The present disclosure as directed to vehicle transportation systems, and more particularly to security in vehicle transportation systems.
Vehicle to vehicle (V2V) communication stands to improve the safety and efficiency of vehicle transportation systems. V2V communication also presents a unique set of security challenges. First, the revocation problem as a major pain point an these systems. Second, vehicles in current systems do not refresh their credentials often enough to avoid security issues. In current systems, credentials have a relatively long lifespan which opens the door for several types of attacks on the vehicle transportation systems. For these and other reasons, there is a need for the subject matter of the present disclosure.
Consistent with the disclosed embodiments, a method of operating a token-based vehicular security system (TVSS) is disclosed. The method comprises communicating with a communicatively connected vehicle (CV) communicatively connected to the token based vehicular security system (TVSS). The method comprises issuing a pseudonym certificate (PC) to the communicatively connected vehicle (CV) from one of a plurality of roadside units (RSUs) with the token-based vehicular security system (TVSS) having a low latency. And the method comprises providing a standard unforgeability security guarantee for the token based vehicular security system (TVSS) without violating anonymity or unlinkability properties. In some embodiments, the method further comprises communicating with the communicatively connected vehicle (CV) moving at a speed of between about 25 miles per hour and about 85 miles per hour. In some embodiments, communicating with the communicatively connected vehicle (CV) communicatively connected to the token based vehicular security system (TVSS) comprises completing a transaction between one of the plurality of roadside units (RSUs) and the communicatively connected vehicle in less than about one-hundred milliseconds. In some embodiments, issuing the pseudonym certificate (PC) for the communicatively connected vehicle (CV) from one of the plurality of roadside units (RSUs) with the token-based vehicular security system (TVSS) having the low latency comprises issuing the pseudonym certificate (PC) for the communicatively connected vehicle (CV) from one of the plurality of roadside units (RSUs) with the token-based vehicular security system (TVSS) having the low latency of between about one millisecond and about two milliseconds. In some embodiments, the method further comprises receiving the pseudonym certificate (PC) at the communicatively connected vehicle (CV) from one of the plurality of road side units (RSUs) with a probability of success of between about 93% and about 99% with the communicatively connected vehicle moving at a speed of about 85 miles per hour. In some embodiments, the method further comprises updating the pseudonym certificate (PC) and maintaining an average time between updates of the pseudonym certificate of less than about eighteen minutes with about 20 miles between each of the plurality of roadside units.
Consistent with the disclosed embodiments, a method of operating a token-based vehicular security system (TVSS) is disclosed. The method comprises communicating with a communicatively connected vehicle (CV) communicatively connected to the token based vehicular security system. The method comprises sharing a short location-specific certificate revocation list (CRL) with the communicatively connected vehicle (CV). In some embodiments, sharing the short location-specific certificate revocation list (CRL) with the communicatively connected vehicle (CV) comprises sharing the short location-specific certificate revocation list (CRL) with the connected vehicle with no online involvement of the backend or communication back to the certificate authority. In some embodiments, the short location-specific certificate revocation list (CRL) is about 13 times smaller than a traditional certificate revocation list.
Consistent with the disclosed embodiments a token-based vehicular security system (TVSS) is disclosed. The TVSS comprises a roadside unit (RSU) communicatively connected to a roadside unit backend included in a cloud computing environment. The TVSS comprises a certificate authority (CA) included in the cloud computing environment, the certificate authority (CA) communicatively connected to the roadside unit backend. The TVSS comprises a SETUP protocol to enable a communicatively connected vehicle (CV), communicatively connected to the token based vehicular security system, to acquire a long-term enrollment certificate (EC) from the certificate authority (CA), the communicatively connected vehicle including an onboard unit capable of being communicatively connected to the roadside unit (RSU). The TVSS comprises a TOKENGEN protocol to enable the communicatively connected vehicle to acquire a plurality of authorization tokens from the certificate authority (CA). The TVSS comprises a PSEUDOGEN protocol to enable the communicatively connected vehicle (CV) to request a pseudonym certificate (PC) from the roadside unit (RSU) in exchange for one of the plurality of authorization tokens. The TVSS comprises a REVOKE protocol to enable the roadside unit backend and the certificate authority (CA) to cooperate to deactivate an adversarial vehicle credential. In some embodiments, the certificate authority (CA) and the roadside unit (RSU) meet an infrastructure/backend separation assumption. In some embodiments, the pseudonym certificate (PC) has a short lifespan. In some embodiments, the short lifespan is dynamically set based on a distance between roadside units (RSUs) and vehicle velocity. In some embodiments, the roadside unit (RSU) is connected to the roadside unit backend that communicates with but is distinct from the certificate authority (CA). In some embodiments, the PSEUDOGEN protocol is at least 7.6 times less likely to fail than a standard Security Certificate Management System for the communicatively connected vehicle (CV) having a velocity of 55 miles per hour. In some embodiments, the communicatively connected vehicle (CV) is operating in a particular geographical area and the communicatively connected vehicle (CV) receives an adversarial pseudonym certificate (PC) from the roadside unit (RSU) only for an adversarial vehicle operating in the particular geographical area.
Reference will now be made in detail to the exemplary embodiments of the present disclosure described below and illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout to refer to same or like parts.
While the present invention is described herein with reference to illustrative embodiments for particular applications, it should be understood that the invention is not limited thereto. Those having ordinary skill in the art and access to the teachings provided herein will recognize additional modifications, applications, embodiments, and substitution of equivalents, that all fall within the scope of the disclosure. Accordingly, the disclosure is not to be considered as limited by the foregoing or following descriptions.
Disclosed are solutions to the authentication problem for V2V communication systems which herein are called vehicular PKI (VPKI). TVSS, a new VPKI system, provides improvements over prior work in the area (including over SCMS; the US department of transportation standard for VPKI) by redesigning the system to take advantage of computation at the roadside units (RSUs) at the edge of the network. Unexpectedly, passing computation to the edge has several positive effects on security. First, it simplifies the revocation problem, a major pain point in prior systems. Second, giving compute power and function to the edge devices means vehicles interact more frequently with the system to refresh their credentials Field experiments of on-board units (OBUs) and RSUs show a reduced latency and lower communication compared to recent VPKIs. This results in the protocols of the disclosed methods and systems requiring a smaller window of connectivity with the RSU in order to complete successfully, and thus the disclosed protocols can be executed at higher vehicle speeds. Notably, the disclosed methods and systems are able to execute the bottleneck operation of the disclosed scheme with a stationary RSU while traveling at highway speeds (more than three times faster than the maximum speeds supported by SCMS). This turns out to have a significant positive impact on preserving vehicle privacy.
Technology which allows road vehicles to communicate with one another and with pieces of road infrastructure has the potential to drastically improve the safety and efficiency of the transportation system. Indeed, though this technology is in its infancy, numerous products have already been proposed. Safety applications such as Basic Safety Messages are projected to reduce road fatalities by 80%, a decrease of roughly 30,000 per year. More than 50 intersections in Pittsburgh, PA were fitted with intelligent traffic signal control systems between 2012 to 2016, which reduced travel times through these intersections by 26% Coordinated driving applications such as Cooperative Adaptive Cruise Control allow connected vehicles to travel closely in a convoy/platoon, reducing aerodynamic drag, improving fuel efficiency, and lowering the carbon footprint of the entire transportation system by a projected 15%.
Security in these types of transportation applications is important as a breach could cause accidents or otherwise disrupt the flow of traffic. In the embodiments of systems disclosed herein, the authentication layer lying underneath these potential applications is considered. Designing such a system requires addressing some non-standard security issues having to do with the fact that a vehicle's identity and position over time are sensitive information.
Vehicular Public Key Infrastructure. Prior work on this topic has culminated in the Security Certificate Management System (SCMS) which has been adopted by the US Department of Transportation (a similar European standard has also been developed). These standards provide a public key infrastructure (PKI) for vehicles to use to authenticate themselves which promises a standard unforgeability security guarantee as well as two additional security features called anonymity and unlinkability. As used herein, anonymity means that a vehicle should be able to authenticate itself without revealing its long term vehicle identity; unlinkability demands that it should not be possible to identify the same vehicle authenticating itself in two different time periods. For example, if Alice's car authenticates itself today on highway 1, anonymity guarantees that no one can deduce “that car belongs to Alice”, while unlinkability ensures that no one can say “the same car authenticated itself yesterday on highway 2”. In the disclosure provided herein, we refer to a PKI which guarantees anonymity and unlinkability as vehicular PKI (VPKI).
Revocation. Given the damage potential of a malicious user in VPKI, a revocation mechanism is needed to deactivate a malicious user's credentials, rendering the user unable to participate in the system. Revocation solutions involving a global centralized certificate revocation list (CRL) are not ideal for VPKI. On the one hand, the large scale and distributed nature of the system make it unreasonable to expect that all vehicles would constantly maintain an up-to-date local copy of the CRL. On the other hand, network-based solutions where a vehicle queries a CRL on the cloud before interacting with another vehicle are not ideal because of latency and network intermittency. Because of these issues, revocation is a major pain point of all prior VPKI systems.
Pseudonym Certificate Generation Time. Typically in VPKI systems, users authenticate themselves on the road using temporary credentials called pseudonym certificates (PCs). These PCs are periodically refreshed when the vehicle executes the PC generation protocol with a stationary roadside unit (RSU). An important (and often overlooked) feature in the design of VPKIs is the execution time of PC generation as this governs the possible use cases of the system. Essentially, the issue is that a fast vehicle passing by an RSU would have only a very brief period of network connectivity (less than one second if traveling at highway speeds). Therefore, if the PC generation protocol is too slow, the vehicle and RSU will fail to complete their protocol with high probability, and thus the vehicle would not reliably be able to update its PC. This issue is aggravated by the fact that channel uncertainty in wireless networks intensifies in highly mobile environments. Unreliability of PC generation at high speeds means, for example, that cars might wind up using the same PC for hours at a time, which harms system security. Because of SCMS slow PC generation protocol, the results shown in this disclosure show that attempting to use SCMS in highway scenarios requires PCs to persist for 6.7 hours, while TVSS reduces this window to 18 minutes (a ˜22.5× privacy improvement).
Edge-based VPKI: Referring to
Formalizing VPKI Security: A formal game-based security definition for VPKI incorporating unforgeability, anonymity and unlinkability is provided herein Additionally, other attacks on TVSS 10 and how to neutralize them are shown. A new type of attack called a clone attack which was previously unconsidered in the VPKI literature, and which affects all prior systems is disclosed. Clone attacks are similar to sybil attacks and occur when an authorized vehicle shares its credentials with an unauthorized vehicle in an attempt for both cars to participate in the system in different locations. Methods for handling cone at tacks against TVSS 10 are described. No discussion or defense to clone attacks is given in other VPKI systems.
Open Source Testbed: A testbed of on-board units (OBUs) and RSUs that have technical specifications similar to commercial OBUs and RSUs have been built. In particular, a networking standard specifically designed for connected vehicles, IEEE 802.11p for dedicated short range communication, is included in the testbed.
VPKI Implementation and Field Experiments: TVSS 2300 and other VPKI systems have been implemented on the OBUs and RSUs and the testbed systems have been used to conduct a series of highway and in city street experiments at different velocities ranging from 25 mph to 85 mph. The tests showed that TVSS 2300 achieves a 28.5× reduction in its PC generation latency and a 13× reduction in total communication during revocation compared to other systems. At extreme speeds, TVSS is 3.85× more likely to successfully complete PC generation and 6.5× more likely to successfully update its local CRL compared to other systems.
Here, the disclosure explains how TVSS 10 works at a high level and how the three features described above are achieved. A more detailed description is presented in the next section.
System Players and the Parameter T. The main players in TVSS 10 are the vehicles 2310, the distributed network of RSUs 2308 and the certificate authority (CA) 2304. The RSUs 2308 are all connected to a backend server called the “RSU backend” 2306 which communicates with, but is distinct from the CA 2304 (this is important for revocation). The connection between the vehicles 2310 and the RSUs 2308 is modeled as a secure private channel (this will be implemented using encryption). Time in TVSS 10 is broken into distinct periods of T minutes each, for a system parameter T. Smaller T means stronger security and greater overhead on the system.
The Infrastructure/Backend Separation Assumption. It is important to security in TVSS 10 to assume that the CA 2304 and the RSUs 2308 are controlled by separate entities which do not collude; this is called the infrastructure/backend separation assumption. Some version of this assumption is implicit an all prior work on VPKI. Though not ideal, the infrastructure/backend separation assumption necessary for security in TVSS 10 is plausible since the CA 2304 would likely be controlled by a specialized security company while the RSUs 2308 would be part of the public infrastructure. Public infrastructure includes street light systems, power delivery systems, traffic signs, and any other structures encountered in a traffic system on which RSUs 2308 my be mounted or included.
System Setup. Life begins for a vehicle 2310 when the vehicle 2310 obtains an enrollment certificate EC from the CA 2304. In some embodiments, this occurs at the manufacturing plant, once during the vehicle's lifetime.
Token Generation. Once a vehicle 2310 possesses an enrollment certificate, the vehicle 2310 can request a batch of tokens from the CA 2304 which the vehicle 2310 will later trade in to the RSUs 2308 in order to get PCs. In order to request tokens, the vehicle 2310 authenticates itself using the EC in order to receive a large number of tokens (say 2,880 for a one month's supply when T=15 minutes). Each token is signed using a CA's 2304 private signing key and can be validated by verifying the signature using a CA's 2304 public signing key. Each token is valid for one specified period of T minutes; when the final token expires, v will need to request new tokens from a CA 2304. Token generation can be performed offline.
PC Provisioning. Once a vehicle 2310 has tokens, it can request PCs from any RSU 2308. To do this, the vehicle 2310 presents the token for the current time period to the RSU 2308 and the RSU 2308 verifies authenticity against the CA's 2304 public credentials and, if valid, returns a PC The PC is signed by the RSU 2308 and marked with a geographical tag corresponding to the RSU's location and is valid only when nearby this location and during the same time window that the token is valid for. This means that new PCs must be requested every T minutes. The geographic radius of validity should be an upper bound on the distance one can drive in T minutes. The RSU 2308 sends the received token to the RSU backend 2306 to check for duplicates. If the same token is used twice to generate two different PCs in two different geographical areas (i.e., if a clone attack is being launched), then the RSU backend 2306 will notice and will begin the revocation procedure (described below) for this vehicle 23101.
Notice that from the point of view of the vehicle 2310, PC generation consists of a sample “handshake-type” interaction with the RSU 2308. This is in contrast to SCMS where PC generation requires the vehicle's messages to be forwarded all the way to the RSU backend 2306 which is four “network hops” away from the vehicle. The ability to perform PC generation over a short-term connection unlocks use cases which are not supported by SCMS. For example, experiments described below demonstrate that PC generation in TVSS 10 can be performed at high speeds on the freeway, while this would not be possible in SCMS. Indeed, the experiments indicate that in these driving conditions, the PC generation protocol is at least 10× less likely to fail than PC generation in SCMS. This is an important improvement since resolving the issues resulting from failed PC generation attempts consumes extra system resources. Additionally, because PC generation can be performed with a much weaker connection between the vehicle 2310 and an RSU 2308, the frequency with which a connection occurs which can support PC generation increases considerably. This allows the system to be set up so that PCs are refreshed more frequently (every fifteen minutes, rather than once per week) which translates to better security and easier revocation.
Revocation. When the PC of a malicious vehicle 2310 as identified, the RSU backend 2306 and the CA 2304 are alerted, and they cooperate to recover the current and future tokens of the offending vehicle 2310. These tokens are shared with the RSUs 2308 who update their token blacklists (TBLs), thus preventing the offending vehicle from obtaining any new PCs an the future. In order to deactivate the current PC, the CA 2301 shares the offending PC only with the RSUs 2308 which are in the geographic radius of the misbehaving vehicle, these RSUs 2308 in turn share the PC with all vehicles 2310 in their region, who update their local CRL (or what we also refer to as pseudonym certificate revocation lists, PCRLs) and make sure to avoid the offending vehicle.
Note that the honest vehicles 2310 receive only the PCs of the misbehaving cars in their geographical area, not the list of all misbehaving vehicles in the whole system. Moreover, this list must only be maintained for the remainder of the time period, after which point it can be discarded. Thus, the amount of revocation information which needs to be downloaded by each vehicle is small. The large TBLs which must be maintained by the RSUs 2308 (consisting of all current and future tokens of all offending vehicles in the system) represent less of a problem as the RSUs 2310 are stationary and so should have a stable connection. Experiments described below demonstrate that this change to requiring the vehicles 2310 only to maintain a geographically based CRLs leads to a systemwide 13× savings in total communication size.
While the idea of using geographic PCs to improve revocation seems, at first glance, to be a generic solution which can be applied in any VPKI, this is not the case. A key feature of TVSS 10 which makes at possible is the short lifespan of the PCs (i.e., small T). In SCMS, the PCs are live for an entire week and so it is not possible to constrain a PC to a small geographic region (one week as enough time to drive from Lisbon, Portugal to Vladivostok, Russia). The short lifespan of PCs is only possible in TVSS 10 because of the system-wide efficiency improvements gained by passing computation to the RSUs 2308.
Security. Anonymity and unlinkability both hold in TVSS 10 intuitively because the tokens which are used to get the PCs have no information about the vehicle 2310. For example, even if the RSU 2308 is corrupt and can connect the PC to the token, there as no way to connect the token to the vehicle's 2310 enrollment certificate as long as the RSU 2308 does not collude with the CA 2304. Thus, anonymity should hold under the infrastructure/backend separation assumption; unlinkability should hold for similar reasons. Formal security definitions and proofs are provided below.
Below, the system model and assumptions are disclosed. In addition, the detailed protocols of TVSS 10 (Setup 2312, TokenGen 2314, PseudoGen 2318, Revoke 2316) and implementation considerations are disclosed.
As mentioned before, TVSS 10 consists of a network of RSUs 2308 and backend servers residing in the cloud. The backend servers are the RSU backend 2306 and the certificate authority (CA) 2304. The CA 2304 is the root of trust in the VPKI and it is responsible for providing vehicles 2310 with ECs and tokens while providing RSUs 2308 with signing certificates. Vehicles 2310 use ECs to obtain tokens from the CA 2304 while RSUs 2308 use their signing certificates to generate and sign PCs for vehicles 2310 in exchange for tokens, as shown in
The four protocols (Setup 2312, TokenGen 2314, PseudoGen 2318, Revoke 2316) are included in TVSS 10.
Setup 2312: This allows a vehicle v∈V to acquire a long-term enrollment certificate, ECv, which acts as the vehicle identity. Explicitly ECv is a signing key pair consisting of a private signing key and a public verification key, and additionally a signature on the public verification key using the CA's 2304 private signing key. The vehicle v will use ECv to request services from the CA 2304 when needed using a TLS-style handshake. The enrollment certificate ECv has a long expiration time and v probably gets it once in its lifetime or upon ownership transfer.
TokenGen 2314: This provides a vehicle 2310 with a list of authorization tokens T={τ1, . . . , τN} that can be used to anonymously request pseudonym certificates from the RSUs 2308. Each token τ∈T is active during a specified time window only, and so once the final token in T expires, the vehicle will have to rerun this procedure to get more. Explicitly, each token is a random nonce, a time window, and a signature on the nonce/tame window pair. The vehicle 2310 obtains the tokens after completing a TLS-style handshake with the CA 2304 using ECv.
PseudoGen 2318: This is used by vehicles to request PCs from the RSUs 2310 in exchange for tokens. Explicitly, a PC as a signing key pair consisting of a private signing key (generated by the vehicle and kept secret), and a public verification key, and a signature on the public verification key using the RSU's 2308 secret signing key. The vehicle 2310 simply presents its token and its verification key to the RSU 2308 who validates the token and then signs the verification key and returns the PC. The RSU 2308 also shares this token and the certificate with the RSU backend 2306 to detect if token double use occurs; this allows the system to detect and throttle clone attacks.
Revoke 2316: When a vehicle 2310 is identified as adversarial, the RSU backend 2306 and the CA 2304 cooperate to run this protocol to deactivate the offending vehicle's credentials. This works, as described above, by updating the RSU TBLs to include all future tokens of the offending vehicle 2310, by updating the vehicle CRLs of all vehicles 2310 which are nearby the offending vehicle 2310 to include the malicious PC, and by updating the CA blacklist (BL) to include the enrollment certificate (ECv).
RSU Blackout Areas. Suppose a vehicle 2310 needs to travel to an area with limited RSU 2308 deployment for an extended period, but wants to precompute PCs for use during its trip. Normally the RSUs 2308 in the system will only give a PC for the current time window. However, in such a situation, the system could allow an RSU 2308 to grant a batch of PCs in exchange for a batch of tokens and the vehicle 2310 would be able to authenticate itself as usual. Note however that the unlinkability guarantee would fail to hold as the RSU 2308 would likely infer that the batch of PCs all belong to the same vehicle.
Linked Tokens via Hash Chains. A novel approach is described that allows for generating token ids for a single vehicle 2310 v that look random and independent but can still be selectively linked using a secret that is kept at CA 2304 only. Particularly, this approach provides two advantages: 1) It allows CA 2304 to publish a single τ id (and a secret) per revoked v, which can significantly reduce token blacklist (TBL) bandwidth requirements since the TBL size becomes based on the number of revoked vehicles rather than revoked tokens. 2) The CA 2304 can keep a single T id (and a secret) at any tame window and derive the ids of tokens of future time intervals; the same approach can also be utilized by an RSU 2308 when tokens are revoked. This can significantly reduce the storage requirements of keeping such token ids at CA 2304 and RSU 2308.
The hash chain mechanism works as follows: At vehicle Setup 2312, CA 2304 picks two random values, x0,r0, called heads. Upon executing PseudoGen 2318, CA 2304 uses H and the heads x0,r0 to create two hash chains of length N+1, where N is the number of tokens generated as a result of this request: the next PseudoGen 2318 request heads become xN, rN. In the hash chain of secrets (i.e., r0, . . . , rN), at the ith position, the value is calculated by H (ri−1). The second hash chain, which produces the τ ids, makes use of the values from the first chain. Specifically, the value at the ith position is calculated by applying H (xi−1∥ri−1). Whenever a malicious vehicle is detected, then the remaining tokens are revoked by publishing the corresponding input values to the current token xi being revoked, that is, (xi−1, ri−1). With this, the RSU 2308 will be able to invalidate the other remaining tokens acquired by the revoked v, which allows RSU to detect and refuse providing new PCs to revoked vehicles 2310.
Below, the security of TVSS 10 is disclosed. Sybil and clone attacks considered. A formal game-based security definition for VPKI which captures anonymity and unlinkability is described. Then, the proposition that TVSS 10 satisfies the security definition as proven.
Sybil Attacks. A Sybil attack occurs when a single malicious vehicle 2310 impersonates many independent vehicles 2310. Sybil attacks are a major concern an SCMS as the vehicles 2310 are given many valid PCs simultaneously and instructed, but not forced, to use them one at a time. However, in TVSS 10 vehicles 2310 get only one valid PC at a time and so a Sybil attack is only possible if the malicious vehicle obtains (either consensually or illicitly) active PCs from other actual users. Thus, launching a Sybil attack on TVSS 10 is much more difficult than on SCMS since it requires either convincing several other users to misbehave, or it requires obtaining their credentials via some other means. In this case, if the Sybil attack were noticed, the offending vehicle's 2310 credentials would be revoked, along with the credentials of all vehicles whose PCs were used.
Clone Attacks. A clone attack occurs when a malicious vehicle 2310 shares its token with another vehicle 2310 in another geographic area and both of them use the token to obtain a valid PC and participate in the system. Clone attacks are more problematic for our system since there is nothing tying the token to the vehicle 2310, and so there is no way for the second RSU 2308 to notice that the token does not “belong” to the clone vehicle. However, when the RSUs 2308 send the tokens to the RSU backend 2306 for analysis, the RSU backend 2306 will discover the clone attack since it will notice that the same token was used in two different places. Immediate revocation will follow, and so the next time the offending vehicle 2310 tries to get a PC from a RSU 2308, it will find that its tokens no longer work.
In this section, the security notions of anonymity and unlink ability are formalized for a VPKI system using a game-based security definition.
Security Game Overview. Let (Setup 2312, TokenGen 2314, PseudoGen 2318) be the algorithms from a TVSS 10 system (the Revoke 2316 procedure plays no part in this game), and furthermore let (Sign, Verify) be the sign and verify algorithms for the signature scheme used in the VPKI (recall that the PCs consist of a signature key pair and a signature on the public key using the RSU's 2308 secret key). In the security game, the adversary (A) is given full control of all parties in the system: A can create vehicles 2310 using Setup 2312. A can request tokens/PCs as v using TokenGen 2314/PseudoGen 2318 which A can choose to either expose or not. Eventually A decides how it will attempt to win the game; A has three options. A can win via forgery. A can break anonymity, or A can break unlinkability. The challenger C then issues a corresponding challenge to A, and A attempts to wan the game. For example, if A decides it wants to win via anonymity, then A will specify two different vehicles and C will have a PC of one of them and A must guess to which vehicle the PC belongs. The security game 40 is shown in
Definition 1 says that the VPKI scheme is secure if no efficient adversary can wan with any non-negligible advantage. Note that A can trivially win the anonymity or unlinkability version of the game by guessing randomly, therefore advantage in this case means Pr [A winsf −½, while in the forgery version of the game A's advantage is simply Pr [A winsf].
Definition 1. A VPKI scheme is secure, if for all efficient adversaries A, A's advantage in winning the VPKI security game is negligible.
A thorough proof that the proposed scheme, TVSS 10, is secure is provided below. A security reduction for all the three challenges: forgery, anonymity, and unlinkability as provided.
In this section, the hardware used for our experiments is presented. Technical details on the connected vehicles 2310 networking technology IEEE 802.11p/DSRC setup is provided implementation details and issues when conducting experiments on connected vehicles 2310 is described. Finally the design of the field experiments on connected vehicles is explained;
Five PC Engine APU1D4 embedded devices that can act as either on-board units (OBUs) or road-side units (RSUs) 2308 were obtained. APU1D4 devices are chosen to have have technical specifications that are similar to commercial OBUs and RSUs 2308 shipped by well-known vendors like Commsignia (ITS-OB4 OBU and ITS-RS4 RSU) and Savari (MW-1000 OBU and SW-1000 RSU). Each of the PC Engine APU1D4 devices has an AMD G series T40E—1 GHz dual Bobcat core, 4 GB DDR3-1066 DRAM and a 16 GB SSD hard drive. The APU104 based OBUs and RSUs were built from scratch so that they provide an open source environment where various applications/VPKI protocols can be implemented to get real field measurements of their performance in a vehicular environment. The OBUs and RSUs 2308 run on a patched version of OpenWrt 21.02.1, a well-known firmware mainly used with embedded and networking devices and is utilized by Savari commercial OBUs and RSUs 2308.
Moreover, two cloud servers were setup at a well-known cloud provider, Digital Ocean, acting as the certificate authority (CA) 2304 and registration authority (RA), which are needed by alternative cloud-based VPKI systems. Each of the CA 2304 and RA runs on an independent server with 4 CPUs, 8 GB of DDR3 RAM and 160 GB of SSD hard drive. Cudy N300 routers were also obtained. The routers are equipped with LTE SIM cards from a cellular service provider; RSUs 2308 are connected to cellular routers to enable internet connectivity. Whenever OBUs need to reach the internet (e.g., for CA 2304 access, RA access . . . etc.), they make use of RSUs 2308 to relay their requests to the cellular router.
IEEE 802.11p/DSRC Setup
In order to enable the OBUs and RSUs 2308 to use the networking standard IEEE 802.11p (DSRC) which is specifically designed for automotive communication, UNEX DHXA-222 wireless network interface cards (NICs) were installed. The installed NICs are compatible with IEEE 802.11p/DSRC. These NICs have been validated and proven to deliver reliable IEEE 802.11p/DSRC communication. To have IEEE 802.11p/DSRC properly set up, the NICs are configured to use the Outside Context of a BSS (OCB) mode; this allows direct communication between OBUs and RSUs 2308 (i.e., V2I/V2V) in an instant fashion with no association/authentication handshakes needed at the link layer. The vehicular standard 5.9 GHz frequency band is also used with a channel width of 10 MHz (namely, channel 178 at 5.890 GHz) as specified by the standard. While the NICs allow the bit rates of 3-27 Mbps to be set, the testbed is configured to have the baseline standard DSRC bit rate of 6 Mbps. IEEE 802.11p compatible antennas from MobileMark (for OBUs) and PulseLarsen (for RSUs) are used with the transmission power set to 15 dBm.
Bash scripts that utilize the ICMP protocol were developed in order to determine the contact time between OBUs and RSUs 2308 when CVs 2310 pass by RSUs 2308. Python was used to implement 3 VPKI systems to measure their performance, namely 1) TVSS 10, 2) SECMACE, a recent VPKI system, and 3) SCMS, the US VPKI standard.
In SCMS, an OBU can request a fresh PC only from the cloud. In SECMACE, the OBU requests tickets from the cloud. Then the 08U uses these tickets to obtain fresh PCs from a Pseudonym Certificate Authority (PCA). Note that in SECMACE, it is assumed the PCA is in the cloud as well, but in order to perform a fair comparison between SECMACE and TVSS 10, it was decided to place the implementation of PCA for SECMACE inside the RSUs. 2308. In TVSS 10, the OBU requests tokens from the cloud 2302 and uses these tokens to obtain fresh PCs from the RSUs 2308. The PC in both SECMACE and TVSS 10 is valid only within a specific region but the main difference is that when a vehicle leaves the validity region in SECMACE, the OBU must request new tickets from the cloud, while in TVSS the OBU simply uses a token to request a new PC from the RSU 2308 for the new region.
In all of the cloud based VPKIs, any interaction with the cloud must go through an RSU 2308.
Each RSU 2308 is equipped with a switching and a routing fabric and configured with a routing table to quickly and efficiently forward any OBU request to a cloud-based IP address via the connected 4G gateway (see below, and
For public key cryptography, we utilize PyNaCl, a Python binding to libsodium, which is a fork of the Networking and Cryptography library (NaCl). The library is used to implement public key encryption using the Elliptic Curve Integrated Encryption Scheme (ECIES) algorithm with the curve25519 elliptic curve and EdDSA digital signature algorithm with the ed25519 elliptic curve. Both algorithms use 256-bit long private keys and are adopted by SCMS All VPKI components (OBU, RSU 2308, CA 2304 and RA) use certificates for authentication.
The nature of experimenting on fast moving vehicles makes the contact time between OBUs and RSUs 2308 (i.e., gateways) limited as will be shown below. Initially, difficulties were experienced measuring cloud-based VPKI systems accurately since the systems tend to have longer round trip time (RTTs) and OBUs could try to communicate with cloud 2302 by sending a packet just before contact is made with the RSU 2308 and wait till after it is out of coverage. This issue by letting OBUs periodically create a new independent thread and send a new request to the cloud servers. The timeout is set to 30 ms for OBU-RSU communication and 2 s for OBU-cloud communication; a new request thread as created every 500 ms to make sure VPKIs have a chance to make a request while in contact with the RSU 2308 and to not saturate the receivers.
All three VPKI systems were evaluated under the following scenarios: 1) highway and 2) in-city scenarios. For the highway scenario, the highway has four lanes (two are inbound and the other two are outbound) and a median strip in the middle. One OBU is installed in a vehicle and four RSUs 2308 are placed on the median strip (i.e., middle of highway). The vehicle passes by the four geographically distributed RSUs 2308 at various highway speeds ranging from 55 mph to 85 mph. For the in-city scenario, the street has two opposing lanes with no median strip; one OBU is installed in the vehicle and four RSUs 2308 are placed on the side of the street. The vehicle passes by the four geographically distributed RSUs 2308 at relatively slow speeds, namely 25 mph and 35 mph. In both scenarios, RSUs 2308 do not have overlapping coverage and are connected to cellular routers, and the OBU antenna is placed outside the vehicle for better signal transmission and reception. In each scenario, two sets of experiments were conducted, PC Procurement (obtaining a PC from the VPKI) and PCRL Download (retrieve a complete and up-to-date PCRL from the RSU 2308). For each experiment and each speed, the experiment was run and repeat the experiment 25 times which generate 100 results per run (25 trials×4 RSUs).
In this section, a field-based study of TVSS 10 is presented along with the two alternatives (SECMACE and SCMS) using the measurements collected by the testbed of OBUs, RSUs, and cloud servers on highway and in-city streets at a range of driving velocities as described above. As described above, TVSS 10 is edge-based, pushing primary services to the edge of the network (the RSU 2308) to enable operation compatible with potentially short connection times. As a result, communicating with centralized back-end services during critical operations is avoided, thus shortening response time and increasing the reliability of the offered services. A primary advantage of TVSS 10 in a V2I communication setting, is that TVSS 10 enables anonymized reauthentication of connected vehicles (CVs) 2310 as they drive by RSJs 2308. A CV 2310 may have access to the infrastructure services for a short period of time (depending on its speed, range, and location) before it exists the coverage of the serving RSU 2308. The purpose of the experiments is to measure the effect of the network coverage time on the service performance and achieved security for different traveling speeds. The scalability of actual RSUs 2308 is also discussed. For all VPKIs, 100 field samples were collected for each of the experiments in order to get statistically reasonable results. Next, evaluation campaigns are presented; each campaign evaluates a specific metric in the design of the VPKIs.
Evaluation 1: Measuring Basic Coverage Times. In the first evaluation, we aim to capture the time a vehicle stays in the cover-age of an RSU 2308 under different speeds and directions to study the implications of vehicle network connectivity time on VPKI. The results are presented in Table 1 in
Evaluation 2: PC Generation Latency. In order to get a better understanding of the design implications of VPKI systems, the end-to-end latency of a PC request operation using different VPKI designs was measured; TVSS 10, our proposed VPKI system, SEC-MACE, a recent VPKI system, and SCMS, the US VPKI standard. For PC generation. TVSS 10 completely relies on the RSU 2308 while SECMACE relies on both the RSU 2308 and a cloud-based CA 2304. For SCMS, it relies completely on the cloud servers.
Evaluation 3: PC Renewal Success Ratio. In this evaluation, we want to measure the ability of various VPKI systems to issue a PC under the constraint of a vehicle 10 coverage time when it drives by an RSU 2308. The three VPKIs are tested under two scenarios: 1) highways with speeds of 55 mph-85 mph and 2) in-city with speeds of 25 mph-35 mph. The results are reported in
Evaluation 4: PCRL Size. In this evaluation, the feasibility of pseudonym certificate revocation lists (PCRLs) used in TVSS and other VPKI systems is discussed. PCRLs hold pseudonym identities of revoked vehicles and are used to notify and protect CVs 2310 from malicious vehicles. In all calculations of other VPKI protocol PCRLs, we consider the hash chain optimizations used in SCMS to reduce the PCRL size while in transit. TVSS 10 on the other hand, does not need to use these optimizations as each OBU can have a single PC at any time interval. In order to provide a reasonable projection of PCRL sizes in VPKI, the revocation ratios in another similar domain, namely the internet, are considered; shows that the regular revocation ratio in the internet is ˜1.29% of the whole PKI system. Because there might also be cases of mass revocation such as the cyber attack in 2015 which allowed hackers to disable vehicles and triggered Chrysler to recall 1.4 million vehicles, mass revocation with a ratio of 5% was also considered. Considering the US scenario with a total of 350 million vehicles, this would result in a PCRL of ˜177 MB in case of regular revocation and ˜684 MB in case of mass revocation as shown in Table 2,
In order to reduce the PCRL size, VPKI systems also suggest dividing the revoked certificates on different PCRLs based on some common factor, such as region of revocation (e.g., a state), so that a vehicle 2310 only downloads and keeps a relevant PCRL to it. In Table 2, shown in
TVSS 10, on the other hand, ties each PC to a very small region (i.e., an area between RSUs), which allows for significantly reduced PCRLs, without having the aforementioned vulnerability. To predict a realistic size of a local PCRL, the total number of vehicles that can fill up an area between RSUs 2309 in a highway is considered. In particular, the real Wyoming deployment of RSUs 2308 in which RSUs 2308 are at most 20 miles apart is considered. The results show that the technique of local PCRLs allows them to be extremely small even in case of mass revocation (˜160 KB), which are 13× smaller than delta PCRLs (i.e., the best SCMS choice) which improves the security of the system. Please note that SCMS cannot be adapted to tie PCs to small regions as this would violate anonymity and allow for tracking by the backend.
Evaluation 5: Ratio of Successful Download of PCRL. In this evaluation, a second set of field experiments to show the ratio of success to download PCRLs by CVs 2310 while driving on highways and in the city when passing by RSUs 2308 for both cases of regular revocation (
Under regular revocation (
Due to the large scale of VPKI, the effect of mass revocation on the system (
Evaluation 6: RSU Scalability. Since TVSS 10 proposes to move the whole workload to generate PCs to the edge network, in this experiment, the scalability of current road-side equipment (i.e., RSUs 2308) to handle such workloads is examined. It is important to make sure that extra costs by upgrading current RSUs 2308 are not incurred and to avoid otherwise ending up with a fragile deployment. Specifically, extreme situations where an RSU 2308 has to service many OBUs to refresh their PCs in a short time period are considered. SECMACE is also included in the discussion of this experiment to show its RSU scalability (even though SECMACE does not rely on the RSU completely). As shown earlier in
Evaluation 7: Linkability Window in VPKIs. The unreliability of the CV wireless networks causes a CV 2310 to reuse the same PC for longer periods if the CV 2310 is unable to renew the PC when driving by an RSU 2308.
CVs 2310 only have short unreliable connection times with RSUs 2308, the main gateway for internet. This causes cloud-based VPKIs to likely fail to refresh vehicle PCs due to high network latency. Thus, a novel token-based VPKI, TVSS 10, that addresses the shortcomings of other VPKIs is disclosed. TVSS 10 makes use of the edge-computing paradigm, where the PC issuance tasks are pushed to the RSUs 2308. This allows CVs 2310 to obtain PCs with low network latency without violating anonymity or unlinkability properties. Field experiments on the street shows that TVSS 10 is reliable even under high driving speeds as opposed to its alternatives; TVSS 10 can successfully generate PCs for vehicles with a 99% chance whereas that ratio drops to 42% for the best VPKI alternative. TVSS 10 also provides pseudonym certificate revocation lists (PCRLs), that are 13× smaller compared to traditional PCRLs.
In this section, the basic cryptographic systems that are utilized in SCMS and TVSS 10, namely encryption, digital signatures, decisional Diffie-Hellman (DDH), and hash chains are described.
Encryption Schemes. Encryption schemes are used in cryptography to ensure confidentiality of the information being sent over a network. It can be formally defined as a set of three algorithms (G, Enc, Dec) The algorithms G(1n) outputs the key pair (ek, dk), Enc(msg, ek) outputs a cipher text ct and Dec(dk, ct) outputs the message, msg, by using the decryption key dk. It satisfies the properties of correctness and the security. Correctness says that for all messages, if (ek, dk)←G(1n), then Dec(dk, Enc(msg, ek))=msg. Informally, the security property is that no efficient adversary can decrypt the ciphertext without having access to the decryption key.
Digital Signatures. Digital signatures are basic schemes used in cryptography and used for authentication purposes. A signature scheme can be formally defined as a set of three algorithms (G, Sign, Verify). The algorithms G(1n) outputs the key pair (vk, sk), Sign(msg, sk) outputs a signature σ and Verify(vk, msg, σ) checks whether the signature as valid or not.
Additionally, the correctness and security of the digital signatures must also hold. Correctness says that for all messages msg, if (vk, sk)←G(1n) and σ←Sign(msg, sk), then Verify(vk, msg, σ)=1. Intuitively, security demands that without possession of the secret key, no adversary can produce a valid signature for a new message.
Decisional Diffie-Hellman. The decisional Diffie-Hellman (DDH) problem in a cyclic group G with a generator g is defined. It is defined as follows. Given a tuple (g, gx, h, h′) where x is a random exponent, h∈G is random and h′ either equals hx or else is a random group element, decide which is the case. In DDH based encryption schemes, the private/public key pair (x, qx) corresponds to the decryption and encryption keys (dk, ek), respectively. Similarly, the key pair (x, gx) corresponds to the signature and verification keys (sk, vk), respectively, in digital signature schemes.
Hash Chains. Hash chains are important primitives which appear in authentication schemes. Formally, we can define a hash chain as follows. Given a hash function H, a hash chain is a list of vertices {v1, . . . , vN} where each vl is labeled by a string xi such that xl+1=H (xi) holds for all i (
Assume for contradiction that an efficient adversary A wins the VPKI game with non-negligible advantage. A efficient adversary B which breaks the security of the signature scheme (Gen, Sign, Verify) with related advantage is constructed. The first thing B does is guess how A will try to win the VPKI game; it will proceed differently in the three cases. Suppose first, that B decides A will win the forgery version of the VPKI game. In this case, B begins playing as the adversary in the security game for (Gen, Sign, Verify). Specifically, the signature game challenger C draws (vk, sk)˜G and sends vk to 8. Then B invokes A and plays as the challenger in the VPKI game. B picks a random vehicle v and a random PC for v and uses vk as the public verification key portion of the PC; all other Queries of A are answered honestly by 8, just as the honest challenger would answer them. If A does indeed decade to win the forgery version of the game, and moreover if A intends to use the selected vehicle v and the selected PC to produce the forgery then 8 proceeds, otherwise B aborts. In case 8 proceeds, B simply forwards A's forged message to C. It is clear that B wins the forgery game whenever A wins the forgery version of the VPKI game using the vehicle v and the selected PC Thus, if A has a non-negligible advantage of winning the forgery version of the VPKI game, then B has non-negligible probability of breaking the signature scheme. Now, let us suppose that A has a non-negligible advantage of breaking either the unlinkability or the anonymity versions of the VPKI game. An information theoretic contradiction in this case is derived by showing that A has the ability to predict a random bit with positive advantage. The key point here as that the PCs are completely independent of the vehicle and of each other and so there is no way A can win the anonymity or unlinkability branch of the game with probability better than ½. This is proved for anonymity, the case of unlinkability is similar. Consider an adversary B who emulates the VPKI challenger in all ways except that it chooses two random vehicles v0 and v1 and it generates two PCs: P0 and P1. Neither PC is associated yet with either vehicle. Now B flips a coin; if heads, 8 associates Pb with vb for b=0, 1; if tails B associates Pb with v1−b for b=0, 1. Now, if A decides to win the anonymity branch of the VPKI game using vehicles v0 and v1, then B sends P0 to A (if A decides to win a different branch, or decides to use different vehicles, then B outputs a random bit. Now, note that if B's coin landed on b, then A needs to return b to win. However, as B's challenge is independent of b, the probability that A returns b is exactly ½. Therefore, it is not possible for A to have an advantage in the anonymity branch of the VPKI game. The same argument shows that A cannot have any advantage in the unlinkability branch.
In summary, it must be that if A has a non-negligible advantage in winning the VPKI game, then this advantage must lie in the forgery branch of the game. However, as shown above, in this case we can design an efficient adversary 8 which breaks the security of the underlying signature scheme.
In some embodiments, the method further comprises updating the pseudonym certificate (PC); and maintaining an average time between updates of the pseudonym certificate of less than about eighteen minutes with about 20 miles between each of the plurality of roadside units.
In some embodiments, the certificate authority (CA) 2304 and the roadside unit (RSU) 2308 meet an infrastructure/backend separation assumption. In some embodiments, the pseudonym certificate (PC) has a short lifespan. In some embodiments, the short lifespan is dynamically set based on vehicle velocity and a distance between roadside units (RSUs) 2308. In some embodiments, the roadside unit (RSU) 2308 is connected to the roadside unit backend 2306 that communicates with but is distinct from the certificate authority (CA) 2304. In some embodiments, the PSEUDOGEN 2318 protocol is at least 7.6 times less likely to fail than a standard Security Certificate Management System for the communicatively connected vehicle (CV) having a velocity of 55 miles per hour. In some embodiments, the communicatively connected vehicle (CV) 2310 is operating in a particular geographical area and the communicatively connected vehicle (CV) 2310 receives an adversarial pseudonym certificate (PC) from the roadside unit (RSU) 2308 only for an adversarial vehicle operating in the particular geographical area. TVSS 10, as shown in
Reference throughout this specification to “an embodiment,” “some embodiments,” or “one embodiment.” means that a particular feature, structure, material, or characteristic described in connection with the embodiment is included in at least one embodiment of the present disclosure. Thus, the appearances of the phrases such as “in some embodiments,” “in one embodiment,” or “in an embodiment,” in various places throughout this specification are not necessarily referring to the same embodiment of the present disclosure. Furthermore, the particular features, structures, materials, or characteristics may be combined in any suitable manner in one or more embodiments.
Although explanatory embodiments have been shown and described, it would be appreciated by those skilled in the art that the above embodiments cannot be construed to limit the present disclosure, and changes, alternatives, and modifications can be made in the embodiments without departing from spirit, principles and scope of the disclosure.