SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
Outline                  Secure Communication with Privacy
Introduction

Motivation
                               Preservation in VANET
Related Works

PACP [2]
                                          Ankit Gupta
Secure Com-
munication in                            M.Tech 2nd Year
VANETs with
Self-Generated
                                        Reg. No. 2011IS20
Pseudonym
Mechanism [3]
                         Department of Computer Science and Engineering
Observations
and                   Motilal Nehru National Institute of Technology Allahabad
Comparisons

Conclusion
                                       November 19, 2012
References




  November 19, 2012                            Department of Computer Science and Engineering   1/23
Outline


                  1 Introduction
Outline
                  2 Motivation
Introduction

Motivation
                  3 Related Works
Related Works

PACP [2]          4 PACP [2]
Secure Com-
munication in     5 Secure Communication in VANETs with Self-Generated
VANETs with
Self-Generated        Pseudonym Mechanism [3]
Pseudonym
Mechanism [3]

Observations
                  6 Observations and Comparisons
and
Comparisons
                  7 Conclusion
Conclusion

References        8 References


  November 19, 2012                             Department of Computer Science and Engineering   2/23
Introduction



Outline

Introduction

Motivation

Related Works
                      Ad-Hoc Network
PACP [2]              Vehicular Ad-Hoc Network (VANET)
Secure Com-
munication in
                      Need of VANETs
VANETs with
Self-Generated        Privacy Preservation in VANETs
Pseudonym
Mechanism [3]

Observations
and
Comparisons

Conclusion

References




  November 19, 2012                         Department of Computer Science and Engineering   3/23
Motivation



Outline

Introduction

Motivation            Tracking mechanisms are getting advanced.
Related Works         Adversary can track a vehicle by observing its
PACP [2]              communication and movement patterns.
Secure Com-
munication in         Preserving privacy and anonymous communication inside
VANETs with
Self-Generated        the VANET is a double-edged feature.
Pseudonym
Mechanism [3]         Vehicles in VANET need conditional privacy.
Observations
and
Comparisons

Conclusion

References




  November 19, 2012                           Department of Computer Science and Engineering   4/23
Related Works



Outline

Introduction          Research works on authentication to ensure security in
Motivation            VANET [5, 6].
Related Works
                      Vehicle Safety Communication Project (VSC) [7].
PACP [2]
                      Efficient Conditional Privacy Preservation (ECPP)
Secure Com-
munication in         Protocol [4].
VANETs with
Self-Generated
Pseudonym
                      Public Key Infrastructure (PKI) is used in most of the
Mechanism [3]
                      schemes designed for anonymity in VANET.
Observations
and                   Existing schemes are not truly anonymous.
Comparisons

Conclusion

References




  November 19, 2012                           Department of Computer Science and Engineering   5/23
Outline

Introduction

Motivation

Related Works
                       First Candidate Solution: PACP: An Efficient
PACP [2]
                  Pseudonymous Authentication-Based Conditional Privacy
Secure Com-
munication in                          Protocol [2].
VANETs with
Self-Generated
Pseudonym
Mechanism [3]

Observations
and
Comparisons

Conclusion

References




  November 19, 2012                       Department of Computer Science and Engineering   6/23
Background Concepts



Outline

Introduction

Motivation

Related Works
                      Conditional Privacy
PACP [2]              Bilinear Mapping [1]
Secure Com-
munication in
                      Identity-Based Encryption [1]
VANETs with
Self-Generated        Elliptic Curve Discrete Logarithmic Problem (ECDLP)
Pseudonym
Mechanism [3]

Observations
and
Comparisons

Conclusion

References




  November 19, 2012                           Department of Computer Science and Engineering   7/23
Network Model for VANET



Outline

Introduction

Motivation

Related Works

PACP [2]

Secure Com-
munication in
VANETs with
Self-Generated
Pseudonym
Mechanism [3]

Observations
and
Comparisons

Conclusion

References                 Figure: Network Model for VANET[2].


  November 19, 2012                      Department of Computer Science and Engineering   8/23
Notations used in PACP and Publicly known
                 system parameters

                                           Notation      Description
                                           ID            The Identity of the vehicle
                                           Ri            The Identity of RSU Ri (also its public key)
Outline                                    SR            The Private key of RSU Ri
                                              i
Introduction                               RTH           Threshold value of the RSU
                                           CertR         Identity-based Certificate of RSU Ri
                                                 i
Motivation                                 SIG (M; K )   ECC-based signature of using key K.
                                           PMVD          The Public Key of the MVD
Related Works                              SMVD          The Private Key of the MVD
                                           M             Message
PACP [2]                                   C             Ciphertext
Secure Com-
munication in                                  Table: Notations used in PACP.
VANETs with
Self-Generated
Pseudonym
Mechanism [3]         e : G1 × G1 → G2
                      ˆ                                  Mapping from an additive group G1 to a multiplicative group G2
                      P G1                               P is a generator of G1
Observations          PMVD = αP                          Public Key of MVD
and                   H : G1 → (0, 1)n                   H, H1 , H2 are publicly known hash functions
Comparisons           H1 : G2 → (0, 1)n
                      H2 : (0, 1)n × (0, 1)n → (0, 1)n
Conclusion

References                             Table: Publicly known system parameters.


  November 19, 2012                                               Department of Computer Science and Engineering          9/23
PACP Protocols

                       Registration Protocol
Outline
                       Generation Protocol
Introduction           Extraction Protocol
Motivation

Related Works

PACP [2]

Secure Com-
munication in
VANETs with
Self-Generated
Pseudonym
Mechanism [3]

Observations
and
Comparisons

Conclusion
                  Figure: State transition diagram for pseudonym generation in
References        PACP[2].


  November 19, 2012                              Department of Computer Science and Engineering   10/23
Anonymous Communication in PACP



Outline

Introduction

Motivation

Related Works
                      Encryption Protocol
PACP [2]

Secure Com-
                      Decryption Protocol
munication in
VANETs with           Revocation Protocol
Self-Generated
Pseudonym
Mechanism [3]

Observations
and
Comparisons

Conclusion

References




  November 19, 2012                         Department of Computer Science and Engineering   11/23
Outline

Introduction

Motivation

Related Works

PACP [2]
                   Second Candidate Solution: Secure Communication in
Secure Com-       VANETs with Self-Generated Pseudonym Mechanism [3].
munication in
VANETs with
Self-Generated
Pseudonym
Mechanism [3]

Observations
and
Comparisons

Conclusion

References




  November 19, 2012                      Department of Computer Science and Engineering   12/23
Background Concepts



Outline

Introduction

Motivation

Related Works
                      Identity-Based Encryption
PACP [2]

Secure Com-
                      Authorization Server
munication in
VANETs with           Vehicle
Self-Generated
Pseudonym
Mechanism [3]

Observations
and
Comparisons

Conclusion

References




  November 19, 2012                          Department of Computer Science and Engineering   13/23
Notations used in second candidate solution



Outline

Introduction
                      Notation               Description
Motivation            PRX /PUX               Private/Public key of a vehicle X, X ∈ AS,V.
                      α                      Pseudonym of vehicle broadcasting
Related Works         e()                    Weil pairing map
                      ⊕                      Operator of cyclic additive group G1
PACP [2]              a·R                    R self adding a times, R ∈ G1
                      ⊗                      Operator of cyclic multiplicative group G2
Secure Com-           tsv                    Timestamp of vehicle V.
munication in         Ek (m)                 Symmetrical encryption by using the secret key k to
VANETs with                                  encrypt the message m.
Self-Generated
Pseudonym
Mechanism [3]                Table: Notations used in second candidate solution.
Observations
and
Comparisons

Conclusion

References




  November 19, 2012                                   Department of Computer Science and Engineering   14/23
Different Phases



Outline

Introduction

Motivation            Broadcasting Phase
Related Works
                      Message Authentication Phase
PACP [2]

Secure Com-           Revoking Vehicle Phase
munication in
VANETs with           Online Secret Key Renewal Phase
Self-Generated
Pseudonym
Mechanism [3]
                      Recovering Identity Phase
Observations
and
Comparisons

Conclusion

References




  November 19, 2012                            Department of Computer Science and Engineering   15/23
Observations from first candidate solution



Outline

Introduction

Motivation            Hardness of ECDLP
Related Works
                      BLS Short Signature and Encryption
PACP [2]

Secure Com-           Generation and Decryption Protocols
munication in
VANETs with           Secure against linking attacks
Self-Generated
Pseudonym
Mechanism [3]
                      Multiple Pseudonyms
Observations
and
Comparisons

Conclusion

References




  November 19, 2012                           Department of Computer Science and Engineering   16/23
Observations from second candidate solution



Outline

Introduction

Motivation            Hardness of ECDLP
Related Works
                      Authentication
PACP [2]

Secure Com-           Anonymity
munication in
VANETs with           Unlinkability
Self-Generated
Pseudonym
Mechanism [3]
                      Non-Repudiation
Observations
and
Comparisons

Conclusion

References




  November 19, 2012                       Department of Computer Science and Engineering   17/23
Comparison of both the solutions with ECPP



Outline
                                                    First Solution    Second     Solu-   ECPP [4]
Introduction                                        [2]               tion [3]
Motivation            Authentication                YES               YES                YES
                      Anonymity                     YES               YES                YES
Related Works         Unlinkability                 YES               YES                NO
                      Traceability                  YES               YES                YES
PACP [2]              Integrity                     YES               YES                YES
                      Non-Repudiation               YES               YES                YES
Secure Com-
munication in         Revoking Vehicle              FASTER            FAST               SLOW
VANETs with           Resisting Replay Attack       YES               YES                YES
Self-Generated        Resisting     Impersonation   YES               YES                YES
Pseudonym             Attack
Mechanism [3]

Observations
                                           Table: Security comparisons.
and
Comparisons

Conclusion

References




  November 19, 2012                                        Department of Computer Science and Engineering   18/23
Comparison of both the candidate solutions



Outline
                                                      First Solution[2]                Second Solution[3]
Introduction          Pseudonym Generation            Done at vehicle by communicat-   Done at vehicle by communi-
                                                      ing with RSU each time.          cating with the Authorization
Motivation
                                                                                       Server only once.
Related Works         Vehicle’s Registration          Done Offline. Vehicle to be        Done Online.      Registers at
                                                      physically present at MVD.       Authorization Server via secure
PACP [2]                                                                               channel.
                      Load at RSU                     MORE                             LESS
Secure Com-           Communication Overhead in       MORE                             LESS
munication in         Network
VANETs with           Extent of Anonymity             SAME                             SAME
Self-Generated        Resisting Compromised RSU at-   YES                              NO
Pseudonym             tack
Mechanism [3]
                      Secret Keys of Vehicle          STATIC                           DYNAMIC
Observations
and                                   Table: Comparison of two candidate solutions.
Comparisons

Conclusion

References




  November 19, 2012                                             Department of Computer Science and Engineering      19/23
Conclusion



Outline

Introduction
                      Different sides of the same coin.
Motivation

Related Works
                      Aims towards achieving anonymous communication with
PACP [2]              conditional privacy in VANET.
Secure Com-
munication in
                      Second solution is an improvement over the first one in
VANETs with           some respect.
Self-Generated
Pseudonym
Mechanism [3]         Both can be merged to generate a better and efficient
Observations          solution.
and
Comparisons

Conclusion

References




  November 19, 2012                           Department of Computer Science and Engineering   20/23
References I



Outline

Introduction          Boneh, D., and Franklin, M.
Motivation            Identity-based encryption from the weil pairing.
Related Works
                      SIAM J. Comput. 32, 3 (Mar. 2003), 586–615.
PACP [2]

Secure Com-           Huang, D., Misra, S., Verma, M., and Xue, G.
munication in
VANETs with           Pacp: An efficient pseudonymous authentication-based
Self-Generated
Pseudonym             conditional privacy protocol for vanets.
Mechanism [3]
                      Intelligent Transportation Systems, IEEE Transactions on
Observations
and                   12, 3 (sept. 2011), 736 –746.
Comparisons

Conclusion

References




  November 19, 2012                            Department of Computer Science and Engineering   21/23
References II



Outline               Hwang, R. J., Hsiao, Y.-K., and Liu, Y.-F.
Introduction          Secure communication scheme of vanet with privacy
Motivation            preserving.
Related Works         In Parallel and Distributed Systems (ICPADS), 2011 IEEE
PACP [2]              17th International Conference on (dec. 2011), pp. 654
Secure Com-
munication in
                      –659.
VANETs with
Self-Generated        Lu, R., Lin, X., Zhu, H., Ho, P.-H., and Shen, X.
Pseudonym
Mechanism [3]         Ecpp: Efficient conditional privacy preservation protocol for
Observations          secure vehicular communications.
and
Comparisons           In INFOCOM 2008. The 27th Conference on Computer
Conclusion            Communications. IEEE (april 2008), pp. 1229 –1237.
References




  November 19, 2012                           Department of Computer Science and Engineering   22/23
References III



Outline
                      Raya, M., and Hubaux, J.-P.
Introduction
                      Securing vehicular ad hoc networks.
Motivation            J. Comput. Secur. 15, 1 (Jan. 2007), 39–68.
Related Works
                      Raya, M., Papadimitratos, P., and Hubaux, J.-P.
PACP [2]
                      Securing vehicular communications.
Secure Com-
munication in         Wireless Communications, IEEE 13, 5 (october 2006), 8
VANETs with
Self-Generated        –15.
Pseudonym
Mechanism [3]         US Department of Transportation, N. H. T.
Observations
and
                      S. A.
Comparisons
                      Vehicle safety communication projects-final report.,
Conclusion
                      January 2008.
References




  November 19, 2012                           Department of Computer Science and Engineering   23/23

Contenu connexe

Tendances

Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsTharindu Weerasinghe
 
01 introduction to_module
01 introduction to_module01 introduction to_module
01 introduction to_moduleAPU
 
IRJET- ARGON2id IP Core
IRJET- ARGON2id IP CoreIRJET- ARGON2id IP Core
IRJET- ARGON2id IP CoreIRJET Journal
 
A Game Theoretic Framework for Heterogenous Information Network Clustering
A Game Theoretic Framework for Heterogenous Information Network ClusteringA Game Theoretic Framework for Heterogenous Information Network Clustering
A Game Theoretic Framework for Heterogenous Information Network ClusteringFaris Alqadah
 
8. design patterns
8. design patterns8. design patterns
8. design patternsAPU
 
A New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsA New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsEswar Publications
 
Recurrent Neural Networks RNN - Xavier Giro - UPC TelecomBCN Barcelona 2020
Recurrent Neural Networks RNN - Xavier Giro - UPC TelecomBCN Barcelona 2020Recurrent Neural Networks RNN - Xavier Giro - UPC TelecomBCN Barcelona 2020
Recurrent Neural Networks RNN - Xavier Giro - UPC TelecomBCN Barcelona 2020Universitat Politècnica de Catalunya
 
Error control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codesError control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codesIAEME Publication
 
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key AlgorithmImplementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key AlgorithmIOSR Journals
 
Zhao huang deep sim deep learning code functional similarity
Zhao huang deep sim   deep learning code functional similarityZhao huang deep sim   deep learning code functional similarity
Zhao huang deep sim deep learning code functional similarityitrejos
 
Colored Image Watermarking Technique Based on HVS using HSV Color Model
Colored Image Watermarking Technique Based on HVS using HSV Color ModelColored Image Watermarking Technique Based on HVS using HSV Color Model
Colored Image Watermarking Technique Based on HVS using HSV Color ModelIDES Editor
 
Design and implementation of hierarchical visual
Design and implementation of hierarchical visualDesign and implementation of hierarchical visual
Design and implementation of hierarchical visualIJNSA Journal
 

Tendances (16)

Fuzzy causal order
Fuzzy causal orderFuzzy causal order
Fuzzy causal order
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
 
D0941824
D0941824D0941824
D0941824
 
01 introduction to_module
01 introduction to_module01 introduction to_module
01 introduction to_module
 
IRJET- ARGON2id IP Core
IRJET- ARGON2id IP CoreIRJET- ARGON2id IP Core
IRJET- ARGON2id IP Core
 
A Game Theoretic Framework for Heterogenous Information Network Clustering
A Game Theoretic Framework for Heterogenous Information Network ClusteringA Game Theoretic Framework for Heterogenous Information Network Clustering
A Game Theoretic Framework for Heterogenous Information Network Clustering
 
Cloud, Fog, or Edge: Where and When to Compute?
Cloud, Fog, or Edge: Where and When to Compute?Cloud, Fog, or Edge: Where and When to Compute?
Cloud, Fog, or Edge: Where and When to Compute?
 
8. design patterns
8. design patterns8. design patterns
8. design patterns
 
A New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsA New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
A New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
 
Recurrent Neural Networks RNN - Xavier Giro - UPC TelecomBCN Barcelona 2020
Recurrent Neural Networks RNN - Xavier Giro - UPC TelecomBCN Barcelona 2020Recurrent Neural Networks RNN - Xavier Giro - UPC TelecomBCN Barcelona 2020
Recurrent Neural Networks RNN - Xavier Giro - UPC TelecomBCN Barcelona 2020
 
Error control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codesError control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codes
 
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key AlgorithmImplementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
 
Zhao huang deep sim deep learning code functional similarity
Zhao huang deep sim   deep learning code functional similarityZhao huang deep sim   deep learning code functional similarity
Zhao huang deep sim deep learning code functional similarity
 
Colored Image Watermarking Technique Based on HVS using HSV Color Model
Colored Image Watermarking Technique Based on HVS using HSV Color ModelColored Image Watermarking Technique Based on HVS using HSV Color Model
Colored Image Watermarking Technique Based on HVS using HSV Color Model
 
Design and implementation of hierarchical visual
Design and implementation of hierarchical visualDesign and implementation of hierarchical visual
Design and implementation of hierarchical visual
 
Private datawarehouse queries
Private datawarehouse queriesPrivate datawarehouse queries
Private datawarehouse queries
 

En vedette

[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network SecurityLim Jung
 
Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networkinganita maharjan
 
Secure Communication
Secure CommunicationSecure Communication
Secure CommunicationKoen Van Impe
 
VANET Simulation - Jamal Toutouh
VANET Simulation - Jamal  ToutouhVANET Simulation - Jamal  Toutouh
VANET Simulation - Jamal ToutouhJamal Toutouh, PhD
 
A Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsA Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsabhijit parmar
 
Vanet ns2 simulation
Vanet ns2 simulationVanet ns2 simulation
Vanet ns2 simulationciza2013
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSSridhar Raghavan
 
Spark at NASA/JPL-(Chris Mattmann, NASA/JPL)
Spark at NASA/JPL-(Chris Mattmann, NASA/JPL)Spark at NASA/JPL-(Chris Mattmann, NASA/JPL)
Spark at NASA/JPL-(Chris Mattmann, NASA/JPL)Spark Summit
 
Spark and Spark Streaming at Netfix-(Kedar Sedekar and Monal Daxini, Netflix)
Spark and Spark Streaming at Netfix-(Kedar Sedekar and Monal Daxini, Netflix)Spark and Spark Streaming at Netfix-(Kedar Sedekar and Monal Daxini, Netflix)
Spark and Spark Streaming at Netfix-(Kedar Sedekar and Monal Daxini, Netflix)Spark Summit
 
2017 Partager les places de son parking d'entreprise
2017 Partager les places de son parking d'entreprise2017 Partager les places de son parking d'entreprise
2017 Partager les places de son parking d'entrepriseStephane Seigneurin
 

En vedette (20)

VANET overview & technical review
VANET overview &  technical reviewVANET overview &  technical review
VANET overview & technical review
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
 
Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networking
 
Secure Communication
Secure CommunicationSecure Communication
Secure Communication
 
VANET Simulation - Jamal Toutouh
VANET Simulation - Jamal  ToutouhVANET Simulation - Jamal  Toutouh
VANET Simulation - Jamal Toutouh
 
Vanet routing
Vanet routingVanet routing
Vanet routing
 
Smart parking - Happiestminds !
Smart parking - Happiestminds !Smart parking - Happiestminds !
Smart parking - Happiestminds !
 
A Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsA Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETs
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
Vanet ns2 simulation
Vanet ns2 simulationVanet ns2 simulation
Vanet ns2 simulation
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
Vanet Presentation
Vanet PresentationVanet Presentation
Vanet Presentation
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkS
 
Building a Smarter Home with Apache NiFi and Spark
Building a Smarter Home with Apache NiFi and SparkBuilding a Smarter Home with Apache NiFi and Spark
Building a Smarter Home with Apache NiFi and Spark
 
Spark at NASA/JPL-(Chris Mattmann, NASA/JPL)
Spark at NASA/JPL-(Chris Mattmann, NASA/JPL)Spark at NASA/JPL-(Chris Mattmann, NASA/JPL)
Spark at NASA/JPL-(Chris Mattmann, NASA/JPL)
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
Spark and Spark Streaming at Netfix-(Kedar Sedekar and Monal Daxini, Netflix)
Spark and Spark Streaming at Netfix-(Kedar Sedekar and Monal Daxini, Netflix)Spark and Spark Streaming at Netfix-(Kedar Sedekar and Monal Daxini, Netflix)
Spark and Spark Streaming at Netfix-(Kedar Sedekar and Monal Daxini, Netflix)
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Smart Parking
Smart ParkingSmart Parking
Smart Parking
 
2017 Partager les places de son parking d'entreprise
2017 Partager les places de son parking d'entreprise2017 Partager les places de son parking d'entreprise
2017 Partager les places de son parking d'entreprise
 

Similaire à Secure Communication with Privacy Preservation in VANET

IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLhiij
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLijccsa
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLijccsa
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocolneirew J
 
Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.IRJET Journal
 
Csit77404
Csit77404Csit77404
Csit77404csandit
 
Software defined networking introduction
Software defined networking introductionSoftware defined networking introduction
Software defined networking introductionEktaSoni20
 
A novel algorithm for software defined networks model to enhance the quality ...
A novel algorithm for software defined networks model to enhance the quality ...A novel algorithm for software defined networks model to enhance the quality ...
A novel algorithm for software defined networks model to enhance the quality ...IJECEIAES
 
Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...IJECEIAES
 
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET Journal
 
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In VanetAn Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanetijcisjournal
 
AODVMO: A Security Routing Protocol using One-Time Password Authentication Me...
AODVMO: A Security Routing Protocol using One-Time Password Authentication Me...AODVMO: A Security Routing Protocol using One-Time Password Authentication Me...
AODVMO: A Security Routing Protocol using One-Time Password Authentication Me...IJCNCJournal
 
AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME PASSWORD AUTHENTICATION ME...
AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME PASSWORD AUTHENTICATION ME...AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME PASSWORD AUTHENTICATION ME...
AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME PASSWORD AUTHENTICATION ME...IJCNCJournal
 
An Efficient Privacy-Preserving MutualAuthenticationScheme for Secure V2VComm...
An Efficient Privacy-Preserving MutualAuthenticationScheme for Secure V2VComm...An Efficient Privacy-Preserving MutualAuthenticationScheme for Secure V2VComm...
An Efficient Privacy-Preserving MutualAuthenticationScheme for Secure V2VComm...JAYAPRAKASH JPINFOTECH
 
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...Open Networking Perú (Opennetsoft)
 
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptxAn Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptxSandeep Maurya
 
Troubleshooting for Intent-based Networking
Troubleshooting for Intent-based NetworkingTroubleshooting for Intent-based Networking
Troubleshooting for Intent-based NetworkingOpen Networking Summit
 
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised AlgorithmsDDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised Algorithmsijfls
 
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMSDDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMSijfls
 
S.a.kalaiselvan udrpg dynamic key management based node
S.a.kalaiselvan   udrpg dynamic key management based nodeS.a.kalaiselvan   udrpg dynamic key management based node
S.a.kalaiselvan udrpg dynamic key management based nodekalaiselvanresearch
 

Similaire à Secure Communication with Privacy Preservation in VANET (20)

IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
 
Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.
 
Csit77404
Csit77404Csit77404
Csit77404
 
Software defined networking introduction
Software defined networking introductionSoftware defined networking introduction
Software defined networking introduction
 
A novel algorithm for software defined networks model to enhance the quality ...
A novel algorithm for software defined networks model to enhance the quality ...A novel algorithm for software defined networks model to enhance the quality ...
A novel algorithm for software defined networks model to enhance the quality ...
 
Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...
 
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
 
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In VanetAn Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
 
AODVMO: A Security Routing Protocol using One-Time Password Authentication Me...
AODVMO: A Security Routing Protocol using One-Time Password Authentication Me...AODVMO: A Security Routing Protocol using One-Time Password Authentication Me...
AODVMO: A Security Routing Protocol using One-Time Password Authentication Me...
 
AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME PASSWORD AUTHENTICATION ME...
AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME PASSWORD AUTHENTICATION ME...AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME PASSWORD AUTHENTICATION ME...
AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME PASSWORD AUTHENTICATION ME...
 
An Efficient Privacy-Preserving MutualAuthenticationScheme for Secure V2VComm...
An Efficient Privacy-Preserving MutualAuthenticationScheme for Secure V2VComm...An Efficient Privacy-Preserving MutualAuthenticationScheme for Secure V2VComm...
An Efficient Privacy-Preserving MutualAuthenticationScheme for Secure V2VComm...
 
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
 
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptxAn Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
 
Troubleshooting for Intent-based Networking
Troubleshooting for Intent-based NetworkingTroubleshooting for Intent-based Networking
Troubleshooting for Intent-based Networking
 
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised AlgorithmsDDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
 
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMSDDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
 
S.a.kalaiselvan udrpg dynamic key management based node
S.a.kalaiselvan   udrpg dynamic key management based nodeS.a.kalaiselvan   udrpg dynamic key management based node
S.a.kalaiselvan udrpg dynamic key management based node
 

Secure Communication with Privacy Preservation in VANET

  • 1. Outline Secure Communication with Privacy Introduction Motivation Preservation in VANET Related Works PACP [2] Ankit Gupta Secure Com- munication in M.Tech 2nd Year VANETs with Self-Generated Reg. No. 2011IS20 Pseudonym Mechanism [3] Department of Computer Science and Engineering Observations and Motilal Nehru National Institute of Technology Allahabad Comparisons Conclusion November 19, 2012 References November 19, 2012 Department of Computer Science and Engineering 1/23
  • 2. Outline 1 Introduction Outline 2 Motivation Introduction Motivation 3 Related Works Related Works PACP [2] 4 PACP [2] Secure Com- munication in 5 Secure Communication in VANETs with Self-Generated VANETs with Self-Generated Pseudonym Mechanism [3] Pseudonym Mechanism [3] Observations 6 Observations and Comparisons and Comparisons 7 Conclusion Conclusion References 8 References November 19, 2012 Department of Computer Science and Engineering 2/23
  • 3. Introduction Outline Introduction Motivation Related Works Ad-Hoc Network PACP [2] Vehicular Ad-Hoc Network (VANET) Secure Com- munication in Need of VANETs VANETs with Self-Generated Privacy Preservation in VANETs Pseudonym Mechanism [3] Observations and Comparisons Conclusion References November 19, 2012 Department of Computer Science and Engineering 3/23
  • 4. Motivation Outline Introduction Motivation Tracking mechanisms are getting advanced. Related Works Adversary can track a vehicle by observing its PACP [2] communication and movement patterns. Secure Com- munication in Preserving privacy and anonymous communication inside VANETs with Self-Generated the VANET is a double-edged feature. Pseudonym Mechanism [3] Vehicles in VANET need conditional privacy. Observations and Comparisons Conclusion References November 19, 2012 Department of Computer Science and Engineering 4/23
  • 5. Related Works Outline Introduction Research works on authentication to ensure security in Motivation VANET [5, 6]. Related Works Vehicle Safety Communication Project (VSC) [7]. PACP [2] Efficient Conditional Privacy Preservation (ECPP) Secure Com- munication in Protocol [4]. VANETs with Self-Generated Pseudonym Public Key Infrastructure (PKI) is used in most of the Mechanism [3] schemes designed for anonymity in VANET. Observations and Existing schemes are not truly anonymous. Comparisons Conclusion References November 19, 2012 Department of Computer Science and Engineering 5/23
  • 6. Outline Introduction Motivation Related Works First Candidate Solution: PACP: An Efficient PACP [2] Pseudonymous Authentication-Based Conditional Privacy Secure Com- munication in Protocol [2]. VANETs with Self-Generated Pseudonym Mechanism [3] Observations and Comparisons Conclusion References November 19, 2012 Department of Computer Science and Engineering 6/23
  • 7. Background Concepts Outline Introduction Motivation Related Works Conditional Privacy PACP [2] Bilinear Mapping [1] Secure Com- munication in Identity-Based Encryption [1] VANETs with Self-Generated Elliptic Curve Discrete Logarithmic Problem (ECDLP) Pseudonym Mechanism [3] Observations and Comparisons Conclusion References November 19, 2012 Department of Computer Science and Engineering 7/23
  • 8. Network Model for VANET Outline Introduction Motivation Related Works PACP [2] Secure Com- munication in VANETs with Self-Generated Pseudonym Mechanism [3] Observations and Comparisons Conclusion References Figure: Network Model for VANET[2]. November 19, 2012 Department of Computer Science and Engineering 8/23
  • 9. Notations used in PACP and Publicly known system parameters Notation Description ID The Identity of the vehicle Ri The Identity of RSU Ri (also its public key) Outline SR The Private key of RSU Ri i Introduction RTH Threshold value of the RSU CertR Identity-based Certificate of RSU Ri i Motivation SIG (M; K ) ECC-based signature of using key K. PMVD The Public Key of the MVD Related Works SMVD The Private Key of the MVD M Message PACP [2] C Ciphertext Secure Com- munication in Table: Notations used in PACP. VANETs with Self-Generated Pseudonym Mechanism [3] e : G1 × G1 → G2 ˆ Mapping from an additive group G1 to a multiplicative group G2 P G1 P is a generator of G1 Observations PMVD = αP Public Key of MVD and H : G1 → (0, 1)n H, H1 , H2 are publicly known hash functions Comparisons H1 : G2 → (0, 1)n H2 : (0, 1)n × (0, 1)n → (0, 1)n Conclusion References Table: Publicly known system parameters. November 19, 2012 Department of Computer Science and Engineering 9/23
  • 10. PACP Protocols Registration Protocol Outline Generation Protocol Introduction Extraction Protocol Motivation Related Works PACP [2] Secure Com- munication in VANETs with Self-Generated Pseudonym Mechanism [3] Observations and Comparisons Conclusion Figure: State transition diagram for pseudonym generation in References PACP[2]. November 19, 2012 Department of Computer Science and Engineering 10/23
  • 11. Anonymous Communication in PACP Outline Introduction Motivation Related Works Encryption Protocol PACP [2] Secure Com- Decryption Protocol munication in VANETs with Revocation Protocol Self-Generated Pseudonym Mechanism [3] Observations and Comparisons Conclusion References November 19, 2012 Department of Computer Science and Engineering 11/23
  • 12. Outline Introduction Motivation Related Works PACP [2] Second Candidate Solution: Secure Communication in Secure Com- VANETs with Self-Generated Pseudonym Mechanism [3]. munication in VANETs with Self-Generated Pseudonym Mechanism [3] Observations and Comparisons Conclusion References November 19, 2012 Department of Computer Science and Engineering 12/23
  • 13. Background Concepts Outline Introduction Motivation Related Works Identity-Based Encryption PACP [2] Secure Com- Authorization Server munication in VANETs with Vehicle Self-Generated Pseudonym Mechanism [3] Observations and Comparisons Conclusion References November 19, 2012 Department of Computer Science and Engineering 13/23
  • 14. Notations used in second candidate solution Outline Introduction Notation Description Motivation PRX /PUX Private/Public key of a vehicle X, X ∈ AS,V. α Pseudonym of vehicle broadcasting Related Works e() Weil pairing map ⊕ Operator of cyclic additive group G1 PACP [2] a·R R self adding a times, R ∈ G1 ⊗ Operator of cyclic multiplicative group G2 Secure Com- tsv Timestamp of vehicle V. munication in Ek (m) Symmetrical encryption by using the secret key k to VANETs with encrypt the message m. Self-Generated Pseudonym Mechanism [3] Table: Notations used in second candidate solution. Observations and Comparisons Conclusion References November 19, 2012 Department of Computer Science and Engineering 14/23
  • 15. Different Phases Outline Introduction Motivation Broadcasting Phase Related Works Message Authentication Phase PACP [2] Secure Com- Revoking Vehicle Phase munication in VANETs with Online Secret Key Renewal Phase Self-Generated Pseudonym Mechanism [3] Recovering Identity Phase Observations and Comparisons Conclusion References November 19, 2012 Department of Computer Science and Engineering 15/23
  • 16. Observations from first candidate solution Outline Introduction Motivation Hardness of ECDLP Related Works BLS Short Signature and Encryption PACP [2] Secure Com- Generation and Decryption Protocols munication in VANETs with Secure against linking attacks Self-Generated Pseudonym Mechanism [3] Multiple Pseudonyms Observations and Comparisons Conclusion References November 19, 2012 Department of Computer Science and Engineering 16/23
  • 17. Observations from second candidate solution Outline Introduction Motivation Hardness of ECDLP Related Works Authentication PACP [2] Secure Com- Anonymity munication in VANETs with Unlinkability Self-Generated Pseudonym Mechanism [3] Non-Repudiation Observations and Comparisons Conclusion References November 19, 2012 Department of Computer Science and Engineering 17/23
  • 18. Comparison of both the solutions with ECPP Outline First Solution Second Solu- ECPP [4] Introduction [2] tion [3] Motivation Authentication YES YES YES Anonymity YES YES YES Related Works Unlinkability YES YES NO Traceability YES YES YES PACP [2] Integrity YES YES YES Non-Repudiation YES YES YES Secure Com- munication in Revoking Vehicle FASTER FAST SLOW VANETs with Resisting Replay Attack YES YES YES Self-Generated Resisting Impersonation YES YES YES Pseudonym Attack Mechanism [3] Observations Table: Security comparisons. and Comparisons Conclusion References November 19, 2012 Department of Computer Science and Engineering 18/23
  • 19. Comparison of both the candidate solutions Outline First Solution[2] Second Solution[3] Introduction Pseudonym Generation Done at vehicle by communicat- Done at vehicle by communi- ing with RSU each time. cating with the Authorization Motivation Server only once. Related Works Vehicle’s Registration Done Offline. Vehicle to be Done Online. Registers at physically present at MVD. Authorization Server via secure PACP [2] channel. Load at RSU MORE LESS Secure Com- Communication Overhead in MORE LESS munication in Network VANETs with Extent of Anonymity SAME SAME Self-Generated Resisting Compromised RSU at- YES NO Pseudonym tack Mechanism [3] Secret Keys of Vehicle STATIC DYNAMIC Observations and Table: Comparison of two candidate solutions. Comparisons Conclusion References November 19, 2012 Department of Computer Science and Engineering 19/23
  • 20. Conclusion Outline Introduction Different sides of the same coin. Motivation Related Works Aims towards achieving anonymous communication with PACP [2] conditional privacy in VANET. Secure Com- munication in Second solution is an improvement over the first one in VANETs with some respect. Self-Generated Pseudonym Mechanism [3] Both can be merged to generate a better and efficient Observations solution. and Comparisons Conclusion References November 19, 2012 Department of Computer Science and Engineering 20/23
  • 21. References I Outline Introduction Boneh, D., and Franklin, M. Motivation Identity-based encryption from the weil pairing. Related Works SIAM J. Comput. 32, 3 (Mar. 2003), 586–615. PACP [2] Secure Com- Huang, D., Misra, S., Verma, M., and Xue, G. munication in VANETs with Pacp: An efficient pseudonymous authentication-based Self-Generated Pseudonym conditional privacy protocol for vanets. Mechanism [3] Intelligent Transportation Systems, IEEE Transactions on Observations and 12, 3 (sept. 2011), 736 –746. Comparisons Conclusion References November 19, 2012 Department of Computer Science and Engineering 21/23
  • 22. References II Outline Hwang, R. J., Hsiao, Y.-K., and Liu, Y.-F. Introduction Secure communication scheme of vanet with privacy Motivation preserving. Related Works In Parallel and Distributed Systems (ICPADS), 2011 IEEE PACP [2] 17th International Conference on (dec. 2011), pp. 654 Secure Com- munication in –659. VANETs with Self-Generated Lu, R., Lin, X., Zhu, H., Ho, P.-H., and Shen, X. Pseudonym Mechanism [3] Ecpp: Efficient conditional privacy preservation protocol for Observations secure vehicular communications. and Comparisons In INFOCOM 2008. The 27th Conference on Computer Conclusion Communications. IEEE (april 2008), pp. 1229 –1237. References November 19, 2012 Department of Computer Science and Engineering 22/23
  • 23. References III Outline Raya, M., and Hubaux, J.-P. Introduction Securing vehicular ad hoc networks. Motivation J. Comput. Secur. 15, 1 (Jan. 2007), 39–68. Related Works Raya, M., Papadimitratos, P., and Hubaux, J.-P. PACP [2] Securing vehicular communications. Secure Com- munication in Wireless Communications, IEEE 13, 5 (october 2006), 8 VANETs with Self-Generated –15. Pseudonym Mechanism [3] US Department of Transportation, N. H. T. Observations and S. A. Comparisons Vehicle safety communication projects-final report., Conclusion January 2008. References November 19, 2012 Department of Computer Science and Engineering 23/23