Providing Location Security in Vehicular Networks

116
Providing Location Security in Vehicular Adhoc Networks Introduction Related Work Location Integrity Location Confidentiality Summary Providing Location Security in Vehicular Adhoc Networks Gongjun Yan Co-advisors: Dr. Stephan Olariu Dr. Michele C. Weigle Computer Science Department Old Dominion University, Norfolk, VA 23529 April 26, 2010 1 / 53

description

Gongjun Yan's PhD defense slides. Presented on April 16, 2010 in the Department of Computer Science at Old Dominion University in Norfolk, VA.

Transcript of Providing Location Security in Vehicular Networks

Page 1: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Providing Location Security in VehicularAdhoc Networks

Gongjun Yan

Co-advisors: Dr. Stephan OlariuDr. Michele C. Weigle

Computer Science DepartmentOld Dominion University,

Norfolk, VA 23529

April 26, 20101 / 53

Page 2: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Table of Contents

1 Introduction

2 Related Work

3 Location Integrity

4 Location Confidentiality

5 Summary

2 / 53

Page 3: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Introduction: Modern Vehicles

GPS Receiver

Digital ID and

Wireless Transceiver

Radar

3 / 53

Page 4: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Introduction: Modern Vehicles

Radar

GPS

Roadside

Infrastructure

Other Vehicles

Transceiver

4 / 53

Page 5: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Vehicular Adhoc Network (VANET)

Create a Vehicular Adhoc Network (VANET).Supported by gov, industry, and academic.

1

1http://www.comnets.rwth-aachen.de/5 / 53

Page 6: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Vehicular Adhoc Network (VANET)

Create a Vehicular Adhoc Network (VANET).Supported by gov, industry, and academic.

1

1http://www.comnets.rwth-aachen.de/5 / 53

Page 7: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Vehicular Adhoc Network

Vehicular Adhoc Network (VANET) applications:Safety:

Collision warning, road sign alarms, merge assistanceLeft turn assistance, pedestrians crossing alert, etc.

Comfort (infotainment) to passengers:Intelligent navigationMultimedia, internet connectivityAutomatic payment of parking, toll collection, etc.

6 / 53

Page 8: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Vehicular Adhoc Network

Vehicular Adhoc Network (VANET) applications:Safety:

Collision warning, road sign alarms, merge assistanceLeft turn assistance, pedestrians crossing alert, etc.

Comfort (infotainment) to passengers:Intelligent navigationMultimedia, internet connectivityAutomatic payment of parking, toll collection, etc.

6 / 53

Page 9: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Vehicular Adhoc Network

Vehicular Adhoc Network (VANET) applications:Safety:

Collision warning, road sign alarms, merge assistanceLeft turn assistance, pedestrians crossing alert, etc.

Comfort (infotainment) to passengers:Intelligent navigationMultimedia, internet connectivityAutomatic payment of parking, toll collection, etc.

6 / 53

Page 10: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Vehicular Adhoc Network

Vehicular Adhoc Network (VANET) applications:Safety:

Collision warning, road sign alarms, merge assistanceLeft turn assistance, pedestrians crossing alert, etc.

Comfort (infotainment) to passengers:Intelligent navigationMultimedia, internet connectivityAutomatic payment of parking, toll collection, etc.

6 / 53

Page 11: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Vehicular Adhoc Network

Vehicular Adhoc Network (VANET) applications:Safety:

Collision warning, road sign alarms, merge assistanceLeft turn assistance, pedestrians crossing alert, etc.

Comfort (infotainment) to passengers:Intelligent navigationMultimedia, internet connectivityAutomatic payment of parking, toll collection, etc.

6 / 53

Page 12: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Vehicular Adhoc Network

Vehicular Adhoc Network (VANET) applications:Safety:

Collision warning, road sign alarms, merge assistanceLeft turn assistance, pedestrians crossing alert, etc.

Comfort (infotainment) to passengers:Intelligent navigationMultimedia, internet connectivityAutomatic payment of parking, toll collection, etc.

6 / 53

Page 13: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Vehicular Adhoc Network

Vehicular Adhoc Network (VANET) applications:Safety:

Collision warning, road sign alarms, merge assistanceLeft turn assistance, pedestrians crossing alert, etc.

Comfort (infotainment) to passengers:Intelligent navigationMultimedia, internet connectivityAutomatic payment of parking, toll collection, etc.

6 / 53

Page 14: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Vehicular Adhoc Network

Vehicular Adhoc Network (VANET) applications:Safety:

Collision warning, road sign alarms, merge assistanceLeft turn assistance, pedestrians crossing alert, etc.

Comfort (infotainment) to passengers:Intelligent navigationMultimedia, internet connectivityAutomatic payment of parking, toll collection, etc.

6 / 53

Page 15: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Applications: TrafficView

[Nadeem et al.(2004)]7 / 53

Page 16: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Attack: Intersection

The line of sight is blocked and you trust only the locationover VANET. No traffic lights.

Traffic Direction

Traffic Direction

8 / 53

Page 17: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Attack: Highway

The line of sight is blocked and you trust only the locationover VANET.

Traffic Direction

Traffic Direction

9 / 53

Page 18: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Research Question

Most, if not all, applications rely on locations.Research question:

How to improve location security?

What do we protect?Right time, right ID, right location

Synchronized time can be obtain from GPSWhat is ID?

A unique digital identityAnonymous to drivers/passengers’ identity

What is location?location ≡ <latitude, longitude, altitude>Obtained from: transceivers, radar, GPS

10 / 53

Page 19: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Research Question

Most, if not all, applications rely on locations.Research question:

How to improve location security?

What do we protect?Right time, right ID, right location

Synchronized time can be obtain from GPSWhat is ID?

A unique digital identityAnonymous to drivers/passengers’ identity

What is location?location ≡ <latitude, longitude, altitude>Obtained from: transceivers, radar, GPS

10 / 53

Page 20: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Research Question

Most, if not all, applications rely on locations.Research question:

How to improve location security?

What do we protect?Right time, right ID, right location

Synchronized time can be obtain from GPSWhat is ID?

A unique digital identityAnonymous to drivers/passengers’ identity

What is location?location ≡ <latitude, longitude, altitude>Obtained from: transceivers, radar, GPS

10 / 53

Page 21: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Research Question

Most, if not all, applications rely on locations.Research question:

How to improve location security?

What do we protect?Right time, right ID, right location

Synchronized time can be obtain from GPSWhat is ID?

A unique digital identityAnonymous to drivers/passengers’ identity

What is location?location ≡ <latitude, longitude, altitude>Obtained from: transceivers, radar, GPS

10 / 53

Page 22: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Research Question

Most, if not all, applications rely on locations.Research question:

How to improve location security?

What do we protect?Right time, right ID, right location

Synchronized time can be obtain from GPSWhat is ID?

A unique digital identityAnonymous to drivers/passengers’ identity

What is location?location ≡ <latitude, longitude, altitude>Obtained from: transceivers, radar, GPS

10 / 53

Page 23: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Research Question

Most, if not all, applications rely on locations.Research question:

How to improve location security?

What do we protect?Right time, right ID, right location

Synchronized time can be obtain from GPSWhat is ID?

A unique digital identityAnonymous to drivers/passengers’ identity

What is location?location ≡ <latitude, longitude, altitude>Obtained from: transceivers, radar, GPS

10 / 53

Page 24: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Security

Assume: <time, ID, Location> can be attacked.What is threat model?

Dropping V Availability

Eavesdropping V Confidentiality

Modifying V Integrity + Confidentiality

Replaying V Integrity

Sybil Attack V Integrity

T

Sybil Attack

11 / 53

Page 25: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Security

Assume: <time, ID, Location> can be attacked.What is threat model?

Dropping V Availability

Eavesdropping V Confidentiality

Modifying V Integrity + Confidentiality

Replaying V Integrity

Sybil Attack V Integrity

T

Sybil Attack

11 / 53

Page 26: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Security

Assume: <time, ID, Location> can be attacked.What is threat model?

Dropping V Availability

Eavesdropping V Confidentiality

Modifying V Integrity + Confidentiality

Replaying V Integrity

Sybil Attack V Integrity

T

Sybil Attack

11 / 53

Page 27: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Security

Assume: <time, ID, Location> can be attacked.What is threat model?

Dropping V Availability

Eavesdropping V Confidentiality

Modifying V Integrity + Confidentiality

Replaying V Integrity

Sybil Attack V Integrity

T

Sybil Attack

11 / 53

Page 28: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Security

Assume: <time, ID, Location> can be attacked.What is threat model?

Dropping V Availability

Eavesdropping V Confidentiality

Modifying V Integrity + Confidentiality

Replaying V Integrity

Sybil Attack V Integrity

T

Sybil Attack

11 / 53

Page 29: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Security

Assume: <time, ID, Location> can be attacked.What is threat model?

Dropping V Availability

Eavesdropping V Confidentiality

Modifying V Integrity + Confidentiality

Replaying V Integrity

Sybil Attack V Integrity

T

Sybil Attack

11 / 53

Page 30: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Security

Assume: <time, ID, Location> can be attacked.What is threat model?

Dropping V Availability

Eavesdropping V Confidentiality

Modifying V Integrity + Confidentiality

Replaying V Integrity

Sybil Attack V Integrity

T

Sybil Attack

11 / 53

Page 31: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Our Solution: Ensure Confidentiality, Integrity,Availability (CIA)

Location

Security

(CIA)

Integrity

ConfidentialityAvailability

Reliable Routing

Select Maintain

Link Model

Local Integrity

Global Integrity

Propagation Aggregation

Encrypt/Decrypt

Access Control

Unreliable routing

Plaintext message

12 / 53

Page 32: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Related Work

Location integrity:Digital signatures [Armknecht et al.(2007), Choi etal.(2006)], etc.Resource:

Radio signal [Suen & Yasinsac(2005), Xiao etal.(2006)], etc.Computational resources [Douceur(2002)], etc.Identification [Piro et al.(2006)], etc.

Location confidentiality:PKI [Choi et al.(2006), Hubaux et al.(2004), Raya etal.(2006)], etc.Location-based encryption[Denning & MacDoran(1996)], etc.

13 / 53

Page 33: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Related Work

Location integrity:Digital signatures [Armknecht et al.(2007), Choi etal.(2006)], etc.Resource:

Radio signal [Suen & Yasinsac(2005), Xiao etal.(2006)], etc.Computational resources [Douceur(2002)], etc.Identification [Piro et al.(2006)], etc.

Location confidentiality:PKI [Choi et al.(2006), Hubaux et al.(2004), Raya etal.(2006)], etc.Location-based encryption[Denning & MacDoran(1996)], etc.

13 / 53

Page 34: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Related Work

Location integrity:Digital signatures [Armknecht et al.(2007), Choi etal.(2006)], etc.Resource:

Radio signal [Suen & Yasinsac(2005), Xiao etal.(2006)], etc.Computational resources [Douceur(2002)], etc.Identification [Piro et al.(2006)], etc.

Location confidentiality:PKI [Choi et al.(2006), Hubaux et al.(2004), Raya etal.(2006)], etc.Location-based encryption[Denning & MacDoran(1996)], etc.

13 / 53

Page 35: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Related Work

Location integrity:Digital signatures [Armknecht et al.(2007), Choi etal.(2006)], etc.Resource:

Radio signal [Suen & Yasinsac(2005), Xiao etal.(2006)], etc.Computational resources [Douceur(2002)], etc.Identification [Piro et al.(2006)], etc.

Location confidentiality:PKI [Choi et al.(2006), Hubaux et al.(2004), Raya etal.(2006)], etc.Location-based encryption[Denning & MacDoran(1996)], etc.

13 / 53

Page 36: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Contributions

The main contribution of this dissertation is:To enhance location security in VANETs

Specifically,1 Enabling location integrity2 Ensuring location confidentiality3 Including integrity and availability in location security4 Enabling location availability5 Reducing control overhead6 Reducing response time7 New Geoencryption can operate with only one PKI peer8 New Geolock can compute key dynamically9 New Geolock can tolerate larger location errors

14 / 53

Page 37: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Integrity: Overview

The main task:Validate the tuple <time, ID, location>

Three sub-solutions:1 Active integrity: strong assumption (radar, GPS,

transceiver)2 Passive integrity: weaker assumption (GPS,

transceiver)3 General integrity: real world environment

15 / 53

Page 38: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Integrity: Overview

The main task:Validate the tuple <time, ID, location>

Three sub-solutions:1 Active integrity: strong assumption (radar, GPS,

transceiver)2 Passive integrity: weaker assumption (GPS,

transceiver)3 General integrity: real world environment

15 / 53

Page 39: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Active Integrity: “Seeing is believing"

16 / 53

Page 40: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

GPS Location

B

X

Y

x∆

y∆

(Xgps, Ygps)

0

Figure: GPS location. (xgps,ygps) is a measurement value of theGPS coordinates.For GPS: let measurement error ∆α = ∆x = ∆y , write

(x −xgps)2 + (y −ygps)2 ≤ (∆α)2 (1)

17 / 53

Page 41: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Radar Detection

For Radar detection:(x − γ×cos(θ −∆θ))2 + (y − γ×sin(θ −∆θ))2 ≤ (∆γ)2 (2)(x − γ×cos(θ + ∆θ))2 + (y − γ×sin(θ + ∆θ))2 ≤ (∆γ)2 (3)

θ : the detected angle; γ: the detected radius.For the region FCGHDE:{

γ−∆γ ≤√

x2 + y2 ≤ γ + ∆γ

θ −∆θ ≤ arctan xy ≤ θ + ∆θ

(4)

18 / 53

Page 42: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Validating GPS Location

Validating GPS location means resolutions of: (1)⋂

{(2)

⋃(3)

⋃(4) }

The accuracy of this solution is 99.1%.19 / 53

Page 43: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Validating GPS Location

Validating GPS location means resolutions of: (1)⋂

{(2)

⋃(3)

⋃(4) }

The accuracy of this solution is 99.1%.19 / 53

Page 44: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Passive Integrity:Statistically remove and refine

Possible data sources:Neighbors: All vehicles in the transmission rangeOn-coming vehicles: All neighbors in opposite direction

20 / 53

Page 45: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Passive Integrity:Statistically remove and refine

Possible data sources:Neighbors: All vehicles in the transmission rangeOn-coming vehicles: All neighbors in opposite direction

20 / 53

Page 46: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Passive Integrity: Data Input

N

Po

sitio

n(m

)

0 1000 2000 3000 4000

0

20

40

60

80

100

120

N

Po

sitio

n(m

)

0 1000 2000 3000 4000

20

40

60

80

100

120

Figure: Bob’s location collected by Alice (raw vs. filtered)

21 / 53

Page 47: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

M-Distance

Mahalanobis distance (M-Distance) introduced by P. C.Mahalanobis [Mahalanobis(1936)]Vectors~x and ~y with the covariance matrix V ,M-Distance:

d(~x ,~y) =√

(~x−~y)T V−1(~x −~y).

Let x : the sample mean vector;V : the sample covariance matrix,

V =1

n−1

n

∑i=1

(xi −x)(xi −x)T . (5)

22 / 53

Page 48: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

M-Distance

Mahalanobis distance (M-Distance) introduced by P. C.Mahalanobis [Mahalanobis(1936)]Vectors~x and ~y with the covariance matrix V ,M-Distance:

d(~x ,~y) =√

(~x−~y)T V−1(~x −~y).

Let x : the sample mean vector;V : the sample covariance matrix,

V =1

n−1

n

∑i=1

(xi −x)(xi −x)T . (5)

22 / 53

Page 49: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

M-Distance

Mahalanobis distance (M-Distance) introduced by P. C.Mahalanobis [Mahalanobis(1936)]Vectors~x and ~y with the covariance matrix V ,M-Distance:

d(~x ,~y) =√

(~x−~y)T V−1(~x −~y).

Let x : the sample mean vector;V : the sample covariance matrix,

V =1

n−1

n

∑i=1

(xi −x)(xi −x)T . (5)

22 / 53

Page 50: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Intuitive Explanation

An intuitive explanation: the distance of a test point from thecenter of mass divided by the width of the ellipse/ellipsoid

Figure: Two-dimensional space.

Figure: Three-dimensional space.23 / 53

Page 51: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Passive Integrity

Outliers can change the value of mean and covariance.We replace the mean x by the median x∗ and obtainthe robust covariance S.

S =∑

ni=1 K (‖xi −x∗‖)(xi −x∗)(xi −x∗)T

∑ni=1 K (‖xi −x∗‖)

, (6)

where ‖X‖= XV−1X T , K (u) = exp(−hu),By [Caussinus & Ruiz(1990)], h = 0.1,

24 / 53

Page 52: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Passive Integrity

Outliers can change the value of mean and covariance.We replace the mean x by the median x∗ and obtainthe robust covariance S.

S =∑

ni=1 K (‖xi −x∗‖)(xi −x∗)(xi −x∗)T

∑ni=1 K (‖xi −x∗‖)

, (6)

where ‖X‖= XV−1X T , K (u) = exp(−hu),By [Caussinus & Ruiz(1990)], h = 0.1,

24 / 53

Page 53: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Passive Integrity

Outliers can change the value of mean and covariance.We replace the mean x by the median x∗ and obtainthe robust covariance S.

S =∑

ni=1 K (‖xi −x∗‖)(xi −x∗)(xi −x∗)T

∑ni=1 K (‖xi −x∗‖)

, (6)

where ‖X‖= XV−1X T , K (u) = exp(−hu),By [Caussinus & Ruiz(1990)], h = 0.1,

24 / 53

Page 54: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Passive Integrity

The new M-distance Dri :

Dri =

√{(xi −x∗)S−1(xi −x∗)T} (7)

Exclude the deviation caused by the outliersFor multivariate normally distributed data, the values ofDr

i are approximately chi-square distributed (χ22 )

[Filzmoser(2004)]The observations can be abandoned by using thechi-squared distribution (e.g., the 97.5% quantile).The sample mean:

x∗ =∑

Nk=1 x∗kN

(8)

The accuracy of this solution is 96.2%.25 / 53

Page 55: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Passive Integrity

The new M-distance Dri :

Dri =

√{(xi −x∗)S−1(xi −x∗)T} (7)

Exclude the deviation caused by the outliersFor multivariate normally distributed data, the values ofDr

i are approximately chi-square distributed (χ22 )

[Filzmoser(2004)]The observations can be abandoned by using thechi-squared distribution (e.g., the 97.5% quantile).The sample mean:

x∗ =∑

Nk=1 x∗kN

(8)

The accuracy of this solution is 96.2%.25 / 53

Page 56: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Passive Integrity

The new M-distance Dri :

Dri =

√{(xi −x∗)S−1(xi −x∗)T} (7)

Exclude the deviation caused by the outliersFor multivariate normally distributed data, the values ofDr

i are approximately chi-square distributed (χ22 )

[Filzmoser(2004)]The observations can be abandoned by using thechi-squared distribution (e.g., the 97.5% quantile).The sample mean:

x∗ =∑

Nk=1 x∗kN

(8)

The accuracy of this solution is 96.2%.25 / 53

Page 57: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Passive Integrity

The new M-distance Dri :

Dri =

√{(xi −x∗)S−1(xi −x∗)T} (7)

Exclude the deviation caused by the outliersFor multivariate normally distributed data, the values ofDr

i are approximately chi-square distributed (χ22 )

[Filzmoser(2004)]The observations can be abandoned by using thechi-squared distribution (e.g., the 97.5% quantile).The sample mean:

x∗ =∑

Nk=1 x∗kN

(8)

The accuracy of this solution is 96.2%.25 / 53

Page 58: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Passive Integrity

The new M-distance Dri :

Dri =

√{(xi −x∗)S−1(xi −x∗)T} (7)

Exclude the deviation caused by the outliersFor multivariate normally distributed data, the values ofDr

i are approximately chi-square distributed (χ22 )

[Filzmoser(2004)]The observations can be abandoned by using thechi-squared distribution (e.g., the 97.5% quantile).The sample mean:

x∗ =∑

Nk=1 x∗kN

(8)

The accuracy of this solution is 96.2%.25 / 53

Page 59: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Passive Integrity

The new M-distance Dri :

Dri =

√{(xi −x∗)S−1(xi −x∗)T} (7)

Exclude the deviation caused by the outliersFor multivariate normally distributed data, the values ofDr

i are approximately chi-square distributed (χ22 )

[Filzmoser(2004)]The observations can be abandoned by using thechi-squared distribution (e.g., the 97.5% quantile).The sample mean:

x∗ =∑

Nk=1 x∗kN

(8)

The accuracy of this solution is 96.2%.25 / 53

Page 60: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

General Integrity: Real World Solution

Data source:Radar: Radar of observerNeighbors: All vehicles in the transmission rangeOn-coming vehicles: All neighbors in on-comingdirection

26 / 53

Page 61: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

General Integrity: Real World Solution

Data source:Radar: Radar of observerNeighbors: All vehicles in the transmission rangeOn-coming vehicles: All neighbors in on-comingdirection

26 / 53

Page 62: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

General Integrity: Real World Solution

Data source:Radar: Radar of observerNeighbors: All vehicles in the transmission rangeOn-coming vehicles: All neighbors in on-comingdirection

26 / 53

Page 63: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

General Integrity: Data Input

N

Location (m)

0

30

60

90

120

150

180

210

240

270

300

330

0 20 40 60 80 100 120

NeighborsOncomingRadar

Before filtering

27 / 53

Page 64: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

General Integrity: Location Measurement

N

Location (m)

0

30

60

90

120

150

180

210

240

270

300

330

0 10 20 30 40

NeighborsOncomingRadar

After filtering

28 / 53

Page 65: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

General Integrity

Let:X: radar detectionY: on-coming vehicle detectionZ: neighbor detection

The final estimation of location:

P = w1 ∗X∗

+ w2 ∗Y∗

+ w3 ∗Z∗

where the weights ofw1: radar detectionw2: on-coming vehicle detectionw3: neighbor detectionw1 ≥ w2 ≥ w3

The accuracy of this solution is 94.7%(w1 = 0.4,w2 = 0.4,w3 = 0.2).

29 / 53

Page 66: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

General Integrity

Let:X: radar detectionY: on-coming vehicle detectionZ: neighbor detection

The final estimation of location:

P = w1 ∗X∗

+ w2 ∗Y∗

+ w3 ∗Z∗

where the weights ofw1: radar detectionw2: on-coming vehicle detectionw3: neighbor detectionw1 ≥ w2 ≥ w3

The accuracy of this solution is 94.7%(w1 = 0.4,w2 = 0.4,w3 = 0.2).

29 / 53

Page 67: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

General Integrity

Let:X: radar detectionY: on-coming vehicle detectionZ: neighbor detection

The final estimation of location:

P = w1 ∗X∗

+ w2 ∗Y∗

+ w3 ∗Z∗

where the weights ofw1: radar detectionw2: on-coming vehicle detectionw3: neighbor detectionw1 ≥ w2 ≥ w3

The accuracy of this solution is 94.7%(w1 = 0.4,w2 = 0.4,w3 = 0.2).

29 / 53

Page 68: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

General Integrity

Let:X: radar detectionY: on-coming vehicle detectionZ: neighbor detection

The final estimation of location:

P = w1 ∗X∗

+ w2 ∗Y∗

+ w3 ∗Z∗

where the weights ofw1: radar detectionw2: on-coming vehicle detectionw3: neighbor detectionw1 ≥ w2 ≥ w3

The accuracy of this solution is 94.7%(w1 = 0.4,w2 = 0.4,w3 = 0.2).

29 / 53

Page 69: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

General Integrity

Let:X: radar detectionY: on-coming vehicle detectionZ: neighbor detection

The final estimation of location:

P = w1 ∗X∗

+ w2 ∗Y∗

+ w3 ∗Z∗

where the weights ofw1: radar detectionw2: on-coming vehicle detectionw3: neighbor detectionw1 ≥ w2 ≥ w3

The accuracy of this solution is 94.7%(w1 = 0.4,w2 = 0.4,w3 = 0.2).

29 / 53

Page 70: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

General Integrity

Let:X: radar detectionY: on-coming vehicle detectionZ: neighbor detection

The final estimation of location:

P = w1 ∗X∗

+ w2 ∗Y∗

+ w3 ∗Z∗

where the weights ofw1: radar detectionw2: on-coming vehicle detectionw3: neighbor detectionw1 ≥ w2 ≥ w3

The accuracy of this solution is 94.7%(w1 = 0.4,w2 = 0.4,w3 = 0.2).

29 / 53

Page 71: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Simulation Methods

For simulation, we find the location attackers out of allvehicles.Q-Q plot (Quantile-Quantile Plots) [Thode(2002)]

A commonly used tool in statistics to show the outliers.Is a kind of graphical method for comparing twoprobability distributionsPlots the two distributions’ quantiles against each other.

A Q-Q plot is applied to show the Mahalanobis distancevs. normal quantile.

30 / 53

Page 72: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Simulation Methods

For simulation, we find the location attackers out of allvehicles.Q-Q plot (Quantile-Quantile Plots) [Thode(2002)]

A commonly used tool in statistics to show the outliers.Is a kind of graphical method for comparing twoprobability distributionsPlots the two distributions’ quantiles against each other.

A Q-Q plot is applied to show the Mahalanobis distancevs. normal quantile.

30 / 53

Page 73: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Simulation Methods

For simulation, we find the location attackers out of allvehicles.Q-Q plot (Quantile-Quantile Plots) [Thode(2002)]

A commonly used tool in statistics to show the outliers.Is a kind of graphical method for comparing twoprobability distributionsPlots the two distributions’ quantiles against each other.

A Q-Q plot is applied to show the Mahalanobis distancevs. normal quantile.

30 / 53

Page 74: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Simulation Settings

Table: Parameters and Values

Parameters ValuesInitial traffic density 30 vehicles/Km/lane

The length of the road L 3 KmAverage speed 60 km/h

The number of lanes 4/directionThe mean error µ 1 m

The deviation of error σ 1 mError ε 3 m

The sample size n 1000# of neighbor outliers mn 8# of opposite outliers mo 2The weight for radar w1 0.5

The weight for opposite w2 0.3The weight for neighbors w3 0.2

31 / 53

Page 75: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Neighboring Report Filtering

-3 -2 -1 0 1 2 3-0.5

0

0.5

1

1.5

2

2.5

3

3.5

4

Standard Normal Quantiles

Qu

an

tile

s o

f In

pu

t S

am

ple

(R

ep

ort

ed

Lo

ca

tio

n)

QQ Plot of Reported Location versus standard normal

Figure: Q-Q plot of the Mahalanobis distance for neighboringsamples.

32 / 53

Page 76: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

All Measurements Estimation

-10 -5 0 5 10-15

-10

-5

0

5

10

15

X

Y

Figure: The x-y coordinates of location observation and thelocation estimation.

33 / 53

Page 77: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Integrity: Summary

Main points:Validate the tuple <time, ID, location>Start with a homogenous model and strongassumptionsImprove to a real world solution

Contributions:Novel idea: active location securityReal world solution

34 / 53

Page 78: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Integrity: Summary

Main points:Validate the tuple <time, ID, location>Start with a homogenous model and strongassumptionsImprove to a real world solution

Contributions:Novel idea: active location securityReal world solution

34 / 53

Page 79: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Integrity: Summary

Main points:Validate the tuple <time, ID, location>Start with a homogenous model and strongassumptionsImprove to a real world solution

Contributions:Novel idea: active location securityReal world solution

34 / 53

Page 80: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Integrity: Summary

Main points:Validate the tuple <time, ID, location>Start with a homogenous model and strongassumptionsImprove to a real world solution

Contributions:Novel idea: active location securityReal world solution

34 / 53

Page 81: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Integrity: Summary

Main points:Validate the tuple <time, ID, location>Start with a homogenous model and strongassumptionsImprove to a real world solution

Contributions:Novel idea: active location securityReal world solution

34 / 53

Page 82: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Integrity: Summary

Main points:Validate the tuple <time, ID, location>Start with a homogenous model and strongassumptionsImprove to a real world solution

Contributions:Novel idea: active location securityReal world solution

34 / 53

Page 83: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Integrity: Summary

Main points:Validate the tuple <time, ID, location>Start with a homogenous model and strongassumptionsImprove to a real world solution

Contributions:Novel idea: active location securityReal world solution

34 / 53

Page 84: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Confidentiality: Overview

Denning’s GeoEncryption:Public Key Infrastructure (PKI): public key & private keyGeolock table

35 / 53

Page 85: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Confidentiality: Overview

Denning’s GeoEncryption:Public Key Infrastructure (PKI): public key & private keyGeolock table

35 / 53

Page 86: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Confidentiality: Overview

Denning’s GeoEncryption:Public Key Infrastructure (PKI): public key & private keyGeolock table

35 / 53

Page 87: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Denning’s GeoLock Table 2

Geolock table is preinstalled on all the nodes.2[Denning & MacDoran(1996)]

36 / 53

Page 88: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Denning’s GeoEncryption 3

Generate

Random Key

Generate

Random Key

EncryptEncrypt

DecryptDecrypt

Plaintext

Plaintext

Ciphertext

Key_S

EncryptEncrypt

DecryptDecrypt

GeoEncrypted Key

Key_E

⊕⊕

⊕⊕

Recipient Location

Signature

Recipient Location

Signature

Location Signature →

Geolock Mapping

Location Signature →

Geolock Mapping

AntiSpoof Enhanced

GPS, WiFi or Loran

Receiver

AntiSpoof Enhanced

GPS, WiFi or Loran

Receiver

Location Signature →

Geolock Mapping

Location Signature →

Geolock Mapping

Key_D

Key_S

GeoEncryptionGeoEncryption

GeoDecryptionGeoDecryption

Geolock

Drawbacks?Both sender and receiver have PKIPre-deployed mapping tables

3[Denning & MacDoran(1996)]37 / 53

Page 89: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Confidentiality: Our Method

Encryption

GeoLock

Decryption

GeoLock

Key_S Key_C

GeoLock

Encryption

Decryption

GeoLock

Key_C

Key_C

Key_S

Key_E

Key_D

Encryption

Decryption

Encryption

E{Req}E{Key} E{Key'}E{Rep}

Alice

Bob

Wireless Channel

Key_S'

Random Number

Key_S'

Decryption

Key_C

Random Numbers

To crack this scheme, attackers must have both location andprivate key.

38 / 53

Page 90: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

New GeoLock

X0 Y0

P P

Mux

Key

Hash

T

P

V

P

39 / 53

Page 91: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

An Example: New GeoLock

04200E 91500 N

042.00E 915.00 N

042E 915N

042915Mux

SHA(042915)Hash

d97e0e02efdb13de05d90abf1a99e8feac134f63

Coordinates

output

GPS Coordinatesin

in Region

Size

GeoLock

Figure: An example of GeoLock.

40 / 53

Page 92: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Simulation Scenario

Figure: Decryption region snapshot (Decryption region is notproportionally drawn)

Comparing our extension with a geoencryptionextension: Al-Fuqaha [Al-Fuqaha & Al-Ibrahim(2007)].Al-Fuqaha added decryption region predictionalgorithm to geoencryption in mobile networks.

41 / 53

Page 93: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Simulation Settings

Table: The selected environment configuration

Name ValueTransmission range 300m

Simulation map UrbanMap area 3.2*3.2 Km2

Decryption area 100*100 m2

Traffic density 1500 vehicles/hourAverage speed 28 m/s

Acceleration range [0,2] m/s2

Initial acceleration 0 m/s2

Initial speed 25 m/sMobility model IDM [Treiber et al.(2000)]

42 / 53

Page 94: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

GeoEncryption Decryption Ratio

As expected, our algorithm can tolerate larger locationerrors. DecryptionRatio =

No. of successful decryptionNo. of received ciphertext

Location error (%)

Dec

rypt

ion

ratio

0 2 4 6 8 10

0.5

0.6

0.7

0.8

0.9

1

YanAl-Fuqaha

43 / 53

Page 95: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

GeoEncryption Decryption Ratio Vs. Overhead

As expected, our algorithmHas smaller decryption error.Has fewer control message.

Update pause (s)

Rat

io

0 5 10 15 20 250

0.2

0.4

0.6

0.8

1Control overhead (Yan)Decryption Error (Yan)Control overhead (AlFuqaha)Decryption error (AlFuqaha)

44 / 53

Page 96: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Confidentiality: Summary

Main points:Encrypt/decrypt location informationLocation is part of the key: GeoLockKey exchange is secured by GeoLock + private key

Contributions:New Geoencryption can operate with only one PKI peerNew Geolock can compute key dynamically.New Geolock can tolerate larger location errors.New Geoencryption has lower control overhead.

45 / 53

Page 97: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Confidentiality: Summary

Main points:Encrypt/decrypt location informationLocation is part of the key: GeoLockKey exchange is secured by GeoLock + private key

Contributions:New Geoencryption can operate with only one PKI peerNew Geolock can compute key dynamically.New Geolock can tolerate larger location errors.New Geoencryption has lower control overhead.

45 / 53

Page 98: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Confidentiality: Summary

Main points:Encrypt/decrypt location informationLocation is part of the key: GeoLockKey exchange is secured by GeoLock + private key

Contributions:New Geoencryption can operate with only one PKI peerNew Geolock can compute key dynamically.New Geolock can tolerate larger location errors.New Geoencryption has lower control overhead.

45 / 53

Page 99: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Confidentiality: Summary

Main points:Encrypt/decrypt location informationLocation is part of the key: GeoLockKey exchange is secured by GeoLock + private key

Contributions:New Geoencryption can operate with only one PKI peerNew Geolock can compute key dynamically.New Geolock can tolerate larger location errors.New Geoencryption has lower control overhead.

45 / 53

Page 100: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Confidentiality: Summary

Main points:Encrypt/decrypt location informationLocation is part of the key: GeoLockKey exchange is secured by GeoLock + private key

Contributions:New Geoencryption can operate with only one PKI peerNew Geolock can compute key dynamically.New Geolock can tolerate larger location errors.New Geoencryption has lower control overhead.

45 / 53

Page 101: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Confidentiality: Summary

Main points:Encrypt/decrypt location informationLocation is part of the key: GeoLockKey exchange is secured by GeoLock + private key

Contributions:New Geoencryption can operate with only one PKI peerNew Geolock can compute key dynamically.New Geolock can tolerate larger location errors.New Geoencryption has lower control overhead.

45 / 53

Page 102: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Confidentiality: Summary

Main points:Encrypt/decrypt location informationLocation is part of the key: GeoLockKey exchange is secured by GeoLock + private key

Contributions:New Geoencryption can operate with only one PKI peerNew Geolock can compute key dynamically.New Geolock can tolerate larger location errors.New Geoencryption has lower control overhead.

45 / 53

Page 103: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Confidentiality: Summary

Main points:Encrypt/decrypt location informationLocation is part of the key: GeoLockKey exchange is secured by GeoLock + private key

Contributions:New Geoencryption can operate with only one PKI peerNew Geolock can compute key dynamically.New Geolock can tolerate larger location errors.New Geoencryption has lower control overhead.

45 / 53

Page 104: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Location Confidentiality: Summary

Main points:Encrypt/decrypt location informationLocation is part of the key: GeoLockKey exchange is secured by GeoLock + private key

Contributions:New Geoencryption can operate with only one PKI peerNew Geolock can compute key dynamically.New Geolock can tolerate larger location errors.New Geoencryption has lower control overhead.

45 / 53

Page 105: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Summary

“Art is never finished, only abandoned."(Leonardo da Vinci)

Focused on studying location information securityCIA model

Location availability: A mobility and probability model inVANET communicationLocation integrity: The active, passive and generalmodelsLocation confidentiality: The location-based encryptionand decryption

46 / 53

Page 106: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Summary

“Art is never finished, only abandoned."(Leonardo da Vinci)

Focused on studying location information securityCIA model

Location availability: A mobility and probability model inVANET communicationLocation integrity: The active, passive and generalmodelsLocation confidentiality: The location-based encryptionand decryption

46 / 53

Page 107: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Summary

“Art is never finished, only abandoned."(Leonardo da Vinci)

Focused on studying location information securityCIA model

Location availability: A mobility and probability model inVANET communicationLocation integrity: The active, passive and generalmodelsLocation confidentiality: The location-based encryptionand decryption

46 / 53

Page 108: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Summary

“Art is never finished, only abandoned."(Leonardo da Vinci)

Focused on studying location information securityCIA model

Location availability: A mobility and probability model inVANET communicationLocation integrity: The active, passive and generalmodelsLocation confidentiality: The location-based encryptionand decryption

46 / 53

Page 109: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Summary

“Art is never finished, only abandoned."(Leonardo da Vinci)

Focused on studying location information securityCIA model

Location availability: A mobility and probability model inVANET communicationLocation integrity: The active, passive and generalmodelsLocation confidentiality: The location-based encryptionand decryption

46 / 53

Page 110: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Putting The Work In Perspective

What remains to be done:Cross layer issuesExtensive simulationIntegrate to other research, e.g. privacyOptimization of the algorithmReal traffic data importTest bed implementationPrototype designApplying the research in real applicationsTheory analysis of the transportation issuesDisaster evacuationData storage in VANET

47 / 53

Page 111: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

VANET Applications

VANET Applications

I. Active safety

1. Dangerous road features 1. Curve speed warning, 2 low bridge warning,3. traffic lights violation warning

2. Abnormal conditions 1. Vehicle-based road condition warning, 2.infrastructure-based road condition warning, 3.visibility enhancer, 4. work zone warning.

3. Danger of collision 1. Blind spot warning, 2. lane change warning,3. intersection collision warning, 4. forward/rearcollision warning, 5. emergency electronic brakelights, 6. rail collision warning, 7. warning aboutpedestrians crossing

4. Incident occurred 1. Post-crash warning, 2. incident recovery (in-surance), 3. SOS service, 4. evacuate people

II. Public service 1.Support for authorities 1. Electronic license plate, 2. electronic driverslicense, 3. vehicle safety inspection, 4. stolenvehicles tracking, 5. Emergency vehicle warning,

III. Improved driving 1. Enhanced Driving 1. Highway merge assistant, 2. left turn as-sistant, 3. cooperative adaptive cruise control,4. cooperative glare reduction, 5. in-vehicle sig-nage, 6. adaptive drivetrain management

2. Traffic Efficiency 1. Notification of crash, 2. intelligent traffic flowcontrol, 3. enhanced route guidance and naviga-tion, 4. map download/update, 5. parking spotlocator service

IV. Entertainment

1. Mobile Services 1. Internet service provisioning, 2. instant mes-saging, 3. point-of-interest notification

2. E-Commerce 1. Fleet management, 2. rental car processing,3. area access control, 4. cargo tracking; 5. tollcollection, 6. parking/gas payment

1. E. Schoch, at el, "Communication Patterns in VANETs," IEEE Communications Magazine, Vol.46 48 / 53

Page 112: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

Related Work

LocationIntegrity

LocationConfidentiality

Summary

Selected Publication Lists

Journal1. G Yan, S. Olariu, "An Efficient Geographic Location-basedSecurity Mechanism for Vehicular Ad hoc Networks", IEEETransactions on Intelligent Transportation System, 2010.Accepted with minor revision (Impact factor: 2.844).2. G Yan, S. Olariu, S. Salleh, "A Probabilistic Routing Protocol inVANET," International Journal of Mobile Computing andMultimedia Communication, IGI-Global, 2010.3. G. Yan, S. Olariu, M. C. Weigle, "Providing Location Security inVehicular Ad hoc Networks ", IEEE Wireless CommunicationMagazine Special Issue On-The-Road Communications, 16(6),pp. 48-53, 2009. (Impact factor: 2.0).4. G. Yan, S. Olariu, M. C. Weigle, "Providing VANET Securitythrough Active Position Detection", Computer Communications -Elsevier, Special Issue on Mobility Protocols for ITS/VANET,31(12):2883-2897, 2008. (Impact factor: 0.884)

49 / 53

Page 113: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

RelatedWork

LocationIntegrity

LocationConfiden-tiality

Summary

Refereed Conference Publication Lists

Refereed Conference5. G. Yan, S. Olariu, D. B. Rawat, "Provisioning Vehicular Ad hoc Networks with Quality ofService", in Proceedings of The International Workshop on Wireless Sensor, Actuator andRobot Networks (WiSARN). Montreal, Canada, June 17, 2010.6. G. Yan, S. Olariu and S. Salleh, "A Probabilistic Routing Protocol in VANET", inProceedings of the 7th International Conference on Advances in Mobile Computing andMultimedia (MoMM2009), 14-16 December 2009, Kuala Lumpur, Malaysia.7. G. Yan, M. C. Weigle and S. Olariu, "A Novel Parking Service Using Wireless Networks," InProceedings of the International 2009 IEEE International Conference on Service Operations,Logistics and Informatics (SOLI 2009), July 22 - 24, 2009, Chicago, IL, USA, The BestStudent Paper Award.8. G. Yan, S. Olariu, "An Efficient Geographic Location-based Security Mechanism forVehicular Ad hoc Networks," In Proceedings of the 2009 IEEE International Symposium onTrust, Security and Privacy for Pervasive Applications (TSP). Macau, October 12-14, 2009.9. G. Yan, X. Chen, S. Olariu, "Providing VANET Position Integrity Through Filtering," InProceedings of the 12th International IEEE Conference on Intelligent Transportation Systems(ITSC2009). St. Louis, MO, USA. Accepted, October 3-7, 2009.10. G. Yan, Y. Wang, M. C. Weigle, S. Olariu and K. Ibrahim, "WEHealth: A Secure andPrivacy Preserving eHealth Using NOTICE," In Proceedings of the IEEE InternationalConference on Wireless Access in Vehicular Environments (WAVE). Dearborn, 2008.11. G. Yan, S. Olariu, M. C. Weigle and M. Abuelela, "SmartParking: A Secure and IntelligentParking System Using NOTICE," In Proceedings of the International IEEE Conference onIntelligent Transportation Systems (ITSC). Beijing, October 2008, pp. 569-574.

50 / 53

Page 114: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

RelatedWork

LocationIntegrity

LocationConfiden-tiality

Summary

Selected Book Chapters

Book Chapters12. G. Yan, K. Ibrahim and M. C. Weigle, "Vehicular NetworkSimulators," In Vehicular Networks: From Theory to Practice, S.Olariu and M. C. Weigle, Eds. Chapman & Hall/CRC, 2009.13. G. Yan, S. El-Tawab, and D. B. Rawat, "Reliable RoutingProtocols in VANETs," In Advances in Vehicular Ad-HocNetworks: Developments and Challenges, Mohamed Watfa, Ed.IGI Global, 2009.14. G. Yan, S. Olariu, D. B. Rawat, W. Yang, "E-Parking: AElectronic Parking Service Using Wireless Networks". inE-Business Issues Challenges and Opportunities for SMEs:Driving Competitiveness, M. Manuela Cruz-Cunha and JoãoEduardo Varajão, Eds, IGI Global, 2010.

51 / 53

Page 115: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

RelatedWork

LocationIntegrity

LocationConfiden-tiality

Summary

Thank you!

52 / 53

Page 116: Providing Location Security in Vehicular Networks

ProvidingLocation

Security inVehicular

AdhocNetworks

Introduction

RelatedWork

LocationIntegrity

LocationConfiden-tiality

Summary

References

Al-Fuqaha, A., & Al-Ibrahim, O. (2007).Geo-encryption protocol for mobile networks.Comput. Commun., 30(11-12), 2510–2517.

Caussinus, H., & Ruiz, A. (1990).Interesting projections of multidimensional data by means of generalized principalcomponent analysis.In X. XX (Ed.) COMPSTAT 90, (pp. 121–126). Physica-Verlag.

Denning, D., & MacDoran, P. (1996).Location-based authentication: Grounding cyberspace for better security.Computer Fraud and Security , 1996(2), 12–16.

Douceur, J. (2002).The sybil attack.Lecture Notes in Computer Science: Revised Papers from the First InternationalWorkshop on Peer-to-Peer Systems, 2429, 251–260.

Filzmoser, P. (2004).A multivariate outlier detection method.In Proceedings of the Seventh International Conference on Computer Data Analysisand Modeling, (pp. 18–22). Belarusian State University, Minsk.

Mahalanobis, P. C. (1936).On the generalised distance in statistics.In Proceedings National Institute of Science, India, vol. 2, (pp. 49–55).URL http://ir.isical.ac.in/dspace/handle/1/1268

Thode, H. (2002).Testing for Normality; electronic version.Abingdon: Dekker.

53 / 53