Dynamic attribute based vehicle authentication

Modern vehicles are proficient in establishing a spontaneous connection over a wireless radio channel, synchronizing actions and information. Security infrastructure is most important in such a sensitive scope of vehicle communication for coordinating actions and avoiding accidents on the road. One of the first security issues that need to be established is authentication via IEEE 1609.2 security infrastructure. According to our preliminary work, vehicle owners are bound to preprocess a certificate from the certificate authority. The certificate carries vehicle static attributes (e.g., licence number, brand and color) certified together with the vehicle public key in a monolithic manner. Nevertheless, a malicious vehicle might clone the static attributes to impersonate a specific vehicle. Therefore, in this paper we consider a resource expensive attack scenario involving multiple malicious vehicles with identical visual static attributes. Apparently, dynamic attributes (e.g., location and direction) can uniquely define a vehicle and can be utilized to resolve the true identity of the vehicle. However, unlike static attributes, dynamic attributes cannot be signed by a trusted authority beforehand. We propose an approach to verify the coupling between non-certified dynamic attributes and certified static attributes on an auxiliary communication channel, for example, a modulated laser beam. Furthermore, we illustrate that the proposed approach can be used to facilitate the usage of existing authentication protocols such as NAXOS, in the new scope of ad-hoc vehicle networks. We use BAN logic to verify the security claims of the protocol against the passive and active interception.

[1]  Robert A. MacLachlan,et al.  Tracking of Moving Objects from a Moving Vehicle Using a Scanning Laser Rangefinder , 2006, 2006 IEEE Intelligent Transportation Systems Conference.

[2]  Ruhul Amin,et al.  A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks , 2016, Ad Hoc Networks.

[3]  Je Hong Park,et al.  Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption , 2008, IACR Cryptol. ePrint Arch..

[4]  Naveen K. Chilamkurti,et al.  A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks , 2015, Inf. Sci..

[5]  Keith Redmill,et al.  Automated parking surveys from a LIDAR equipped vehicle , 2014 .

[6]  Shigang Li,et al.  Calibration of Nonoverlapping In-Vehicle Cameras With Laser Pointers , 2015, IEEE Transactions on Intelligent Transportation Systems.

[7]  Hans-Werner Gellersen,et al.  Usability classification for spontaneous device association , 2011, Personal and Ubiquitous Computing.

[8]  Yutaka Matsushita,et al.  An inter-vehicle networking method using laser media , 1994, Proceedings of IEEE Vehicular Technology Conference (VTC).

[9]  N. Epley,et al.  The mind in the machine: Anthropomorphism increases trust in an autonomous vehicle , 2014 .

[10]  Jar-Ferr Yang,et al.  Enhancement authentication protocol using zero‐knowledge proofs and chaotic maps , 2017, Int. J. Commun. Syst..

[11]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[12]  Jean-Charles Noyer,et al.  A PHD approach for multiple vehicle tracking based on a polar detection method in laser range data , 2013, 2013 IEEE International Systems Conference (SysCon).

[13]  Berkant Ustaoglu,et al.  Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS , 2008, Des. Codes Cryptogr..

[14]  John Swanson,et al.  Light-Rail Transit Systems , 2010, IEEE Vehicular Technology Magazine.

[15]  Lawrence Ulrich Top ten tech cars , 2014, IEEE Spectrum.

[16]  Michael Thuy,et al.  Non-linear, shape independent object tracking based on 2D lidar data , 2009, 2009 IEEE Intelligent Vehicles Symposium.

[17]  Oliver W. W. Yang,et al.  Vehicular telematics over heterogeneous wireless networks: A survey , 2010, Comput. Commun..

[18]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[19]  Fabian de Ponte Müller,et al.  Characterization of a Laser Scanner Sensor for the Use as a Reference System in Vehicular Relative Positioning , 2013, Nets4Cars/Nets4Trains.

[20]  Lawrence Ulrich,et al.  Whiter brights with lasers , 2013, IEEE Spectrum.

[21]  Tomotaka Wada,et al.  Novel vehicle information acquisition method using vehicle code for automotive infrared laser radar , 2014, 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC).

[22]  John B. Kenney,et al.  Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.

[23]  K David,et al.  2020 Vision , 1998, IEEE Vehicular Technology Magazine.

[24]  Shwetak N. Patel,et al.  Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.

[25]  Arun Kumar,et al.  Article in Press Pervasive and Mobile Computing ( ) – Pervasive and Mobile Computing a Comparative Study of Secure Device Pairing Methods , 2022 .

[26]  A. W. Roscoe,et al.  Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey , 2011, J. Comput. Secur..

[27]  Tim Kindberg,et al.  Secure Spontaneous Device Association , 2003, UbiComp.

[29]  Matthias Ringwald,et al.  Spontaneous Interaction with Everyday Devices Using a PDA , 2002 .

[30]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[31]  Hong Liu,et al.  Modeling and characterization of GPS spoofing , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[32]  Ueli Maurer,et al.  The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms , 1999, SIAM J. Comput..

[33]  A Pizzinat,et al.  Radio-Over-Fiber Architectures , 2010, IEEE Vehicular Technology Magazine.

[34]  René Mayrhofer,et al.  A Human-Verifiable Authentication Protocol Using Visible Laser Light , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[35]  Hannes Hartenstein,et al.  A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.

[36]  Maxim Raya,et al.  The security of VANETs , 2005, VANET '05.

[37]  Azzedine Boukerche,et al.  Preventing a DoS threat in vehicular ad-hoc networks using adaptive group beaconing , 2012, Q2SWinet '12.

[38]  Michael Segal,et al.  Vehicle authentication via monolithically certified public key and attributes , 2015, Wirel. Networks.

[39]  Kristin E. Lauter,et al.  Stronger Security of Authenticated Key Exchange , 2006, ProvSec.

[40]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.

[41]  Hugo Krawczyk,et al.  Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.

[42]  Maria Kihl,et al.  Inter-vehicle communication systems: a survey , 2008, IEEE Communications Surveys & Tutorials.

[43]  Hugo Krawczyk,et al.  SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols , 2003, CRYPTO.

[44]  Suzanne Sloan,et al.  An Approach to Communications Security for a Communications Data Delivery System for V2V/V2I Safety: Technical Description and Identification of Policy and Institutional Issues , 2011 .

[45]  Michael K. Reiter,et al.  Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[46]  Jean-Claude Bajard,et al.  A New Security Model for Authenticated Key Agreement , 2010, SCN.

[47]  Michel Barbeau,et al.  Detecting Impersonation Attacks in Future Wireless and Mobile Networks , 2005, MADNES.

[48]  Michael Segal,et al.  Dynamic attribute based vehicle authentication , 2014, 2014 IEEE 13th International Symposium on Network Computing and Applications.

[49]  Roland H. C. Yap,et al.  Extending BAN Logic for Reasoning with Modern PKI-Based Protocols , 2008, 2008 IFIP International Conference on Network and Parallel Computing.

[50]  Michael Beigl Point & Click - Interaction in Smart Environments , 1999, HUC.