[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Trusted FPGA‐based transport traffic inject, impersonate (I2) attacks beaconing in the Internet of Vehicles

Published: 01 May 2019 Publication History

Abstract

Internet of Things assisted vehicular ad‐hoc network VANET (I‐VANET) is one of the preferred technologies to provide fast and reliable communication in smart transportation systems. With the goal of preserving security, I‐VANET is characterised by field‐programmable gate array‐based remote dynamic partial reconfiguration (RDPR) and security providing entity as a washable physical unclonable function (WPUF). In this specific work, an efficient WPUF‐based unknown authentication scheme is proposed to identify and avoid malicious vehicles entering into the I‐VANET. In addition to that, the proposed work provides a conditional tracing mechanism to hint the vehicles or roadside units that misuse the I‐VANET. This system reveals the malicious vehicles to efficiently provide conditional privacy through I‐VANET, by enabling a situation where the entities are unknown to each other until they depart from the network. Finally, I2 attacks were analysed from possible attacks that can emanate from the availability of RDPR at I‐VANET nodes, and WPUF circuit was used to prevent such attacks. The proposed WPUF‐based authentication scheme takes only around 120 ms for verifying 100 tokens but other conventional techniques take >900 ms for verifying 100 tokens.

6 References

[1]
Lu, R., Lin, X., Luan, T.H. et al: ‘Anonymity analysis on social spot‐based pseudonym changing for location privacy in VANETs’. Proc. IEEE ICC, Kyoto, Japan, June 2011, pp. 1–5
[2]
Wollinger, T., Guajardo, J., Paar, C.: ‘Security on FPGAs: state‐of‐the‐art implementations and attacks’, ACM Trans. Embedded Comput. Syst., 2004, 3, (3), pp. 534–574
[3]
Gubbi, J., Buyya, R., Marusic, S. et al: ‘Internet of things (IoT): a vision, architectural elements and future directions’. Future Gener. Comput. Syst., 2013, 29, (7), pp. 1645–1660
[4]
Dhamgaye, A., Chavhan, N.: ‘Survey on security challenges in VANET’, Int. J. Comput. Sci. Netw., 2013, 2, (1), pp. 88–96
[5]
Osch, C.B., Gujardo, J., Sadeghi, A.R. et al: ‘Efficient helper data key extractor on FPGAs’. Proc., ser. CHES'08, Washington D.C., USA, 2008, pp. 181–197
[6]
Jung, C.D., Sur, C., Park, Y. et al: ‘A robust conditional privacy preserving authentication protocol in VANET’. Proc. Social Informatics and Telecommunication Engineering, Belgium, 2009, pp. 35–45. https://doi.org/10.10007/978-3-64204434-2_4
[7]
Zhu, H., Lin, X., Lu, R. et al: ‘AEMA: an aggregated emergency message authentication scheme for enhancing the security of vehicular Ad Hoc networks’. 2008 IEEE Int. Conf. on Communications, Beijing, 2008, pp. 1436–1440
[8]
Raya, M., Papadimitrators, P., Hubaux, J.P.: ‘Securing vehicular communications’, IEEE Wirel. Commun., 2006, 13, (5), pp. 8–15
[9]
Van Dijk, M., Reuhrmair, U.: ‘Physical unclonable function in cryptographic protocols: security proofs and impossibility results’, IACR Cryptography e‐Print Archive, 2012, p. 228
[10]
Uckelmann, D. et al: ‘An architectural approach towards the future internet of things’ (Springer, Berlin, Germany, 2011)
[11]
Lai, V., Diessel, O.: ‘ICAP‐I: a reusable interface for the internal reconfiguration of Xilinx FPGAs’. 2009 Int. Conf. on Field‐Programmable Technology, Sydney, NSW, 2009, pp. 357–360
[12]
Sharma, K., Raju, G., Varma, G.: ‘A review of FPGA implementation of internet of things’, Int. J. Sci. Eng. Res., 2017, 8, (4)
[13]
Xiao, K., Tehranipoor, M.: ‘BISA: built‐in self‐authentication for preventing hardware Trojan insertion’. 2013 IEEE Int. Symp. on Hardware‐Oriented Security and Trust (HOST), Austin, TX, 2013, pp. 45–50
[14]
Johnson, P., Chakraborty, R.S., Mukhopadyay, D. et al: ‘Fault attack on AES via hardware trojan insertion by dynamic partial reconfiguration of FPGA over Ethernet’. Proc. 9th Workshop Embedded System Security, India, 2014, pp. 1–8
[15]
Lu, R., Lin, X., Luan, T.H.: ‘Pseudonym changing at social spots: an effective strategy for location privacy in VANETs’, IEEE Trans. Veh. Technol., 2012, 61, (1), pp. 86–96
[16]
Reuhrmair, U., Sehnke, F., Seolter, J. et al: ‘Modeling attacks on physical unclonable functions’. Proc. 17th ACM Conf. on Computer Communication Security, Chicago, IL, USA, 2010, pp. 237–249
[17]
Guajardo, J., Kumar, S.S., Schrijen, G.J. et al: ‘FPGA intrinsic PUFs and their use for IP protection’. CHES 2007, Vienna, Austria, 2007 (LNCS, 4727), pp. 63–80
[18]
Rhrmair, U., Jaeger, C., Algasinger, M.: ‘An attack on PUF‐based session key exchange and a hardware‐based countermeasure: erasable PUFs’. Financial Cryptography and Data security, ser. LNCS, 2012, vol. 7035, pp. 190–204
[19]
Rhrmair, U., Busch, H., Katzenbeisser, S.: ‘Strong PUFs: models, constructions and security proofs’. Towards Hardware‐Intrinsic Security, ser. Information Security and Cryptography, 2010, pp. 79–96
[20]
Lin, X., Lu, R., Zhang, C. et al: ‘Security in vehicular ad hoc networks’, IEEE Commun. Mag., 2008, 46, (4), pp. 88–95
[21]
Satheesh Kumar, J., Saravana Kumar, G., Ahilan, A.: ‘High performance decoding aware FPGA bit‐stream compression using RG codes’, Cluster Comput., 2018, pp. 1–5 early access https://doi.org/10.1007/s10586-018-2486-3
[22]
Azees, M., Vijayakumar, P., Deboarh, L.J.: ‘Efficient anonymous authentication with conditional privacy‐preserving scheme for vehicular ad‐hoc networks’, IEEE Trans. Intell. Transp. Syst., 2017, 18, (9), pp. 2467–2476
[23]
Ahilan, A., Deepa, P.: ‘Design for built‐in FPGA reliability via fine‐grained 2‐D error correction codes’, Microelectron. Reliab., 2015, 55, (9‐10), pp. 2108–2112
[24]
Wang, L., Liu, X.: ‘NOTSA: novel OBU with three‐ level security architecture for internet of vehicles’, IEEE Internet Things J., 2018, 3, (5), pp. 1–12
[25]
Ahilan, A., Deepa, P.: ‘Radiation induced multiple bit upset prediction and correction in memories using cost efficient CMC’, J. Microelectron., Electron. Compon. Mater., 2016, 46, (4), pp. 257–266
[26]
Ahilan, A., Deepa, P.: ‘Modified decimal matrix codes in FPGA configuration memory for multiple bit upsets’. 2015 Int. Conf. on Computer Communication and Informatics (ICCCI), Coimbatore, India, 2015, pp. 1–5
[27]
Ahilan, A., Deepa, P.: ‘Improving lifetime of memory devices using evolutionary computing based error correction coding’. Computational Intelligence, Cyber Security and Computational Models, Coimbatore, India, 2016, pp. 237–245
[28]
Ahilan, A., James, E.A.K.: ‘Design and implementation of real time car theft detection in FPGA’. 2011 Third Int. Conf. on Advanced Computing, Chennai, 2011, pp. 353–358
[29]
Prathiba, G., Santhi, M., Ahilan, A.: ‘Design and implementation of reliable flash ADC for microwave applications’, Microelectron. Reliab., 2018, 88–90, pp. 91–97
[30]
Sivasankari, B., Ahilan, A., Jothin, R. et al: ‘Reliable N sleep shuffled phase damping design for ground bouncing noise mitigation’, Microelectron. Reliab., 2018, 88–90, pp. 1316–1321

Cited By

View all
  • (2024)Dynamic task offloading and collaborative task execution using three tier edge cloud computing (T2EC2) system for autonomous vehiclesJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-22097046:2(5415-5427)Online publication date: 14-Feb-2024
  • (2023)Towards a Greener and Fairer Transportation System: A Survey of Route Recommendation TechniquesACM Transactions on Intelligent Systems and Technology10.1145/362782515:1(1-57)Online publication date: 19-Dec-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IET Networks
IET Networks  Volume 8, Issue 3
May 2019
75 pages
EISSN:2047-4962
DOI:10.1049/ntw2.v8.3
Issue’s Table of Contents

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 01 May 2019

Author Tags

  1. field programmable gate arrays
  2. data privacy
  3. telecommunication security
  4. vehicular ad hoc networks

Author Tags

  1. WPUF‐based authentication scheme
  2. trusted FPGA‐based transport traffic inject
  3. ad‐hoc network VANET
  4. smart transportation systems
  5. field‐programmable gate array‐based remote dynamic partial reconfiguration
  6. washable physical unclonable function
  7. efficient WPUF‐based unknown authentication scheme
  8. malicious vehicles
  9. roadside units
  10. I‐VANET nodes

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Dynamic task offloading and collaborative task execution using three tier edge cloud computing (T2EC2) system for autonomous vehiclesJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-22097046:2(5415-5427)Online publication date: 14-Feb-2024
  • (2023)Towards a Greener and Fairer Transportation System: A Survey of Route Recommendation TechniquesACM Transactions on Intelligent Systems and Technology10.1145/362782515:1(1-57)Online publication date: 19-Dec-2023

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media