Você está na página 1de 6

Department of CSE

Course title: research project


Course code: cse-5000
Research proposal on: Ecc based rfid mechanism for
vanet security

SUBMITTED BY SUBMITTED TO
Md. Habibur Rahman Dr. Mostofa Kamal Nasir
Associate professor
ID: CE-13038
Department OF CSE
Md. Misbahur Rahman
MBSTU
ID: CE-13021

4th YEAR 2nd SEMESTER

SESSION: 2012-2013

Department OF CSE
MBSTU
Abstract: A Vehicular Ad hoc Network (VANET) is a type of mobile Peer-To-Peer
wireless network that allows providing communication among nearby vehicles and between
vehicles and nearby fixed roadside equipment. With technological advancement, recent
VANET applications such as safe driving and emergency rescue often demand high position
accuracy. Unfortunately, conventional localization systems, e.g., GPS, hardly meet new
accuracy requirements. To overcome this limitation, an RFID-assisted localization system
can be used.
Radio-frequency identification (RFID) is the most important wireless communication
technologies used in the Internet of Things as it can store sensitive data, used for wireless
communication with other objects, and identify/track particular object automatically. To
provide better security and performance to RFID authentication scheme, Elliptic Curve
Cryptography is going to be used.
Elliptic curve cryptography (ECC) system is for provide suitable authentication RFID
system because it can provide similar security level but using a smaller key size and has low
computational system requirements.

Introduction: Thousands of people around the world die every year in road accidents
and many more are severely injured. Implementations of safety information such as speed
limits and road conditions are used in many parts of the world but still more work is
required. Vehicular Ad Hoc Networks (VANET) is used to collect and distribute safety
information to massively reduce the number of accidents by warning drivers about the
danger before they actually face it.
In a VANET, each vehicle is assumed to have an On-Board Unit (OBU) and there is Road-
Side Units (RSU) that is installed along the roads. A Trusted Authority (TA) and some other
application servers are installed in the back end. The OBUs and RSUs communicate using
the Dedicated Short Range Communications (DSRC) protocol over the wireless channel. The
RSUs, TA, and the application servers communicate by using a secure fixed network.

Figure 1: General VANET architecture


Many researches have been completed on VANET security, from these researches we have
conclude that the main security requirements are actual position detection of Vehicles, using
smaller key size, less computational power and low cost. From these above requirements we
are motivated to propose a new security system for VANET.
Radio-frequency identification (RFID) is a wireless communication technology that is
useful for precisely identifying objects. RFID technology uses the radio-frequency waves to
transfer identifying information between tagged objects and readers without line of sight
(LOS), providing an automatic identification system.

But when RFID scheme is used the data is in open space so there are possibility to hack the
data. It doesn’t provide proper security to your data that is either your personnel or financial
or for that system dealing with security. So the main requirement for this RFID is small
computational capacity system that have strong authentication and good performance.
Thus, we are going to use a new security system called ECC based RFID mechanism for
VANET security.

Literature Review:
[1]. Hein, D., Wolkerstorfer, J., Felber proposed that there are efficient implementations of
ECC based protocols on low cost RFID tags.
[2]. Lee, Y.K., Batina, L., Verbauwhede proposed that an ECC-based authentication RFID
protocol has been proposed. In this work the well-known Schnorr identification protocol was
modified so that the resulting protocol, named EC-RAC (Elliptic Curve Based Randomized
Access Control) it could satisfy the untraceability property.
[3].Bringer, J., Chabanne, H., Icart, proposed that this protocol is vulnerable to tracking
attacks and replay attacks.
[4].Godor and Imre proposed an ECC-based RFID scheme using a simplified version of
ElGamal scheme and Elliptic Curve Digital Signature Algorithm (ECDSA), the use of a
Public-Key Infrastructure (PKI) is assumed in their scheme. However, both of the two
operations are quite complex. For example, the verification algorithm in the ECDSA needs at
least two elliptic curve point multiplications. Besides the hardware needed for elliptic curve
point operations, additional hardware is needed to support the two algorithms. Therefore, the
performance of their scheme is not suitable for practical applications and their scheme
cannot be applied to cheap RFID tags.
In addition, Godor and Imre’s scheme cannot withstand the replay attack because the tag
cannot check the freeness of the received message {rR, σS}. Therefore, their scheme is not
suitable for practical applications.
[5].Wang et al. proposed an ECC-based RFID authentication scheme using hash function
operations to get backward privacy. the computational workload of the searching algorithm
increases significantly with an increase in the number of tags making this scheme not
scalable and not suitable for practical
applications.
Besides, the tag in Wang et al.’s scheme cannot authenticate the backend server because it
receives only a random number sent by the back-end server. Therefore,[6] Zhang et al.’s
schemes cannot provide mutual authentication.
[7].Parisa Babaheidarian, Mahshid Delavar, Javad Mohajeri proposed an ECC-based RFID
authentication protocols, namely the improved Schnorr protocol and the improved EC-RAC
protocol do not satisfy the claimed properties as these protocols provide only a one-way
authentication. These protocols can not remove impersonation attack and the tracing attack
and therefore not able to overcome their privacy vulnerabilities.

[8]. Rukaiya Shaikh and Disha Deotale proposed a replica server to solve main server
problems but this leads to an ambiguity situation as vehicle can not decide whether it should
communicate with main server or replica server.

Problem Statement: We have read several papers. From these papers we have
identified some problems. Those problems are given below:
1). Does RFID use larger key size in data encryption and decryption?
2). Does RFID consume high computational power?
3). Is there possibility to hack the data as when RFID scheme is used the data is in open
space?
4). Can a tracking attacker eavesdrop message exchanges in different parts of a network in
RFID system?
5). Is the attacker able to link different message exchanges of the same user and hence track
the user in RFID system?

Goal: The main goal of our research is to provide small computational capacity, strong
authentication, good performance, to overcome the authentication delay and improving the
security issue in VANET.

Objectives: The objectives of our research include the following facts:


1).ECC based RFID system provides same security level using the smaller key size.
2). The low processing associated with ECC authentication scheme is to make suitable for
use with RFID tags because they have consuming limited computing power.
3).There are two types of attack in vanet security namely active attack and passive attack. A
passive attacker only eavesdrops the messages of the vehicles, while an active attacker can
send, modify, or delete messages. we can remove both of these two problems by using
encryption and decryption implemented by ECC based RFID.

Motivation: The main motivation of this research is to enhance traffic safety, traffic
efficiency, give assistance to drivers, and the possibility of infotainment applications in
vanet. The vehicles exchange messages regularly with each other and with the infrastructure
using wireless communication to achieve the main goals such as safer roads. The most
relevant problem to this dissertation is that the privacy of the drivers of the vehicles can be
violated. This vulnerability is analyzed in general an attacker can achieve her goals by
tampering the OBU, an RSU, sensor readings, or the wireless channel. Traditional
mechanisms cannot deal with the vulnerabilities discussed above because of the new
challenges in VANETs. Another problem related to the wireless communication is that while
the nodes are relaying messages, attackers can modify them. This is called In-Transit Traffic
Tampering.
Radio Frequency Identification (RFID) systems are becoming popular due to their vast
applications like supply chains, inventory, tolling, baggage management, access control,
medical, financial etc. By use these technology not only improve our lives but they also
cause of privacy risk .
RFID technology attracts a lot of attention in recent years because of it large convergence of
lower cost and the increased capabilities of RFID keys .
Elliptical curve cryptography (ECC) is based on a public key cryptosystem based system
that is on elliptic curve theory. Elliptic Curve Cryptography can be used to create smaller,
faster, and more efficient cryptographic keys ECC based RFID authentication protocol is one
of the first published and implemented asymmetric-key RFID protocols based on ECC for
providing private tag authentication. This protocol was designed to provide anonymity and
untraceability.

Significance: Elliptic curve Cryptography authentication scheme offers considerably


greater data security for a given key size. If the key size is smaller it is also possible to
implement for a given level of security so that it consume less power and less heat
production. The smaller key size makes faster cryptographic operations, running on smaller
chip and on more compact software. So for data security ECC is the great choice for several
reasons such as ECC provide great security of given key size. By using smaller keys it make
more compact implementation, fast cryptographic operations. Less heat production and less
power consumption. In ECC, there are efficient and compact hardware implementation .It is
practically impossible to find private key so it is not possible for third party to obtain the
secret.

Gantt Chart:
References:
[1].Hein, D., Wolkerstorfer, J., Felber, N.: ECC is Ready for RFIDA Proof
in Silicon. Selected Areas in Cryptography. pp. 401-413 (2009).

[2]. Lee, Y.K., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP based
randomized access control): Provably secure RFID authentication
protocol. RFID, 2008 IEEE International Conference on. pp. 97-104(2008).

[3]. Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID
identification protocol. Cryptology and Network Security. pp. 149-161(2008).

[4]. G. Godor and S. Imre, “Elliptic curve cryptography based authentication protocol for
low-cost RFID tags,”in Proc. IEEE Int. Conf. RFID-Technol. Appl., 2011, pp. 386–393.

[5]. S. Wang, S. Liu, and D. Chen, “Analysis and construction of efficient RFID
authentication protocol with backward p.

[6]. Z. Zhang and Q. Qi, “An efficient RFID authentication protocol to enhance patient
medication safety using elliptic curve cryptography,”J. Med. Syst., vol. 38, no. 5, 2014, doi:
10.1007/s10916-014-0047-8.

[7]. Parisa Babaheidarian, Mahshid Delavar, Javad Mohajeri “On the Security of an ECC
Based RFID Authentication Protocol” 2012 9th International ISC Conference on Information
Security and Cryptology.

[8].Rukaiya Shaikh and Disha Deotale “ Security and Authentication Process using ECC in
VANET” International Journal of Advance Research in Computer Science and Management
Studies, Volume 3, Issue 5, May 2015, pg. 156-166 .

Você também pode gostar