted Component (RTC) } - if an attacker is able to block RTC messages
 - then use Certificate Revocation Lists (CRL) } RSU forwards the list to the vehicles } } All clear! Increase speed! !8
  • 9. Communication Privacy } Possible solutions 1. Aliases } ELP (Electronic License Plate) - by CA or TPM 2. Group Keys (signatures) } The group provides anonymity outside its membership } } Group private and public keys Group Manager id_c TPM id_b id_a GK_B !9 GK_A
  • 10. Messages propagation } Symmetric key: leader generates and sends the key to members, encrypted with their public key } Areas must overlap } Vehicle V owns both keys ! } Advantages } reduced overhead } doesn’t need to contact the CA V ! } GK_B GK_A Disadvantages } This system does not guarantee: } non-repudiation → solution: unique group-key pair (assigned and revoked by CA) } privacy !10
  • 11. Trust Models } } } Traditional models } Each vehicle assigns a reputation to other vehicles } Scalability? Novel techniques } Each vehicle assigns a reputation to a group } What about short-living groups? ! Data-oriented trust models → message-related } Vehicle type (ambulance, police, bus, etc.) } Dempster-Shafer Theory } Opinion piggybacking !11
  • 12. The case of S2-Move Project (1/2) } CPS (Central Processing System) } } } Certification Server Group management (keys assignment) ! CPS may be unattainable } relies on network availability Data Transmission Manager Presentation Layer Logical Units Data Layer !12
  • 13. The case of S2-Move Project (2/2) } } Solution } Symmetric key when network is unavailable } Integrity and Authenticity guaranteed } Group Management } Privacy guaranteed Hybrid trust models M1 M1 M2 M2 CA - GM CA - GM !13
  • 14. Future work } Experimental evaluation } 802.11p - 1609.2 on-road analysis } delay measurement } different speed conditions ! } Investigating on particular events } Followers exits a fleet } Leader pushes a follower out of a fleet ! } Issues } cars may not be on the road - how to deal with it? } fleet control !14
  • 16. !16
  • 18. Dempster-Shafer Theory (DST) } } Bayesian theory → probabilities Belief functions (DST) → degrees of belief ! belief ≤ plausibility ! e.g. accident on a certain road Vehicle A P(R1)=0.1, P(R2)=0.9 Vehicle B P(R1)=0.1, P(R3)=0.9 Vehicle C P(R1)=0.1, P(R4)=0.9 R1 R4 R2 R3 !18