talk slides: first in-progress attempt

- using pdflatex
- unfinished
- problem: title page invisible
master
Trolli Schmittlauch 2018-07-15 01:51:25 +02:00
parent 358afd82f7
commit e9b6ad4570
4 changed files with 338 additions and 6 deletions

4
.gitignore vendored
View File

@ -4,3 +4,7 @@
*.bbl
*.blg
*.out
*.nav
*.shm
*.toc
*.snm

Binary file not shown.

After

Width:  |  Height:  |  Size: 200 KiB

View File

@ -81,7 +81,7 @@
abstract = {Pseudonym certificates are the state-of-the-art approach for secure and privacy-friendly message authentication in vehicular ad-hoc networks. However, most of the proposed pseudonym schemes focus on privacy among participants. Privacy towards backend providers is usually (if at all) only protected by separation of responsibilities. The protection can be overridden, when the entities collaborate, e.g. when revocation of long-term credentials is required. This approach puts the users' privacy at risk, if the backend systems are not fully trusted.},
language = {en},
journal = {Ad Hoc Networks},
author = {F{\"o}rster, David and Kargl, Frank and L{\"o}hr, Hans},
author = {F\"orster, David and Kargl, Frank and L\"ohr, Hans},
year = {2016},
keywords = {unread},
pages = {11},
@ -200,7 +200,7 @@
doi = {10.1007/s00779-012-0633-z},
number = {1},
journal = {Personal Ubiquitous Comput.},
author = {Wernke, Marius and Skvortsov, Pavel and D{\"u}rr, Frank and Rothermel, Kurt},
author = {Wernke, Marius and Skvortsov, Pavel and D\"urr, Frank and Rothermel, Kurt},
month = jan,
year = {2014},
keywords = {Adversary,Approaches,Attacks,Classification,Location privacy,Location-based services,Principles,Protection goals,unread},
@ -318,7 +318,7 @@
language = {en},
number = {3},
journal = {Transactions on Emerging Telecommunications Technologies},
author = {Sandonis, Victor and Soto, Ignacio and Calderon, Maria and Urue{\~n}a, Manuel},
author = {Sandonis, Victor and Soto, Ignacio and Calderon, Maria and Urue\~na, Manuel},
month = mar,
year = {2016},
keywords = {GeoNetworking},
@ -394,11 +394,11 @@
@article{TN_libero_mab2,
title = {{{ISO}} 29281-1},
abstract = {Bibliographische Datenbank (monatlich aktualisiert, 3sprachig) mit ca. 1.100.000 Daten von Normen aus 23 L{\"a}ndern, (z.B. ANSI, DIN, ISO), technischen Regeln sowie von deutschen Rechtsvorschriften mit technischen Bezug und geltenden EU-Richtlinien incl. VDI-Richtlinien. Der Volltextzugriff auf Normen ist nur bei entsprechender Lizenz verf{\"u}gbar!},
author = {intelligents de transport {ISO/TC 204 Systeme f{\"u}r Verkehrsbeeinflussung und -information , ISO/TC 204 Intelligent transport systems}, ISO/TC 204 Syst{\`e}mes},
abstract = {Bibliographische Datenbank (monatlich aktualisiert, 3sprachig) mit ca. 1.100.000 Daten von Normen aus 23 L\"andern, (z.B. ANSI, DIN, ISO), technischen Regeln sowie von deutschen Rechtsvorschriften mit technischen Bezug und geltenden EU-Richtlinien incl. VDI-Richtlinien. Der Volltextzugriff auf Normen ist nur bei entsprechender Lizenz verf\"ugbar!},
author = {intelligents de transport {ISO/TC 204 Systeme f\"ur Verkehrsbeeinflussung und -information , ISO/TC 204 Intelligent transport systems}, ISO/TC 204 Syst\`emes},
year = {2013},
keywords = {DIN-Norm,Internationale Norm,Norm,Regeln der Technik,Verzeichnis},
publisher = {{ISO Internationale Organisation f{\"u}r Normung, ISO International Organization for Standardization, ISO Organisation Internationale de Normalisation}}
publisher = {{ISO Internationale Organisation f\"ur Normung, ISO International Organization for Standardization, ISO Organisation Internationale de Normalisation}}
}
@techreport{RFC8200,
@ -574,4 +574,9 @@
file = {/home/spiollinux/Zotero/storage/J9PVY5ED/visionzero.html}
}
@misc{careeuroadaccidentsdatabaseEUFatalitiesTargets,
title = {{{EU Fatalities}} and {{Targets}} 2001-2020},
author = {{CARE (EU road accidents database)}}
}

323
talk-slides.tex Normal file
View File

@ -0,0 +1,323 @@
% $Header$
\documentclass[aspectratio=169]{beamer}
% This file is a solution template for:
% - Talk at a conference/colloquium.
% - Talk length is about 20min.
% - Style is ornate.
% Copyright 2004 by Till Tantau <tantau@users.sourceforge.net>.
%
% In principle, this file can be redistributed and/or modified under
% the terms of the GNU Public License, version 2.
%
% However, this file is supposed to be a template to be modified
% for your own needs. For this reason, if you use this file as a
% template and not specifically distribute it as part of a another
% package/program, I grant the extra permission to freely copy and
% modify this file as you see fit and even to delete this copyright
% notice.
\mode<presentation>
{
\usetheme[cd2018,beamerfonts,noddc,navbar]{tud}
% or ...
%\setbeamercovered{transparent}
% or whatever (possibly just delete it)
}
\usepackage[english]{babel}
% or whatever
\usepackage[latin1]{inputenc}
% or whatever
\usepackage{times}
\usepackage[T1]{fontenc}
% Or whatever. Note that the encoding and the font should match. If T1
% does not look nice, try deleting the line with the fontenc.
\usepackage{cite}
\usepackage{tikz}
\title[Pseudonym Schemes in ETSI V2X communication] % (optional, use only with long paper titles)
{An ETSI look at the State of the Art of pseudonym
schemes in Vehicle-to-Everything (V2X)
communication}
\subtitle
{Include Only If Paper Has a Subtitle}
\author
{Oliver Schmidt}
% - Give the names in the same order as the appear in the paper.
% - Use the \inst{?} command only if the authors have different
% affiliation.
\institute[] % (optional, but mostly needed)
{
Department of Computer Science\\
Technical University Dresden
}
\date[HSTS 2018] % (optional, should be abbreviation of conference name)
{Hauptseminar Technischer Datenschutz, 2018}
% - Either use conference name or its abbreviation.
% - Not really informative to the audience, more for people (including
% yourself) who are reading the slides online
\subject{Theoretical Computer Science}
% This is only inserted into the PDF information catalog. Can be left
% out.
% If you have a file called "university-logo-filename.xxx", where xxx
% is a graphic format that can be processed by latex or pdflatex,
% resp., then you can add a logo as follows:
% \pgfdeclareimage[height=0.5cm]{university-logo}{university-logo-filename}
% \logo{\pgfuseimage{university-logo}}
% Delete this, if you do not want the table of contents to pop up at
% the beginning of each subsection:
%\AtBeginSubsection[]
%{
% \begin{frame}<beamer>{Outline}
% \tableofcontents[currentsection,currentsubsection]
% \end{frame}
%}
% If you wish to uncover everything in a step-wise fashion, uncomment
% the following command:
%\beamerdefaultoverlayspecification{<+->}
\begin{document}
\begin{frame}
\titlepage
\end{frame}
\begin{frame}{Outline}
\tableofcontents
% You might wish to add the option [pausesections]
\end{frame}
% Structuring a talk is a difficult task and the following structure
% may not be suitable. Here are some rules that apply for this
% solution:
% - Exactly two or three sections (other than the summary).
% - At *most* three subsections per section.
% - Talk about 30s to 2min per frame. So there should be between about
% 15 and 30 frames, all told.
% - A conference audience is likely to know very little of what you
% are going to talk about. So *simplify*!
% - In a 20min talk, getting the main ideas across is hard
% enough. Leave out details, even if it means being less precise than
% you think necessary.
% - If you omit details that are vital to the proof/implementation,
% just say so once. Everybody will be happy with that.
\section{Motivation}
\subsection{Intelligent Transport Systems}
\begin{frame}{Intelligent Transportation Systems}{Network Communication for Increased Traffic Safety}
% - A title should summarize the slide in an understandable fashion
% for anyone how does not follow everything on the slide itself.
\begin{columns}
\begin{column}{0.47\textwidth}
\begin{itemize}
\item
\textbf{Vision Zero}: the aim of having no traffic-related fatalities\note{vision zero: late 90s, aim: no road traffic fatalities}
\item
includes shifting responsibility to infrastructure\note{paradigm shift}
\item
communication between safety assistance systems to increase safety
\item periodical broadcast of position and proximity
\end{itemize}
\end{column}
\begin{column}{0.5\textwidth}
\begin{figure}
\includegraphics[width=\textwidth]{figures/eu-fatalities-and-targets-2001-2020.jpg}
\nocite{careeuroadaccidentsdatabaseEUFatalitiesTargets}
\end{figure}
\end{column}
\end{columns}
\end{frame}
\subsection{ETSI ITS network architecture}
\begin{frame}{ETSI ITS network architecture}
\begin{itemize}
\item \textbf{E}uropean \textbf{T}elecommunications \textbf{S}tandards \textbf{I}nstitute
\item network technologies used in middle layers:
\begin{itemize}
\item GeoNetworking for geographical routing
\item BTP as transport protocol
\item IPv6 encapsulated in GeoNetworking
\end{itemize}
\end{itemize}
\end{frame}
\begin{frame}{Intelligent Transportation Systems}{Tracking in Vehicular Networks}
\begin{itemize}
\item problem: constant communication allows tracking of vehicles
\item \textit{linkability} of messages threat to \textit{location privacy}
\item linkable identifiers in messages:
\begin{itemize}
\item vehicle position
\item network addresses: IP, GeoNetworking, port numbers
\item certificates for message signing\note{for security purposes authenticity of messages needs to be ensured by asymmetric signing}
\item StationID
\item state residing in message queues, counters, \dots
\item message content left out of scope
\item \dots
\end{itemize}
\end{itemize}
\end{frame}
\section{Pseudonym Schemes}
\subsection{Pseudonym Schemes for ETSI ITS}
\begin{frame}{Pseudonym Schemes for ETSI ITS}
\only<2>{\begin{figure}
\includegraphics[width=0.7\textwidth]{figures/etsi-pki.png}
\end{figure}}
\begin{itemize}
\item<1,3-> basic idea: use temporary identifiers, change them simulataneously together
\item<1,3> divide knowledge about identities within a PKI
\item<3-> crucial operations: pseudonym issuance, use, change, revocation, resolution
\end{itemize}
\end{frame}
\begin{frame}{Pseudonym Change}
\begin{itemize}
\item requirements for an effective change strategy:
\begin{itemize}
\item other nodes present for ambiguity
\item coordinated change
\item random change frequency
\item all identifiers changed simulataneously, buffers flushed
\end{itemize}
\item Car-2-Car CC: divide trips into 3 segments
\item Mix Zones
\item Silent Periods
\end{itemize}
\end{frame}
\subsection{More Advanced Pseudonym Schemes}
\begin{frame}{Make Titles Informative.}
\end{frame}
\subsection{Evaluation}
\begin{frame}{Attacker Model}{Characteristics}
\center
\begin{tabular}{r | l}
\textbf{capability} & \\ \hline
reach & single-point/ multi-point/ global \\
authentication in network & insider/ outsider \\
activity & Dolev-Yao (active)/ passive
\end{tabular}
\end{frame}
\begin{frame}{Resilience Against Attacks}
\begin{tabular}{l | p{0.6\textwidth} }
\textbf{attacker} & \textbf{possible countermeasures} \\ \hline
multi-point passive outsider & 3-segment pseudonym change \\ \hline
global passive outsider & cooperative pseudonym change: silent periods or (cryptographic) mix zones \\ \hline
active insider & resistance against pseudonym depletion (e.g. pseudonym reuse) \\ \hline
attacking infrastructure & frequent cooperative pseudonym change with real silent periods \\
\end{tabular}
\end{frame}
\section{Summary}
\begin{frame}{Summary}
% Keep the summary *very short*.
\begin{itemize}
\item
The \alert{first main message} of your talk in one or two lines.
\item
The \alert{second main message} of your talk in one or two lines.
\item
Perhaps a \alert{third message}, but not more than that.
\end{itemize}
% The following outlook is optional.
\vskip0pt plus.5fill
\begin{itemize}
\item
Outlook
\begin{itemize}
\item
Something you haven't solved.
\item
Something else you haven't solved.
\end{itemize}
\end{itemize}
\end{frame}
% All of the following is optional and typically not needed.
\appendix
\section<presentation>*{\appendixname}
\subsection<presentation>*{For Further Reading}
\begin{frame}[allowframebreaks]
\frametitle{Bibliography}
\bibliographystyle{IEEEtran}
\bibliography{mybib}
\end{frame}
\end{document}