Скачать презентацию Mix-Zones for Location Privacy in Vehicular Networks Julien Скачать презентацию Mix-Zones for Location Privacy in Vehicular Networks Julien

554c238f598dd3193c46136be8e4c123.ppt

  • Количество слайдов: 22

Mix-Zones for Location Privacy in Vehicular Networks Julien Freudiger Maxim Raya, Márk Félegyházi, Panos Mix-Zones for Location Privacy in Vehicular Networks Julien Freudiger Maxim Raya, Márk Félegyházi, Panos Papadimitratos, and Jean-Pierre Hubaux August 14, 2007 Wi. N-ITS, Vancouver, BC, Canada

Motivation Safety messages • Position (p) • Speed (s) • Acceleration (a) Authenticated • Motivation Safety messages • Position (p) • Speed (s) • Acceleration (a) Authenticated • Digital Signature • Certificate 2

No location privacy 3 No location privacy 3

Outline 1. System and Threat Model 2. Mix-Zones 3. Vehicular Mix-Networks 4. Simulation Results Outline 1. System and Threat Model 2. Mix-Zones 3. Vehicular Mix-Networks 4. Simulation Results 4

Vehicular Networks • Safety Messages • Certification Authority (CA) – (p, s, a) – Vehicular Networks • Safety Messages • Certification Authority (CA) – (p, s, a) – Timestamp – Authenticated – CA distributes public/private key pairs (Ki, j, Ki, j-1) with j=1, …, F to each vehicle i – F is the size of the set of key pairs – Public keys certificates are referred to as pseudonyms => Vehicles are preloaded with a large set of pseudonyms and key pairs • Vehicles have tamper proof devices that guarantee the – Correct execution of cryptographic operations – Non-disclosure of private keying material 5

Adversary We assume an external, global, and passive adversary • • • Installs its Adversary We assume an external, global, and passive adversary • • • Installs its own radio receivers Collects GPS coordinates and pseudonyms of safety messages Links pseudonym changes using GPS coordinates – Wi. Fi operator (e. g. , Google, Earth. Link ) – Wi. Fi community network (e. g. , FON) [http: //www. earthlink. net/wifi/cities/] 6

Mix-Zone Definition (1) A mix-zone is a restricted region where users cannot be located Mix-Zone Definition (1) A mix-zone is a restricted region where users cannot be located Entering event Exiting event • i. e. , from road n at time i. e. , from road e at time ’ Adversary has statistical information about mix-zones – pn, e = – qn, e(t) = • k = (n, ) l = (e, ’) Prob(“Vehicle enters from road n and exits from road e”) Prob(“Time spent between road n and e is t”) Statistical information depends on – The geometry of the mix-zone – The location of the mix-zone in the network topology 7

Mix-Zone Definition (2) • Mix-zones obscure the relation of incoming and outgoing vehicles – Mix-Zone Definition (2) • Mix-zones obscure the relation of incoming and outgoing vehicles – Unlinkability • An adversary estimates the mapping of entering and exiting events – With two vehicles • The probability of a mapping depends on the geometry of the mix-zone 8

Mix-Zone Effectiveness Entropy measures uncertainty of mapping where N= # of mobiles in the Mix-Zone Effectiveness Entropy measures uncertainty of mapping where N= # of mobiles in the mix-zone – N models the mix-zone density – (pn, e, qn, e(t)) models the unpredictability of vehicles’ whereabouts 9

Where to create Mix-Zones? Best mix-zone • • High N High vehicle whereabouts unpredictability Where to create Mix-Zones? Best mix-zone • • High N High vehicle whereabouts unpredictability (pn, e, qn, e(t)) Road intersections 10

High Uncertainty 11 High Uncertainty 11

How to create a mix-zone? • Cryptographic Mix-zone (CMIX) – Encrypt Safety Messages (with How to create a mix-zone? • Cryptographic Mix-zone (CMIX) – Encrypt Safety Messages (with a symmetric key SK) – Computational security 12

CMIX Protocol (1) Key Establishment Rely on presence of RSU at road intersection to CMIX Protocol (1) Key Establishment Rely on presence of RSU at road intersection to establish a symmetric key Request, Ts, Signi(Request, Ts), Certi, k EKi, j(vi, SK, Ts, Sign. RSU(vi, SK, Ts)), Cert. RSU Ack, Ts, Signi(Ack, Ts), Certi, k SK Ts Signi Certi, k = = Symmetric Key Time stamp Signature of i Certificate of i 13

CMIX Protocol (2) Key Forwarding • • • V 2 unable to obtain key CMIX Protocol (2) Key Forwarding • • • V 2 unable to obtain key directly from RSU, thus to decrypt messages from V 1 RSU leverages on vehicles already in the mix-zone to forward symmetric key V 2 broadcasts key requests until any vehicle in the mix-zone replies EK 2, j(v 2, v 1, SK, Ts, Sign. RSU(v 1, SK, Ts)) • Vehicles do not encrypt their messages before entering the mix-zone 14

CMIX Protocol (3) Key Update • RSU initiates key update to – renew keys CMIX Protocol (3) Key Update • RSU initiates key update to – renew keys – revoke keys • Update is triggered when – Mix-zone is empty • CA is informed of new SK for liability issues • Asynchronous key updates across mix-zones improve system security 15

Vehicular Mix-Network Mix-network cumulative entropy for vehicle v where L= Length of the path Vehicular Mix-Network Mix-network cumulative entropy for vehicle v where L= Length of the path in the mix-network 16

Simulation Setup • 10 X 10 Manhattan network with 4 roads/intersection • N ~ Simulation Setup • 10 X 10 Manhattan network with 4 roads/intersection • N ~ Poisson( ) vehicles per intersection at network initialization • Vehicle inter arrival time ~ Uniform[0, T] models – High traffic congestion – Low traffic congestion • Intersection characteristics – qn, e(t) ~ N( n, e, n, e) for each intersection – pn, e randomly chosen for each intersection 17

Vehicular Mix-Zone • Both network density and congestion affect the achievable location privacy • Vehicular Mix-Zone • Both network density and congestion affect the achievable location privacy • Confidence intervals are small because there is low variability within one mix-zone 18

Vehicular Mix-Network • Larger confidence interval due to varying number of vehicles and varying Vehicular Mix-Network • Larger confidence interval due to varying number of vehicles and varying set of traversed mix-zones • Tracking probability is quickly insignificant Mix-zones effectiveness is high 19

Conclusions • Mix-zone effectiveness depends on – Intersection’s congestion – Vehicle’s density – Vehicles’ Conclusions • Mix-zone effectiveness depends on – Intersection’s congestion – Vehicle’s density – Vehicles’ whereabouts unpredictability • Vehicular mix-network effectiveness – Has large variance – But is overall high • Need more simulations – With realistic traffic traces • Efficiency of vehicular mix-network is independent of CMIX protocol – Alternative CMIX protocols could exploit location 20

References • L. Buttyán, T. Holczer, and I. Vajda. On the Effectiveness of Changing References • L. Buttyán, T. Holczer, and I. Vajda. On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. ESAS 2007 • A. R. Beresford. Mix-zones: User privacy in location-aware services. Per. Sec 2004 • L. Huang, K. Matsuura, H. Yamane, and K. Sezaki. Silent cascade: Enhancing location privacy without communication Qo. S degradation. SPC 2005 • M. Li, K. Sampigethaya, L. Huang, and R. Poovendran. Swing & Swap: User-centric Approaches Towards Maximizing Location Privacy. WPES 2006 • M. Raya, P. Papadimitratos, and J. -P. Hubaux. Securing Vehicular Communications. IEEE Wireless Communications magazine, 2006 21

CMIX Protocol Analysis • Transmission Complexity – Key requests scale with network condition – CMIX Protocol Analysis • Transmission Complexity – Key requests scale with network condition – Avoid key reply flooding by backoff mechanism and key acknowledgement • Computational Complexity – The number of exponentiations is manageable – Load is shared among vehicles in the CMIX • Security – Impersonation/Instantiation attacks are unfeasible – Denial of service attacks are hard – Cost to become internal adversary is high 22