Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
1. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
Analysis, Conclusion and Future Work
Bibliography
Restricted Usage of Anonymous Credentials in
VANET for Misbehavior Detection
Ankit Singh
Fraunhofer SIT,
Darmstadt, Germany
June 25, 2012
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
2. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
Analysis, Conclusion and Future Work
Bibliography
1 Introduction to Vehicular Ad-hoc Network (VANET)
Overview of Basic Components in VANETs
2 Problem Statement
What is the privacy issue in VANET?
3 IT Security and Privacy requirements in VANET
Requirements
4 Design and Implementation of ACS Protocols for VANET
Assumptions made for Designing the ACS protocols
Players Participating in different Protocols
Proposed Protocols
Implementation of the Proposed Protocols and Contributions
5 Analysis, Conclusion and Future Work
Analysis and Discussions
Conclusion of the Thesis
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
3. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
Analysis, Conclusion and Future Work
Bibliography
Future work of the Thesis
6 Bibliography
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
4. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
IT Security and Privacy requirements in VANET
Overview of Basic Components in VANETs
Design and Implementation of ACS Protocols for VANET
Analysis, Conclusion and Future Work
Bibliography
What is VANET and Why we need VANET? I
Safe and Secure travel
Free flow of traffic
Infotainment services
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
5. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
IT Security and Privacy requirements in VANET
Overview of Basic Components in VANETs
Design and Implementation of ACS Protocols for VANET
Analysis, Conclusion and Future Work
Bibliography
Overview of Basic Components in VANETs I
Basic Component of VANET
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
6. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
IT Security and Privacy requirements in VANET
What is the privacy issue in VANET?
Design and Implementation of ACS Protocols for VANET
Analysis, Conclusion and Future Work
Bibliography
Problem Statement I
Vehicle A broadcasting message of traffic Jam
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
7. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
IT Security and Privacy requirements in VANET
What is the privacy issue in VANET?
Design and Implementation of ACS Protocols for VANET
Analysis, Conclusion and Future Work
Bibliography
Problem Statement II
Vehicle A broadcasting message signed using a classical certificate
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
8. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
IT Security and Privacy requirements in VANET
What is the privacy issue in VANET?
Design and Implementation of ACS Protocols for VANET
Analysis, Conclusion and Future Work
Bibliography
Problem Statement III
Vehicle A broadcasting message signed using a pseudonymous
certificate
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
9. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
IT Security and Privacy requirements in VANET
What is the privacy issue in VANET?
Design and Implementation of ACS Protocols for VANET
Analysis, Conclusion and Future Work
Bibliography
Problem Statement IV
Vehicle A broadcasting same message signed using multiple
pseudonymous certificates
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
10. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
IT Security and Privacy requirements in VANET
Requirements
Design and Implementation of ACS Protocols for VANET
Analysis, Conclusion and Future Work
Bibliography
Requirements I
Security Requirements Privacy Requirements
Authentication Anonymity
Accountability Unlinkability
Verification of Data Consistency Restricted Credential usage
Availability Perfect forward privacy
Non-repudiation
Credential revocation
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
11. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement Assumptions made for Designing the ACS protocols
IT Security and Privacy requirements in VANET Players Participating in different Protocols
Design and Implementation of ACS Protocols for VANET Proposed Protocols
Analysis, Conclusion and Future Work Implementation of the Proposed Protocols and Contributions
Bibliography
Assumptions I
Strong trust on issuer party
Tamper proof storage device.
Negotiations on attributes etc. are done before beginning of
the protocols.
Secure channel.
Broadcasting messages.
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
12. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement Assumptions made for Designing the ACS protocols
IT Security and Privacy requirements in VANET Players Participating in different Protocols
Design and Implementation of ACS Protocols for VANET Proposed Protocols
Analysis, Conclusion and Future Work Implementation of the Proposed Protocols and Contributions
Bibliography
Players participating in different protocols I
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
13. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement Assumptions made for Designing the ACS protocols
IT Security and Privacy requirements in VANET Players Participating in different Protocols
Design and Implementation of ACS Protocols for VANET Proposed Protocols
Analysis, Conclusion and Future Work Implementation of the Proposed Protocols and Contributions
Bibliography
Proposed Protocols I
Two versions of protocols are proposed for the problem statements:
Setup protocol (common to both versions)
Version 1 without revocation
Issuance protocol V1:
- Strong privacy.
Signing protocol V1:
- Achieved restricted usage of credential.
Verifying protocol V1:
- Detects fraud at verifier vehicle side
- No revocation request.
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
14. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement Assumptions made for Designing the ACS protocols
IT Security and Privacy requirements in VANET Players Participating in different Protocols
Design and Implementation of ACS Protocols for VANET Proposed Protocols
Analysis, Conclusion and Future Work Implementation of the Proposed Protocols and Contributions
Bibliography
Proposed Protocols II
Version 2 with revocation
Issuance protocol V2:
- Weak privacy.
- Adapted from V1.
- Generates tracing ID.
Signing protocol V2:
- Adapted from V1 and randomizes tracing ID.
Verifying protocol V2:
- Adapted from V1 and revocation request
Tracing and Revocation protocol:
- Tracing of the fraud vehicle
- Revocation of the credential.
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
15. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement Assumptions made for Designing the ACS protocols
IT Security and Privacy requirements in VANET Players Participating in different Protocols
Design and Implementation of ACS Protocols for VANET Proposed Protocols
Analysis, Conclusion and Future Work Implementation of the Proposed Protocols and Contributions
Bibliography
Implementation and Contributions I
Designed Anonymous credential protocols for VANET
Idemix java cryptographic library
The Library was modified and extended:
Support limited spending.
Used domain pseudonyms for binding it to a time frame.
Generating tracing ID.
Generating multiple pseudonyms and saving it to a file.
Randomizing tracing ID during signing protocol.
Contributed in detecting the fraud at the receiver side.
Modified library for preforming revocation.
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
16. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
Analysis and Discussions
IT Security and Privacy requirements in VANET
Conclusion of the Thesis
Design and Implementation of ACS Protocols for VANET
Future work of the Thesis
Analysis, Conclusion and Future Work
Bibliography
Analysis and Discussions I
Security requirements fulfilled ( : achieved; ◦: out of scope of this
thesis)
of
data consistency
Restricted cre-
Authentication
Credential Re-
Confidentiality
Accountability
dential usage
Verification
repudiation
Availability
vocation
Non-
◦ ◦
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
17. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
Analysis and Discussions
IT Security and Privacy requirements in VANET
Conclusion of the Thesis
Design and Implementation of ACS Protocols for VANET
Future work of the Thesis
Analysis, Conclusion and Future Work
Bibliography
Analysis and Discussions II
Privacy requirements fulfilled ( : achieved; ◦: out of scope of this thesis)
Minimum dis-
for-
ward privacy
Unlinkability
Distributed
Anonymity
Resolution
Authority
Perfect
closure
◦
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
18. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
Analysis and Discussions
IT Security and Privacy requirements in VANET
Conclusion of the Thesis
Design and Implementation of ACS Protocols for VANET
Future work of the Thesis
Analysis, Conclusion and Future Work
Bibliography
Conclusion I
Successfully ‘achieved restricted usage of anonymous
credentials in VANET’.
Successfully ‘detected the fraud of overspending anonymous
credentials by vehicles’.
Successfully ‘achieved revocation of the defaulter vehicle’s
anonymous credential’.
Challenge in the usage of the proposed protocols in VANET
due to:
Performance overhead of the protocols
Signed message size
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
19. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
Analysis and Discussions
IT Security and Privacy requirements in VANET
Conclusion of the Thesis
Design and Implementation of ACS Protocols for VANET
Future work of the Thesis
Analysis, Conclusion and Future Work
Bibliography
Future work I
Signing and Verifying protocol must be optimized to reduce
the execution time
Revocation protocol performance and strategy must be
optimized
Credential update should be made compulsory for the vehicle
(Specially for revocation)
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
20. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
Analysis, Conclusion and Future Work
Bibliography
Bibliography I
Handbook of Applied Cryptography, Alfred. J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
(http://cacr.uwaterloo.ca/hac/).
SECURITY WITHOUT IDENTIFICATION: TRANSACTION SYSTEMS TO MAKE BIG BROTHER
OBSOLETE, DAVID CHAUM, Communications of the ACM, October 1985, Volume 28, Number 10.
Privacy Requirements in Vehicular Communications Systems, Florian Schaub, Zhendong Ma, and Frank
Kargl, Institute of Media Informatics, Ulm University, Germany.
A signature scheme with efficient protocols. Jan Camenisch and Anna Lysyanskaya. In Stelvio Cimato,
Clemente Galdi, and Giuseppe Persiano, editors, Security in Communication Networks, Third International
Conference, SCN 2002, volume 2576 of Lecture Notes in Computer Science, pages 268-289. Springer
Verlag, 2003.
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, Jan
Camenisch1 , Anna Lysyanskaya2 ,1 IBM Research, Zurich Research Laboratory CH-8803, R¨schlikon,2 MIT
u
LCS, 545 Technology Square, Cambridge, MA 02139 USA.
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation, Jan
Camenisch and Anna Lysyanskaya. In Birgit Pfitzmann, editor, Advances in Cryptology — EUROCRYPT
2001, volume 2045 of Lecture Notes in Computer Science, pages 93-118. Springer Verlag, 2001.
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
21. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
Analysis, Conclusion and Future Work
Bibliography
Bibliography II
PRIME - Privacy and Identity Management for Europe. https://www.prime-project.eu/ Last Access:
June 25, 2012.
IBM software safeguards consumer identity on the Web, IDEMIX,
http://www.zurich.ibm.com/news/07/idemix.html and official Idemix blog: http://idemix.wordpress.com/
Last Access: June 25, 2012.
Design and Implementation of the idemix Anonymous Credential System, Jan Camenisch and Els Van
Herreweghen, IBM Research, Zurich Research Laboratory, Switzerland.
Specification of the Identity Mixer Cryptographic Library, Version 2.3.3, IBM Research - Zurich, June 3,
2011.
Idemix Java library source download https://prime.inf.tu-dresden.de/idemix/ Last Access: June 25,
2012.
How to Explain Zero-Knowledge Protocols to Your Childern. QuisQuater Jean-Jacques(1) , Myriam, Muriel,
Micha¨l GUILLOU Louis(2) , Marie Annick, Ga¨ Anna, Gwenol´, Soazig in collaboration with Tom
e ıd, e
BERSON(3) for the English version. (1) Philips Research Laboratory, Avenue Van Becelaere, 2, B-1170
(2)
Brussels, Belgium. CCETT/EPT, BP 59, F-35512 Cesson S´vign´, France. (3) Anagram Laboratories,
e e
P.O. Box 791, Palo Alto CA 94301, USA.
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
22. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
Analysis, Conclusion and Future Work
Bibliography
Bibliography III
Threshold Anonymous Announcement in VANETs, March 2011, Liqun Chen Member, IEEE Hewlett
Packard Labs, Bristol, United Kingdom, Siaw-Lynn Ng, Department of Mathmatics, Royal Holloway,
University of London, Egham, Surrey, United Kingdom and Guilin Wang, School of computer Science and
Software Engineering, University of Wollongong, NSW, Australia.
DAA: Fixing the pairing based protocols. L. Chen, P. Morrissey and N. P. Smart. Cryptology ePrint Archive:
Report 2009/198, Withdrawn due to Major Flaw from http://eprint.iacr.org/2009/198 Last Access:
June 25, 2012
K-times anonymous authentication (extended abstract). I. Teranishi, J. Furukawa, and K. Sako. Internet
Systems Research Laboratories, NEC Corporation 1753 Shimonumabe, Nakahara-Ku, Kawasaki 211-8666,
Japan.
Commitment schemes and zero-knowledge protocols, 2007, I. Damg˚rd and J. B. Nielsen.
a
A GENERIC PUBLIC KEY INFRASTRUCTURE FOR SECURING CAR-TO-X COMMUNICATION. Norbert
Bißmeyer1 , Hagen St¨bing2 , Elmar Schoch3 , Stefan G¨tz4 , Jan Peter Stotz1 , Brigitte Lonc5 . 1 Fraunhofer
u o
SIT, Secure Mobile Systems, 64295 Darmstadt, Germany. 2 Adam Opel AG, Active Safety, 65423
R¨sselsheim, Germany,3 Volkswagen AG, Security and Connectivity, 38436 Wolfsburg, Germany,
u
4
Continental Teves AG & Co. oHG, Connected Systems, 60488, Frankfurt/Main, Germany, 5 RENAULT
S.A.S., Electronic Systems Engineering Department, 1 Avenue du Golf, 78288 Guyancourt Cedex, France.
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
23. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
Analysis, Conclusion and Future Work
Bibliography
Bibliography IV
Analysis of Revocation Strategies for Anonymous Idemix Credentials, Jorn Lapon1 , Markulf Kohlweiss3 ,
Bart de Decker2 , and Vincent Naessens1 , 1 Katholieke Hogeschool Sint-Lieven, Industrial Engineering, 2
Katholieke Universiteit Leuven, CS-DISTRINET, 3 Microsoft Research, Cambridge.
Signature Schemes and Applications to Cryptographic Protocol Design. Anna Lysyanskaya. Ph.D. thesis,
Massachusetts Institute of Technology, September 2002.
Theft and Misuse Protection for Anonymous Credentials, Patrick Bichsel, Master Thesis MA-2007-42, June
2007 to November 2007, ETH, Switzerland.
Master Thesis KATHOLIEKE UNIVERSITEIT LEUVEN: Smart Card Implementation of Anonymous
Credentials, Josep Balasch, 2007 - 2008, Promotor: Prof. Dr. Ir. Bart Preneel.
Smart card integration in the pseudonym system idemix, Luuk Danes, Master Thesis 18 December 2007,
University of Groningen, faculty of mathematics and natural sciences.
How to Win the Clone Wars: Efficient Periodic nTimes Anonymous Authentication, Jan Camenisch1 , Susan
Hohenberger1 , Markulf Kohlweiss2 , Anna Lysyanskaya3 , Mira Meyerovich3 , 1 Zurich Research Lab IBM
Research, 2 Dept. of Electrical Engineering, Katholieke Universiteit Leuven, 3 Computer Science Dept.,
Brown University.
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
24. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
Analysis, Conclusion and Future Work
Bibliography
Bibliography V
V-tokens for Conditional Pseudonymity in VANETs. Florian Schaub∗ , Frank Kargel† , Zhendong Ma∗ , and
Michael Weber∗ . ∗ Institute of Media Informatics, Ulm University, Germany, † Distributed and Embedded
Security, University of Twente, The Netherlands.
A Restricted Multi-show Credential System and Its Application on E-Voting, Joseph K. Liu1 and Duncan S.
Wong2 , 1 Department of Information Engineering, The Chinese University of Hong Kong Shatin, Hong
Kong, 2 Department of Computer Science, City University of Hong Kong Kowloon, Hong Kong.
Anonymous k-Show Credentials, Mohamed Layouni and Hans Vangheluwe, School of Computer Science,
McGill University, 3480 University Street, Montreal, H3A 2A7, Quebec, Canada.
An integer commitment scheme based on groups with hidden order. Ivan Damøard and Eiichiro Fujisaki. In
Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Sciences, pages
431- 444. Springer Verlag, 2000.
Efficient attributes for anonymous credentials. Jan Camenisch and Thomas Gross. In Peng Ning, Paul F.
Syverson, and Somesh Jha, editors, ACS Conference on Computer and communications Security, pages
345-356, 2008.
Security Engineering for Vehicular IT Systems, Improving the Trustworthiness and Dependability of
Automotive IT Applications, Marko Wolf.
The Sybil Attack, John R. Douceur, Microsoft Research.
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
25. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
Analysis, Conclusion and Future Work
Bibliography
Bibliography VI
How much does software add to the cost of today’s vehicles? How about tomorrow’s electric cars? by
Sebastian Blanco on Jun 8th 2010, at Auto Blog Green: autobloggreen.com
Design of 5.9GHz DSRC-based Vehicular Safety Communication, Daniel Jiang1 , Vikas Taliwal1 , Andreas
Meier1 , Wieland Holfelder1 , Ralf Herrtwich2 , 1 DaimlerChrysler Research and Technology North America,
Inc., 2 DaimlerChrysler AG, Vehicle IT and Services Research and Advanced Engineering.
DSRC range comparison with FM Radio, cellular Phone, Satellite, Check FAQs,
http://www.leearmstrong.com/DSRC/DSRCHomeset.htm Last Access: June 25, 2012.
Security in Vehicular Ad Hoc Networks, Xiaodong Lin, Rongxing Lu, Chenxi Zhang, Haojin Zhu, Pin-Han
Ho, and Xuemin (Sherman) Shen, University of Waterloo.
Mandatory Enforcement of Privacy policies using Trusted Computing Principles, Frank Kargl, University of
Twente, The Netherlands, Florian Schaub and Stefan Dietzel, Ulm University, Germany, Published in 2010,
Association for the Advancement of Artificial Intelligence (www.aaai.org).
Security Engineering for VANETs, Frank Kargl, Zhendong Ma, and Elmar Schoch, Ulm University, Institute
of Media Informatics.
The Security of Vehicular Ad Hoc Networks, Maxim Raya and Jean-Pierre Hubaux, Laboratory of computer
Communications and Applications (LCA), School of Computer and Communication Sciences, EPFL,
Switzerland.
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
26. Introduction to Vehicular Ad-hoc Network (VANET)
Problem Statement
IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
Analysis, Conclusion and Future Work
Bibliography
Bibliography VII
Securing Vehicular Communications, Maxim Raya, Panos Papadimitratos, Jean-Pierre Hubaux, Laboratory
of computer Communications and Applications (LCA), School of Computer and Communication Sciences,
EPFL, Switzerland.
Trusted Platform Module (TPM) Main Specification, Online Website: Trusted Computer Group (TCG).
http://www.trustedcomputinggroup.org/resources/tpm_main_specification Last Access: June 25,
2012.
Privacy in VANETs using Changing Pseudonyms - Ideal and Real, Matthias Gerlach and Felix G¨ttler.
u
M.Sc. Program, High Integrity System, University of Applied Sciences, Frankfurt am Main, Germany:
http://tinyurl.com/high-integrity-systems Last Access: June 25, 2012.
Database Management Systems, Third Edition, Ramakrishnan and Gehrke
Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb