13
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing Presenter: Yung-Chih Lu ( 呂呂呂 ) Date: 2011/03/04

An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks

  • Upload
    pepper

  • View
    42

  • Download
    0

Embed Size (px)

DESCRIPTION

An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks. Source: IEEE Transactions on Vehicular Technology, Reviewing Presenter: Yung-Chih Lu ( 呂勇志 ) Date: 2011/03/04. Outline. Introduction Proposed Scheme Security Analysis Performance Analysis - PowerPoint PPT Presentation

Citation preview

Page 1: An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks

An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks

Source: IEEE Transactions on Vehicular Technology, Reviewing

Presenter: Yung-Chih Lu (呂勇志 )

Date: 2011/03/04

Page 2: An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks

Outline

2

Introduction Proposed Scheme Security Analysis Performance Analysis Conclusion Comment

Page 3: An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks

Introduction (1/3)

Goal Message Authentication & Message

Encryption Against attack

Replay attackImpersonation attackOutsider attack

Saving resourcecomputation cost

3

Page 4: An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks

Introduction (2/3)

4

Vehicular Ad Hoc Network (VANET)

RSC: Road Side Unit

Page 5: An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks

Introduction (3/3)

The Functions of Proposed Scheme Traffic control schemes

Message Authentication Entertainment service scheme

Message Encryption

5

Page 6: An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks

Vehicle-RSU-Vehicle Communication

Proposed Scheme for Traffic Control (1/2)

6V: Vehicular M: Message TVi: Timestamp Kvi: A pre-shared keyx: RSU’s private key t: Random number H(): one way hash functionQ: base point over Elliptic Curve X= x . Q

Vi

(IDVi, IDVj, M, TVi, Kvi⊕ H(M||TVi))

VjRSU

1.Computes K’Vi =H(IDVi || x)2. Decrypts Kvi⊕ H(M||TVi)3.

4.Checks M,Tvi

5. Selects t ∈ Z*n

6. Computes T= t . Q = (x1,y1) r= x1 mod n s= t-1 . [H(M||TR)+x .t]7.Broadcast (IDR, IDVj, M, (r,s), TR )

1.Computes (s-1 . H(M||TR)) . Q+s-1 . r . X)= (x1’,y1

’)2. Verifies r’ = r r’= x1’ mod n

Page 7: An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks

CSESPP Scheme

Proposed Scheme for Entertainment Service (2/2)

7V: Vehicular Reg: Request message TVi: Timestamp Kvi: A pre-shared keyES: Entertainment Service R: Random number H(): one way hash functionCSESPP: Communication Scheme for Entertainment Services with Privacy Preservation

Vi

(IDVi, Reg, TVi, H(Kvi||TVi))

RSU

1.Computes K’Vi =H(Kvi||TVi)2. Verifies H(K’vi||TVi) =H(Kvi||TVi) 3. R∈ Z*

n

4. Computes SKi= H(Kvi||R) {ESKi(ES,R) ,R}

1.Computes SKi =H(Kvi||R)2. Decrypts ESKi(ES,R) 3. Check R

K’Vi =H(IDVi || x)

Page 8: An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks

Security Analysis (1/1)

Against attack Outsider attack

Secret key Impersonation attack

Secret key Replay attack

Timestamp

8

Page 9: An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks

Performance Analysis (1/1)

9

Comparisons Table

TEC_Mul: the operation time of point multiplication on the elliptic curve functionTexp: the operation time of the modular exponentiationTmul: the operation time of the modular multiplication

Page 10: An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks

Conclusion

10

A vehicle only needs to share one session key with RSU to communicate with the other vehicles.

The proposed scheme is more efficient than other scheme.

Page 11: An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks

Comment (1/2)

11

本文主要貢獻簡述: 所有認證與加密工作皆透過公認第三方 (RSU) 來進行 ,

搭配 ECDSA 簽章,降低 Computation cost 。優點:

提出橢圓曲線的 point multiplication 比 modular exponentiation 更有效率的概念,來降低computation cost 。

缺點: 錯字都集中在 proposed scheme 。 Security Analysis 缺乏證明。 當 Vehicular 周圍無 RSU 時,則無法進行

authentication 及 encryption 。

Page 12: An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks

Comment (2/2)

作者需進一步說明 : 請解釋在 Entertainment Service 中,使用隨機值 R

的用意。明顯錯誤 ( 含 typos):

Page6, 倒數第 3 行 S 應改成 M Page16, Figure1, 第 8 行 H’(IDVi||x) =⊕ H(IDVi||x) 應

改成 H’(M||TVi) =H(M||TVi) Page16, Figure1, 第 13 行 x . t 應改成 x . r Page18, Figure2, 第 5 行 K’Vi =H(Kvi||TVi) 應改成 K’Vi

=H(IDVi || x)

12

Page 13: An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks

Li et al.’s Scheme for Traffic Control (1/2)

13

Vi Vj

1.Computes 1.Decrypts the message by Ht(SK)2.Computes

3.check

Vehicle-to-Vehicle Communication