Wireless Network Security Spring 2016

Similar documents
Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information

Wireless Network Security Spring 2016

Acceptance Test Report. C CVII Task 2

A Resilient Control Approach to Secure Cyber Physical Systems (CPS) with an Application on Connected Vehicles

2013 ADVANCED TECHNOLOGY GUIDE

P e = 0.1. P e = 0.01

WeatherCloud Hyper-Local Global Forecasting All rights reserved. Fathym, Inc.

ELE 491 Senior Design Project Proposal

Wireless Network Security Spring 2015

Consists of several displays that provide you with useful information. Odometer, Trip meter. distribution monitor. Bluetooth HandsFreeLink

Downlink Traffic Scheduling in Green Vehicular Roadside Infrastructure

Cellular-Assisted Vehicular Communications: A Stochastic Geometric Approach

TOPICS OF COURSES FOR FINAL STATE EXAMINATIONS OF MASTER'S DEGREE PROGRAMME (for CTU in Prague Faculty of Transportation Sciences students)

Transportation and Road Weather

INTERVEHICLE communications based on wireless technologies

Traffic and Road Monitoring and Management System for Smart City Environment

Efficient and Secure Message Authentication in Cooperative Driving: A Game-Theoretic Approach

Quantum Wireless Sensor Networks

BAD WEATHER DOESN T CAUSE ACCIDENTS

Securing the Web of Things

VEHICULAR TRAFFIC FLOW MODELS

Innovations in Road Weather. Jon Tarleton Senior Marketing Manager / Meteorologist

Communication constraints and latency in Networked Control Systems

Mobile Driver License (mdl) June 20, Geoff Slagle Director, Identity Management AAMVA

Location Determination Technologies for Sensor Networks

We provide two sections from the book (in preparation) Intelligent and Autonomous Road Vehicles, by Ozguner, Acarman and Redmill.

Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas

Coordination. Failures and Consensus. Consensus. Consensus. Overview. Properties for Correct Consensus. Variant I: Consensus (C) P 1. v 1.

Distributed Data Fusion with Kalman Filters. Simon Julier Computer Science Department University College London

Chapter 6: Securing neighbor discovery

Chapter 7 Control. Part Classical Control. Mobile Robotics - Prof Alonzo Kelly, CMU RI

The Road to Improving your GIS Data. An ebook by Geo-Comm, Inc.

Communication-based Cooperative Driving of Road Vehicles by Motion Synchronization

FEEDBACK loops are always associated with certain time

CHALLENGE #1: ROAD CONDITIONS

Understand FORWARD COLLISION WARNING WHAT IS IT? HOW DOES IT WORK? HOW TO USE IT?

National Quali cations 2018

Date of occurrence Location name O Porriño (Pontevedra) Local time 09:25 Latitude Railway vehicle movement events Train derailment.

FORCE AND MOTION SEPUP UNIT OVERVIEW

Reliable Broadcast for Broadcast Busses

A Black Box Measurement Method for Reliability of Wireless Communication

Embedded Systems Design: Optimization Challenges. Paul Pop Embedded Systems Lab (ESLAB) Linköping University, Sweden

Usefulness of Collision Warning Inter-Vehicular System

A Platform for Estimating the Relevance of Information in VANET Applications

A Group-Based Deployment for Wormhole Prevention in Sensor Networks

On Modeling and Understanding Vehicle Evacuation Attacks in VANETs

Law Enforcement Solutions and Applications

Cooperation Speeds Surfing: Use Co-Bandit!

Fig. 1. Securely distinguish three vehicle flows /17/$31.00 c 2017 IEEE

Round-Efficient Multi-party Computation with a Dishonest Majority

A Study on Performance Analysis of V2V Communication Based AEB System Considering Road Friction at Slopes

WHITE PAPER. Winter Tires

Controlled variable- T (house interior temperature) Manipulated variable- Q (heat from the furnace) 1-1

Feedback Control CONTROL THEORY FUNDAMENTALS. Feedback Control: A History. Feedback Control: A History (contd.) Anuradha Annaswamy

Polynomial-Time Verification of PCTL Properties of MDPs with Convex Uncertainties and its Application to Cyber-Physical Systems

Good Spirit School Division Parents/Guardians

Tahlequah Public Schools Inclement Weather Transportation Plan

Customizing Vehicular Ad Hoc Networks to Individual Drivers and Traffic Conditions

Technical Report Communicating Secret Information Without Secret Messages

Advanced information feedback strategy in intelligent two-route traffic flow systems

Comprehensive Winter Maintenance Management System BORRMA-web MDSS inside to increase Road Safety and Traffic Flow

R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H.

A Proposed Driver Assistance System in Adverse Weather Conditions

Extracting a Secret Key from a Wireless Channel

Developing a Distributed Consensus-Based Cooperative Adaptive Cruise Control (CACC) System

Modeling: Start to Finish

ANALYSIS OF CONSENSUS AND COLLISION AVOIDANCE USING THE COLLISION CONE APPROACH IN THE PRESENCE OF TIME DELAYS. A Thesis by. Dipendra Khatiwada

Multi agent Evacuation Simulation Data Model for Disaster Management Context

Research on Consistency Problem of Network Multi-agent Car System with State Predictor

Experimental verification platform for connected vehicle networks

The prediction of passenger flow under transport disturbance using accumulated passenger data

Whether you are driving or walking, if you come to a flooded road, Turn Around Don't Drown

WITH the rapid development of sensors and wireless

Attack-Resilient Sensor Fusion for Safety-Critical Cyber-Physical

Notes for Lecture 17

suppressing traffic flow instabilities

Reliability Analysis of an Anti-lock Braking System using Stochastic Petri Nets

2. Experiment Description

Solid foundations has been a hallmark of the control community

Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications

Performance Evaluation of Anti-Collision Algorithms for RFID System with Different Delay Requirements

The Capacity of Vehicular Ad Hoc Networks

A location privacy metric for V2X communication systems

Lectures 25 & 26: Consensus and vehicular formation problems

ISO 2575 INTERNATIONAL STANDARD. Road vehicles Symbols for controls, indicators and tell-tales

Session 6: and Evaluation. M c Farland Management, LLC

Distributed Consensus

Data-based fuel-economy optimization of connected automated trucks in traffic

Recap. CS514: Intermediate Course in Operating Systems. What time is it? This week. Reminder: Lamport s approach. But what does time mean?

EFFECTS OF WEATHER-CONTROLLED VARIABLE MESSAGE SIGNING IN FINLAND CASE HIGHWAY 1 (E18)

Connected Cruise Control Design Using Probabilistic Model Checking

PDQ Tracker High Level Requirements

Dust Storms in Arizona: The Challenge to Ensure Motorist Safety Jennifer Toth, P.E. Deputy Director for Transportation

Modified flatbed tow truck model for stable and safe platooning in presences of lags, communication and sensing delays

Q1. (a) The diagram shows a car being driven at 14 rn/s. The driver has forgotten to clear a thick layer of snow from the roof.

CS505: Distributed Systems

Warning Timing, Driver Distraction, and Driver Response to Imminent Rear-End Collisions

MeteoGroup RoadMaster. The world s leading winter road weather solution

Distributed Systems Principles and Paradigms. Chapter 06: Synchronization

QUANTIZED SYSTEMS AND CONTROL. Daniel Liberzon. DISC HS, June Dept. of Electrical & Computer Eng., Univ. of Illinois at Urbana-Champaign

Transcription:

Wireless Network Security Spring 2016 Patrick Tague Class #19 Vehicular Network Security & Privacy 2016 Patrick Tague 1

Class #19 Review of some vehicular network stuff How wireless attacks affect vehicle safety Brief mention of vehicle network privacy challenges 2016 Patrick Tague 2

Vehicular Networks Vehicular (ad hoc) network Cars talk amongst each other, w/ roadside units and w/ devices within the vehicles Applications of interest: Automated driver safety management Passive road quality / condition monitoring In-car entertainment Navigation services Context-aware rec's: This alternate route would be faster, and it would go past your favorite Primanti Bros. 2016 Patrick Tague 3

Vehicular Network Components User devices interact with the vehicle using WiFi, Bluetooth, NFC, visual channels, etc. On-board sensors communicate with a controller using low-power RF, e.g., 802.15.4 for TPMS Mobile network connectivity (e.g., GSM, LTE) Safety messaging systems between vehicles 2016 Patrick Tague 4

802.11p and DSRC 802.11p extends the 802.11 standard to include vehicular communications in the 5.9 GHz band Allows dynamic comms without setting up a BSS (i.e., no SSID) for fast decentralized operation No association, no authentication, no access control Also includes mechanisms for channel management and synchronization Dedicated Short Range Communication One- and two-way communication based on the 802.11p standard Builds on the older ASTM E2213-03 PHY standard 2016 Patrick Tague 5

WAVE Wireless Access in Vehicular Environments Wireless stack for vehicle-to-vehicle and vehicle-toinfrastructure communications Based on IEEE P1609 standard family Built on top of the 802.11p / DSRC foundation 2016 Patrick Tague 6

What kinds of vehicle safety systems are built on top of this wireless stack? 2016 Patrick Tague 7

Vehicle Safety Systems New vehicles have various wireless subsystems Driver alerts, ex: tire pressure monitoring Valve sensors report to a TPMS controller wireless because they're inside the wheels Adaptive cruise control, Platooning Controller receives signals from a variety of sources, including other vehicles, RSUs, road beacons/monitors, etc. Crash avoidance, Self-braking Alerts come from other vehicles, sensors, etc. Self-driving All of the above and more 2016 Patrick Tague 8

2016 Patrick Tague 9

Networked Controllers Any time you put a network inside a control loop, the network affects the controller Lost packets ==> lost control Spoofed packets ==> poor decisions GPS errors ==> wrong controller world view Network/compute overhead ==>control delay ==> reduced accuracy All of these have potentially bad side-effects in the context of vehicle safety systems 2016 Patrick Tague 10

Other than general wireless comms issues, what are some potential threats? 2016 Patrick Tague 11

2016 Patrick Tague 12

Ghost Vehicles [Bißmeyer et al., VANET 2012] Ghost vehicles result from falsified reports, often by a Sybil attacker Insider can properly sign and protect reports, so detection must rely on somehow invalidating reports Trust and reputation system? 2016 Patrick Tague 13

Misbehavior Evaluation Misbehavior detection systems can detect inconsistencies in reported mobility data Local detection is limited to observable area (i.e., limited by communication range) Also limited to short validity lifetime of mobility data Subject to ID changes by attackers, dynamic tactics 2016 Patrick Tague 14

Some Assumptions Vehicles can switch between pseudonym certificates arbitrarily Position information is very accurate GPS, relative positioning approaches Additional sensors: cameras, radar The availability of connection between local nodes and the central entity is not guaranteed Excluding attackers is the goal over the long run Latency is not a big concern 2016 Patrick Tague 15

Reputation Evaluation Reputation is computed centrally by a Misbehavior Evaluation Authority (MEA) using misbehavior reports from witnesses and info from suspects Trust: the observed tendency to behave as expected, takes values in [-1,1], defaults to 0 Confidence: level of certainty in the trust value, essentially a weighting in [0,1] Reputation: essentially trust x confidence, values in [-1,1] 2016 Patrick Tague 16

Ghost Identification Vehicles with beyond a threshold negative reputation can be identified as ghosts Q: How serious is a false negative (declaring a real car when it's a ghost)? Q: How serious is a false positive (declaring a ghost when it's a real car)? 2016 Patrick Tague 17

Evaluation 2016 Patrick Tague 18

Evaluation 2016 Patrick Tague 19

Evaluation 2016 Patrick Tague 20

[Some slides courtesy of Jason Haas] 2016 Patrick Tague 21

DSRC Evaluation UIUC DSRC Simulator: accurate modeling of vehicular networking environment 5 vehicles: 1 leader, 4 followers 10m ideal and initial spacing Lead vehicle accelerates at 1 m/s 2 Compare control (no failure) to jamming scenario Attacker knows preceding vehicle's state 2016 Patrick Tague 22

Control (No Jammer) 2016 Patrick Tague 23

Effect of Jammer DSRC position broadcast at 20 Hz Leader speed limit: 50 m/s Jammer turns on at 100s Pretty easy to detect 2016 Patrick Tague 24

More Interesting Jamming New jammer strategy: jam during acceleration 50% duty cycle, variable period in {2, 5, 10}s Jammer turns on at 100s More interesting lead vehicle behavior as well: Starts at 30m/s Accelerate/decelerate at 1m/s 2 from 120-150s 2016 Patrick Tague 25

2016 Patrick Tague 26

2016 Patrick Tague 27

What about privacy issues in vehicular networks? 2016 Patrick Tague 28

Vehicular Network Privacy Everything we talked about previously regarding network privacy applies to vehicles However, vehicles have many wireless subsystems combined into a single platform Several wireless identities (DSRC, WiFi, LTE, TPMS, etc.) and non-wireless identities being used (license plate number, visual identity, etc.) Many apps/services operating simultaneously with different requirements Identity/pseudonym management may need to consider all of these jointly, consider many trade-offs 2016 Patrick Tague 29

Conclusions Some of the most fundamental threats / misbehaviors in wireless have serious and sometimes unpredictable effects on vehicles Open problem: how to design vehicle controllers that are robust to wireless threats? wireless protocols that provide guarantees for vehicle control? 2016 Patrick Tague 30

Apr 12: IoT Security & Privacy 2016 Patrick Tague 31