Security Infrastructure For Vanets

  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Security Infrastructure For Vanets as PDF for free.

More details

  • Words: 2,478
  • Pages: 6
Security Infrastructure for VANETs Ashwin Rao 2006ANY7513 Project Supervisor: Dr. Arzad A Kherani

Abstract The primary objective of vehicular ad hoc networks (VANETs), i.e., secure communication of the time critical information, is possible only if a robust infrastructure provides this security at all times. This document explores the dependency of performance of VANETs on the mechanism used for providing this security infrastructure

1

Introduction

Most of the critical messages in VANETs are broadcast oriented safety messages that should have a deep penetration and should be delivered in a short time. Additionally these messages must be secure and must not leak personal, identifying, or linkable information to unauthorised parties, as the owners of the vehicles involved in the communication have a right to privacy. Thus the important points in VANET security are

A mobile ad hoc network (MANET) is a kind of an ad hoc network of mobile nodes connected by wireless links. The nodes are free to move randomly and organise themselves arbitrarily. A Vehicular ad hoc network (VANET) is a special kind of MANET in which the mobile nodes are vehicles. The main difference between VANETs and MANETs is that in VANETs the nodes move in a random but predictable manner, but at much higher speeds compared to traditional MANETs. The advantage of VANETs over traditional ad hoc networks is that nodes (vehicles) possess substantial power resources. VANETs enable vehicles to communicate with each other (V2V) and road side infrastructure (V2I) to increase the awareness of their surroundings thereby increasing safety and possibly optimising traffic. The applications running over VANETs are be broadly classified as • Safety related applications - e.g. Warning messages.

• Authentication - There can be malicious and genuine sources for messages in VANETs. Authentication is the ability to distinguish between these sources. • Anonymity - The physical identity of the originator of a message should not be easily identifiable from the message • Data Integrity - The data received are exactly as sent by the authorized entity without any modification [3]

Early

• Best Effort Applications - e.g. Infotainment, traffic optimisation.

• Low Overhead - The messages being time critical, the security overheads should retain the usefulness of the message.

• Secure Transactions - e.g. Toll collection. 1

2

Abbreviations

The commonly used abbreviations in the VANET literature are [1] • DSRC - is a short to medium range communications service that supports both public safety and private operations in roadside to vehicle and vehicle to vehicle communication environments. Figure 1: 1609.x Protocol Stack

• ACID - An application class identifier is a code(number) that identifies a class of applications.

• IEEE P1609.1 - Resource Manager - describes the key components of the WAVE system architecture and defines data flows and resources at all points. It also defines command message formats and data storage formats that must be used by applications to communicate between architecture components, and specifies the types of devices that may be supported by the OBU resident on the vehicle or mobile platform.

• ACM - An application context mark is a code that identifies a specific instance of an application within a class. • OBU - A WAVE device that can operate when in motion and supports information exchange with roadside units (RSUs) and other OBUs. • RSU - A wireless access in vehicular environments (WAVE) device that operates only when stationary and supports information exchange with on board units (OBUs).

• IEEE P1609.2 - Security Services for Applications and Management Messages - defines secure message formats and processing. It also defines the circumstances for using secure message exchanges and how those messages should be processed based upon the purpose of the exchange.

• WAVE - Wireless Access in Vehicular Environments (WAVE), a new name for DSRC [2].

3

Current VANETs

Scenario

• IEEE P1609.3 - Networking Services - defines network and transport layer services in support of secure WAVE data exchange. It also defines Wave Short Messages(WSM), providing an efficient WAVE-specific alternative to IPv6(Internet Protocol version 6) that can be directly supported by applications.

in

The IEEE 1609 Family of Standards [1] define an architecture and a complementary, standardised set of services and interfaces that collectively enable secure vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) wireless communications. The layers of the protocol stack are as follows

• IEEE P1609.4 - Multi-Channel Operations - provides enhancements to the IEEE 802.11 MAC to support WAVE opera2

• Other delays - time is not critical, e.g. intelligent traffic flow control.

tions. It provides mechanisms for prioritised access to the physical channel. The IEEE P1609.2 standard defines secure message formats and the processing of those secure messages within the WAVE system using the Public Key Infrastructure(PKI). It covers methods for securing WAVE management messages and application messages with the exception of vehicle originating safety messages, and also describes administrative functions necessary to support core security functions. For obtaining anonymity each vehicle is issued a set of certificates, as periodically sent beacons with position and time information enable external eavesdroppers to create movement profiles [4]. But for the robustness of the security, timely access to revocation information is important. However real time availability and penetration of the revocation information is a particularly hard problem in vehicular networks. Some proposals for certificate revocation in vehicular networks have been made [8], which include temporary revocation of the attacker till the connection to the CA is established. Security requirement and time constraints for applications based on criticality of the information have been proposed and the security characteristics of these applications along with general characteristics like degree human involvement on events have been enumerated in [7]. The end to end delays based on the criticality of the applications are as follows.

4

Algorithm to Accept/Drop Messages

The trivial algorithm for accepting/dropping a message relies on a local information that is residing at the receiving OBU in terms of the CRLs. The mechanism proposes dropping a received message if the sender happens to be in the CRLs. However, it is not very clear what step should be taken if the sending entity is not listed in the CRLs available at the receiving OBU. Clearly, absence of the sender in the CRLs available at the receiver does not guarantee that the sender’s certificate has not been revoked by the authority (CA) that issued certificate to the sender. Thus, the receiver faces the dilemma of whether to accept the message or simply drop it. In order to improve the performance of the message flow in V2V communications, an most important point to be addressed is to have an algorithm (criteria) to accept/drop a message received by an OBU. In short the packet can be accepted/dropped based on the Confidence On the Security infrastructure(CoS). The Security Infrastructure represents the Public Key Infrastructure along with the mechanism for issue and distribution of certificates and CRLs issued by the CAs. Hence the CoS is the probability of accepting the packet when the certificate is not present in the CRLs available in the OBU and the • Up to 0.5 seconds - message is highly crit- packet satisfies all other criteria mentioned in the standard for accepting the packets. ical, e.g. break down warning. This CoS is dependent on

• 0.5 seconds to 1 second - time is critical, e.g. emergency vehicle approaching warning.

• The freshness of the certificate under consideration. This freshness of the certificate specifies how fresh the current certificate is. The more recent/fresh the less probable is its revocation. This freshness complements the honest majority concept

• 1 to 5 seconds - delays up to 5 seconds are acceptable, e.g. glare reduction. 3

of vehicular networks that assumes most of the nodes in the V2V are honest, but the cost of obtaining this freshness needs to be analysed for various Security Infrastructure designs.

determines the number of certificates and CRLs to be stored, hence the storage capacity limits the maximum number of CRLs that can be stored in the OBU. • The number of certificates in the certificate chain. The number of links/certificates in the certificate chain to the root determines the number of CAs whose certificates and CRLs need to be stored in the OBU.

• The freshness of the CRLs. The freshness of CRLs in the OBU is the penetration capacity of the CRLs, which in turn is completely dependent on the mechanism used for distributing the CRLs. The concept of freshness of certificates is not new but a similar concept was mentioned in [9] and can be obtained if security infrastructure considers the following points.

• The expected number of certificates revoked and its distribution geographically. The expected number of certificates revoked and the geographical distribution of these revocations determines the number of CRLs required in the OBU. This is related to the density of nodes in the geographical regions under consideration. e.g. If the security infrastructure is designed such that a vehicle requires a new certificate if it relocates from one geographical region to another, then only the CRLs of the current geographical region are needed on the OBU.

• The signer should provide all the evidence (if possible) the acceptor needs, including the recency/freshness information. Fresh certificates are the best evidence. • The acceptor of the messages should set the recency/freshness requirements of the certificate and not the CA. Thus if the performance is measured as the fraction of packets dropped due to failure in authenticating a genuine sender, to the total number of packets transmitted, then the mechanism used for implementing the security infrastructure determines the performance of the system.

5

• The relocation (migration) model of the vehicles. The relocation model describes how the vehicle migrates from one region to the other. If the certificate is to remain the same across geographical domains then the relocation model determines the maximum number of regions whose CRLs need to be stored on the OBU.

Design Constraints for the Security Infrastructure

The high mobility of vehicles and the unavailability of connection with the PKI at all times makes design of the security infrastructure a non trivial task. The factors that affect the design of the security infrastructure, thus the CoS are

• The Mobility Model of the vehicles. The mobility model describes how the vehicle moves from one geographical region to another. This along with the density of the nodes determines the number of other nodes(RSUs and OBUs) the given node communicates.

• The storage capacity of the OBU. As mentioned above the security infrastructure 4

• A certificate is issued by a CA in one region and it is valid only in the region of issue. On relocation the certificate need to be re-signed or a new certificate needs to be issued by the CA of the current region.

• Life time of a certificate. This determines the time for which the certificates need to be stored on the OBU. The ways of implementing the security infrastructure can be broadly classified as 1. Only one CA for all vehicles. This has many issues like monopoly and the fact that no organisation is universally trusted.

• A certificate is issued by a CA of one region and is valid in a set of regions that are near 1 the region of issue. On relocation new certificates wont be required in near by regions.

2. Manufacturer Based- The manufacturer is the CA

• Each vehicle manufacturer is the CA Some critical questions that need to be anfor the vehicles it produces swered by the security infrastructure are • A representative of a group of manu1. Who are the CAs authorised to issue to a facturers is the CA for vehicles procertificate? duces by member manufacturers. This is the most important question and its answer provides the core design of the This model poses the following probsecurity infrastructure. lems [5] 2. How will the certificates be distributed? The issuing authority can authorise other organisations to distribute the certificates issued by it. This is analogous to the registration authorities concept mentioned in [6].

• Coordination in installing certificates. • Coordination for distribution of revocation lists in vehicles running on road. • It doesn’t optimise on localisation of information like, probability of communicating with vehicles registered in the same region is high in the region of registration.

3. What is the life-time of the certificate? What is the procedure for renewal of the certificates? The above 2 questions is addresses the frequency with which the certificates need to be renewed, thus can provide the time limit for the relocation model.

3. Geographical Region Based- This can be implemented as vehicle registration authorities becoming the CAs.

4. Is there any support for freshness checks • A certificate is issued by a CA of done by certificate owner i.e the OBU? one region and is valid across all geThis can be provided by the amount of ographical regions. time for which the vehicles can access the The relocation model is such that PKI. with a given certificate a vehicle can 1 The factors that determine whether a region is near theoretically relocate to all other ge- to the region of issue or not depends on the relocation ographical regions in the life-time of model and probability with which a vehicle migrates to the certificate. the region under question from the region of issue. 5

5. What is/are the geographical region(s) for [4] Klaus P., Thomas Nowey, and Christian which the given certificate is valid? Mletzko. Towards a security architecture for vehicular ad hoc networks. First Inter6. How is the relocation of the vehicles hannational Conference on Availability, Reliadled? bility and Security, 2006. 7. What are the conditions for revocation?

[5] Bryan Parno and Adrian Perrig. Challenges in securing vehicular networks. 8. How will the revocation lists be propagated? [6] Radia Perlman. An overview of pki trust models. IEEE Network, 1999. 9. How many CRLs need to stored on the OBU? [7] A. Kung R. Kroh and F. Kargl. Vanets security requirements version 1.0.

6

Future Work

7

Conclusion

[8] Maxim Raya, Daniel Jungels, Panos Papadimitratos, Imad Aad, and Jean-Pierre The factors affecting the design of the secuHubaux. Certificate revocation in vehicurity infrastructure are now very limited, and lar networks. 2006. work needs to be done in obtaining other factors. Comparisons of the various implementa- [9] Ronald L. Rivest. Can we eliminate certions need to be analysed, in different scenartificate revocation lists? Proceedings of Fiios. The impact of the implementation of the nancial Cryptography, 1998. Security Infrastructure on the CoS and thus on the performance of the system, needs to be analysed. Simulations need to be carried out to support the results obtained through theoretical analysis.

Along with strong cryptographic algorithms to provide security, an equally strong infrastructure is required for effective secure communication between the communicating entities in VANETs.

References [1] http://ieeexplore.ieee.org/xpl/standards.jsp. [2] http://standards.ieee.org/board/nes/projects/16090.pdf. [3] Cryptography and Network Security. Pearson Education International., 2006. 6

Related Documents