a study on issuance of secure vehicle certificate for...

4
A Study on Issuance of Secure Vehicle Certificate for Vehicle to Vehicle Communications in Internet of Vehicles * Taekjung Kim 1 , Byungwook Jin 1 , Si-Ho Cha 2, and Moon-Seog Jun 1 1 Department of Computer Science, Soongsil University 369, Sangdo-ro, Dong-Jak, Seoul, South Korea 2 Dept. of Multimedia Science, Chungwoon University 113, Sukgol-ro, Nam-gu, Incheon, South Korea [email protected] Abstract. This paper describes that the stability for vehicle to vehicle (V2V) communication in Internet of Vehicles (IoV). The V2V communication is important factors for intelligent transportation system that is fast becoming commercialization. In this paper, we particularly focus on the vulnerabilities of the authentication form used as an essential factor in communication between vehicles. We propose the secure vehicle certificate method against the threat posed by CA access by improving the authentication issue process of CA that has been a week point. Keywords: Secure Vehicle Certificate, Internet of Vehicles, Vehicle to Vehicle 1 Introduction Vehicle-to-vehicle (V2V) in Internet of Vehicles (IoV) allows for direct communication between vehicles traveling at high speed, thus providing safety as part of the services. The existing ITS services provide static services when a car moves through a certain spot or section. It was focused on after-incident management with constraints on prompt response in case of traffic accidents. But the C-ITS currently in pilot in Korea offers dynamic services where the road infrastructure and vehicles constantly communicate with one another. This allows for prompt prevention and response. The WAVE system technologically supports the communication amongst the infrastructure, the vehicles or the user device, thus delivering the current status of the roads to moving vehicles so that they can receive real-time information. As a result, it is expected to be applicable to various areas such as preventing collisions or accidents causing human lives. With the increase in applied wireless communication technology, security risks are exposed to Man in the Middle (MITM) attacks, * This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF2016R1D1A1A09917662). Corresponding author Advanced Science and Technology Letters Vol.142 (SIT 2016), pp.117-120 http://dx.doi.org/10.14257/astl.2016.142.21 ISSN: 2287-1233 ASTL Copyright © 2016 SERSC

Upload: vodan

Post on 22-Aug-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

A Study on Issuance of Secure Vehicle Certificate for

Vehicle to Vehicle Communications in Internet of

Vehicles*

Taekjung Kim1, Byungwook Jin1, Si-Ho Cha2†, and Moon-Seog Jun1

1 Department of Computer Science, Soongsil University

369, Sangdo-ro, Dong-Jak, Seoul, South Korea 2 Dept. of Multimedia Science, Chungwoon University

113, Sukgol-ro, Nam-gu, Incheon, South Korea

[email protected]

Abstract. This paper describes that the stability for vehicle to vehicle (V2V)

communication in Internet of Vehicles (IoV). The V2V communication is

important factors for intelligent transportation system that is fast becoming

commercialization. In this paper, we particularly focus on the vulnerabilities of

the authentication form used as an essential factor in communication between

vehicles. We propose the secure vehicle certificate method against the threat

posed by CA access by improving the authentication issue process of CA that

has been a week point.

Keywords: Secure Vehicle Certificate, Internet of Vehicles, Vehicle to Vehicle

1 Introduction

Vehicle-to-vehicle (V2V) in Internet of Vehicles (IoV) allows for direct

communication between vehicles traveling at high speed, thus providing safety as part

of the services. The existing ITS services provide static services when a car moves

through a certain spot or section. It was focused on after-incident management with

constraints on prompt response in case of traffic accidents. But the C-ITS currently in

pilot in Korea offers dynamic services where the road infrastructure and vehicles

constantly communicate with one another. This allows for prompt prevention and

response. The WAVE system technologically supports the communication amongst

the infrastructure, the vehicles or the user device, thus delivering the current status of

the roads to moving vehicles so that they can receive real-time information. As a

result, it is expected to be applicable to various areas such as preventing collisions or

accidents causing human lives. With the increase in applied wireless communication

technology, security risks are exposed to Man in the Middle (MITM) attacks,

* This research was supported by Basic Science Research Program through the National

Research Foundation of Korea (NRF) funded by the Ministry of Education

(NRF2016R1D1A1A09917662). † Corresponding author

Advanced Science and Technology Letters Vol.142 (SIT 2016), pp.117-120

http://dx.doi.org/10.14257/astl.2016.142.21

ISSN: 2287-1233 ASTL Copyright © 2016 SERSC

resending attacks and other attacks. If the messages of a car collision accident are

exposed to a third party and this is disguised or changed, then nearby cars can become

victims of even more accidents. To prevent such scenarios, reliable authentication is

sought after in the vehicle communication systems. Given the characteristics of cars

moving at high speed, mutual authentication using authentication forms is the basis of

the system. While the authentication form is easy to access and to replicate, once it is

managed poorly or stored online such as in a cloud, there is the risk of being hacked

or attacked by a virus. In fact, there are many accidents related to the theft of

authentication forms. If such authentication form is stolen from a car moving at high

speed, this can lead to a dangerous situation that puts the driver’s life at risk. For such

reasons, this paper suggests an ensure for a safe issue of authentication forms in the

WAVE system.

2 Related Work

2.1 C2C-CC

The CSR authentication is issued by LTCA (Long Term CA), and the pseudonym

authentication by PCA (Pseudonym CA). If a vehicle requests an issue using the CSR

authentication to PCA, PCA through LTCA verifies the validity of the CSR

authentication form and a pseudonym authentication form. In the CAMP method,

even an insider who can access RA cannot discover the ID information that generates

the CSR authentication form and pseudonym authentication, while in the C2C-CC

(Car2Car-Communication Consortium) method, an insider with access to PCA can

find the CSR authentication form and the ID of the pseudonym authentication form.

Therefore, it is of utmost importance to conduct authority management and training

and to prevent insider information leakage by securing audit evidence [1][3].

2.2 WAVE Based V2X Communication

WAVE uses the IEEE technological standard to provide V2V/V2I automobile

networking technologies for public safety and ITS services. The process of how the

WAVE standard came to be shows how the existing vehicle communication

environment used DSRC (Dedicated Short Range Communications) to provide traffic

information or for charging toll fees. However, as needs changed in the ITS

environment that changes in real time, the existing standard of Wi-Fi communication,

IEEE 802.11a was used as a base to reflect the electric wave environment on the road

or within automobiles to designate WAVE as the IEEE 802.11p standard. IEEE

802.11p, in order to simplify the membership joining process, omitted the existing

method of authentication of IEEE 802.11and the assembly process which led to

security issues. To address such issues, the IEEE 1609.2 standard that provides

security services in the upper hierarchy of MAC was combined to give birth to the

Advanced Science and Technology Letters Vol.142 (SIT 2016)

118 Copyright © 2016 SERSC

WAVE standard. The structure of the WAVE is as seen in Fig. 1.

The WAVE can be categorized into three parts of WAVE Security Service, Data

Plane, and Management Plane. WAVE Security Service provides the services that can

complement the omitted authentication of IEEE 802.11p, while the Management

Plane requests or advertises services from the RSU (Road-Side Unit) or OBU (On-

Board Unit). Data Plane contains the data flow for actual data transmission and

reception [1][2].

Fig. 1. WAVE Architecture

3 Protocol Design

This chapter reviews the issues with C2C-CC where the PCA issues a pseudonym

authentication form at which point a pseudonym for the vehicle ID is generated and

issued to the vehicle. During this process, the vehicle ID information can be stored in

order to trace the vehicle ID. This poses the risk of anyone with access to PCA or a

malicious attacker stealing the vehicle ID. Therefore, by preventing the PCA from

knowing the ID that can generate the authentication form using RCA, leakage of

information on the vehicle ID can be prevented.

Advanced Science and Technology Letters Vol.142 (SIT 2016)

Copyright © 2016 SERSC 119

Fig. 1. A Design RCA Protocol of V2V Communication

4 Conclusion

This paper suggests a method issuing authentication forms that can improve security

by reducing the likelihood of hacking in the authentication process required for

communication between vehicles in the intelligent transport system. In addition, a

quantitative analysis will be conducted on the stability and efficiency of the suggested

protocol to conduct an evaluation on the functions. As a follow-up study, the direction

of security that can defend against new and evolving attacks in the intelligent

transport system environment will be reviewed.

References

1. Park, S.-S., Kim, K.: A Study on Minimalize V2V Communication Authentication

Procedure for Enhancing Privacy. Korea Institute of Communication Sciences. 2016.6,

117-118.

2. Lee, Y.S., Sim, S.G., Kim, D.S.: A Study on Security technology for V2X communication.

Korea Institute of Information Security and Cryptology. 2014.4, 28-34.

3. An, H., Kang, S., Kim, M., Jung, J.: A Study on the IEEE WAVE 1609.2 ECDSA

Performance based on Open Source. Korea Institute of Communication Sciences. 2015.1,

856-857.

Advanced Science and Technology Letters Vol.142 (SIT 2016)

120 Copyright © 2016 SERSC