Top Banner
Wenmao Liu Harbin Institute of Technology China
16

Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

Mar 27, 2015

Download

Documents

Caleb Tucker
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

Wenmao Liu

Harbin Institute of Technology

China

Page 2: Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

Outline

ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion

Page 3: Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

Problems in current TS

Congestions Accidents

Page 4: Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

ITS & VANETs

Intelligent Transportation Systems(ITS)Systems adding information and

communications technology to transport infrastructure and vehicles.

Vehicular Ad-Hoc Networks(VANETs)Subset of MANETsVehicles talk to each other and the road side

infrastructures with wireless devicesIntelligent ?

Page 5: Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

Benefits of VANETs

Congestions : reduced

Accidents : avoided

Page 6: Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

Benefit of VANETs

Improve entertainmentWIFI accessOnline musicReal time positionFind restaurants …

Page 7: Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

Security Issues

Driving is a life-or-death matter Many attackers for many purposes

TerroristsCrackersMessage BlockersIllusion makers

Page 8: Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

Solutions

Cryptography Intrusion Detection Authentication (PKI) Pseudonym (fake ID)

Page 9: Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

Scenario

Page 10: Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

An autonomous architecture

Page 11: Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

An autonomous architecture Servers

CA clustersLog serversApplication Servers

Roadside infrastructures Vehicles

Page 12: Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

Autonomous system setup Node deployment Backbone node generation Autonomous gather

Page 13: Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

Vehicle authentication Authentication process of a vehicle o to a

roadside infrastructure r.r broadcasts its certificate .o verifies r’s certificate.o challenges r and sends its own certificate as

piggyback to save timer verifies o’s identity, and then answers the

challengeo checks whether the return message value

equal the challenge message, if yes, r is legal, vice versa. Then o calculates the challenge n and sends it back.

r verifies o’s validity by checking the response

Page 14: Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

Secure Communication

Pseudonym scope Certificate Cache & Forward

Tcache = Length/ Speedn

Length = (r2 − (dmn sin )2 + dmn cos α)1/2

Page 15: Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

Conclusion

ITS and VANETs offer promising future for transportation.

Reducing overheads of roadside infrastructures

A complete authentication Regional trust relationship and

autonomy guarantee scalability

Page 16: Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.

The End