Token-based Vehicular Security System (TVSS): Scalable, Secure, Low-latency Public Key Infrastructure for Connected Vehicles (2402.18365v1)
Abstract: Connected and Autonomous vehicles stand to drastically improve the safety and efficiency of the transportation system in the near future while also reducing pollution. These systems leverage communication to coordinate among vehicles and infrastructure in service of a number of safety and efficiency driver assist and even fully autonomous applications. Attackers can compromise these systems in a number of ways including by falsifying communication messages, making it critical to support security mechanisms that can operate and scale in dynamic scenarios. Towards this end, we present TVSS, a new VPKI system which improves drastically over prior work in the area (including over SCMS; the US department of transportation standard for VPKI). TVSS leverages the idea of unforgeable tokens to enable rapid verification at the road side units (RSUs), which are part of the road infrastructure at the edge of the network. This edge based solution enables agile authentication by avoiding the need for back-end servers during the potentially short contact time between a moving vehicle and the infrastructure. It also results in several security advantages: (1) Scalable Revocation: it greatly simplifies the revocation problem, a difficult problem in large scale certificate systems; and (2) Faster Refresh: Vehicles interact more frequently with the system to refresh their credentials, improving the privacy of the system. We provide a construction of the system and formally prove its security. Field experiments on a test-bed we develop consisting of on-board units (OBUs) and RSUs shows substantial reduction in the latency of refreshing credentials compared to SCMS, allowing the system to work even with smaller window of connectivity when vehicles are moving at higher speeds. Notably, we are able to execute the bottleneck operation of our scheme with a stationary RSU while traveling at highway speeds .
- Application level attacks on connected vehicle protocols. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({normal-{\{{RAID}normal-}\}} 2019), pages 459–471, 2019.
- Development of dsrc device and communication system performance measures recommendations for dsrc obe performance and security requirements. Technical report, United States Department of Transportation Intelligent Transportation Systems Joint Program Office, 2016.
- Vespa: Vehicular security and privacy-preserving architecture. In Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy, pages 19–24, 2013.
- Intelligent transportation systems and greenhouse gas reductions. Current Sustainable/Renewable Energy Reports, 2(3):90–97, 2015.
- Preparing secure vehicle-to-x communication systems. 2014.
- Copra: Conditional pseudonym resolution algorithm in vanets. In 2013 10th annual conference on wireless on-demand network systems and services (WONS), pages 9–16. IEEE, 2013.
- A security credential management system for v2x communications. IEEE Transactions on Intelligent Transportation Systems, 19(12):3850–3871, 2018.
- Alexandra Chiang. V2x promises a new era of smart transportation. https://www.advantech.com/en-us/resources/faq/v2x-promises-a-new-era-of-smart-transportation, 2022.
- Decentralized anonymous micropayments. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 609–642. Springer, 2017.
- European Commission. Certificate Policy for Deployment and Operation of European Cooperative Intelligent Transport Systems (C-ITS) Release 1.1. https://transport.ec.europa.eu/system/files/2018-05/c-its_certificate_policy-v1.1.pdf, June 2018.
- Autonomous driving’s future: Convenient and connected. Technical report, McKinsey & Company, 2023.
- John R Douceur. The sybil attack. In International workshop on peer-to-peer systems, pages 251–260. Springer, 2002.
- TCITS ETSI. Intelligent transport systems (its); vehicular communications; basic set of applications; definitions. Tech. Rep. ETSI TR 102 6382009, 2009.
- TS ETSI. 102 940 v2.1.1—intelligent transport systems (its); security; its communications security architecture and security management. Technical report, Technical Report, 2021.
- TS ETSI. 102 941 v1.4.1—intelligent transport systems (its); security; trust and privacy management. Standard, TC C-ITS, 2021.
- Traffic Safety Facts. Motor vehicle crashes: Overview. Traffic safety facts: research note, 2018.
- Serosa: Service oriented security architecture for vehicular communications. In 2013 IEEE Vehicular Networking Conference, pages 111–118. IEEE, 2013.
- Martin Haenggi. Outage, local throughput, and capacity of random wireless networks. IEEE Transactions on Wireless Communications, 8(8):4350–4359, 2009.
- The elliptic curve digital signature algorithm (ecdsa). International journal of information security, 1:36–63, 2001.
- Secmace: Scalable and robust identity and credential management infrastructure in vehicular communication systems. IEEE Transactions on Intelligent Transportation Systems, 19(5):1430–1444, 2018.
- Scaling pseudonymous authentication for large mobile systems. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, pages 174–184, 2019.
- Evaluating on-demand pseudonym acquisition policies in vehicular communication systems. In Proceedings of the First International Workshop on Internet of Vehicles and Vehicles of Internet, pages 7–12, 2016.
- Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications. In 2008 IEEE 68th Vehicular Technology Conference, pages 1–5. IEEE, 2008.
- Frequency of target crashes for intellidrive safety systems. Technical report, United States. National Highway Traffic Safety Administration, 2010.
- Office of the Assistant Secretary for Research and Technology ITS Joint Program. Intelligent Transportation Systems Strategic Plan. https://www.its.dot.gov/stratplan2020/index.htm.
- U.S. Department of Transportation (US DOT). Security credential management system (scms). https://its.dot.gov/resources/scms.htm, 2022.
- Secure vehicular communication systems: design and architecture. IEEE Communications Magazine, 46(11):100–109, 2008.
- Ticket based service access for the mobile user. In Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking, pages 223–233, 1997.
- Dedicated short-range communications roadside unit specifications. Technical report, United States. Dept. of Transportation, 2017.
- A survey on security attacks and defense techniques for connected and autonomous vehicles. Computers and Security, 109(C), oct 2021.
- Mss: Lightweight network authentication for resource constrained devices via mergeable stateful signatures. In 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS), pages 282–292, 2021.
- Characterization and performance evaluation of ieee 802.11 p nics. In Proceedings of the 1st ACM MobiHoc Workshop on Technologies, mOdels, and Protocols for Cooperative Connected Cars, pages 13–18, 2019.
- Experimental assessment of ieee 802.11-based v2i communications. In Proceedings of the 18th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, pages 33–40, 2021.
- P4r: Privacy-preserving pre-payments with refunds for transportation systems. In International Conference on Financial Cryptography and Data Security, pages 205–212. Springer, 2013.
- V-tokens for conditional pseudonymity in vanets. In 2010 IEEE Wireless Communication and Networking Conference, pages 1–6. IEEE, 2010.
- Pf-ibs: pairing-free identity based digital signature algorithm for wireless sensor networks. Wireless personal communications, 97:1185–1196, 2017.
- Let’s revoke: Scalable global certificate revocation. In 27th Annual Network and Distributed System Security Symposium, NDSS, 2020.
- A survey on cyber-security of connected and autonomous vehicles (cavs). IEEE Transactions on Intelligent Transportation Systems, 23(7):6240–6259, 2021.
- Iota-vpki: a dlt-based and resource efficient vehicular public key infrastructure. In 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), pages 1–6. IEEE, 2018.
- Autonomous vehicle security: A taxonomy of attacks and defences. In 2016 IEEE international conference on internet of things, pages 164–170. IEEE, 2016.
- USDOT. Wydot update at the application design stage webinar q&a. https://www.its.dot.gov/pilots/wydot_webinar_qa.htm, 2022.
- Sevecom—security and privacy in car2car ad hoc networks. In 2009 9th International Conference on Intelligent Transport Systems Telecommunications,(ITST), pages 658–661. IEEE, 2009.
- Cyber hack triggers mass fiat chrysler car recall — financial times. https://www.ft.com/content/2bafe3e0-321f-11e5-8873-775ba7c2ea3d, 2015.
- Double-spending with a sybil attack in the bitcoin decentralized network. IEEE transactions on Industrial Informatics, 15(10):5715–5722, 2019.