Dr. Panos Papadimitratos
|
|
- Kristina Anderson
- 6 years ago
- Views:
Transcription
1 Dr. Panos Papadimitratos Ecole Polytechnique Fédéral de Lausanne (EPFL)
2 2 Security in Vehicle-to-Vehicle (V2V) and Vehicle-to- Infrastructure (V2I) Communications
3 Security and Privacy Why? 3 o Safety (?) Warning: Accident at (x,y,z)! o Efficiency (?) Warning: Congestion at (x,y,z) RSU TOC!! Traffic Update: Congestion at (x,y,z); Use alternate route!! RSU
4 Security and Privacy Why? 4
5 SEVECOM is a Transversal Project 5 Security Industry Standards esafety SecurIST PRIME C2C-CC Security WG COMeSafety SafeSpot CVIS egovernment SEVECOM Coopers Modinis-IDM GST
6 Security Baseline Architecture 6 o Requirements Authentication, Integrity, Non-repudiation, Access control, Confidentiality Availability Privacy Liability identification
7 7 o Objectives Focus on communication Baseline Privacy Enhancing Technology (PET) Future dynamic deployment of stronger PETs o Baseline solution design approach Standardized cryptographic primitives Easy-to-implement Low overhead Adaptable protection
8 8 o Challenges High rate broadcast communication VANET-only (e.g., safety) and TCP/IP communication Safety Applications General Applications C2C-CC Position Based Routing Wave Short Message Protocol (WSMP) TCP / UDP IPv6 C2C-CC MAC IEEE p MAC and PHY IEEE
9 9 o Basic ideas Unique Identity Credentials and Cryptographic Keys Long-term identity Public key crypto EC-DSA, RSA Certificates Central Processing Module Wireless Communication Module Abstract view of a vehicle
10 10 o Basic ideas (cont d) Pseudonym: Remove all identifying information from certificate Equip vehicles with multiple pseudonyms Alternate among pseudonyms over time (and space) Sign message with the private key corresponding to pseudonym Append current pseudonym to signed message
11 11 o Basic Ideas (cont d) Using Pseudonyms PSNYM_2 PSNYM_3 PSNYM_2 PSNYM_1 PSNYM_3 PSNYM_2 PSNYM_1 PSNYM_1
12 12 o System setup Authority X Long-term Identification Authority A Pseudonym Provider PSNYM_1,, PSNYM_k Vehicle V
13 13 o System setup (cont d) Multiple pseudonym providers Organization 1 Organization 2... Organization n V-PNYM-1 V-PNYM-2 V-PNYM-n... Vehicle V
14 14 o Pseudonym format PSNYM-Provider ID PSNYM Lifetime Public Key PSNYM-Provider Signature o Supplying vehicles with pseudonyms Sufficient in number Periodic refills PSNYM_1 PSNYM_2 PSNYM_3 PSNYM_4 PSNYM_k1 PSNYM_1 PSNYM_2 PSNYM_3 PSNYM_4 PSNYM_k2 PSNYM_1 PSNYM_2 PSNYM_3 PSNYM_4 PSNYM_k3 Time
15 15 o Pseudonym Change Mechanism PSNYM_1,, PSNYM_k PSNYM_1,, PSNYM_k Inputs: Vehicle Location Vehicle Clock Recipient(s) / (Verifier(s)) o One pseudonym per day (?) o One per transaction (?) Pseudonym Selection Process Inputs: Local (vehicle) and Authority Privacy Policies Output: Use PSNYM_i for period [t i,t i+1 ] Vehicle V
16 16 o Other vehicle network identifiers: e.g., IP and MAC addresses o Change addresses along with pseudonyms o Maintain addresses only when necessary, but encapsulate Server S AP B AP A AP C PSNYM_k IP c IP S PSNYM_j IP B IP S PSNYM_i IP A
17 17 o Pseudonym resolution Pseudonymous Communication Transcript Authority O Vehicle V generated the transcript
18 18 o Baseline Solution Well-accepted building blocks (e.g., cryptographic primitives) and concepts (e.g., anonymized certificates/pseudonyms) Adaptation to enhance protection o Investigation of alternative techniques Newer cryptography o Flexible Security Architecture Plug-in stronger privacy enhancing technology
19 Thank you! 19 o Questions? o
Secure Vehicle Communication. SEVECOM (SE-cure VE-hicle COM-munication) General Introduction SEVECOM General Introduction
Secure Vehicle Communication SEVECOM (SE-cure VE-hicle COM-munication) General Introduction 1 Outline Vehicle Communication Security and Privacy Threats Research topics Preliminary results 2 Vehicle Communication
More informationSecure and Privacy Preserving Vehicular Communication Systems: Identity and Credential Management Infrastructure
KTH ROYAL INSTITUTE OF TECHNOLOGY Secure and Privacy Preserving Vehicular Communication Systems: Identity and Credential Management Infrastructure Mohammad Khodaei and Panos Papadimitratos Networked Systems
More informationSecurity of vehicular communications. Vehicular communication (VC) systems
Security of vehicular communications vehicular safety communications design constraints attacker classes desired security services a security architecture Vehicular communication (VC) systems motivations:
More informationVehicular Communications (VC) Security on Wheels. Vehicular Communications (VC) (cont d) Vehicles equipped with. Efficiency. Safety.
IEEE VNC 2011 Keynote Security on Wheels Vehicular Communications (VC) Vehicles equipped with Computers Sensors Including positioning systems (GPS, Galileo) Wireless transceivers Panos Papadimitratos www.ee.kth.se/~papadim
More informationCar2Car Communication Consortium C2C-CC
Car2Car Communication Consortium C2C-CC Secure Vehicular Communication: Results and Challenges Ahead February 20th/21st 2008, Lausanne Benjamin Weyl BMW Group Research and Technology Chair C2C-CC Security
More informationCOMeSafety Specific Support Action
COMeSafety Specific Support Action Towards a Common European Communication Architecture for for Cooperative Systems Current Status, Major Issues, Next Steps Dr. Dr. Timo Timo Kosch Kosch BMW BMW Group
More informationIntroduction to VANET
VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of
More informationCooperative ITS Corridor Joint Deployment
Cooperative ITS Corridor Joint Deployment Secure V2X Communication Glasgow, June 8th 2016 Markus Ullmann Federal Office for Information Security (BSI) Outline Cooperative Intelligent Transport System (C-ITS)
More informationVPKIs: State-of-the-Art, Challenges and Extensions
VPKIs: State-of-the-Art, Challenges and Extensions VPKIs: State-of-the-Art, Challenges and Extensions Hongyu Jin, Mohammad Khodaei and Panos Papadimitratos Networked Systems Security Group www.ee.kth.se/nss
More informationCOOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY
COOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY ETSI IoT Security WORKSHOP, 13 15 June 2016 Brigitte LONC, RENAULT ETSI TC ITS WG 5 Chairman ETSI 2016.
More informationShort-term Linkable Group Signatures with Categorized Batch Verification
Short-term Linkable Group Signatures with Categorized Batch Verification Lukas Malina 1, Jordi Castella-Rocà 2, Arnau Vives-Guasch 2, Jan Hajny 1 1 Department of Telecommunications Faculty of Electrical
More informationSecuring Ad Hoc Networks and Vehicular Communications. Tutorial at SBSEG Panos Papadimitratos
Securing Ad Hoc Networks and Vehicular Communications Tutorial at SBSEG 2007 Panos Papadimitratos panos.papadimitratos@epfl.ch 1 Securing Ad Hoc Networks and Vehicular Communications Part 1: Securing Ad
More informationSecurity and Privacy in Car2Car Adhoc Networks
Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com 15/06/2016 1 Introduction French SME Involved since 2002 in security and privacy for connected vehicles 15/06/2016 2
More informationEnhanced Management of Certificate Caching and Revocation Lists in VANET
Enhanced Management of Certificate Caching and Revocation Lists in VANET Sadiq H. Abdulhussain Computer Engineering Department College of Engineering University of Baghdad ABSTRACT Vehicular network security
More informationThe GeoNet project: Combination of IPv6 & GeoNetworking
The GeoNet project: Combination of IPv6 & GeoNetworking Geographic addressing and routing for vehicular communications http://www.geonet-project.eu Dr. Thierry Ernst INRIA Mines ParisTech (LaRA) GeoNet
More informationEfficient Authentication and Congestion Control for Vehicular Ad Hoc Network
Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Deivanai.P 1, K.Sudha 2, K.Radha 3 Department of CSE, Muthayammal Engineering College, Rasipuram, India 1 Assistant Professor,
More informationPrivacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH
Privacy in Vehicular Ad-hoc Networks Nikolaos Alexiou, LCN, EE KTH alexiou@kth.se 2/10/2012 Outline Introduction VANETs: an overview VANET privacy - Anonymity - Location Privacy - VPKI Privacy Attacks
More informationProxy Signature-based RSU Message Broadcasting in VANETs
Proxy Signature-based RSU Message Broadcasting in VANETs Subir Biswas Dept. of Computer Science University of Manitoba Winnipeg MB, Canada R3T 2N2 Email: bigstan@cs.umanitoba.ca Jelena Mišić Dept. of Computer
More informationIntelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014
Intelligent Transportation Systems Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014 Outline Wireless Access for Vehicular Environments (WAVE) IEEE 802.11p IEEE
More informationPolicy and Organizational Challenges for Vehicular Communications Security
Policy and Organizational Challenges for Vehicular Communications Security Secure Vehicular Communications Workshop. EPFL, 20.02.08 Emilio Davila Gonzalez EC DG INFSO.G4 Contents The Framework: Trust and
More informationENSC 427, Spring 2012
ENSC 427, Spring 2012 Outline A Study of VANET Networks Introduction DSRC channel allocation Standards : IEEE 802.11p + IEEE 1604 PHY LAYER MAC LAYER Communication Walkthrough Ns-3, Node Mobility, SUMO
More informationOverview of Challenges in VANET
Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because
More informationWAP Security. Helsinki University of Technology S Security of Communication Protocols
WAP Security Helsinki University of Technology S-38.153 Security of Communication Protocols Mikko.Kerava@iki.fi 15.4.2003 Contents 1. Introduction to WAP 2. Wireless Transport Layer Security 3. Other WAP
More informationVehicular Networking
Vehicular Networking Christoph Sommer http://www.ccs labs.org/~sommer/ IAB Technical Plenary 93 rd IETF July 2015 Prague Motivation Illustration: C2C-CC Illustration: C2C-CC Illustration: Project AKTIV
More informationPrincess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)
Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content
More informationPrivacy-Enabled Probabilistic Verification in Broadcast Authentication for Vehicular Networks
Privacy-Enabled Probabilistic Verification in Broadcast Authentication for Vehicular Networks KANIKA GROVER 1, ALVIN LIM 1, SEUNGBAE LEE 1, QING YANG 2 1 Department of Computer Science and Software Engineering,
More informationEnhancing Security on Vehicular Adhoc Networks using EMAP-HMAC
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 Page No.: 704-711 Volume-5, Issue-2, April-2015 International Journal of Engineering and Management Research Enhancing Security on Vehicular
More informationCVIS. CVIS Chief Architect Dallas 14. November 2006
CVIS Knut.Evensen@Q-Free.com CVIS Chief Architect Dallas 14. November 2006 European R&D projects supported by DG INFSO Coordinator: ERTICO Total budget: 41 Million EC contribution: 22 Million Consortium:
More informationEXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION
EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION Shaiba Wahab Dept. Of Computer Science and Engineering M.E.A. Engineering College Perinthalmanna, Kerala Jemsheer Ahmed P Dept.
More informationRoberto Brignolo The SAFESPOT Integrated Project: Overview of the architecture, technologies and applications
Roberto Brignolo The SAFESPOT Integrated Project: Overview of the architecture, technologies and applications General figures 2 Project type: Integrated Project (IP) Co-funded by: the European Commission
More informationISO TC204 WG 16: The CALM Architecture. INRIA IMARA project-team / JRU LARA.
ISO TC204 WG 16: The CALM Architecture Thierry.Ernst@inria.fr INRIA IMARA project-team / JRU LARA http://www.lara.prd.fr ISO TC204 WG16: CALM ISO Technical Committee 204: Currently 12 active WGs http://www.sae.org/technicalcommittees/tc204wg16.htm
More informationDedicated Short Range Communication: What, Why and How?
Dedicated Short Range Communication: What, Why and How? Imran Hayee EE Department, University of Minnesota Duluth Connected Vehicles Research Lab (http://www.d.umn.edu/ee/cvrl/index.html) Outline Background
More informationSecure Vehicular Communication Systems: Design and Architecture
Secure Vehicular Communication Systems: Design and Architecture P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya Z. Ma, F. Kargl, A. Kung, J.-P. Hubaux Abstract Significant developments
More informationMessage Authentication Scheme for Vehicular Ad-Hoc Wireless Networks without RSU
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 1, January 2015 Message Authentication Scheme for Vehicular Ad-Hoc Wireless
More informationIETF 101, London March 19, Jaehoon (Paul) Jeong [Presenter] and Yiwen (Chris) Shen
Vehicular Prefix/Service Discovery, DNS Naming, and Seamless IP Networking (draft-jeong-ipwave-vehicular-neighbor-discovery-02, draft-jeong-ipwave-iot-dns-autoconf-02, and draft-ietf-ipwave-vehicular-networking-02)
More informationNetwork Security and Cryptography. 2 September Marking Scheme
Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,
More informationEUROPEAN STANDARD Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 3: Network Architecture
EN 302 636-3 V1.2.1 (2014-12) EUROPEAN STANDARD Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 3: Network Architecture 2 EN 302 636-3 V1.2.1 (2014-12) Reference REN/ITS-0030034
More informationA Surveying on Road Safety Using Vehicular Communication Networks
Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-4, February 10, 2012 A Surveying on Road Safety Using Vehicular Communication Networks Padmavathi K Asst. Professor, Department
More information8. Network Layer Contents
Contents 1 / 43 * Earlier Work * IETF IP sec Working Group * IP Security Protocol * Security Associations * Authentication Header * Encapsulation Security Payload * Internet Key Management Protocol * Modular
More informationCRL Distribution in VANETs using ns-3. Michael E. Nowatkowski Workshop on ns-3 Malaga, Spain 15 March 2010
CRL Distribution in VANETs using ns-3 Michael E. Nowatkowski Workshop on ns-3 Malaga, Spain 15 March 2010 Agenda VANET Overview Physical Layer MAC Layer Network Layer Application Layer CRL Distribution
More informationMethods and effectiveness of pre-distribution for certificate management in VANETS
Eindhoven University of Technology MASTER Methods and effectiveness of pre-distribution for certificate management in VANETS Pielage, R.H.M. Award date: 2014 Link to publication Disclaimer This document
More informationCS Computer Networks 1: Authentication
CS 3251- Computer Networks 1: Authentication Professor Patrick Traynor 4/14/11 Lecture 25 Announcements Homework 3 is due next class. Submit via T-Square or in person. Project 3 has been graded. Scores
More information06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security
1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of
More informationCAMP. Intelligent Transportation Systems. A Security Credential Management System for Vehicle-to-Vehicle Communications
CAMP Vehicle Safety Communications 3 Intelligent Transportation Systems A Security Credential Management System for Vehicle-to-Vehicle Communications William Whyte (Security Innovation); André Weimerskirch
More informationInternet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho
Internet Security - IPSec, SSL/TLS, SRTP - 29th. Oct. 2007 Lee, Choongho chlee@mmlab.snu.ac.kr Contents Introduction IPSec SSL / TLS SRTP Conclusion 2/27 Introduction (1/2) Security Goals Confidentiality
More informationAuthentication with Privacy for Connected Cars - A research perspective -
Authentication with Privacy for Connected Cars - A research perspective - Mark Manulis Surrey Centre for Cyber Security, Deputy-Director Department of Computer Science University of Surrey sccs.surrey.ac.uk
More informationInnovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017
Innovation and Cryptoventures Technology 101 Lee Jacobs and Campbell R. Harvey February 22, 2017 What is a computer? Electronic device that has the ability to store, retrieve, and process data Hardware
More informationPublic Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems
Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems Markus Ullmann, Christian Wieschebrink and Dennis Kügler Federal Office for Information Security D-53133 Bonn,
More informationCryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
More informationLecture 12 Page 1. Lecture 12 Page 3
IPsec Network Security: IPsec CS 239 Computer Software February 26, 2003 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided
More informationCONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements
CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4
More informationIPv6 Operation for WAVE - Wireless Access in Vehicular Environments
IPv6 Operation for WAVE - Wireless Access in Vehicular Environments Emmanuel Baccelli INRIA, France Email: Emmanuel.Baccelli@inria.fr Thomas Clausen Hipercom@LIX Ecole Polytechnique, France Email: thomas@thomasclausen.org
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms
Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of
More informationThe ZigBee Architecture An Introduction
The ZigBee Architecture An Introduction May 18 th, 2011 Session I Introduction & Architecture I, 1 Contents Outline 1. Architectural Overview 2. Market Positioning 3. Convergence 4. Summary 2 ch.1: IEEE802.15.4
More informationLESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT
LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT André Weimerskirch, Scott Bogard, Debby Bezzina University of Michigan Transportation Research Institute 2901 Baxter Road Ann Arbor,
More informationC2X Security. Introduction and overview (focus to European standard only) Cryptovision s Mindshare V
C2X Security Introduction and overview (focus to European standard only) Cryptovision s Mindshare 2015-06-24 V1.00 2015-06-24 Agenda What is Car2x Communication? Standards Security concepts C2X-PKI 2/30
More informationSecure Position-Based Routing for VANETs
Secure Position-Based Routing for VANETs Charles Harsch 1,2, Andreas Festag 1, Panos Papadimitratos 2 1 NEC Deutschland GmbH, {harsch festag}@netlab.nec.de 2 EPFL, Switzerland, {charles.harsch panos.papadimitratos}@epfl.ch
More informationLecture 13 Page 1. Lecture 13 Page 3
IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided
More informationSECURITY MANAGEMENT SYSTEM FUNCTIONAL ARCHITECTURE FOR ENTERPRISE NETWORK
SECURITY MANAGEMENT SYSTEM FUNCTIONAL ARCHITECTURE FOR ENTERPRISE NETWORK Shervin Erfani Electrical and Computer Engineering University of Windsor Windsor, Ontario BASIC PROBLEMS WITH SECURITY MANAGEMENT
More informationThe Mobile Finnish Identity Certificate
The Mobile Finnish Identity Certificate Dr.Tech. Göran Pulkkis and BSc (Eng.) Jonny Karlsson ARCADA Polytechnic Helsinki Finland PRESENTATION OUTLINE Finnish Electronic Identity (FINEID) as a Smartcard
More informationDigital Certificates Demystified
Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates
More informationIntroduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell
Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering
More informationEnhancement of VANET Communication Range using WiMAX and Wi-Fi: A Survey
International Journal of Urban Design for Ubiquitous Computing Vol.1, No.1, (2013), pp. 9-16 http://dx.doi.org/10.21742/ijuduc.2013.1.1.02 Enhancement of VANET Communication Range using WiMAX and Wi-Fi:
More informationThe WAVE Communications Stack: IEEE p, and, September, 2007
The WAVE Communications Stack: IEEE 802.11p, 1609.4 and, 1609.3 September, 2007 WAVE System Components External Systems ROAD SIDE UNIT Covered by WAVE Standards ON-BOARD UNITS External Systems Host Host
More informationSURVEY: Reputation and Trust Management in VANETs
, pp. 301-306 http://dx.doi.org/10.14257/ijgdc.2015.8.4.29 SURVEY: Reputation and Trust Management in VANETs Jitendra Singh Sengar BVM College of Technology & Management, Gwalior, MP, India jitendrasinghsengar@gmail.com
More informationIntroduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur
Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 50 Connected Vehicles II So, now we are going to continue
More informationSecure Position-Based Routing for VANETs
Secure Position-Based Routing for VANETs Charles Harsch 1,2, Andreas Festag 1, Panos Papadimitratos 2 1 NEC Deutschland GmbH, {harsch festag}@netlab.nec.de 2 EPFL, Switzerland, {charles.harsch panos.papadimitratos}@epfl.ch
More informationUsing TPMs to Secure Vehicular Ad-Hoc Networks (VANETs)
Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs) Gilles Guette 1 and Ciarán Bryce 2 IRISA Campus de Beaulieu, 35042 Rennes CEDEX, France gilles.guette@univ-rennes1.fr, Ciaran.Bryce@inria.fr Abstract.
More informationDeploying a New Hash Algorithm. Presented By Archana Viswanath
Deploying a New Hash Algorithm Presented By Archana Viswanath 1 function? Hash function - takes a message of any length as input - produces a fixed length string as output - termed as a message digest
More informationA Review on Security in Vehicular Ad-hoc Networks
A Review on Security in Vehicular Ad-hoc Networks Ramandeep Kaur 1, Er. Rupinderpal Singh 2 1M.Tech Scholar Computer Science & Engineering Department 2Asst. Prof. in Computer Science & Engineering Department
More informationPERFORMANCE EVALUATION OF SECURE COMMUNICATION IN VEHICULAR NETWORKS. by ASHWIN RAO
PERFORMANCE EVALUATION OF SECURE COMMUNICATION IN VEHICULAR NETWORKS by ASHWIN RAO Amar Nath and Shashi Khosla School of Information Technology Submitted in fulfillment of the requirements of the degree
More information14. Internet Security (J. Kurose)
14. Internet Security (J. Kurose) 1 Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer:
More informationLecture III : Communication Security Mechanisms
Lecture III : Communication Security Mechanisms Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 X.800 : Security
More informationChapter 8 Information Technology
CRIM 2130 Introduction to Critical Infrastructure Protection Spring 2016 Chapter 8 Information Technology School of Criminology and Justice Studies University of Massachusetts Lowell Enterprise systems
More informationMessage authentication. Why message authentication. Authentication primitives. and secure hashing. To prevent against:
Message authentication and secure hashing Why message authentication To prevent against: Masquerade/impersonation Modification of message content Modification of message sequence Acceptance of replayed/delayed
More informationIPSec. Slides by Vitaly Shmatikov UT Austin. slide 1
IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service
More informationLecture 1: Introduction to Security Architecture. for. Open Systems Interconnection
Lecture 1: Introduction to Security Architecture for Open Systems Interconnection 1. Purpose of Document This document includes notes to guide the self-study of the students of the lectures on Network
More informationSecure Routing and Transmission Protocols for Ad Hoc Networks
MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks
More informationA Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET. Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu
A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu Outline Introduction to Vehicular Networks Motivation
More informationStandards for Cooperative ITS: A Proof of Concept
Standards for Cooperative ITS: A Proof of Concept Presented by Thierry Ernst Mines ParisTech Authored by Rodrigo Silva, Satoru Noguchi Thierry Ernst, Arnaud de La Fortelle, Walter Godoy Jr AICT 2014 Paris
More informationBCA III Network security and Cryptography Examination-2016 Model Paper 1
Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct
More informationIEEE VNC Vehicular Networking Conference
"The Future of V2x IEEE VNC Vehicular Networking Conference Torino, 2017-11-27 By Ing. Paul Spaanderman Vice Chair WG1 and WG2 ETSI TC ITS Internet and Communication Innovation Projects www.paulsconsultancy.com
More informationCOMeSafety Specific Support Action
COMeSafety Specific Support Action ITS Consolidation and Standardization Common Architecture Dr. Andreas Lübke, Volkswagen AG February 5th, 2009 Outline Introduction COMeSafety Goals Partners Consolidation
More informationSecurity & Privacy. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of
Contents Security & Privacy Contents Web Architecture and Information Management [./] Spring 2009 INFO 190-02 (CCN 42509) Erik Wilde, UC Berkeley School of Information Abstract 1 Security Concepts Identification
More informationNetwork Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2011
Network Security: Broadcast and Multicast Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2011 Outline 1. Broadcast and multicast 2. Receiver access control (i.e. data confidentiality)
More informationUser Authentication Principles and Methods
User Authentication Principles and Methods David Groep, NIKHEF User Authentication - Principles and Methods 1 Principles and Methods Authorization factors Cryptographic methods Authentication for login
More informationAn Overview of Secure and Authenticated Remote Access to Central Sites
Workshop on Data Access to Micro-Data (WDA) Nuernberg, August 20-21 An Overview of Secure and Authenticated Remote Access to Central Sites Dr Milan Marković Banca Intesa ad Beograd, Serbia milan.markovic@bancaintesabeograd.com
More informationHP Instant Support Enterprise Edition (ISEE) Security overview
HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained
More informationRequirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC)
Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC) James T. Yu, jyu@cs.depaul.edu School of Computer Science, Telecommunications, and Information Systems DePaul
More informationNetwork Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2010
Network Security: Broadcast and Multicast Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline 1. Broadcast and multicast 2. Receiver access control (i.e. data confidentiality)
More informationITS Standardization. Oyunchimeg Shagdar, Inria Thierry Ernst, Mines Paris Tech
ITS Standardization Oyunchimeg Shagdar, Inria Thierry Ernst, Mines Paris Tech JNCT: Les Journées Nationales des Communication dans les Transports 29 Mai 2013 ITS: Intelligent Transportations Systems Systems
More informationImplementing Cryptography: Good Theory vs. Bad Practice
Implementing Cryptography: Good Theory vs. Bad Practice Viet Pham Information Security Group, Department of Mathematics Royal Holloway, University of London Outline News report What is cryptography? Why
More informationCryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
More informationThird public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy
Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy 14 February 2017 Amsterdam Gerhard Menzel European Commission - DG MOVE Scope:
More informationBlind Signatures and Their Applications
Department of Computer Science, National Chiao Tung University 1 / 15 Cryptanalysis Lab Outline 1 Digital Signature 2 Blind signature 3 Partially blind signature 2 / 15 Cryptanalysis Lab Digital Signature
More informationA GENERIC PUBLIC KEY INFRASTRUCTURE FOR SECURING CAR-TO-X COMMUNICATION
A GENERIC PUBLIC KEY INFRASTRUCTURE FOR SECURING CAR-TO-X COMMUNICATION Norbert Bißmeyer 1, Hagen Stübing 2, Elmar Schoch 3, Stefan Götz 4, Jan Peter Stotz 1, Brigitte Lonc 5 1 Fraunhofer SIT, Secure Mobile
More informationNetwork Security and Cryptography. December Sample Exam Marking Scheme
Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers
More informationV2V and V2I Communication. 건국대학교 MBC Lab
V2V and V2I Communication 건국대학교 MBC Lab Contents V2I/V2V Communication Introduction DSRC WAVE CALM V2V Network Protocols Projects and Standards V2I/V2V Communication Introduction Introduction What is ITS?
More informationCOSC4377. Chapter 8 roadmap
Lecture 28 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7
More informationLTE and IEEE802.p for vehicular networking: a performance evaluation
LTE and IEEE802.p for vehicular networking: a performance evaluation Zeeshan Hameed Mir* Fethi Filali EURASIP Journal on Wireless Communications and Networking 1 Presenter Renato Iida v2 Outline Introduction
More information