kth.sePublications
Change search
Link to record
Permanent link

Direct link
Alternative names
Publications (10 of 24) Show all publications
Khodaei, M., Noroozi, H. & Papadimitratos, P. (2023). SECMACE+: Upscaling Pseudonymous Authentication for Large Mobile Systems. IEEE Transactions on Cloud Computing, 11(3), 3009-3026
Open this publication in new window or tab >>SECMACE+: Upscaling Pseudonymous Authentication for Large Mobile Systems
2023 (English)In: IEEE Transactions on Cloud Computing, ISSN 2168-7161, Vol. 11, no 3, p. 3009-3026Article in journal (Refereed) Published
Abstract [en]

The central building block of secure and privacy-preserving Vehicular Communication (VC) systems is a Vehicular Public Key Infrastructure (VPKI), which provides vehicles with multiple anonymized credentials, termed pseudonyms. These pseudonyms are used to ensure VC message authenticity and integrity while preserving vehicle (thus passenger) privacy. In the light of emerging large-scale multi-domain VC environments, the efficiency of the VPKI and, more broadly, its scalability are paramount. By the same token, preventing misuse of the credentials, in particular, Sybil-based misbehavior, and managing "honest-but-curious" VPKI entities are other facets of a challenging problem. In this paper, we leverage the state-of-the-art VPKI system and enhance its functionality towards a highly-available, dynamically-scalable, and resilient design; this ensures that the system remains operational in the presence of benign failures or resource depletion attacks, and that it dynamically scales out, or possibly scales in, according to request arrival rates. Our full-blown implementation on the Google Cloud Platform shows that deploying large-scale and efficient VPKI can be cost-effective: the processing latency to issue 100 pseudonyms is approximately 56 ms. More so, our experiments show that our VPKI system dynamically scales out or scales in according to the rate of pseudonyms requests. We formally assess the achieved security and privacy properties for the credential acquisition process. Overall, our scheme is a comprehensive solution that complements standards and can catalyze the deployment of secure and privacy-protecting VC systems.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
Keywords
Availability, cloud computing, communication system security, connected vehicles, privacy, public key infrastructure, scalability, vehicular ad hoc networks
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-338167 (URN)10.1109/TCC.2023.3250584 (DOI)001063436300055 ()2-s2.0-85149426050 (Scopus ID)
Note

Not duplicate with DiVA 974407

QC 20231016

Available from: 2023-10-16 Created: 2023-10-16 Last updated: 2023-10-16Bibliographically approved
Kalogiannis, K., Khodaei, M., Bayaa, W. M. & Papadimitratos, P. (2022). Attack Impact and Misbehavior Detection in Vehicular Platoons. In: Proceedings of the 15th ACMConference on Security and Privacy in Wireless and Mobile Networks (WiSec’22): . Paper presented at WiSeC '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, May 16–19, 2022, San Antonio, TX, USA. (pp. 45-59). New York, USA: ACM Digital Library
Open this publication in new window or tab >>Attack Impact and Misbehavior Detection in Vehicular Platoons
2022 (English)In: Proceedings of the 15th ACMConference on Security and Privacy in Wireless and Mobile Networks (WiSec’22), New York, USA: ACM Digital Library, 2022, p. 45-59Conference paper, Published paper (Refereed)
Abstract [en]

Cooperative Adaptive Cruise Control (CACC), a promising Vehicular Ad-hoc Network (VANET) application, automates transportation and improves efficiency. Vehicles form a platoon, following a leader, with their controllers automatically adjusting velocity, based on messages by other vehicles, to keep appropriate distances for safety. Towards deploying secure CACC, several proposals in academia and standardization leave significant questions unanswered. Thwarting adversaries is hard: cryptographic protection ensures access control (authentication and authorization) but falsified kinematic information by faulty insiders (platoon members with credentials, even the platoon leader) can cause platoon instability or vehicle crashes. Filtering out such adversarial data is challenging (computational cost and high false positive rates) but, most important, state-of-the-art misbehavior detection algorithms completely fail during platoon maneuvering. In this paper, we systematically investigate how and to what extent controllers for existing platooning applications are vulnerable, mounting a gamut of attacks, ranging from falsification attacks to jamming and collusion;  including two novel attacks during maneuvering. We show how the existing middle-join and leave processes are vulnerable to falsification or 'privilege escalation' attacks. We mitigate such vulnerabilities and enable vehicles joining and exiting from any position (middle-join and middle-exit). We propose a misbehavior detection system that achieves an F1 score of ≈87 on identifying attacks throughout the lifetime of the platoon formation, including maneuvers. Our cyberphysical simulation framework can be extended to assess any other driving automation functionality in the presence of attackers.

Place, publisher, year, edition, pages
New York, USA: ACM Digital Library, 2022
Keywords
Falsification Attacks, Connected Vehicles, Internal Adversaries, Platoon Maneuvers, Misbehavior Detection, Hidden Markov Models
National Category
Computer Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-313167 (URN)10.1145/3507657.3528552 (DOI)000927874700009 ()2-s2.0-85130797516 (Scopus ID)
Conference
WiSeC '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, May 16–19, 2022, San Antonio, TX, USA.
Note

Part of proceedings ISBN 978-1-4503-9216-7

QC 20220629

Available from: 2022-06-01 Created: 2022-06-01 Last updated: 2023-03-20Bibliographically approved
Khodaei, M. & Papadimitratos, P. (2021). Cooperative Location Privacy in Vehicular Networks: Why Simple Mix-zones are not Enough. IEEE Internet of Things Journal, 8(10), 7985-8004
Open this publication in new window or tab >>Cooperative Location Privacy in Vehicular Networks: Why Simple Mix-zones are not Enough
2021 (English)In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 8, no 10, p. 7985-8004Article in journal (Refereed) Published
Abstract [en]

Vehicular communications disclose rich information about the vehicles and their whereabouts. Pseudonymous authentication secures communication while enhancing user privacy. To enhance location privacy, cryptographic mix zones were proposed to facilitate vehicles covertly transition to new ephemeral credentials. The resilience to (syntactic and semantic) pseudonym linking (attacks) highly depends on the geometry of the mix zones, mobility patterns, vehicle density, and arrival rates. We introduce a tracking algorithm for linking pseudonyms before and after a cryptographically protected mix zone. Our experimental results show that an eavesdropper, leveraging standardized vehicular communication messages and road layout, could successfully link ≈73% of pseudonyms during nonrush hours and ≈62% of pseudonyms during rush hours after vehicles change their pseudonyms in a mix zone. To mitigate such inference attacks, we present a novel cooperative mix zone scheme that enhances user privacy regardless of the vehicle mobility patterns, vehicle density, and arrival rate to the mix zone. A subset of vehicles, termed relaying vehicles, is selected to be responsible for emulating nonexisting vehicles. Such vehicles cooperatively disseminate decoy traffic without affecting safety-critical operations: with 50% of vehicles as relaying vehicles, the probability of linking pseudonyms (for the entire interval) drops from ≈68% to ≈18%. On average, this imposes 28 ms extra computation overhead, per second, on the roadside unit (RSU) and 4.67 ms extra computation overhead, per second, on the (relaying) vehicle side; it also introduces 1.46 kB/s extra communication overhead by (relaying) vehicles and 45 kB/s by RSUs for the dissemination of decoy traffic. Thus, user privacy is enhanced at the cost of low computation and communication overheads.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
Keywords
Anonymity, Location Privacy, Mix Networks, Privacy, Pseudonymity, VANETs., Vehicular Communication, Cryptography, Privacy by design, Roads and streets, Safety engineering, Semantics, Communication overheads, Cooperative locations, Critical operations, Extra computations, Inference attacks, Tracking algorithm, Vehicular communications, Vehicular networks, Road vehicles
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-290827 (URN)10.1109/JIOT.2020.3043640 (DOI)000648206800016 ()2-s2.0-85097953773 (Scopus ID)
Note

QC 20250429

Available from: 2021-03-23 Created: 2021-03-23 Last updated: 2025-04-29Bibliographically approved
Khodaei, M. & Papadimitratos, P. (2021). Scalable & Resilient Vehicle-Centric Certificate Revocation List Distribution in Vehicular Communication Systems. IEEE Transactions on Mobile Computing, 20(7), 2473-2489
Open this publication in new window or tab >>Scalable & Resilient Vehicle-Centric Certificate Revocation List Distribution in Vehicular Communication Systems
2021 (English)In: IEEE Transactions on Mobile Computing, ISSN 1536-1233, E-ISSN 1558-0660, Vol. 20, no 7, p. 2473-2489Article in journal (Refereed) Published
Abstract [en]

In spite of progress in securing Vehicular Communication (VC) systems, there is no consensus on how to distribute Certificate Revocation Lists (CRLs). The main challenges lie exactly in (i) crafting an efficient and timely distribution of CRLs for numerous anonymous credentials, pseudonyms, (ii) maintaining strong privacy for vehicles prior to revocation events, even with honest-but-curious system entities, (iii) and catering to computation and communication constraints of on-board units with intermittent connectivity to the infrastructure. Relying on peers to distribute the CRLs is a double-edged sword: abusive peers could "pollute" the process, thus degrading the timely CRLs distribution. In this paper, we propose a vehicle-centric solution that addresses all these challenges and thus closes a gap in the literature. Our scheme radically reduces CRL distribution overhead: each vehicle receives CRLs corresponding only to its region of operation and its actual trip duration. Moreover, a "fingerprint" of CRL 'pieces' is attached to a subset of (verifiable) pseudonyms for fast CRL 'piece' validation (while mitigating resource depletion attacks abusing the CRL distribution). Our experimental evaluation shows that our scheme is efficient, scalable, dependable, and practical: with no more than 25 KB/s of traffic load, the latest CRL can be delivered to 95% of the vehicles in a region (15 x 15 KM) within 15s, i.e., more than 40 times faster than the state-of-the-art. Overall, our scheme is a comprehensive solution that complements standards and can catalyze the deployment of secure and privacy-protecting VC systems.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
Keywords
Vehicular Communications, VANETs, Vehicular PKI, Certificate Revocation, CRL Distribution, Security, Privacy, Efficiency
National Category
Communication Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-271703 (URN)10.1109/TMC.2020.2981887 (DOI)000658333000011 ()2-s2.0-85107536378 (Scopus ID)
Note

QC 20210720

Available from: 2020-04-05 Created: 2020-04-05 Last updated: 2023-10-16Bibliographically approved
Molloy, P., Khodaei, M., Hallgren, P., Thenorio, A. & Papadimitratos, P. (2021). SecProtobuf: Implicit Message Integrity Provision in Heterogeneous Vehicular Systems. In: Kargl, F Altintas, O Sommer, C Higuchi, T Klingler, F (Ed.), 2021 IEEE Vehicular Networking Conference (VNC): . Paper presented at 13th IEEE Vehicular Networking Conference (IEEE VNC), NOV 10-12, 2021, ELECTR NETWORK (pp. 190-193). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>SecProtobuf: Implicit Message Integrity Provision in Heterogeneous Vehicular Systems
Show others...
2021 (English)In: 2021 IEEE Vehicular Networking Conference (VNC) / [ed] Kargl, F Altintas, O Sommer, C Higuchi, T Klingler, F, Institute of Electrical and Electronics Engineers (IEEE) , 2021, p. 190-193Conference paper, Published paper (Refereed)
Abstract [en]

Novel vehicular applications, such as remote driving, platooning, and autonomous driving systems are increasing the complexity of networked vehicular systems. These Vehicle-toVehicle (V2V) and Vehicle-to-Infrastructure (V2I) (V2X) use-cases require strong security (and privacy) guarantees, authentication, integrity, and non-repudiation. Standardization bodies and harmonization efforts provide complex data structures for basic safety messages, mandated to be digitally signed and validated. Due to the complex data structures, the multiplicity of use-cases, the rapid deployment, as well as the need for interoperability among Original Equipment Manufacturers (OEMs), developing the code needed to provide security becomes a more challenging, error prone, and time consuming task; even more so as the scale of Vehicular Communication (VC) systems grow. In order to tackle this challenge, we propose SecProtobuf, a novel security framework to automate the signature generation and validation procedures for any VC safety and non-safety data structures. Our framework facilitates the serialisation and deserialisation processes for arbitrarily complex data types, thus, mitigating potential security defect risks and catalyzing the deployment. In order to ensure the correct usage of the framework by developers, SecProtobuf is provided with a static code analysis (linter).

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
Series
IEEE Vehicular Networking Conference, ISSN 2157-9857
Keywords
Automatic Integrity Checks, Code-generation
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-310265 (URN)10.1109/VNC52810.2021.9644658 (DOI)000758412900040 ()2-s2.0-85123755527 (Scopus ID)
Conference
13th IEEE Vehicular Networking Conference (IEEE VNC), NOV 10-12, 2021, ELECTR NETWORK
Note

QC 20220328

Part of proceedings: ISBN 978-1-6654-4450-7

Available from: 2022-03-28 Created: 2022-03-28 Last updated: 2024-03-18Bibliographically approved
Khodaei, M. & Papadimitratos, P. (2019). A Cooperative Location Privacy Protection Scheme for Vehicular Ad-hoc Networks. Stockholm, Sweden
Open this publication in new window or tab >>A Cooperative Location Privacy Protection Scheme for Vehicular Ad-hoc Networks
2019 (English)Report (Other academic)
Place, publisher, year, edition, pages
Stockholm, Sweden: , 2019. p. 1
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-253011 (URN)
Note

QC 20190611

Available from: 2019-06-11 Created: 2019-06-11 Last updated: 2022-06-26Bibliographically approved
Khodaei, M., Noroozi, H. & Papadimitratos, P. (2019). Scaling Pseudonymous Authentication for Large Mobile Systems. In: WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks: . Paper presented at 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019; Miami; United States; 15 May 2019 through 17 May 2019 (pp. 174-185). Miami, FL, USA
Open this publication in new window or tab >>Scaling Pseudonymous Authentication for Large Mobile Systems
2019 (English)In: WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks, Miami, FL, USA, 2019, p. 174-185Conference paper, Published paper (Refereed)
Abstract [en]

The central building block of secure and privacy-preserving Vehicular Communication (VC) systems is a Vehicular Public-Key Infrastructure (VPKI), which provides vehicles with multiple anonymized credentials, termed pseudonyms. These pseudonyms are used to ensure message authenticity and integrity while preserving vehicle (thus passenger) privacy. In the light of emerging large-scale multi-domain VC environments, the efficiency of the VPKI and, more broadly, its scalability are paramount. By the same token, preventing misuse of the credentials, in particular, Sybil-based misbehavior, and managing “honest-but-curious” insiders are other facets of a challenging problem. In this paper, we leverage the state-of-the-art VPKI system and enhance its functionality towards a highly-available, dynamically-scalable, and resilient design; this ensures that the system remains operational in the presence of benign failures or resource depletion attacks, and that it dynamically scales out, or possibly scales in, according to request arrival rates. Our full-blown implementation on the Google Cloud Platform shows that deploying large-scale and efficient VPKI can be cost-effective.

Place, publisher, year, edition, pages
Miami, FL, USA: , 2019
Keywords
VANETs, VPKI, Security, Privacy, Availability, Scalability, Resilient, Micro-service, Container Orchestration, Cloud.
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-253012 (URN)10.1145/3317549.3323410 (DOI)000477981300017 ()2-s2.0-85066733902 (Scopus ID)
Conference
12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019; Miami; United States; 15 May 2019 through 17 May 2019
Note

QC 20190619

Part of ISBN 978-1-4503-6726-4

Available from: 2019-06-11 Created: 2019-06-11 Last updated: 2024-10-22Bibliographically approved
Noroozi, H., Khodaei, M. & Papadimitratos, P. (2019). VPKIaaS: Towards Scaling Pseudonymous Authentication for Large Mobile Systems. Stockholm, Sweden
Open this publication in new window or tab >>VPKIaaS: Towards Scaling Pseudonymous Authentication for Large Mobile Systems
2019 (English)Report (Other academic)
Place, publisher, year, edition, pages
Stockholm, Sweden: , 2019. p. 1
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-253009 (URN)
Note

QC 20190611

Available from: 2019-06-11 Created: 2019-06-11 Last updated: 2024-03-18Bibliographically approved
Khodaei, M. & Papadimitratos, P. (2018). Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs. In: WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS. Paper presented at 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), JUN 18-20, 2018, Stockholm, SWEDEN (pp. 172-183). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs
2018 (English)In: WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, Association for Computing Machinery (ACM) , 2018, p. 172-183Conference paper, Published paper (Refereed)
Abstract [en]

In spite of progress in securing Vehicular Communication (VC) systems, there is no consensus on how to distribute Certificate Revocation Lists (CRLs). The main challenges lie exactly in (i) crafting an efficient and timely distribution of CRLs for numerous anonymous credentials, pseudonyms, (ii) maintaining strong privacy for vehicles prior to revocation events, even with honest-but-curious system entities, (iii) and catering to computation and communication constraints of on-board units with intermittent connectivity to the infrastructure. Relying on peers to distribute the CRLs is a double-edged sword: abusive peers could "pollute" the process, thus degrading the timely CRLs distribution. In this paper, we propose a vehicle-centric solution that addresses all these challenges and thus closes a gap in the literature. Our scheme radically reduces CRL distribution overhead: each vehicle receives CRLs corresponding only to its region of operation and its actual trip duration. Moreover, a "fingerprint" of CRL 'pieces' is attached to a subset of (verifiable) pseudonyms for fast CRL 'piece' validation (while mitigating resource depletion attacks abusing the CRL distribution). Our experimental evaluation shows that our scheme is efficient, scalable, dependable, and practical: with no more than 25 KB/s of traffic load, the latest CRL can be delivered to 95% of the vehicles in a region (50x50 KM) within 15s, i.e., more than 40 times faster than the state-of-the-art. Overall, our scheme is a comprehensive solution that complements standards and can catalyze the deployment of secure and privacy-protecting VC systems.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2018
Keywords
Vehicular Communications, VPKI, Revocation, CRL Distribution
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-303845 (URN)10.1145/3212480.3212481 (DOI)000456097500017 ()2-s2.0-85050915720 (Scopus ID)978-1-4503-5731-9 (ISBN)
Conference
11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), JUN 18-20, 2018, Stockholm, SWEDEN
Note

QC 20211024

Not duplicate with DiVA 1231581

Available from: 2021-10-24 Created: 2021-10-24 Last updated: 2022-06-25Bibliographically approved
Khodaei, M. & Papadimitratos, P. (2018). Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs. In: Proceedings of the ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec), Stockholm, Sweden, June 2018.: . Paper presented at The ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec), Stockholm, Sweden, June 2018..
Open this publication in new window or tab >>Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs
2018 (English)In: Proceedings of the ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec), Stockholm, Sweden, June 2018., 2018Conference paper, Published paper (Refereed)
Abstract [en]

In spite of progress in securing Vehicular Communication (VC) systems, there is no consensus on how to distribute Certificate Revocation Lists (CRLs). The main challenges lie exactly in (i) crafting an efficient and timely distribution of CRLs for numerous anonymous credentials, pseudonyms, (ii) maintaining strong privacy for vehicles prior to revocation events, even with honest-but-curious system entities, (iii) and catering to computation and communication constraints of on-board units with intermittent connectivity to the infrastructure. Relying on peers to distribute the CRLs is a double-edged sword: abusive peers could ‘‘pollute’’ the process, thus degrading the timely CRLs distribution. In this paper, we propose a vehicle-centric solution that addresses all these challenges and thus closes a gap in the literature. Our scheme radically reduces CRL distribution overhead: each vehicle receives CRLs corresponding only to its region of operation and its actual trip duration. Moreover, a ‘‘fingerprint’’ of CRL ‘pieces’ is attached to a subset of (verifiable) pseudonyms for fast CRL ‘piece’ validation (while mitigating resource depletion attacks abusing the CRL distribution). Our experimental evaluation shows that our scheme is efficient, scalable, dependable, and practical: with no more than 25 KB/s of traffic load, the latest CRL can be delivered to 95% of the vehicles in a region (50×50 KM) within 15s, i.e., more than 40 times faster than the state-of-the-art. Overall, our scheme is a comprehensive solution that complements standards and can catalyze the deployment of secure and privacy-protecting VC systems.

Keywords
Vehicular Communications, VPKI, Revocation, CRL Distribution
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-232024 (URN)
Conference
The ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec), Stockholm, Sweden, June 2018.
Note

QC 20180717

Available from: 2018-07-08 Created: 2018-07-08 Last updated: 2022-06-26Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-1778-1416

Search in DiVA

Show all publications