VANET Privacy Protocol
-
Upload
risalatul-hoque -
Category
Documents
-
view
22 -
download
3
Transcript of VANET Privacy Protocol
1
VANET Location Privacy
Dummy Event Overhead and CongestionRISALATUL HOQUE & JOHNATHAN COX (ADVISOR: GEORGE CORSER)
2
Road MapVANET, privacy and congestion/overhead
Security (Privacy) Concerns
Vehicular Network Concerns
VANET protocols
VANET privacy protocols
Location privacy theory
Vehicle Mobility and Location Privacy
Dummy Event Methods
3
VANET, privacy and congestion/overhead
VANET: Vehicular Ad-hoc Network◦ Designed primarily for safety◦ Will also assist with traffic management and
perhaps infotainment
Why is privacy a problem?◦ US DOT is expected to require that ALL cars have
this technology installed and anyone with access to antenna could monitor/track a car
Why is congestion/overhead a problem?◦ If cars send fake messages (“dummy events”)
then it will add more “spam” communications to the system
Image source: http://adrianlatorre.com/projects/pfc/img/vanet_full.jpg
4
Security (Privacy) Concerns Forgery
Jamming (or DOS)
In-transit traffic tampering
Impersonation
On-board tampering
Privacy violation Ensuring liability Protecting personal identifiable information Location privacy
Security (Privacy)
Vehicular Network
[Source: Raya et al. and Lu et al.]
5
Vehicular Network Concerns Idiosyncrasies of VANETs
Efficiency
Throughput
Latency
Overhead / Congestion Security (Privacy)
Vehicular Network
[Source: Kenney paper]
6
VANET protocols WSMP: WAVE Short Message Protocol
WAVE: Wireless Access in Vehicular Environments
DSRC: Dedicated Short Range Communications
TMS
Dummy Event Techniques
Could congest WSMP
7
VANET privacy protocolsMIX ZONES (BERESFORD & STAJANO) GROUP MODEL (SAMPIGETHAYA)
Problems with group model: (a) How do group member stay in
range of group leader?(b) Even while in range, what is
the distance between anonymity set members?
(c) if all group members relay through group leader, what is
congestion?(d) how do members join/leave,
group and how does this affect privacy/overhead/congestion?
8
Location privacy theory Hiding Events
Obfuscation
Anonymization
Adding Dummy Events
[Source: Shokri et al.]
9
Vehicle Mobility and Location Privacy
Image source: http://gmsf.sourceforge.net/screenshot.png
How can vehicles achieve privacy if there are no nearby
vehicles to mix with?
10
Dummy Event Methods Naïve Dummy Event: One car sends two messages: One real, one fake.
Dummy Event Undetectable by RSU: Two cars send messages: One car sends the real one, the other car sends a fake one. Car 1 remains anonymized no matter how far it travels from Car 2.
Problems: Additional Overhead, Congestion. In case of group model, also the problem of communication range.
11
Next Step: SimulationK: The Anonymity Set
D: Distance Deviation
T: Anonymity Time
Performance & Efficiency
Congestion & Overhead
12
The End
Image Source: http://ultimatehealthandage.com/wp-content/uploads/2013/09/Depositphotos_TheEnd.jpg