You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

361 lines
9.7 KiB

% $Header$
% use lualatex for compilation
\documentclass[aspectratio=169]{beamer}
% This file is a solution template for:
% - Talk at a conference/colloquium.
% - Talk length is about 20min.
% - Style is ornate.
% Copyright 2004 by Till Tantau <tantau@users.sourceforge.net>.
%
% In principle, this file can be redistributed and/or modified under
% the terms of the GNU Public License, version 2.
%
% However, this file is supposed to be a template to be modified
% for your own needs. For this reason, if you use this file as a
% template and not specifically distribute it as part of a another
% package/program, I grant the extra permission to freely copy and
% modify this file as you see fit and even to delete this copyright
% notice.
\mode<presentation>
{
\usetheme[cd2018,noddc,navbar,darktitlepage]{tud}
\usecolortheme{tud}
% or ...
%\setbeamercovered{transparent}
% or whatever (possibly just delete it)
}
% notes on 2nd screen:
\usepackage{pgfpages}
%\setbeameroption{show notes on second screen}
\usepackage[english]{babel}
% or whatever
\usepackage{ifluatex}
\ifluatex
\usepackage{fontspec}
\else
\usepackage[T1]{fontenc}
\usepackage[utf8]{inputenc}
% Or whatever. Note that the encoding and the font should match. If T1
% does not look nice, try deleting the line with the fontenc.
\fi
\usepackage{cite}
\title[Pseudonym Schemes in ETSI V2X communication] % (optional, use only with long paper titles)
{An ETSI look at the State of the Art of pseudonym
schemes in Vehicle-to-Everything (V2X)
communication}
\author
{Oliver Schmidt}
% - Give the names in the same order as the appear in the paper.
% - Use the \inst{?} command only if the authors have different
% affiliation.
\institute[] % (optional, but mostly needed)
{
Department of Computer Science\\
Technical University Dresden
}
\date[HSTS 2018] % (optional, should be abbreviation of conference name)
{Hauptseminar Technischer Datenschutz, 2018}
% - Either use conference name or its abbreviation.
% - Not really informative to the audience, more for people (including
% yourself) who are reading the slides online
\subject{Privacy}
% This is only inserted into the PDF information catalog. Can be left
% out.
% If you have a file called "university-logo-filename.xxx", where xxx
% is a graphic format that can be processed by latex or pdflatex,
% resp., then you can add a logo as follows:
% \pgfdeclareimage[height=0.5cm]{university-logo}{university-logo-filename}
% \logo{\pgfuseimage{university-logo}}
% Delete this, if you do not want the table of contents to pop up at
% the beginning of each subsection:
%\AtBeginSubsection[]
%{
% \begin{frame}<beamer>{Outline}
% \tableofcontents[currentsection,currentsubsection]
% \end{frame}
%}
% If you wish to uncover everything in a step-wise fashion, uncomment
% the following command:
%\beamerdefaultoverlayspecification{<+->}
\begin{document}
\maketitle
\begin{frame}{Outline}
\tableofcontents
% You might wish to add the option [pausesections]
\end{frame}
% Structuring a talk is a difficult task and the following structure
% may not be suitable. Here are some rules that apply for this
% solution:
% - Exactly two or three sections (other than the summary).
% - At *most* three subsections per section.
% - Talk about 30s to 2min per frame. So there should be between about
% 15 and 30 frames, all told.
% - A conference audience is likely to know very little of what you
% are going to talk about. So *simplify*!
% - In a 20min talk, getting the main ideas across is hard
% enough. Leave out details, even if it means being less precise than
% you think necessary.
% - If you omit details that are vital to the proof/implementation,
% just say so once. Everybody will be happy with that.
\section{Motivation}
\subsection{Intelligent Transport Systems}
\begin{frame}{Intelligent Transportation Systems}{Network Communication for Increased Traffic Safety}
% - A title should summarize the slide in an understandable fashion
% for anyone how does not follow everything on the slide itself.
\begin{columns}
\begin{column}{0.47\textwidth}
\begin{itemize}
\item
\textbf{Vision Zero}: the aim of having no traffic-related fatalities\note{vision zero: late 90s, aim: no road traffic fatalities}
\item
includes shifting responsibility to infrastructure\note{paradigm shift}
\item
communication between safety assistance systems to increase safety
\item periodical broadcast of position and proximity
\end{itemize}
\end{column}
\begin{column}{0.5\textwidth}
\begin{figure}
\includegraphics[width=\textwidth]{figures/eu-fatalities-and-targets-2001-2020.jpg}
\nocite{careeuroadaccidentsdatabaseEUFatalitiesTargets}
\end{figure}
\end{column}
\end{columns}
\end{frame}
\subsection{ETSI ITS network architecture}
\begin{frame}{ETSI ITS network architecture}
\begin{columns}
\begin{column}{0.49\textwidth}
\begin{itemize}
\item \textbf{E}uropean \textbf{T}elecommunications \textbf{S}tandards \textbf{I}nstitute
\item this survey: focus on network technologies used in middle layers:
\begin{itemize}
\item GeoNetworking for geographical routing
\item BTP as transport protocol
\item IPv6 encapsulated in GeoNetworking
\end{itemize}
\end{itemize}
\end{column}
\begin{column}{0.52\textwidth}
\includegraphics[width=\textwidth]{figures/schema_internet_communication.png}
\end{column}
\end{columns}
\end{frame}
\begin{frame}{Intelligent Transportation Systems}{Tracking in Vehicular Networks}
\begin{itemize}
\item problem: constant communication allows tracking of vehicles
\item \textit{linkability} of messages threat to \textit{location privacy}
\item linkable identifiers in messages:
\begin{itemize}
\item vehicle position
\item network addresses: IP, GeoNetworking, port numbers
\item certificates for message signing\note{for security purposes authenticity of messages needs to be ensured by asymmetric signing}
\item StationID
\item state residing in message queues, counters, \dots
\item message content left out of scope
\item \dots
\end{itemize}
\end{itemize}
\end{frame}
\section{Pseudonym Schemes}
\subsection{Pseudonym Schemes for ETSI ITS}
\begin{frame}{Pseudonym Schemes for ETSI ITS}
\only<2>{\begin{figure}
\includegraphics[width=0.7\textwidth]{figures/etsi-pki.png}
\end{figure}}
\begin{itemize}
\item<1,3-> basic idea: use temporary identifiers, change them periodically \& simultaneously together
\item<1,3> pseudonymity while maintaining authentication of vehicle node:
\begin{itemize}
\item<1,3> divide knowledge about identities within a PKI
\end{itemize}
\item<3-> crucial operations: pseudonym issuance, use, change, revocation, resolution
\end{itemize}
\end{frame}
\begin{frame}{Pseudonym Change}
\begin{itemize}
\item requirements for an effective change strategy:
\begin{itemize}
\item other nodes present for ambiguity
\item coordinated change
\item random change frequency
\item all identifiers changed simultaneously, buffers flushed
\end{itemize}
\item Car-2-Car CC: divide trips into 3 segments
\item Silent Periods
\item Mix Zones
\end{itemize}
\end{frame}
\subsection{More Advanced Pseudonym Schemes}
\begin{frame}{Advanced Cryptographic Pseudonym Schemes}
\begin{itemize}
\item ETSI standard uses PKI certificate-based pseudonyms
\item other approaches: \note{all of them have their challenges}
\begin{itemize}
\item identity-based cryptography
\item group signature schemes
\item symmetric MACs
\end{itemize}
\end{itemize}
\end{frame}
\subsection{Evaluation}
\begin{frame}{Attacker Model}{Characteristics}
\center
\begin{tabular}{r | l}
\textbf{capability} & \\ \hline
reach & single-point/ multi-point/ global \\
authentication in network & insider/ outsider \\
activity & Dolev-Yao (active)/ passive
\end{tabular}
\end{frame}
\begin{frame}{Resilience Against Attacks}
\begin{tabular}{l | p{0.6\textwidth} }
\textbf{attacker} & \textbf{possible countermeasures} \\ \hline
multi-point passive outsider & 3-segment pseudonym change \\ \hline
global passive outsider & cooperative pseudonym change: silent periods or (cryptographic) mix zones \\ \hline
active attacker & resistance against pseudonym depletion (e.g. pseudonym reuse) \\ \hline
attacking infrastructure & frequent cooperative pseudonym change with real silent periods \\
\end{tabular}
\end{frame}
\section{Summary}
\begin{frame}{Summary}
% Keep the summary *very short*.
\begin{itemize}
\item
ETSI ITS messages contain \alert{many potential linkable identifiers}.
\item
The \alert{PKI based pseudonym scheme} by ETSI \alert{lacks a change strategy, resilient resolution and advanced cryptography}.
\item
\alert{Other work} can provide these missing aspects, but \alert{needs to be integrated into the standard}.
\end{itemize}
% The following outlook is optional.
\vskip0pt plus.5fill
\begin{itemize}
\item
Outlook
\begin{itemize}
\item
Expanding and adjusting the ETSI standard.
\item
Look at linkability in lower network layers or applications.
\end{itemize}
\end{itemize}
\end{frame}
% All of the following is optional and typically not needed.
\appendix
\section<presentation>*{\appendixname}
\subsection<presentation>*{For Further Reading}
\begin{frame}[allowframebreaks]
\frametitle{References}
\bibliographystyle{IEEEtran}
\bibliography{mybib}
\end{frame}
\begin{frame}
\center\huge{Thank you for your attention!}
\includegraphics[height=0.5\textheight]{figures/nomnompingu.png}\tiny\footnote{CC-BY-SA 3.0 by Elektroll}
\end{frame}
\end{document}