20
Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work VeSPA: Vehicular Security and Privacy-preserving architecture N. Alexiou M. Lagan` a S. Gisdakis M. Khodaei P. Papadimitratos School of Electrical Engineering, KTH, Sweden [email protected] HotWiSec13’ April 19, 2013 1 / 20

VeSPA: Vehicular Security and Privacy-preserving Architecture

Embed Size (px)

Citation preview

Page 1: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

VeSPA: Vehicular Security and Privacy-preservingarchitecture

N. Alexiou M. Lagana S. GisdakisM. Khodaei P. Papadimitratos

School of Electrical Engineering, KTH, Sweden

[email protected]

HotWiSec13’

April 19, 2013

1 / 20

Page 2: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

Table of Contents

IntroductionStatus and current Directions for VC

Future Challenges for VCList of Future Challenges

VeSPAArchitecture & Operation

Analysis of VeSPAEfficiency & Privacy Improvements

Future WorkOngoing Work and Future Directions

2 / 20

Page 3: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

Vehicular Communications

• Vehicular Communications (VC)

• Vehicles propagate informationfor Safe-Driving

• Location, Velocity, angle• Hazardous warnings• Emergency break etc.

• Cooperative awareness throughbeaconed status messages andevent-triggered warnings

• ..Security in VC?• Assure legitimate vehicles

propagate information• Secure integrity of information

Image source: C2C-CC

3 / 20

Page 4: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

Digital Signatures for VC

• Vehicles hold Private-PublicKey pair

• Unique pair to each vehicle

• Digital Signature of themessages

• Authentication• Integrity• Non-repudiation

• Vehicular Public KeyInfrastructure (VPKI)

• To assign credentials• Propagate trust

Image Source: Secure Vehicular Communication Systems: Design and Architecture, P. Papadimitratos et al

4 / 20

Page 5: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

Privacy in VC

• Packets signed using samecredentials can be triviallylinked

• Solution:• Offer multiple short-lived

credentials (Pseudonyms(PS))

• Pseudonyms valid forunique time periods

• Sign packets with validpseudonyms

• Cryptographic operations ina Hardware Security Module

• Extend the VPKI to supportPseudonyms

5 / 20

Page 6: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

Current Status: Overview

• Credential management in Vehicular Communications (VC)• Long-term Credentials for accountability and Authentication• Short-lived Pseudonyms for anonymity and Location Privacy• A VPKI to support credential management

• VPKI Architecture:• LTCA: Issuer of Long-term Credentials• PCA: Issuer of Pseudonymous Credentials• RA: Resolution Authority

• VPKI Protocols:• Pseudonym provision: Refresh pool of pseudonyms• Pseudonym Resolution: De-anonymize misbehaving vehicles

• Car accident, violation of traffic regulation, police request

• Pseudonym revocation: Revoke the misbehaving pseudonyms

• Main Suspects: SEVECOM, C2C-CC, PRESERVE, 1609family of standards WAVE, ETSI

6 / 20

Page 7: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

Table of Contents

IntroductionStatus and current Directions for VC

Future Challenges for VCList of Future Challenges

VeSPAArchitecture & Operation

Analysis of VeSPAEfficiency & Privacy Improvements

Future WorkOngoing Work and Future Directions

7 / 20

Page 8: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

Future Challenges for VC

• Implement an efficient VPKI prototype according to thestandard

• How to enhance privacy towards the infrastructure

• Envision support for future vehicular services• Safety as a service, not the target application• Location based services, Pay-as-you-drive systems• Enhance current VPKI to support vehicular services• AAA solution with current VPKI architecture as the starting

point• Authentication: Legitimate part of the system• Authorization: Right to access a service• Accountability: Track of consumption

8 / 20

Page 9: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

Table of Contents

IntroductionStatus and current Directions for VC

Future Challenges for VCList of Future Challenges

VeSPAArchitecture & Operation

Analysis of VeSPAEfficiency & Privacy Improvements

Future WorkOngoing Work and Future Directions

9 / 20

Page 10: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

VeSPA: Vehicular Security and Privacy-preservingArchitecture

• “Kerberized” version of a VPKI• Efficient VPKI Credential Management Architecture• Enhanced VPKI design with respect to privacy• Cryptographic tickets to support AAA

• Tickets:• tkt = SigLTCA([te ], {S1}, . . . , {Sn})• Carrier of service subscription information• Anonymous proof of access to obtain pseudonyms• Authorization and Authentication to the PCA• Limited lifetime dependent on vehicle subscription to the

service• Revocable upon misbehavior

10 / 20

Page 11: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

VeSPA: Operation

• AAA check at LTCA• LTCA issues ticket• 73, 5msec/ticket

• Ticket per service/access• Increased anonymity set• Low overhead introduced

• Ticket received• Request for new

pseudonyms

• Communication over TLS(one-way authentication)

11 / 20

Page 12: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

VeSPA: Protocols

Pseudonym Provision:

• V−→LTCA: Sigkv (t1,Request) ‖ LTv

• LTCA−→V : tkt

• V−→PCA:t3,tkt,{K1v ,...,K

nv }

• PCA−→V :t4,{Ps1v ,...,Ps

nv }

Resolution Protocol:

• RA−→PCA: SigRA(P iv ,t1)

• PCA−→RA: SigPCA(tkt,t2)

• RA−→LTCA: SigRA(tkt,t3)

• LTCA−→RA: SigLTCA(LTv ,t4)

12 / 20

Page 13: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

Table of Contents

IntroductionStatus and current Directions for VC

Future Challenges for VCList of Future Challenges

VeSPAArchitecture & Operation

Analysis of VeSPAEfficiency & Privacy Improvements

Future WorkOngoing Work and Future Directions

13 / 20

Page 14: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

Implementation Details

• OpenCA for cryptographic operations

• ECC-256 keys for digital certificates

• 1609.2 standard compatible

• Separate machines for each entity:• Intel Xeon 3.4 GHz, 8 GB RAM• System scales up with more machines or..• stronger equipment

• Communications over encrypted TLS channel (one-wayauthentication)

• Authentication of server• Confidentiality

14 / 20

Page 15: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

Increased Privacy against the VPKI

15 / 20

Page 16: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

Privacy against the Infrastructure

16 / 20

Page 17: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

Pseudonym Provision Efficiency

1 10 20 50 100 200 500 10000

2

4

6

8

10

12

14

16

18

Number of Pseudonyms

La

ten

cy [

se

co

nd

s]

Preparing the RequestEntire Operations on the ServerEntire CommunicationVerification and Storage

Infrastructure, Vehicle, Communications Efficiency vs number of requestedpseudonyms

17 / 20

Page 18: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

Pseudonym Revocation Efficiency

1 10 100 1000 10,000 100,0000

400

800

1200

1600

2000

2400

2800

3200

3600

Number of Revoked Pseudonyms in CRL

La

ten

cy [

mill

ise

co

nd

s]

Preparing the RequestEntire Operations on the ServerEntire CommunicationVerification and Storage

Infrastructure, Vehicle, Communications Efficiency vs number of revoked pseudonyms

18 / 20

Page 19: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

Table of Contents

IntroductionStatus and current Directions for VC

Future Challenges for VCList of Future Challenges

VeSPAArchitecture & Operation

Analysis of VeSPAEfficiency & Privacy Improvements

Future WorkOngoing Work and Future Directions

19 / 20

Page 20: VeSPA: Vehicular Security and Privacy-preserving Architecture

Introduction Future Challenges for VC VeSPA Analysis of VeSPA Future Work

Overview & Future Work

VeSPA:

• Efficient VPKI Prototype according to the standards

• Increased Privacy to towards the infrastructure

• Enhanced VPKI with AAA capabilities

• A VPKI able to support vehicular services

Ongoing Work:

• Integration of Anonymous Authentication Mechanisms

• Extensions to support multi-Domain VPKI architectures

20 / 20