大貫翔貴(前 大阪市立小路小学校教諭) 女性教諭(大阪市立小路 ... · 2020. 5. 21. · 大貫翔貴(前大阪市立小路小学校教諭) 他1名 (大阪市立小路小学校教諭)
Privacy & Identity Management for Vehicular Communication Systems 69821501 吳佳翰 69821506...
-
Upload
daisy-veronica-park -
Category
Documents
-
view
242 -
download
1
Transcript of Privacy & Identity Management for Vehicular Communication Systems 69821501 吳佳翰 69821506...
Privacy & Identity Privacy & Identity Management for Vehicular Management for Vehicular Communication SystemsCommunication Systems
69821501 69821501 吳佳翰吳佳翰69821506 69821506 廖本諭廖本諭69821510 69821510 湯珮智湯珮智
OutlineOutline
• Vehicular Communication Systems
• Identity in VC Systems
• Challenges and Open issues
• IDEMIX
• Mobile & Wireless Networking Technologies
• Conclusion
• References
Vehicular Communication SystemsVehicular Communication Systems
• Applications– Traffic efficiency– Safety– Driver assistance– Infotainment
Ex: Warnings on environmental hazards, traffic and road conditions, and tourist information system…etc.
Vehicular Communication SystemsVehicular Communication Systems
• Privacy concerns– If there’re no integrated security and privacy
mechanisms within VC systems…• The leak of personal data…• The criminal and anti-social behavior…• Serious problems would jeopardize the
benefit from the deployment of VC systems.
Vehicular Communication SystemsVehicular Communication Systems
• Privacy concerns– Proliferation of Internet & Mobile communication
Personal data dissemination management
– The VC systems are not an extension of the Internet.
– VC systems specific issue and salient features.
Lots of space for researching the privacy & security issues in VC field.
Vehicular Communication SystemsVehicular Communication SystemsVehicular ad hoc Networks (VANET) Architecture
Roles of VANET
Public vehicle
Private vehicle
Road-Side Unit
Authorities
Infrastructure
VEHICULAR NETWORKSVEHICULAR NETWORKS
• VANET rely on several communication channels– cellular telephony 、 broadband wireless
• DSRC– Dedicated Short Range Communications– VSCC
• IEEE P1609.2/D2• asymmetric cryptography to sign
– C2C-CC 、 SEVECOM• VC security is not considered
– Ex: Berkeley PATH (USA) , Fleetnet (Germany) within eSafety
IDENTITIES IN VC SYSTEMSIDENTITIES IN VC SYSTEMS
• Driver-vehicle relation is many to many• Identities of vehicles and users
– DMV : drivers licenses, vehicles…– Manufacturers : VIN 、 date of production 、 mod
el and color• Digital identities
– Attributes emerge 、 mixing– Multiple identities– Network Nodes : entire networking protocol stack
• NIC 、 IP address, TCP port…etc.
CHALLENGES AND OPEN ISSUESCHALLENGES AND OPEN ISSUES
• Privacy protection• Approaches :
– pseudonyms• Target : avoiding linkability of one’s actions to its own identity• do not carry entities information• cannot be correlated• minimum amount of identity information
– Credential :• anonymity revocation• different entities to obtain multiple credentials• Prevent share 、 pass among
– Ex: IDEMIX & Mobile/Wireless technologies
• Identity Mixer :--strong authentication and privacy at the same time.
--only contain the subset of the attested information
CHALLENGES AND OPEN ISSUESCHALLENGES AND OPEN ISSUES
RELATED MOBILE AND WIRELESS RELATED MOBILE AND WIRELESS NETWORKING TECHNOLOGIESNETWORKING TECHNOLOGIES
• Global System for Mobile Communications(Global System for Mobile Communications(GSM)
RELATED MOBILE AND RELATED MOBILE AND WIRELESS NETWORKING WIRELESS NETWORKING
TECHNOLOGIES (cont.)TECHNOLOGIES (cont.)
• IEEE802.11
-open system authorization
-share key
• IEEE 802.1x/IEEE802.11i/EAP-TLS
Reference(1)Reference(1)
• Zero-knowledge proofs– if the verifier does not learn any (computati
onal) information about the provers input w
• Blind Certification
• 無線區域網路 (Wireless Local Area Network)
係指使用無線通訊來傳送或接收資料的區域網路。一般係指由符合 IEEE802.11 各項規格的裝置所構成的網路。無線區域網路又可分為 2 種,一種是各終端裝置必須使用無線區域網路卡,透過稱為「無線基地台 (Access Point) 」的中介裝置來進行通訊 (Infrastructure 通訊 ) 的方式,另一種則是不需透過無線基地台,直接在無線區域網路卡之間進行通訊的方式。
Reference(2)Reference(2)
• Identity Mixer (IDEMIX) is an anonymous credential system developed at IBM Research that enables strong authentication and privacy at the same time.
• A credential is a means to establish a claimed identity, roles, or attributes about oneself with an entity, typically as part of an access control request. So for instance an identity card can serve as a credential to establish that one is between 12 and 15 years old as might be required to access a teenage chat. Using a traditional identity card, this would also reveal to the chat side all the other information on the card.
• Anonymous credentials overcome this: with such credential a user can selectively reveal any of the attributes contained in the credential without revealing any of their information whatsoever. Thus, anonymous credentials are a key ingredient to protect one’s privacy in an electronic world.
• http://idemix.wordpress.com/
Reference(3)Reference(3)What is Identity Mixer?What is Identity Mixer?