Secure Message Communication Using Digital Signatures and Attribute Based Cryptographic Method in VANET
Total Page:16
File Type:pdf, Size:1020Kb
International Journal of Information Technology and Knowledge Management July-December 2010, Volume 2, No. 2, pp. 591-594 Secure Message Communication using Digital Signatures and Attribute Based Cryptographic Method in VANET Sandhya Kohli1 & Rakesh Dhiman2 The Vehicles will become increasingly intelligent in the near future, they will be equipped with radio interfaces. Security and privacy are the two primary concerns in the design of Vehicular Ad hoc Networks (VANET). Poorly designed VANET causes serious attacks on the network and jeopardize the goal of increased driving safety. While designing VANET security features, it must ensure that no third party can collect private information about drivers. This paper provides a way by which message authenticity is improved by combining two schemes digital signatures and attribute based cryptographic schemes. Keywords: VANET, Certification Authority, RSU, Public Key Infrastructure, Attributes. 1. INTRODUCTION a. Disruption of Network Operation or Denial of Traffic congestion on the roads is today a large problem in Service (DOS) Attack: In this case the main aim of big cities. Issues related to accidents, driver safety and attacker is to prevent the network from carrying out congestion pose a threat to not only to human life but to safety related function. The DOS attack, which our environment also, other negative consequences are includes jamming the wireless channel, thus energy wastage, leakage of secret information. Until interrupts all communications. In Transit Traffic recently road Vehicles were the realm of mechanical Tampering in DOS also proves very fatal because engineers, but with the emergence of VANET the vehicles in this any node acts as a relay and can disrupt are becoming “Computer on Wheels”. A modern car communication of other nodes. It can drop or consists of tens of interconnected processor, usually known corrupt messages. as EDR (Event Data Recorder), GPS (Global positioning b. ID Disclosure: This attack includes Id disclosure system) a receiver, a navigator system and several radars. of other vehicles in order to track their location. For vehicular communication in US the FCC has allocated This is Big Brother Scenario where global observer a bandwidth of 75 MHz, which is referred as DSR can monitor trajectories of targeted vehicles and use (Dedicated short Range Communication). The self- this data for range of purpose. The attacker in this organizing operation and unique features of Vehicular case is passive, it does not make use of cameras, communication is a double edge sword i.e. a rich set of physical pursuit or onboard tacking device to tools is offered to drivers and authorities but a [5] formidable uncover the identity of his target. set of abuses and attacks are also becomes possible. Hence the security of vehicular network is indispensable because c. Hidden Vehicle Attacks: In this attack a vehicle otherwise these systems could make antisocial and criminal broadcasting warnings will listen for feed back from behavior easier. Due to tight coupling between applications its neighbor and stop its broadcast if it realizes that with rigid requirements and the networking fabric makes one of its neighbors is better positioned for warning the vehicular security hard to achieve. other vehicles. This reduces congestion on wireless channel. In the hidden vehicle attack an attacker vehicle behaves like a neighbor vehicle placed at a 2. IDENTIFYING VARIOUS ATTACKS better position for message forwarding, thus leading The nature and resources of adversary [5] will largely to silencing of original vehicle and making hidden, determine the scope of defense needed to secure vehicular thereby introduces the false information into the networks. In this section we describe the various security network. threats faced by vehicular networks. The various types of d. Wormhole Attacks: In wireless networking the Attacks in Vehicular communications (VC) are: wormhole attack consist of tunneling packets between two remote nodes. An attacker that controls 1Lecturer, RIMT Mandi Gobindgarh, Punjab, INDIA at least two entities remote from each other and a 2Astt Prof., M.M. University, Mullana, Ambala, Haryana, INDIA high speed communication link between them can Email: [email protected], [email protected] tunnel packets broadcasted in one location to 592 SANDHYA KOHLI & RAKESH DHIMAN another, thus introducing erroneous messages in authorities or the manufacturer. Moreover, ELP’s the destination area. are fixed and accompany the vehicle for the long duration while anonymous keys sets have to be 3. VARIOUS HARDWARE PROPOSED FOR VC periodically renewed after their lifetime expired. The successful deployment of inter vehicular d. Vehicular PKI: A PKI (Public Key Infrastructure) communication requires [6] a robust and secured is typical [3], security architecture used for mechanism. Like in many areas of networking inter vehicle networks where the presence of online authorities communication (IVC) is also prone to set of abuses and is not always guaranteed. A Vehicular PKI is a good security related attacks. The security of vehicular networks choice for enabling IVC security. In VPKI, each is indispensable because misbehavior in these systems could vehicle is equipped with one or more private/public lead to anti social and criminal tasks easier. In this step some Key pairs certified by certification authorities. So of the hardware used in security is described. that a message sender will use the private keys to generate digital signatures on messages that need The various components used to protect Vehicular to be certified and message receivers will have communication against wide range of threats are: Event data corresponding public key to verify the validity of recorder (EDR), Tamper Proof Device (TPD), Electronic messages. Although this architecture seems very License plates, vehicular PKI. convenient for vehicular networks, but some a. Event Data Recorder (EDR): EDR’s will be used in problems still exists. One of them is key vehicles to register to all parameters especially distribution, which allows message receiver to during critical situations like accidents. Data stored obtain the public keys of message senders. Other in EDR will be used for crash reconstruction and problem is certificate revocation by certification to verify the reason for casualty. EDR also used to authority (CA), which invalidates some public/ collect information related to driving habits like private key pairs. A third problem of PKI is average speed and no. of driving hours. increased overhead in terms of digital signature sizes and verification, transmission delays. b. Temper Proof Device (TPD): The user of secret information like private keys incurs the need for a TPD in each vehicle. TPD will keep the material 4. SECURITY MECHANISMS FOR MESSAGE AUTHENTION safe from attackers thus decreasing the possibility a. Digital Signatures: The simplest and the most efficient of the information leakage. Since car electronics method is to assign each vehicle a set of public/private key is vulnerable to attacks especially the data buses, pair that will allow the vehicle [5] to digitally sign messages which are responsible for transferring information and authenticate itself to receivers. Due to the liability issue and control commands between the different present in VANET, a self-trust management approach such electronic components of a vehicle. The TPD as PGP (Pretty Good Privacy) is not satisfactory. These device will take care of signing and verifying public keys should be issued and signed by a trusted messages so that they cannot be altered if the data authority. The certificate issued by a authority implies the buses are hacked. To provide security the TPD has use of PKI. Under the PKI solution each vehicle send a safety its own battery, which can be recharged from the message, sign it with its private key and includes the CA’s vehicles. (Certification Authority) Certificate as ® c. Electronic License Plate (ELP): ELP’s are unique V *:M, SigPrKV [M|T], CertV cryptographically verifiable numbers that will be Where V designate the sending vehicle, * represents all used as traditional license plates. The advantage the messages receivers, M is a message, | is the concatenation of ELP’s is that they will automate the paper based operator and T is the timestamp to ensure message freshness, document checkups of vehicles. It will help in Cert is the public key certificate of vehicle. The receivers detection of stolen cars, identifying vehicles on V of message extract and verify the public key of vehicle using crossing country borders or during annual technical the certificate and then verify the signature by using its checkups. An ELP is issued by government or an certified public key. If the messages send in emergency Electronic chassis no. (ECN) issued by vehicle context then this message along with signature and manufacturer [1]. Since the ELP’s are the electronic certificate should be stored in the EDR for further potential equivalent of physical license plate, it should be investigation in the emergency. installed in the vehicle by using similar procedure, which is followed by government transportation b. Attribute based Cryptographic Schemes: Proposed authority at the time of vehicle registration. security solutions by using traditional public key Anonymous keys are preloaded by transportation cryptography are not very flexible [2], in providing specified SECURE MESSAGE COMMUNICATION USING DIGITAL SIGNATURES AND ATTRIBUTE BASED CRYPTOGRAPHIC METHOD IN VANET 593 levels of privacy. Symmetric Keys solution proposed are also has at least K attributes that overlap with a set S’ chosen by not suitable for delay sensitive vehicle-to-vehicle encryptor. ABE scheme is often criticized for its high scheme communication. So various cryptographic schemes based overhead due to the requirement of extensive pairing on user’s attributes have been proposed. User Identities like operation. ABE scheme is of two types KP-ABE and CP- name, email address are often used [4] to access several ABE. information sources .The encryptor restricts the decryptor to indicate the identity of the decryptor. The hierarchy of 4.2.1.