Privacy & Identity Management for Vehicular Communication Systems 69821501 吳佳翰 69821506...

24
Privacy & Identity Privacy & Identity Management for Management for Vehicular Vehicular Communication Systems Communication Systems 69821501 69821501 吳吳吳 吳吳吳 69821506 69821506 吳吳吳 吳吳吳 69821510 69821510 吳吳吳 吳吳吳

Transcript of Privacy & Identity Management for Vehicular Communication Systems 69821501 吳佳翰 69821506...

Privacy & Identity Privacy & Identity Management for Vehicular Management for Vehicular Communication SystemsCommunication Systems

69821501 69821501 吳佳翰吳佳翰69821506 69821506 廖本諭廖本諭69821510 69821510 湯珮智湯珮智

OutlineOutline

• Vehicular Communication Systems

• Identity in VC Systems

• Challenges and Open issues

• IDEMIX

• Mobile & Wireless Networking Technologies

• Conclusion

• References

Vehicular Communication SystemsVehicular Communication Systems

• Applications– Traffic efficiency– Safety– Driver assistance– Infotainment

Ex: Warnings on environmental hazards, traffic and road conditions, and tourist information system…etc.

Vehicular Communication SystemsVehicular Communication Systems

• Privacy concerns– If there’re no integrated security and privacy

mechanisms within VC systems…• The leak of personal data…• The criminal and anti-social behavior…• Serious problems would jeopardize the

benefit from the deployment of VC systems.

Vehicular Communication SystemsVehicular Communication Systems

• Privacy concerns– Proliferation of Internet & Mobile communication

Personal data dissemination management

– The VC systems are not an extension of the Internet.

– VC systems specific issue and salient features.

Lots of space for researching the privacy & security issues in VC field.

Vehicular Communication SystemsVehicular Communication SystemsVehicular ad hoc Networks (VANET) Architecture

Roles of VANET

Public vehicle

Private vehicle

Road-Side Unit

Authorities

Infrastructure

VEHICULAR NETWORKSVEHICULAR NETWORKS

• VANET rely on several communication channels– cellular telephony 、 broadband wireless

• DSRC– Dedicated Short Range Communications– VSCC

• IEEE P1609.2/D2• asymmetric cryptography to sign

– C2C-CC 、 SEVECOM• VC security is not considered

– Ex: Berkeley PATH (USA) , Fleetnet (Germany) within eSafety

IDENTITIES IN VC SYSTEMSIDENTITIES IN VC SYSTEMS

• Driver-vehicle relation is many to many• Identities of vehicles and users

– DMV : drivers licenses, vehicles…– Manufacturers : VIN 、 date of production 、 mod

el and color• Digital identities

– Attributes emerge 、 mixing– Multiple identities– Network Nodes : entire networking protocol stack

• NIC 、 IP address, TCP port…etc.

CHALLENGES AND OPEN ISSUESCHALLENGES AND OPEN ISSUES

• Privacy protection• Approaches :

– pseudonyms• Target : avoiding linkability of one’s actions to its own identity• do not carry entities information• cannot be correlated• minimum amount of identity information

– Credential :• anonymity revocation• different entities to obtain multiple credentials• Prevent share 、 pass among

– Ex: IDEMIX & Mobile/Wireless technologies

• Identity Mixer :--strong authentication and privacy at the same time.

--only contain the subset of the attested information

CHALLENGES AND OPEN ISSUESCHALLENGES AND OPEN ISSUES

Identity Mixer (IDEMIX)Identity Mixer (IDEMIX)

Identity Mixer (IDEMIX)Identity Mixer (IDEMIX)

Identity Mixer (IDEMIX)Identity Mixer (IDEMIX)RRN:National Register Number TTP:Trusted Third Party

RELATED MOBILE AND WIRELESS RELATED MOBILE AND WIRELESS NETWORKING TECHNOLOGIESNETWORKING TECHNOLOGIES

• Global System for Mobile Communications(Global System for Mobile Communications(GSM)

RELATED MOBILE AND RELATED MOBILE AND WIRELESS NETWORKING WIRELESS NETWORKING

TECHNOLOGIES (cont.)TECHNOLOGIES (cont.)

• IEEE802.11

-open system authorization

-share key

• IEEE 802.1x/IEEE802.11i/EAP-TLS

CONCLUSION

Reference(1)Reference(1)

• Zero-knowledge proofs– if the verifier does not learn any (computati

onal) information about the provers input w

• Blind Certification

• 無線區域網路 (Wireless Local Area Network)

係指使用無線通訊來傳送或接收資料的區域網路。一般係指由符合 IEEE802.11 各項規格的裝置所構成的網路。無線區域網路又可分為 2 種,一種是各終端裝置必須使用無線區域網路卡,透過稱為「無線基地台 (Access Point) 」的中介裝置來進行通訊 (Infrastructure 通訊 ) 的方式,另一種則是不需透過無線基地台,直接在無線區域網路卡之間進行通訊的方式。

Reference(2)Reference(2)

Reference(2)Reference(2)

• Identity Mixer (IDEMIX) is an anonymous credential system developed at IBM Research that enables strong authentication and privacy at the same time.

• A credential is a means to establish a claimed identity, roles, or attributes about oneself with an entity, typically as part of an access control request. So for instance an identity card can serve as a credential to establish that one is between 12 and 15 years old as might be required to access a teenage chat. Using a traditional identity card, this would also reveal to the chat side all the other information on the card.

• Anonymous credentials overcome this: with such credential a user can selectively reveal any of the attributes contained in the credential without revealing any of their information whatsoever. Thus, anonymous credentials are a key ingredient to protect one’s privacy in an electronic world.

• http://idemix.wordpress.com/

Reference(3)Reference(3)What is Identity Mixer?What is Identity Mixer?

Reference(4)Reference(4) GSM 安全架構