connected vehicle security: successes and challengesgoyal/s18/15503/cv_security_2018.pdf ·...

34
Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar, OnBoard Security [email protected] January 30 th , 2018

Upload: others

Post on 31-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Connected Vehicle Security: Successes and Challenges

Dr. Virendra Kumar, OnBoard [email protected]

January 30th, 2018

Page 2: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Background

Page 3: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Traffic Safety

§ 32k US road deaths, and 3.8M injuries annually

§ Fatalities and injuries = $300B/year

§Congestion = $230B/year

§ Leading cause of death for ages 15-34 in US

Technology EvolutionPassive Active Proactive

3

Page 4: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

source: nhtsa.gov5

Page 5: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

source: gpo.gov

6

Page 6: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

V2V Communications Security

Basic Safety

Message

Basic Safety

Message

Basic Safety

Message

Basic Safety

Message

7

Page 7: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

SCMS Design

§ Security Credential Management System

(SCMS – think PKI-on-steroids) for V2V

includes privacy-preserving mechanisms

§ Shuffle at RA to protect against CA learning

certificates

§ Linkage authorities to allow tracing

misbehaving devices without revealing their

identity, and revoking in a way that only

allows them to be tracked after revocation

§ Organization separation ensures no single

insider / no single database breach can

track any car

8

Page 8: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Pilot Deployments

9source: cvp.nyc, its.dot.gov

Page 9: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Binary Hash Tree Based Certificate Access Management

(joint work with Jonathan Petit and William Whyte, appeared at ACM WiSec 2017)

Page 10: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

The Big Dilemma

Lifetime SupplyWho pays for 2-wayconnectivity?

What happens if thevehicle is hacked?

11

Page 11: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Current Certificate Model

3 years’ worth

3 years’ worth

RA

12

Page 12: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Encrypted Batches of Certificates

1 2 3 4 5

6 7 8 9 10

11 12 13 14 15

16 17 18 19 20

21 22 23 … n

13

Page 13: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Periodic Key Updates

ii

14

Page 14: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Compression using Binary Hash Trees

10

0100 10 11

000 001 010 011 100 101 110 111

seed

0 1 2 3 4 5 6 715

Page 15: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Day 1: No Revocation

10

0100 10 11

000 001 010 011 100 101 110 111

seed

0 1 2 3 4 5 6 7

Published node

Derived node

16

Page 16: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Day 2: Vehicles 2, 4, 5 Revoked

10

0100 10 11

000 001 010 011 100 101 110 111

seed

0 1 2 3 4 5 6 7

Published node

Derived node

Revoked node

17

Page 17: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Pathological: Every Other Vehicle Revoked

10

0100 10 11

000 001 010 011 100 101 110 111

seed

0 1 2 3 4 5 6 7

Published node

Derived node

Revoked node

18

Page 18: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Binary Tree Encoding

Encoding Size Decoding Time

Unique index of each

published node

r * log2(n/r) * (log2(n) + 1)

number of published nodes

Same as searching

Unique index of each

revoked leaf noder * log2(n)

No efficient algorithm

known

n: number of leaf-nodes, r: number of revoked vehicles, 1 ≤ r ≤ n/2

Can we get the best of both worlds? 19

Page 19: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

A New Algorithm for Full Binary Trees

Observations:

1. Topology known, only need to know which nodes are published and which are omitted.

2. Subtree of a published node can be ignored without any loss of information.

Encoding:

1. Start from root with an empty string.

2. Do breadth-first traversal.

1. Append 0 for revoked node.

2. Append 1 for published node.

3. Do nothing for derived node.

0

0 0

1 0 0 1

0 1 0 0

0 00 1001 0100Encoded string:

Disclaimer: Authors are not aware of any prior art with equivalent encoding sizes and decoding times.

1 2

3

Published nodes: 00, 11, 011

20

Page 20: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

A New Algorithm for Full Binary Trees Contd.Decoding: 1. Start from root and process 1 level at a time. 2. At every level, look at the bit of interest

1. If 0, go to next level. 2. If 1, output the number of 1s so far, and stop.

Example (vehicle 3 è 011):

Disclaimer: Authors are not aware of any prior art with equivalent encoding sizes and decoding times.

Encoding: 0 00 1001 0100

Bits at a level:# bits before bit of interest: 0# bits after bit of interest: 0

Rules for going to next level:1. # bits before = 2 * (# 0s in bits before bit of interest)2. Add 1 to (# bits before), if next bit of vehicle ID is 1.3. # bits after = 2 * (# 0s in bits after bit of interest)4. Add 1 to (# bits after), if next bit of vehicle ID is 0.

bit of interest

Vehicle ID bit

Bits at a level:# bits before bit of interest: 0# bits after bit of interest: 1

Bits at a level:# bits before bit of interest: 1# bits after bit of interest: 2

Bits at a level:# bits before bit of interest: 1# bits after bit of interest: 2

3

1 2

3

21

Page 21: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Efficiency of Encoding Algorithm

§ Encoding size– # published nodes ≈ # revoked nodes, i.e. encoding has roughly the same

number of 0s and 1s.– Size ≈ 2*r*log2(n/r)– For n=240, r=1,000, encoding takes less than 1% of the full packet, i.e. about 20

times smaller than using unique index of each published node.

§ Decoding time– Breadth-first but queue size ≤ r.– For n=240, r=10,000, a consumer laptop (2.7 GHz Intel Core i7, 16GB RAM) takes

less than 3 milliseconds on average.

22

n: number of leaf-nodes, r: number of revoked vehicles, 1 ≤ r ≤ n/2

Page 22: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Some Open Problems

Page 23: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Pseudonym Certificate Change Algorithm

27source: project.wnyc.org

Page 24: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Perfect Anonymity

§With the current approach, certificate batch size will be 3*365*24*3600*10 ≈ 1 Billion!

§Can we guarantee perfect anonymity, e.g. via group signatures?– Will the performance of such a signature scheme be acceptable?

– Will it provide protection against insider attacks?– Will it provide efficient revocation?– Will it provide efficient addition of group members?

– …

28

Page 25: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Group Revocation

29

Page 26: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Malicious Insiders

30

Page 27: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Misbehavior Identification

§Misbehaving vehicles can frequently change their pseudonym certificates– Can we correlate all the misbehavior by a given vehicle?– Can we do it while respecting the privacy of honest vehicles?– Can we do it when the Misbehavior Authority is malicious?– …

31

Page 28: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Secure Computation

Page 29: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Real Life Computation Problems

33

Solution: Trusted third party

But, do we really have to?

Page 30: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Secure Computation

§ Parties P1, P2, …, Pn with private inputs x1, x2, …, xn can jointly compute any arbitrary function f(x1, x2, …, xn), s.t.– Correctness: Output is guaranteed to be correct.– Privacy: Inputs are guaranteed to remain private.– …

§ [Yao ’82] achieved this for n = 2.

§ [Goldreich-Micali-Wigderson ’87] achieved this for n ≥ 2.

§ Active area of cryptographic research.

34

Page 31: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Garbled Circuits [Yao ’82]

35

f(x1, x2)

Page 32: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Garbled Circuits contd.

36

w1 w2

w3

k10, k1

1 k20, k2

1

k30, k3

1

Garbling

w1 w2 w3 Garbling0 0 0 G1 = E(k1

0, k20, k3

0)

0 1 1 G2 = E(k10, k2

1, k31)

1 0 1 G3 = E(k11, k2

0, k31)

1 1 1 G4 = E(k11, k2

1, k31)

P1 (x1 = 0) P2 (x2 = 1)G2, G1, G3, G4

(k30, 0), (k3

1, 1)

k10

OT for k21

1. Try to decrypt G1, …, G4.2. With k1

0 and k21, can decrypt

only G2 to obtain k31.

3. k31 maps to 1, so the output is 1.

Output = 1

Page 33: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Why are the last two problems still open?

§ There are more than 250 million vehicles in the US, and each one of them needs at least 1000 certificates per year.

§ Even with the state of the art, garbled circuits for linkage value generation would be more than 5000 Exabytes in size and require more than 1 million high-end computers to generate them.– Google has only 15 Exabytes of data!– 1 Exabyte = 1024*1024*1024 Gigabytes.

37

Page 34: Connected Vehicle Security: Successes and Challengesgoyal/s18/15503/cv_security_2018.pdf · 2018-01-31 · Connected Vehicle Security: Successes and Challenges Dr. Virendra Kumar,

Thank you!

38

We have opening for interns!