WO2012007609A1 - System for securely communicating in a spontaneous self-managed ad-hoc vehicular network - Google Patents

System for securely communicating in a spontaneous self-managed ad-hoc vehicular network Download PDF

Info

Publication number
WO2012007609A1
WO2012007609A1 PCT/ES2011/000220 ES2011000220W WO2012007609A1 WO 2012007609 A1 WO2012007609 A1 WO 2012007609A1 ES 2011000220 W ES2011000220 W ES 2011000220W WO 2012007609 A1 WO2012007609 A1 WO 2012007609A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
module
nodes
key
certificates
Prior art date
Application number
PCT/ES2011/000220
Other languages
Spanish (es)
French (fr)
Inventor
Pino Caballero Gil
Candido Caballero Gil
Jezabel Molina Gil
Original Assignee
Universidad De La Laguna
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Universidad De La Laguna filed Critical Universidad De La Laguna
Publication of WO2012007609A1 publication Critical patent/WO2012007609A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/047Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
    • H04W12/0471Key exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Definitions

  • the present invention relates to a secure communications system in a spontaneous and self-managed ad-hoc vehicular (or VANET) network.
  • the invention is applicable in the field of telecommunications, especially in mobile and wireless communications between vehicles.
  • the present invention relates to the security of communications in ad-hoc vehicular networks or VANETs (Vehicular Ad-hoc NETworks).
  • VANETs Vehicle Ad-hoc NETworks
  • the messages exchanged between the vehicles will influence the behavior of their drivers as they, for example, will reduce speed and / or choose alternative routes based on the information received. Any malicious user could try to exploit this situation, carrying out any of the following attacks:
  • VANETs [IEEE 802.1 lp WAVE (Wireless Access for Vehicular Environments, http://grouper.ieee.org/groups/802/ll/Reports)] that is being developed by the consortium Car-2-Car (http://www.car-to-car.org), presupposes that VANETs will combine several wireless technologies such as Cellular, Satellite, WiMAX (Woridwide Interoperability for Microwave ACCess, http: //www.ieee802. org / 16) and DSR (Dedicated Short Rangé) communications.
  • CALM architecture Communication Extensions, Air interface, Long and Medium range, http://www.isotc204wgl6.org/concept
  • ISO International Organization for Standard dizatiori
  • ITSs Intelligent Transportation Systems
  • WAVE Wireless Fidelity
  • UMTS Universal Mobile Telecommunications System
  • WiMAX Wireless Fidelity
  • RFID Radio Frequency IDentification
  • IEEE 802.11, 802.1 lp, 802.15, 802.16e, 802.20, 2G / 3G / 4G mobile telephony, and national ITSs such as IEEE 802.11, 802.1 lp, 802.15, 802.16e, 802.20, 2G / 3G / 4G mobile telephony, and national ITSs.
  • Patents include the following documents related to VANETs.
  • US2008002635 and US2008002574 propose a method to manage communications traffic, measuring local levels and defining a microutility of the data to be transmitted to select the transmission medium.
  • US20080279141 describes a method of assigning channels to multihop communications between one node and another, for sending information via routing.
  • WO2008104673 proposes the estimation of the density of nodes by dividing them into geographic cells in which the node closest to the center is responsible for adding and retransmitting the information.
  • WO2009024945 describes a method for synchronizing radio-communicated devices by means of periodic beacons that include clock signals.
  • WO2009053657 proposes that in the intersections of roads the diffusion of information is carried out through a node chosen within a group based on the estimated time to reach the intersection.
  • WO2010020260 presents a method for sending information from a source node to a destination node by routing through intermediate nodes.
  • a secure communications system in a spontaneous and self-managed vehicular ad hoc network comprising:
  • - a module containing client / server architecture with the possibility of connecting to multiple users at the same time; - a module for multicast sending and wireless reception of beacons with variable pseudonyms;
  • node reputation module which deletes dishonest nodes from stores, by erasing their public key from certificate stores;
  • the invention avoids the need to install any type of infrastructure either in the vehicle or on the road, which implies savings in economic investment and in waiting time for the development of the multiple applications of vehicle networks, allowing to put VANETs are underway without any investment from governments, car companies or telephone companies.
  • a secure communications system is presented here in a spontaneous and self-managed vehicular ad-hoc network, without infrastructures either on the road or in vehicles, using only mobile devices with a receiver of a global satellite navigation system, and wireless and wireless communication capability.
  • computing such as mobile phones, PDAs and laptops.
  • the mode of operation provided for in the invention is fully distributed and decentralized, and takes into account the protection of drivers' privacy and defense against possible attacks. Both issues imply the possibility of progressive deployment with effective functionality and security from the start.
  • the key factors of the proposed design are: scalability and economy, authentication of nodes and information, privacy, promotion of cooperation, and low delay and stability of communications.
  • a system is proposed that can be integrated into specific mobile devices, or implemented in existing devices on the market such as mobile phones equipped with appropriate software.
  • the first fundamental element of the present invention is a self-managed authentication method, which does not require the intervention of certification authorities since it is the nodes themselves that certify the validity of the public keys of the nodes they trust, issuing the corresponding certificates , which are stored in local stores and updated by an algorithm described here.
  • the proposal of authentication of nodes includes a cryptographic protocol, which allows each node to convince another node of the possession of a certain secret without allowing the transmitted information to discover anything about said secret, preventing possible impersonation attacks.
  • a second fundamental element of this invention is a symmetric encryption algorithm used in different phases. For its design, all known parameters that guarantee the security of non-linear filtering in flow ciphers are contemplated.
  • the present invention also contemplates as a third fundamental element an aggregation scheme of data that includes the generation of aggregated packages from groups created as-hoc for it, and the verification of digital signatures in a probabilistic way.
  • a unique IDentifier obtained by applying a unidirectional function over a unique value.
  • ID a unique IDentifier
  • the unidirectional function could be a hash function, such as MD5.
  • the communications system can be used for the reduction of road jams in which:
  • the module for generating identity and digital smoking keys is based on the generation of the decimal value of the binary representation corresponding to the upper triangular submatrix of the adjacent symmetric matrix containing the elements corresponding to a Hamiltonian circuit in a graph;
  • the module for multicast sending and wireless reception of beacons with variable pseudonyms is based on the hash of the list of IDs of the nodes present in your public keystore at that time;
  • the module for mutual authentication of nodes is based on the fact that a node B that wishes to establish contact with a node A first asks for the list of IDs of its warehouse at that time, check that its hash matches the pseudonym sent by A in your beacon, and respond by indicating an X key present at the intersection of both stores. Then, there is a demonstration of mutual null knowledge about the public key X so that each node builds from that key, considering it as a Hamiltonian circuit, a graph G in which X is a solution to the difficult problem of the Hamiltonian circuit, and sends it to the other node.
  • each node sends an isomorphic GI graph to the other as a compromise to the previously sent graph.
  • Each node then sends the other a random challenge indicating whether it wishes to receive from the other node the isomorphism between both graphs or a Hamiltonian circuit in the isomorphic graph.
  • both nodes know that they share the public key X, which they use to encrypt using the symmetric encryption described below, and send their own public identity key to the other node.
  • the module for updating public key stores is based on using an algorithm in each node that chooses to store in its store those public key certificates of the nodes that have issued or received more valid certificates.
  • the certificates and nodes of the store are treated in said algorithm respectively as edges and vertices of a graph;
  • the node reputation module is based on reflecting the conduct of a dishonest node by assigning in the warehouse a negative weight to the edges corresponding to certificates issued or received by it, so that upon receiving said certificates a negative weight, the vertex will leave progressively being present in updated stores.
  • This scheme is combined in the warehouse update algorithm with an assignment of weights to edges in the warehouse, according to the following criteria: 2 for certificates issued or received directly by the node, 1 for other certificates, -2 for denounced certificates directly by the node, and -1 for certificates denounced by other nodes;
  • the data encryption exchange module is based on a binary flow encryption using a declined and non-linear filtering generator with a buffer, of a shift register with primitive feedback polynomial on GF (2) of equal degree L to the length of the key used in each moment, fed with the seed formed by said key, and with feedback polynomial given by the primitive polynomial of lower non-zero coefficients and number of said coefficients given by the smallest possible number greater than 0.07 * L.
  • the output of said non-linear filtering is irregularly declined so that the log output determines at any time whether the corresponding filtrate output is used or discarded, being introduced in the first case in a size 4 buffer;
  • the data authentication module is based on a data aggregation scheme based on reactive groups in which each leader is responsible for building the package and adding the signatures of all the vehicles in their group, and where the verification is carried out according to a probabilistic protocol that depends on the geographical area in which each vehicle is located;
  • an automatic anomaly detection module is added for speed calculation, based on the information received from a receiver of a global satellite navigation system.
  • FIG. 1 shows a conceptual scheme of the communications system according to the invention including its 8 basic modules of Key Generation and Signature (Cl), Client / Server Architecture (C2), Sending and Receiving Beacons (C3), Authentication of Nodes (C4), Warehouse Update (C5), Reputation Scheme (C6), Encrypted Exchange (C7) and Data Authentication (C8).
  • the execution of these modules is not necessarily sequential, since C5 and C6 do not require interaction between nodes, while C7 and C8 yes, so that C5 and C6 can run in parallel with C7 and C8.
  • two modes are proposed such that in one of them the execution of modules C7 and C8 is not required;
  • Figure 2 shows a scheme representing the client / server architecture with connection to multiple users at the same time, and also the multicast sending and wireless reception of the beacons;
  • Figure 3 shows a mutual authentication scheme based on an interactive demonstration of null knowledge between a pair of nodes A and B.
  • beacons B it commits to node A with the object to be demonstrated by sending a witness (DI ). If A wishes to establish contact with B, it sends a random challenge (D2). Finally B returns the answer (D3) corresponding to the challenge and the witness;
  • Figure 4 shows a scheme that represents the ownership of the six degrees of separation in the environment of the certification of public keys between vehicles
  • Figure 5 illustrates a scheme showing the proposal for carrying out the invention using the mobile phone first associated with the hands-free device of a vehicle, so that before starting the vehicle the user enters his destination and route preference , and when the mobile receives information about abnormal speeds from its neighbors, it recalculates the recommended route and suggests it to the driver;
  • Figure 6 shows an Exemplification of the proposed generation of the public identity key KUro from a graph and its adjacency matrix, using the elements of the upper triangular submatrix corresponding to a Hamiltonian circuit in the graph;
  • Figure 7 shows a scheme that represents all the interactions between two nodes A and B.
  • First A sends the hash ⁇ VDIDe Warehouse A ⁇ (Pl) to B, in step (P2) B requests node A to list the IDs of its warehouse, then A sends the set ⁇ WarehouseID A ⁇ (P3) to B, B checks if there is an Xe key ⁇ Warehouse A Store ⁇ and then sends it to node A, (P4). Then A builds and sends a graph GA (X) (P5) to B.
  • At least two three-step iterations are performed in which first A sends a graph GU (X) (P6) isomorphic to graph GA (X), then B sends a random binary challenge (P7) to node A, and according to its value A returns to B the isomorphism between both graphs or a Hamiltonian circuit in GIA (X) (P8).
  • A uses X to encrypt its KUA key and send the result EX (KUA) (P9) to B, then B uses the KU key A to encrypt its key 3 ⁇ 4 and send the result KUA (K b ) to node A ( CHEEP).
  • Figure 9 shows a formation of reactive group generated ad-hoc from the detection of a jam
  • Figure 10 shows a scheme representing the three geographical areas defined for the authentication of data called danger zone (Zl), uncertainty zone (Z2) and security zone (Z3); Y
  • Figure 11 shows a graphical representation of use of calculating the speed from the distance s traveled in time t by a node, allowing the device to automatically recalculate time t and estimated initially recommended and compare it to the route Initially estimated time h for that route, so if you »th, and there is an alternative route with estimated time t a « t e , the device recommends this route to the driver.
  • the analyzes carried out and the concrete embodiment described as an embodiment are focused on the objective of reducing road jams.
  • mobile phones are used as mobile devices, so that the node representing the vehicle within the vehicular network at all times is the passenger's mobile phone first associated with the hands-free device of the vehicle.
  • This last assumption avoids the possibility that in a vehicle there are several devices of its passengers that may be included in the VANET, since this would lead to erroneous conclusions about the density of vehicles on the road.
  • the mobile phone when the mobile phone is synchronized as the first device associated with the hands-free device, the mobile phone automatically changes from 'pedestrian mode' to 'vehicle mode'. In mode Pedestrian 'The mobile phone only has active components C2, C3, C4, C5 and C6, which allow you to update your keystore.
  • the user does not have to perform any specific action while driving.
  • enter your destination and route preference into the device Before starting the vehicle, enter your destination and route preference into the device.
  • the proposal implies that the device receives and sends information automatically, using only the vehicular network and without requiring the driver's collaboration at any time (see Figure 5).
  • the device detects that the vehicle is traveling at an abnormal speed with respect to the road, it generates a warning and sends it to all its neighbors via broadcast. With the information received, the device automatically recalculates the recommended route and suggests it to the driver.
  • FIG. 1 shows a preferred embodiment of the secure communications system according to the invention.
  • the secure communications system in a spontaneous and self-managed vehicular ad-hoc network comprises the following modules:
  • each node is responsible for generating its own public / private key pairs, which are essential for authentication processes, and for digital signature of the messages it sends once authenticated.
  • Each node has a fixed pair of public / private keys (identity keys) whose validity is certified in a self-managed way through the public key stores of the nodes themselves.
  • C2 Client / server architecture with the possibility of connecting to multiple users at the same time It is necessary for the first fundamental element of the invention. It is that each node (client) makes requests to another node (server), which responds to it (see Figure 2). This idea is very useful in distributed multi-user systems such as the vehicular network object of this invention because thus the process capacity is shared between the clients and the servers. In particular in this invention this component is necessary for the interconnection of the nodes since it allows sending and receiving messages from many clients and to many servers at the same time as each user is both client and server.
  • the sending / receiving of beacons messages containing variable pseudonyms of the sending nodes is necessary for the process of discovering active nodes, and avoiding possible follow-ups (see Figure 2).
  • each uses its own secret key to encrypt and send encrypted keystore.
  • This module allows to guarantee to each node the authenticity of the other, as well as to exchange the secret keys that are used in the module C7, and to update the stores of public keys necessary for the later verification of the validity of the public keys of identity used for the Message signing
  • This module constitutes the second fundamental element of the invention.
  • the encrypted exchange of information obtained on the road and traffic, which nodes have stored at that time is necessary to avoid passive behavior of users who intend to take advantage of the VANET without cooperating for its operation.
  • the use of a secret key cryptosystem is recommended given the size of the data file.
  • Our invention proposes to use a temporary secret key of the issuer.
  • the third fundamental element of the invention is part of this module.
  • it is essential to verify the integrity and origin of the data received by digital signature, evaluation of verifiable characteristics (freshness, location, relevance, correction, etc.) and verification of coincidences with aggregation, since it is due check at all times that the retransmitted information is authentic, current and valid.
  • this is only possible by combining techniques of integrity and origin verification, evaluation of verifiable characteristics, and verification of coincidences with other messages received through data aggregation.
  • the public identity key be generated as a decimal value of the binary representation corresponding to the upper triangular submatrix of the adjacent symmetric matrix containing the elements corresponding to a Hamiltonian circuit in a graph ( see Figure 6).
  • the variable pseudonym of each node be the hash of the list of IDs of the nodes present in its public keystore at that time. Since this store varies, the pseudonym also varies.
  • module C4 we propose for this specific embodiment, as shown in Figure 7, that a node B that wishes to establish contact with a node A first asks you to list its store IDs at that time, check its match hash with the pseudonym sent by A in your beacon, and respond by indicating an X key present at the intersection of both stores. Then, the demonstration of mutual null knowledge is carried out on the public key X so that each node builds from said key, considering it as a Hamiltonian circuit, a graph G in which X is a solution to the difficult problem of the Hamiltonian circuit, and what Send to the other node.
  • each node sends an isomorphic GI graph to the other as a compromise to the previously sent graph.
  • Each node then sends the other a random challenge indicating whether it wishes to receive from the other node the isomorphism between both graphs or a Hamiltonian circuit in the isomorphic graph.
  • both nodes know that they share the public key X, which they use to encrypt using the symmetric encryption described below, and send their own public identity key to the other node.
  • each node chooses to store in its warehouse those public key certificates of the nodes that have issued or received more valid certificates, since this maximizes the probability of intersection between warehouses, required in module C4.
  • the certificates and nodes of the store are treated in said algorithm respectively as edges and vertices of a graph.
  • module C6 we propose that the dishonest node, instead of directly deleting its public key from the warehouse after improper behavior, reflects its conduct by assigning a negative weight to the edges corresponding to certificates issued or received by he, so that upon receiving said certificates a negative weight, the vertex will progressively cease to be present in the updated warehouses.
  • This scheme is combined in the warehouse update algorithm with an assignment of weights to edges in the warehouse, according to the following criteria: 2 for certificates issued or received directly by the node, 1 for other certificates, -2 for denounced certificates directly by the node, and -1 for certificates denounced by other nodes.
  • For use in the C7 module, as well as for the secret key encryption contemplated in the C4 module we propose efficient symmetric encryption.
  • the register feedback polynomial is given by the primitive polynomial of lower non-zero coefficients and number of said coefficients given by the smallest possible number greater than 0.07 * L, to improve efficiency.
  • the order of the filtering function is the prime number p closest to L / 2, to ensure large linear complexity.
  • the output of said non-linear filtering is irregularly declined so that the log output determines at any time whether the corresponding filtrate output is used or discarded.
  • a size 4 buffer is included.
  • Verification of an aggregation message is only performed on those vehicles that are unable to directly verify the information, that is, when a vehicle receives a warning message about an incident that is outside the coverage of its antenna and wants to confirm the authenticity of the message received.
  • the verification carried out by the vehicles depends on the direction of travel and the geographical area in which it is located. In the area of uncertainty, if a vehicle receives an aggregation message containing n signatures, it uses the offset register of length n defined in module C7 fed with the first bit of each of the signatures to generate n bits and verify only the signatures indicated by said exit.
  • the vehicles check a series of signatures contained in the package as described in the previous case, but in addition the vehicles will be able to perform other verifications that provide them with a higher level of reliability on the information received.
  • the vehicles being in this area, it is possible to receive several aggregate packages corresponding to the same danger but coming from different groups.
  • a final module is added for the specific implementation, which allows automatic detection of anomalous road conditions in order to notify drivers in advance to avoid or reduce traffic jams.
  • This module uses the information received from a receiver of a global satellite navigation system. It is necessary to be able to use the network in order to help driving without having to install any type of infrastructure either in the vehicle or on the road (see Figure 11).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

System for securely communicating in a spontaneous self-managed ad-hoc vehicular network, without infrastructures on either the road or in vehicles, using only mobile devices with a global satellite navigation system receiver and with wireless communication and computation capability such as mobile telephones, PDAs and portable computers. The operating mode envisaged in the invention is completely distributed and decentralized and takes into account the protection of the privacy of the drivers and defence against possible attacks.

Description

Sistema de comunicaciones seguras en una red ad-hoc vehicular espontánea y autogestionada La presente invención se refiere a un sistema de comunicaciones seguras en una red ad-hoc vehicular (o VANET) espontánea y autogestionada.  Secure communications system in a spontaneous and self-managed vehicular ad-hoc network The present invention relates to a secure communications system in a spontaneous and self-managed ad-hoc vehicular (or VANET) network.
La invención es aplicable en el campo de las telecomunicaciones, especialmente en comunicaciones móviles e inalámbricas entre vehículos. The invention is applicable in the field of telecommunications, especially in mobile and wireless communications between vehicles.
Antecedentes de la invención Background of the invention
La presente invención está relacionada con la seguridad de las comunicaciones en las redes ad-hoc vehiculares o VANETs (Vehicular Ad-hoc NETworks). Dicha seguridad representa actualmente un reto a resolver ya que se prevé que esas redes supondrán en un futuro no muy lejano una importante revolución para la seguridad y el confort del transporte por carretera. The present invention relates to the security of communications in ad-hoc vehicular networks or VANETs (Vehicular Ad-hoc NETworks). This security currently represents a challenge to be solved since it is anticipated that these networks will be an important revolution for the safety and comfort of road transport in the not too distant future.
En las VANETs los mensajes intercambiados entre los vehículos influirán en el comportamiento de sus conductores pues éstos por ejemplo, reducirán la velocidad y/o escogerán rutas alternativas en función de la información recibida. Cualquier usuario malintencionado podría intentar explotar esta situación, llevando a cabo alguno de los siguientes ataques: In the VANETs, the messages exchanged between the vehicles will influence the behavior of their drivers as they, for example, will reduce speed and / or choose alternative routes based on the information received. Any malicious user could try to exploit this situation, carrying out any of the following attacks:
- Inyección de información falsa, modificada o repetida, difundiendo datos erróneos que puedan afectar al resto de vehículos, bien en beneficio del atacante por ejemplo al conseguir liberar una vía, o simplemente por mala intención por ejemplo para producir un atasco. - Injection of false information, modified or repeated, spreading erroneous data that may affect the rest of vehicles, either for the benefit of the attacker, for example, when a road is released, or simply for bad intentions, for example, to produce a traffic jam.
- Falsificación de identidad (haciéndose pasar por ejemplo por un vehículo de emergencia) o manipulación de la información enviada (alterando datos como posición, dirección, velocidad, etc.) por ejemplo para intentar escapar de responsabilidades al haber provocado un accidente.  - Forgery of identity (posing as an emergency vehicle, for example) or manipulation of the information sent (altering data such as position, address, speed, etc.), for example, to try to escape responsibilities by causing an accident.
- Seguimiento de conductores y/o vehículos, amenazando su privacidad y anonimato. - Tracking drivers and / or vehicles, threatening their privacy and anonymity.
- Denegación de servicio, provocando la pérdida de la conectividad de la red. Por tanto, la seguridad de las comunicaciones es un factor imprescindible a la hora de impedir dichas amenazas y posibilitar el despliegue de las VANETs. - Denial of service, causing loss of network connectivity. Therefore, the security of communications is an essential factor in preventing such threats and enabling the deployment of VANETs.
Existen diversas iniciativas tanto desde la industria como desde el entorno académico destinadas a hacer posible la futura explotación de las VANETs. Sin embargo, todas las propuestas existentes tienen en común la hipotética existencia previa de una infraestructura en la carretera o RSU (Road-Side Unit) y/o el uso de telefonía móvil, y/o Internet y/o dispositivos a bordo de los vehículos u OBUs (On-Board Units). Por ejemplo, el borrador de estándar de comunicaciones para VANETs, [IEEE 802.1 lp WAVE (Wireless Access for Vehicular Environments, http://grouper.ieee.org/groups/802/ll/Reports)] que está siendo desarrollado por el consorcio Car-2-Car (http://www.car-to-car.org), presupone que las VANETs combinarán varias tecnologías inalámbricas como Celular, Satélite, WiMAX (Woridwide Interoperability for Microwave ACCess, http://www.ieee802.org/16) y comunicaciones DSR (Dedicated Short Rangé). There are various initiatives both from the industry and from the academic environment aimed at making possible the future exploitation of VANETs. However, all existing proposals have in common the hypothetical previous existence of an infrastructure on the road or RSU (Road-Side Unit) and / or the use of mobile telephony, and / or Internet and / or devices on board vehicles or OBUs (On-Board Units). For example, the draft communications standard for VANETs, [IEEE 802.1 lp WAVE (Wireless Access for Vehicular Environments, http://grouper.ieee.org/groups/802/ll/Reports)] that is being developed by the consortium Car-2-Car (http://www.car-to-car.org), presupposes that VANETs will combine several wireless technologies such as Cellular, Satellite, WiMAX (Woridwide Interoperability for Microwave ACCess, http: //www.ieee802. org / 16) and DSR (Dedicated Short Rangé) communications.
De igual forma, la arquitectura CALM (Communications, Air interface, Long and Médium range, http://www.isotc204wgl6.org/concept), también en proceso de estandarización por la organización ISO (International Organization for Standar dizatiori), pretende dar soporte a comunicaciones en entornos móviles y en particular en ITSs (Intelligent Transportation Systems), mediante el uso combinado de varias tecnologías inalámbricas como WAVE, UMTS (Universal Mobile Telecommunications System, http://www.3GPP.org), WiMAX o RFID (Radio Frequency IDentification), y la aplicación de diversos estándares internacionales, interfaces y medios, como IEEE 802.11, 802.1 lp, 802.15, 802.16e, 802.20, telefonía móvil 2G/3G/4G, e ITSs nacionales. Similarly, the CALM architecture (Communications, Air interface, Long and Medium range, http://www.isotc204wgl6.org/concept), also in the process of standardization by the ISO (International Organization for Standard dizatiori) organization, aims to give support for communications in mobile environments and in particular in ITSs (Intelligent Transportation Systems), through the combined use of various wireless technologies such as WAVE, UMTS (Universal Mobile Telecommunications System, http://www.3GPP.org), WiMAX or RFID ( Radio Frequency IDentification), and the application of various international standards, interfaces and media, such as IEEE 802.11, 802.1 lp, 802.15, 802.16e, 802.20, 2G / 3G / 4G mobile telephony, and national ITSs.
En ambos estándares, la seguridad de las comunicaciones se basa en la combinación de las tecnologías mencionadas, en general suponiendo el uso de infraestructuras de clave pública con certificación basada en autoridades centralizadas, lo que implica la necesidad de implementación previa de RSUs en carreteras y OBUs en vehículos. Por otra parte, las soluciones propuestas en diversos proyectos de investigación se basan en la disponibilidad de OBUs en los vehículos, y/o de RSUs en la carretera, lo que implicaría un gran desembolso inicial por el Estado y/o por los usuarios. De hecho, la mayor parte de los esfuerzos investigadores en este campo se está haciendo desde las compañías automovilísticas, de forma que en las propuestas normalmente se supone que en las OBUs integradas en los vehículos hay una caja negra, una identidad certificada, sensores para detectar obstáculos, una interface humano-máquina, y un dispositivo a prueba de falsificaciones para hacer los cálculos, además de un receptor de un Sistema Global de Navegación por Satélite y un dispositivo Wi-Fi. In both standards, the security of communications is based on the combination of the mentioned technologies, in general assuming the use of public key infrastructure with certification based on centralized authorities, which implies the need for prior implementation of MSWs on roads and OBUs in vehicles. On the other hand, the solutions proposed in various research projects are based on the availability of OBUs in vehicles, and / or RSUs on the road, which would imply a large initial outlay by the State and / or by users. In fact, most of the research efforts in this field are being made from the automobile companies, so that in the proposals it is normally assumed that in the OBUs integrated in the vehicles there is a black box, a certified identity, sensors to detect obstacles, a human-machine interface, and a counterfeit-proof device for calculations, in addition to a receiver of a Global Satellite Navigation System and a Wi-Fi device.
Entre las publicaciones científicas relacionadas con la seguridad en las VANETs, destacan las siguientes: Among the scientific publications related to safety in VANETs, the following stand out:
- [Philippe Golle, Dan Greene and Jessica Staddon, "Detecting and correcting malicious data in VANETs ", lst ACM intemational workshop on Vehicular ad hoc networks pp. 29-37. 2004]. Propone el uso de sensores para detectar información incorrecta. - [Philippe Golle, Dan Greene and Jessica Staddon, "Detecting and correcting malicious data in VANETs", lst ACM international workshop on Vehicular ad hoc networks pp. 29-37. 2004]. Proposes the use of sensors to detect incorrect information.
- [Maxim Raya and Jean-Pierre Hubaux, "The security of vehicular ad hoc networks ", 3rd ACM workshop on Security of ad hoc and sensor networks pp. 11-21. 2005]. Asume la existencia de autoridades de certificación para emitir los certificados a los vehículos, proponiendo que sean las autoridades gubernamentales o los fabricantes de vehículos.  - [Maxim Raya and Jean-Pierre Hubaux, "The security of vehicular ad hoc networks", 3rd ACM workshop on Security of ad hoc and sensor networks pp. 11-21. 2005]. It assumes the existence of certification authorities to issue certificates to vehicles, proposing that they be government authorities or vehicle manufacturers.
- [Florian Dótzer, "Privacy Issues in Vehicular Ad Hoc Networks ", Lecture Notes in Computer Science 3856 pp. 197-209. 2006]. Supone la participación de los fabricantes de vehículos ya que durante la producción de cada vehículo se debe establecer una conexión segura con una autoridad certificadora que valide la OBU.  - [Florian Dótzer, "Privacy Issues in Vehicular Ad Hoc Networks", Lecture Notes in Computer Science 3856 pp. 197-209. 2006]. It involves the participation of vehicle manufacturers since during the production of each vehicle a secure connection must be established with a certifying authority that validates the OBU.
Entre las patentes destacan los siguientes documentos relacionados con las VANETs. Patents include the following documents related to VANETs.
US2008002635 y US2008002574: proponen un método para gestionar el tráfico de comunicaciones, midiendo niveles locales y definiendo una microutilidad de los datos a transmitir para seleccionar el medio de transmisión. - US20080279141: describe un método de asignación de canales a las comunicaciones multihop entre un nodo y otro, para el envío de información mediante enrutamiento.US2008002635 and US2008002574: propose a method to manage communications traffic, measuring local levels and defining a microutility of the data to be transmitted to select the transmission medium. - US20080279141: describes a method of assigning channels to multihop communications between one node and another, for sending information via routing.
- WO2008092475 : propone la diseminación de información mediante unicast. - WO2008092475: proposes the dissemination of information through unicast.
- WO2008104673: plantea la estimación de la densidad de nodos mediante la división en celdas geográficas en las que el nodo más cercano al centro es el encargado de agregar y retransmitir la información.  - WO2008104673: proposes the estimation of the density of nodes by dividing them into geographic cells in which the node closest to the center is responsible for adding and retransmitting the information.
- WO2008119948: se basa en el uso de telefonía móvil para definir un algoritmo de enrutamiento de información entre dos nodos.  - WO2008119948: it is based on the use of mobile telephony to define an information routing algorithm between two nodes.
- WO2009024945: describe un método para sincronizar dispositivos comunicados por radio mediante beacons periódicos que incluyen señales de reloj.  - WO2009024945: describes a method for synchronizing radio-communicated devices by means of periodic beacons that include clock signals.
- WO2009053657: propone que en las intersecciones de carreteras el broadcast de información se realice a través de un nodo elegido dentro de un grupo en función del tiempo estimado para alcanzar la intersección.  - WO2009053657: proposes that in the intersections of roads the diffusion of information is carried out through a node chosen within a group based on the estimated time to reach the intersection.
- WO2010020260: presenta un método para el envío de información desde un nodo origen hasta un nodo destino mediante enrutamiento a través de nodos intermedios. - WO2010020260: presents a method for sending information from a source node to a destination node by routing through intermediate nodes.
- WO2010040372: presupone el uso de una infraestructura en la carretera para controlar la carga de comunicaciones del canal inalámbrico, definiendo prioridades sobre los mensajes para establecer sus características de envío. Sin embargo, no se ha encontrado ningún precedente que describa una solución segura y más económica que las propuestas hasta ahora. - WO2010040372: it presupposes the use of an infrastructure on the road to control the communications load of the wireless channel, defining priorities over the messages to establish its sending characteristics. However, no precedent has been found that describes a safe and cheaper solution than the proposals so far.
Descripción de la invención A partir de lo descrito anteriormente, es un objetivo de la presente invención proporcionar un sistema de comunicaciones seguras en una red ad-hoc vehicular (o VANET) espontánea y autogestionada. Description of the invention From what has been described above, it is an object of the present invention to provide a secure and self-managed ad-hoc vehicular (or VANET) network of secure communications.
Dicho objetivo se consigue mediante un sistema de comunicaciones seguras en una red ad- hoc vehicular espontánea y autogestionada que comprende: Said objective is achieved by means of a secure communications system in a spontaneous and self-managed vehicular ad hoc network comprising:
- un módulo de generación de claves de identidad y de firma digital;  - a module for generating identity and digital signature keys;
- un módulo que contenga arquitectura cliente/servidor con posibilidad de conexión a múltiples usuarios a la vez; - un módulo de envío multicast y recepción inalámbrica de beacons con seudónimos variables; - a module containing client / server architecture with the possibility of connecting to multiple users at the same time; - a module for multicast sending and wireless reception of beacons with variable pseudonyms;
- un módulo para autenticación mutua de nodos, con intercambio de claves públicas fijas, claves secretas temporales, y almacenes de claves públicas basado en un esquema interactivo de reto-respuesta;  - a module for mutual authentication of nodes, with exchange of fixed public keys, temporary secret keys, and public key stores based on an interactive challenge-response scheme;
- un módulo de actualización de los almacenes de claves públicas;  - a module for updating public key stores;
- un módulo de reputación de nodos, que borra de los almacenes a los nodos deshonestos, mediante el borrado de su clave pública de los almacenes de certificados;  - a node reputation module, which deletes dishonest nodes from stores, by erasing their public key from certificate stores;
- un módulo de intercambio cifrado de datos sobre elementos estáticos y dinámicos de la carretera, mediante la utilización de una clave secreta temporal del emisor; - a module for the encrypted exchange of data on static and dynamic elements of the road, through the use of a temporary secret key of the transmitter;
- un módulo de autenticación de datos mediante la comprobación de coincidencias con otros mensajes recibidos mediante agregación de datos. En este sentido la invención evita la necesidad de instalar ningún tipo de infraestructura ni en el vehículo ni en la carretera, lo que implica un ahorro en inversión económica y en tiempo de espera para el desarrollo de las múltiples aplicaciones de las redes vehiculares, permitiendo poner en marcha las VANETs sin ninguna inversión de gobiernos, compañías automovilísticas ni empresas de telefonía. - a data authentication module by checking matches with other messages received through data aggregation. In this sense, the invention avoids the need to install any type of infrastructure either in the vehicle or on the road, which implies savings in economic investment and in waiting time for the development of the multiple applications of vehicle networks, allowing to put VANETs are underway without any investment from governments, car companies or telephone companies.
Se presenta aquí un sistema de comunicaciones seguras en una red ad-hoc vehicular espontánea y autogestionada, sin infraestructuras ni en carretera ni en vehículos, utilizando solamente dispositivos móviles con receptor de un sistema global de navegación por satélite, y capacidad de comunicación inalámbrica y de computación, tales como teléfonos móviles, PDAs y ordenadores portátiles. A secure communications system is presented here in a spontaneous and self-managed vehicular ad-hoc network, without infrastructures either on the road or in vehicles, using only mobile devices with a receiver of a global satellite navigation system, and wireless and wireless communication capability. computing, such as mobile phones, PDAs and laptops.
El modo de funcionamiento previsto en la invención es totalmente distribuido y descentralizado, y tiene en cuenta la protección de la privacidad de los conductores y la defensa ante posibles ataques. Ambas cuestiones implican la posibilidad de despliegue progresivo con funcionalidad efectiva y seguridad desde el primer momento. Los factores clave del diseño propuesto son: escalabilidad y economía, autenticación de nodos e información, privacidad, fomento de la cooperación, y bajo retardo y estabilidad de las comunicaciones. Se propone un sistema que puede integrarse en dispositivos móviles específicos, o bien implementarse en dispositivos ya existentes en el mercado como teléfonos móviles dotados de software adecuado. The mode of operation provided for in the invention is fully distributed and decentralized, and takes into account the protection of drivers' privacy and defense against possible attacks. Both issues imply the possibility of progressive deployment with effective functionality and security from the start. The key factors of the proposed design are: scalability and economy, authentication of nodes and information, privacy, promotion of cooperation, and low delay and stability of communications. A system is proposed that can be integrated into specific mobile devices, or implemented in existing devices on the market such as mobile phones equipped with appropriate software.
El primer elemento fundamental de la presente invención es un método de autenticación autogestionada, que no requiere de intervención de autoridades de certificación ya que son los propios nodos los que certifican la validez de las claves públicas de los nodos en quienes confían, emitiéndoles los correspondientes certificados, que son guardados en almacenes locales y actualizados mediante un algoritmo aquí descrito. Además, la propuesta de autenticación de nodos incluye un protocolo criptográfico, que permite que cada nodo convenza a otro nodo de la posesión de cierto secreto sin que la información transmitida permita descubrir nada sobre dicho secreto, impidiendo posibles ataques de suplantación. The first fundamental element of the present invention is a self-managed authentication method, which does not require the intervention of certification authorities since it is the nodes themselves that certify the validity of the public keys of the nodes they trust, issuing the corresponding certificates , which are stored in local stores and updated by an algorithm described here. In addition, the proposal of authentication of nodes includes a cryptographic protocol, which allows each node to convince another node of the possession of a certain secret without allowing the transmitted information to discover anything about said secret, preventing possible impersonation attacks.
Un segundo elemento fundamental de esta invención es un algoritmo de cifrado simétrico utilizado en diferentes fases. Para su diseño se contemplan todos aquellos parámetros conocidos que garantizan la seguridad de los filtrados no lineales en cifrados en flujo. A second fundamental element of this invention is a symmetric encryption algorithm used in different phases. For its design, all known parameters that guarantee the security of non-linear filtering in flow ciphers are contemplated.
Por último la presente invención contempla también como tercer elemento fundamental un esquema de agregación de datos que incluye la generación de paquetes agregados a partir de grupos creados as-hoc para ello, y la verificación de las firmas digitales de forma probabilística. Finally, the present invention also contemplates as a third fundamental element an aggregation scheme of data that includes the generation of aggregated packages from groups created as-hoc for it, and the verification of digital signatures in a probabilistic way.
En la presente invención se asume que cada nodo de la red está caracterizado por los siguientes parámetros: In the present invention it is assumed that each node of the network is characterized by the following parameters:
ID, (KUID, KRID), {IDÍ, KUIDÍ, Cert(KUIDi)} IOi e Almacén incluyendo: ID, (KUID, KRID), {IDÍ, KUIDÍ, Cert (KU IDi )} IOi and Warehouse including:
- un IDentificador único (denotado ID), obtenido mediante la aplicación de una función unidireccional sobre un valor único. Por ejemplo, si el dispositivo usado es un teléfono móvil se puede usar el número, mientras que en otros casos se puede usar una dirección de correo electrónico. La función unidireccional podría ser una función hash, como por ejemplo MD5. - a unique IDentifier (denoted ID), obtained by applying a unidirectional function over a unique value. For example, if the device used is a telephone mobile number can be used, while in other cases you can use an email address. The unidirectional function could be a hash function, such as MD5.
- un par fijo de claves pública/privada (denotadas (KU, KR) y llamadas claves de identidad para usar en un criptosistema asimétrico, como por ejemplo RSA.  - a fixed pair of public / private keys (denoted (KU, KR) and so-called identity keys for use in an asymmetric cryptosystem, such as RSA for example.
- un almacén conteniendo varios IDs, y correspondientes claves públicas KUs y certificados, que el nodo mantiene en todo momento actualizado, de la forma:  - a store containing several IDs, and corresponding public keys KUs and certificates, which the node keeps at all times updated, in the form:
KUIDi, Cert(KU1D1 ) KU ID i, Cert (KU 1D1 )
KUID2, Cert(KU1D2) KU ID2 , Cert (KU 1D2 )
KUID3, Cert(KUID3) KU ID3 , Cert (KU ID3 )
IDlím KUroiím, Cert(KUIDIÍm) IDlím KUroiím, Cert (KU IDIÍm )
De acuerdo con una realización preferida de la invención, el sistema de comunicaciones puede utilizarse para la reducción de atascos en carretera en el que: According to a preferred embodiment of the invention, the communications system can be used for the reduction of road jams in which:
- el módulo de generación de claves de identidad y de fuma digital se basa en la generación del valor decimal de la representación binaria correspondiente a la submatriz triangular superior de la matriz simétrica de adyacencia que contiene los elementos correspondientes a un circuito hamiltoniano en un grafo; - the module for generating identity and digital smoking keys is based on the generation of the decimal value of the binary representation corresponding to the upper triangular submatrix of the adjacent symmetric matrix containing the elements corresponding to a Hamiltonian circuit in a graph;
- el módulo de envío multicast y recepción inalámbrica de beacons con seudónimos variables se basa en el hash del listado de IDs de los nodos presentes en su almacén de claves públicas en ese momento;  - the module for multicast sending and wireless reception of beacons with variable pseudonyms is based on the hash of the list of IDs of the nodes present in your public keystore at that time;
- el módulo para autenticación mutua de nodos se basa en que un nodo B que desee establecer contacto con un nodo A en primer lugar le solicite el listado de IDs de su almacén en ese momento, compruebe coincidencia de su hash con el seudónimo enviado por A en su beacon, y le responda indicando una clave X presente en la intersección de ambos almacenes. Luego, se realiza una demostración de conocimiento nulo mutua sobre la clave pública X de manera que cada nodo construye a partir de dicha clave, considerándola como circuito hamiltoniano, un grafo G en el que X sea solución al problema difícil del circuito hamiltoniano, y lo envía al otro nodo. Después se realizan al menos dos iteraciones de la demostración de forma que en un primer paso cada nodo envía al otro como testigo de compromiso un grafo isomorfo GI al grafo previamente enviado. A continuación cada nodo envía al otro un reto aleatorio indicando si desea recibir del otro nodo el isomorfismo entre ambos grafos o bien un circuito hamiltoniano en el grafo isomorfo. Al finalizar la demostración de conocimiento nulo, ambos nodos saben que comparten la clave pública X, que usan para cifrar mediante el cifrado simétrico descrito más adelante, y enviar al otro nodo su propia clave pública de identidad. Después se intercambian sus claves secretas temporales cifradas con la clave pública del otro nodo y finalmente cada uno usa su propia clave secreta temporal para cifrar con el cifrado simétrico descrito a continuación, y enviar cifrado su almacén de claves, que es contrastado contra el seudónimo remitido en el beacon y el listado de IDs enviado en el primer paso de la autenticación; - the module for mutual authentication of nodes is based on the fact that a node B that wishes to establish contact with a node A first asks for the list of IDs of its warehouse at that time, check that its hash matches the pseudonym sent by A in your beacon, and respond by indicating an X key present at the intersection of both stores. Then, there is a demonstration of mutual null knowledge about the public key X so that each node builds from that key, considering it as a Hamiltonian circuit, a graph G in which X is a solution to the difficult problem of the Hamiltonian circuit, and sends it to the other node. Then at least two iterations of the demonstration are performed so that in a first step each node sends an isomorphic GI graph to the other as a compromise to the previously sent graph. Each node then sends the other a random challenge indicating whether it wishes to receive from the other node the isomorphism between both graphs or a Hamiltonian circuit in the isomorphic graph. At the end of the demonstration of null knowledge, both nodes know that they share the public key X, which they use to encrypt using the symmetric encryption described below, and send their own public identity key to the other node. Then they exchange their encrypted temporary secret keys with the public key of the other node and finally each uses their own temporary secret key to encrypt with the symmetric encryption described below, and send encrypted their keystore, which is contrasted against the pseudonym forwarded in the beacon and the list of IDs sent in the first step of the authentication;
- el módulo de actualización de los almacenes de claves públicas se basa en utilizar un algoritmo en el cada nodo escoge para guardar en su almacén aquellos certificados de claves públicas de los nodos que más certificados válidos han emitido o recibido. Los certificados y nodos del almacén se tratan en dicho algoritmo respectivamente como aristas y vértices de un grafo;  - The module for updating public key stores is based on using an algorithm in each node that chooses to store in its store those public key certificates of the nodes that have issued or received more valid certificates. The certificates and nodes of the store are treated in said algorithm respectively as edges and vertices of a graph;
- el módulo de reputación de nodos se basa en reflejar la conducta de un nodo deshonesto asignando en el almacén un peso negativo a las aristas correspondientes a certificados emitidos o recibidos por él, de forma que al recibir dichos certificados un peso negativo, el vértice dejará progresivamente de estar presente en los almacenes actualizados. Este esquema se combina en el algoritmo de actualización de almacenes con una asignación de pesos a aristas en el almacén, según el siguiente criterio: 2 para certificados emitidos o recibidos directamente por el nodo, 1 para el resto de certificados, -2 para certificados denunciados directamente por el nodo, y -1 para certificados denunciados por otros nodos; - the node reputation module is based on reflecting the conduct of a dishonest node by assigning in the warehouse a negative weight to the edges corresponding to certificates issued or received by it, so that upon receiving said certificates a negative weight, the vertex will leave progressively being present in updated stores. This scheme is combined in the warehouse update algorithm with an assignment of weights to edges in the warehouse, according to the following criteria: 2 for certificates issued or received directly by the node, 1 for other certificates, -2 for denounced certificates directly by the node, and -1 for certificates denounced by other nodes;
- el módulo de intercambio cifrado de datos se basa en un cifrado en flujo binario usando como generador de secuencia cifrante un filtrado no lineal decimado y con buffer, de un registro de desplazamiento con polinomio de realimentación primitivo sobre GF(2) de grado L igual a la longitud de la clave usada en cada momento, alimentado con la semilla formada por dicha clave, y con polinomio de realimentación dado por el polinomio primitivo de menores coeficientes no nulos y número de dichos coeficientes dado por el menor número posible mayor que 0,07*L. La función no lineal del filtrado tiene como orden el número primo p más cercano a L/2, incluye un término lineal correspondiente a su orden, además de un número de términos de cada orden i=l,2,..., p dado por la parte entera de L/i, obtenidos multiplicando etapas sucesivas. La salida de dicho filtrado no lineal se decima irregularmente de manera que la salida del registro determina en cada momento si la correspondiente salida del filtrado se utiliza o se descarta, introduciéndose en el primer caso en un buffer de tamaño 4; - the data encryption exchange module is based on a binary flow encryption using a declined and non-linear filtering generator with a buffer, of a shift register with primitive feedback polynomial on GF (2) of equal degree L to the length of the key used in each moment, fed with the seed formed by said key, and with feedback polynomial given by the primitive polynomial of lower non-zero coefficients and number of said coefficients given by the smallest possible number greater than 0.07 * L. The nonlinear function of filtering has as its order the prime number p closest to L / 2, includes a linear term corresponding to its order, in addition to a number of terms of each order i = l, 2, ..., p given for the entire part of L / i, obtained by multiplying successive stages. The output of said non-linear filtering is irregularly declined so that the log output determines at any time whether the corresponding filtrate output is used or discarded, being introduced in the first case in a size 4 buffer;
- el módulo de autenticación de datos se basa en un esquema de agregación de datos basado en grupos reactivos en los que cada líder se encarga de construir el paquete y agregar las firmas de todos los vehículos de su grupo, y donde la verificación se realiza según un protocolo probabilístico que depende de la zona geográfica en la que se encuentre cada vehículo;  - the data authentication module is based on a data aggregation scheme based on reactive groups in which each leader is responsible for building the package and adding the signatures of all the vehicles in their group, and where the verification is carried out according to a probabilistic protocol that depends on the geographical area in which each vehicle is located;
- se añade un módulo de detección automática de condiciones anómalas para el cálculo de velocidad, basado en la información recibida de un receptor de un sistema global de navegación por satélite. Breve descripción de las figuras  - an automatic anomaly detection module is added for speed calculation, based on the information received from a receiver of a global satellite navigation system. Brief description of the figures
Para mayor comprensión de cuanto se ha expuesto se acompaña unos dibujos en los cuales, esquemáticamente y sólo a título de ejemplo no limitativo, se representa un caso práctico de realización. For a better understanding of how much has been exposed, some drawings are attached in which, schematically and only by way of non-limiting example, a practical case of realization is represented.
En los dibujos, In the drawings,
La figura 1 muestra un esquema conceptual del sistema de comunicaciones de acuerdo con la invención incluyendo sus 8 módulos básicos de Generación de claves y firma (Cl), Arquitectura cliente/servidor (C2), Envío y recepción de beacons (C3), Autenticación de nodos (C4), Actualización de almacenes (C5), Esquema de reputación (C6), Intercambio cifrado (C7) y Autenticación de datos (C8). La ejecución de dichos módulos no es necesariamente secuencial, ya que C5 y C6 no requieren interacción entre nodos, mientras que C7 y C8 sí, de forma que C5 y C6 pueden ejecutarse en paralelo con C7 y C8. De hecho, en la propuesta de realización descrita se proponen dos modos tales que en uno de ellos no se requiere la ejecución de los módulos C7 y C8; Figure 1 shows a conceptual scheme of the communications system according to the invention including its 8 basic modules of Key Generation and Signature (Cl), Client / Server Architecture (C2), Sending and Receiving Beacons (C3), Authentication of Nodes (C4), Warehouse Update (C5), Reputation Scheme (C6), Encrypted Exchange (C7) and Data Authentication (C8). The execution of these modules is not necessarily sequential, since C5 and C6 do not require interaction between nodes, while C7 and C8 yes, so that C5 and C6 can run in parallel with C7 and C8. In fact, in the described implementation proposal two modes are proposed such that in one of them the execution of modules C7 and C8 is not required;
La figura 2 muestra un esquema que representa la arquitectura cliente/servidor con conexión a múltiples usuarios a la vez, y también el envío multicast y recepción inalámbrica de los beacons;  Figure 2 shows a scheme representing the client / server architecture with connection to multiple users at the same time, and also the multicast sending and wireless reception of the beacons;
La figura 3 muestra un esquema de autenticación mutua basada en una demostración interactiva de conocimiento nulo entre un par de nodos A y B. En el paso de envío de beacons B se compromete frente al nodo A con el objeto a demostrar enviándole un testigo (DI). Si A desea establecer contacto con B, le envía un reto aleatorio (D2). Finalmente B devuelve la respuesta (D3) correspondiente al reto y al testigo;  Figure 3 shows a mutual authentication scheme based on an interactive demonstration of null knowledge between a pair of nodes A and B. In the step of sending beacons B, it commits to node A with the object to be demonstrated by sending a witness (DI ). If A wishes to establish contact with B, it sends a random challenge (D2). Finally B returns the answer (D3) corresponding to the challenge and the witness;
La figura 4 muestra un esquema que representa la propiedad de los seis grados de separación en el entorno de la certificación de claves públicas entre vehículos;  Figure 4 shows a scheme that represents the ownership of the six degrees of separation in the environment of the certification of public keys between vehicles;
La figura 5 ilustra un esquema que muestra la propuesta de realización de la invención utilizando el teléfono móvil asociado en primer lugar al dispositivo manos libres de un vehículo, de forma que antes de poner en marcha el vehículo el usuario introduce su destino y preferencia de ruta, y cuando el móvil recibe información sobre velocidades anormales de sus vecinos, recalcula la ruta recomendada y se la sugiere al conductor;  Figure 5 illustrates a scheme showing the proposal for carrying out the invention using the mobile phone first associated with the hands-free device of a vehicle, so that before starting the vehicle the user enters his destination and route preference , and when the mobile receives information about abnormal speeds from its neighbors, it recalculates the recommended route and suggests it to the driver;
La figura 6 muestra una Ejemplificación de la generación propuesta de la clave pública de identidad KUro a partir de un grafo y su matriz de adyacencia, usando los elementos de la submatriz triangular superior correspondientes a un circuito hamiltoniano en el grafo;  Figure 6 shows an Exemplification of the proposed generation of the public identity key KUro from a graph and its adjacency matrix, using the elements of the upper triangular submatrix corresponding to a Hamiltonian circuit in the graph;
La figura 7 muestra un esquema que representa todas las interacciones entre dos nodos A y B. Primero A envía a B el hash {VDIDe AlmacénA} (Pl), en el paso (P2) B solicita al nodo A el listado de IDs de su almacén, luego A envía a B el conjunto{VIDeAlmacénA} (P3), B comprueba si hay una clave Xe {AlmacénAnAlmacéne} y en ese caso se la envía al nodo A, (P4). Entonces A construye y envía a B un grafo GA(X) (P5). Después se realizan al menos dos iteraciones de tres pasos en los que primero A envía a B un grafo GU(X) (P6) isomorfo al grafo GA(X), luego B envía al nodo A un reto binario aleatorio (P7), y según su valor A devuelve a B el isomorfismo entre ambos grafos o un circuito hamiltoniano en GIA(X) (P8). Al finalizar, A usa X para cifrar su clave KUA y enviar a B el resultado EX(KUA) (P9), luego B usa la clave KUA para cifrar su clave ¾ y enviar al nodo A el resultado KUA(Kb) (PIO). Por último, A usa su clave KA para cifrar su almacén y enviar a B el cifrado EKA(AlmacénA) (Pl l); La figura 8 muestra un generador de secuencia cifrante basado en un registro de desplazamiento con polinomio de realimentación primitivo de coeficientes (CL, CL-15. . . , C de menores valores no nulos, tales que el peso de dicho vector de coeficiente es el menor valor mayor que 0,07*L. Incluye una función de filtrado f de orden igual al número primo p más cercano a L/2, término lineal correspondiente a p, y número de términos de cada orden i=l,2,..., p igual a [L/i]. La salida de dicho filtrado se decima según la salida del registro, y la salida decimada se introduce en un buffer de tamaño 4; Figure 7 shows a scheme that represents all the interactions between two nodes A and B. First A sends the hash {VDIDe Warehouse A } (Pl) to B, in step (P2) B requests node A to list the IDs of its warehouse, then A sends the set {WarehouseID A } (P3) to B, B checks if there is an Xe key {Warehouse A Store} and then sends it to node A, (P4). Then A builds and sends a graph GA (X) (P5) to B. Then at least two three-step iterations are performed in which first A sends a graph GU (X) (P6) isomorphic to graph GA (X), then B sends a random binary challenge (P7) to node A, and according to its value A returns to B the isomorphism between both graphs or a Hamiltonian circuit in GIA (X) (P8). At the end, A uses X to encrypt its KUA key and send the result EX (KUA) (P9) to B, then B uses the KU key A to encrypt its key ¾ and send the result KUA (K b ) to node A ( CHEEP). Finally, A uses its KA key to encrypt its store and send E KA (Warehouse A ) encryption to B (Pl l); Figure 8 shows an encryption sequence generator based on a shift register with primitive coefficient feedback polynomial (CL, CL- 15... , C of lower non-zero values, such that the weight of said coefficient vector is the lower value greater than 0.07 * L. It includes a filtering function f of order equal to the prime number p closest to L / 2, corresponding linear term ap, and number of terms of each order i = l, 2, .. ., p equal to [L / i] The output of said filtrate is decimated according to the register output, and the decimated output is introduced into a size 4 buffer;
La figura 9 muestra una formación de grupo reactivo generado ad-hoc a partir de la detección de un atasco;  Figure 9 shows a formation of reactive group generated ad-hoc from the detection of a jam;
La figura 10 muestra un esquema representando las tres zonas geográficas definidas para la autenticación de datos llamadas zona de peligro (Zl), zona de incertidumbre (Z2) y zona de seguridad (Z3); y Figure 10 shows a scheme representing the three geographical areas defined for the authentication of data called danger zone (Zl), uncertainty zone (Z2) and security zone (Z3); Y
La figura 11 muestra una representación gráfica de uso del cálculo de la velocidad a partir de la distancia s recorrida en un tiempo t por un nodo, permitiendo que el dispositivo recalcule automáticamente el tiempo te estimado para la ruta inicialmente recomendada y lo compare con el tiempo h inicialmente estimado para esa ruta, de forma que si te»th, y existe una ruta alternativa con tiempo estimado ta«te, el dispositivo recomienda esta ruta al conductor. Figure 11 shows a graphical representation of use of calculating the speed from the distance s traveled in time t by a node, allowing the device to automatically recalculate time t and estimated initially recommended and compare it to the route Initially estimated time h for that route, so if you »th, and there is an alternative route with estimated time t a « t e , the device recommends this route to the driver.
Descripción de una realización preferida de la invención Description of a preferred embodiment of the invention
Aunque el planteamiento general de la invención puede ser usado en diferentes aplicaciones de las VANETs, los análisis llevados a cabo y la realización concreta descrita como modo de realización están centrados en el objetivo de la reducción de atascos en la carretera. En este caso se utilizan teléfonos móviles como dispositivos móviles, de forma que el nodo que representa al vehículo dentro de la red vehicular en cada momento es el teléfono móvil del pasajero asociado en primer lugar al dispositivo manos libres del vehículo. Esta última suposición evita la posibilidad de que en un vehículo sean varios los dispositivos de sus pasajeros que puedan estar figurando en la VANET, ya que esto conduciría a conclusiones erróneas sobre densidad de vehículos en la carretera. Además, en el momento de sincronización del teléfono móvil como primer aparato asociado al dispositivo manos libres, el teléfono móvil modifica automáticamente de 'modo peatón' a 'modo vehículo'. En 'modo peatón' el teléfono móvil únicamente tiene activos los componentes C2, C3, C4, C5 y C6, que le permiten actualizar su almacén de claves. Although the general approach of the invention can be used in different applications of the VANETs, the analyzes carried out and the concrete embodiment described as an embodiment are focused on the objective of reducing road jams. In this case, mobile phones are used as mobile devices, so that the node representing the vehicle within the vehicular network at all times is the passenger's mobile phone first associated with the hands-free device of the vehicle. This last assumption avoids the possibility that in a vehicle there are several devices of its passengers that may be included in the VANET, since this would lead to erroneous conclusions about the density of vehicles on the road. In addition, when the mobile phone is synchronized as the first device associated with the hands-free device, the mobile phone automatically changes from 'pedestrian mode' to 'vehicle mode'. In mode Pedestrian 'The mobile phone only has active components C2, C3, C4, C5 and C6, which allow you to update your keystore.
Para usar esta invención el usuario no tiene que realizar ninguna acción específica mientras conduce. Antes de poner en marcha el vehículo, introduce en el dispositivo su destino y preferencia de ruta. La propuesta implica que el dispositivo recibe y envía información automáticamente, usando únicamente la red vehicular y sin necesidad de requerir la colaboración del conductor en ningún momento (ver Figura 5). Cuando el dispositivo detecta que el vehículo está circulando a una velocidad anormal con respecto a la vía, genera un aviso y lo envía a todos sus vecinos vía broadcast. Con las informaciones recibidas, el dispositivo recalcula automáticamente la ruta recomendada y se la sugiere al conductor. To use this invention the user does not have to perform any specific action while driving. Before starting the vehicle, enter your destination and route preference into the device. The proposal implies that the device receives and sends information automatically, using only the vehicular network and without requiring the driver's collaboration at any time (see Figure 5). When the device detects that the vehicle is traveling at an abnormal speed with respect to the road, it generates a warning and sends it to all its neighbors via broadcast. With the information received, the device automatically recalculates the recommended route and suggests it to the driver.
La figura 1 muestra una realización preferida del sistema de comunicaciones seguras de acuerdo con la invención. En esta realización preferida, el sistema de comunicaciones seguras en una red ad-hoc vehicular espontánea y autogestionada comprende los siguientes módulos: Figure 1 shows a preferred embodiment of the secure communications system according to the invention. In this preferred embodiment, the secure communications system in a spontaneous and self-managed vehicular ad-hoc network comprises the following modules:
Cl. Módulo de generación de claves de identidad v de firma digital Cl. Identity key v digital signature generation module
Constituye parte del primer elemento fundamental de la invención. Dicha generación es necesaria ya que la autenticación de nodos propuesta en esta invención se basa en criptografía de clave pública autogestionada sin requerir en ningún momento autoridades de certificación. En su lugar, cada nodo es responsable de generar sus propios pares de claves pública/privada, que son imprescindibles para los procesos de autenticación, y de firma digital de los mensajes que envíe una vez autenticado. Cada nodo cuenta con un par fijo de claves pública/privada (claves de identidad) cuya validez es certificada de forma autogestionada mediante los almacenes de claves públicas de los propios nodos.  It is part of the first fundamental element of the invention. This generation is necessary since the authentication of nodes proposed in this invention is based on self-managed public key cryptography without requiring certification authorities at any time. Instead, each node is responsible for generating its own public / private key pairs, which are essential for authentication processes, and for digital signature of the messages it sends once authenticated. Each node has a fixed pair of public / private keys (identity keys) whose validity is certified in a self-managed way through the public key stores of the nodes themselves.
C2. Arquitectura cliente/servidor con posibilidad de conexión a múltiples usuarios a la vez Es necesaria para el primer elemento fundamental de la invención. Consiste en que cada nodo (cliente) realiza peticiones a otro nodo (servidor), que le responde (ver Figura 2). Esta idea es muy útil en sistemas multiusuarios distribuidos tales como la red vehicular objeto de esta invención porque así la capacidad de proceso se reparte entre los clientes y los servidores. En particular en esta invención este componente es necesario para la interconexión de los nodos ya que permite enviar y recibir mensajes de muchos clientes y hacia muchos servidores a la vez pues cada usuario es a la vez cliente y servidor. C2 Client / server architecture with the possibility of connecting to multiple users at the same time It is necessary for the first fundamental element of the invention. It is that each node (client) makes requests to another node (server), which responds to it (see Figure 2). This idea is very useful in distributed multi-user systems such as the vehicular network object of this invention because thus the process capacity is shared between the clients and the servers. In particular in this invention this component is necessary for the interconnection of the nodes since it allows sending and receiving messages from many clients and to many servers at the same time as each user is both client and server.
C3. Envío multicast y recepción inalámbrica de beacons con seudónimos variables C3 Multicast sending and wireless reception of beacons with variable pseudonyms
Es parte del primer elemento fundamental de la invención. El envío/recepción de mensajes beacons conteniendo seudónimos variables de los nodos emisores es necesario para el proceso de descubrimiento de nodos activos, y evitar posibles seguimientos (ver Figura 2). It is part of the first fundamental element of the invention. The sending / receiving of beacons messages containing variable pseudonyms of the sending nodes is necessary for the process of discovering active nodes, and avoiding possible follow-ups (see Figure 2).
C4. Autenticación mutua de nodos, con intercambio de claves públicas fijas, claves secretas temporales, y almacenes de claves públicas: C4 Mutual authentication of nodes, with exchange of fixed public keys, temporary secret keys, and public key stores:
Es la base del primer elemento fundamental de la invención. El intercambio de mensajes entre pares de nodos tiene como objeto que cada uno demuestre al otro que conoce un secreto sin revelarle nada sobre él. El esquema propuesto se basa en un esquema interactivo de reto- respuesta, según se muestra en la Figura 3. En el paso de envío de beacons cada nodo se compromete frente a sus vecinos con lo que pretende demostrar, enviándoles un testigo (DI). Si un nodo A desea establecer contacto con otro nodo B, le envía un reto aleatorio (D2). Entonces B devuelve la respuesta (D3) correspondiente al reto y al testigo. Tras dichos pasos, ambos nodos comparten una clave que usan para cifrar y enviar al otro su clave pública de identidad. A continuación se intercambian sus claves secretas temporales cifradas con la clave pública del otro nodo. Finalmente cada uno usa su propia clave secreta para cifrar y enviar cifrado el almacén de claves. Este módulo permite garantizar a cada nodo la autenticidad del otro, así como intercambiar las claves secretas que se usan en el módulo C7, y actualizar los almacenes de claves públicas necesarios para la posterior comprobación de la validez de las claves públicas de identidad usadas para la firma de mensajes.  It is the basis of the first fundamental element of the invention. The exchange of messages between pairs of nodes is intended to show each other that he knows a secret without revealing anything about it. The proposed scheme is based on an interactive challenge-response scheme, as shown in Figure 3. In the step of sending beacons each node commits itself to its neighbors with what it intends to demonstrate, sending them a witness (DI). If a node A wishes to establish contact with another node B, it sends a random challenge (D2). Then B returns the answer (D3) corresponding to the challenge and the witness. After these steps, both nodes share a key that they use to encrypt and send their public identity key to the other. Their encrypted temporary secret keys are then exchanged with the public key of the other node. Finally each uses its own secret key to encrypt and send encrypted keystore. This module allows to guarantee to each node the authenticity of the other, as well as to exchange the secret keys that are used in the module C7, and to update the stores of public keys necessary for the later verification of the validity of the public keys of identity used for the Message signing
C5. Actualización óptima de los almacenes de claves públicas C5 Optimal update of public key stores
Es una parte importante del primer elemento fundamental de la invención. Permite limitar el número de claves almacenadas a un valor denotado lím, de manera que dicho valor sea en general inferior al número de usuarios que forman la red vehicular, e igual al mínimo número que permita, aprovechando la propiedad de los seis grados de separación consistente en que cualquier nodo puede conectarse a cualquier otro a través de una cadena con no más de seis enlaces (ver Figura 4), almacenar sólo las claves necesarias para poder autenticar a cualquier otro nodo con una alta probabilidad. C6. Esquema de reputación de nodos, que borra de los almacenes a los nodos deshonestos Forma parte del primer elemento fundamental de la invención. Permite aislar a aquellos nodos para los que se hayan detectado comportamientos incorrectos o corruptos, mediante el borrado de su clave pública de los almacenes de certificados. It is an important part of the first fundamental element of the invention. It allows to limit the number of stored keys to a value denoted limit, so that said value is generally lower than the number of users that form the vehicular network, and equal to the minimum number that allows, taking advantage of the property of the six degrees of consistent separation in which any node can connect to any other through a chain with no more than six links (see Figure 4), store only the keys necessary to authenticate any other node with a high probability. C6 Node reputation scheme, which erases dishonest nodes from warehouses It is part of the first fundamental element of the invention. It allows to isolate those nodes for which incorrect or corrupt behaviors have been detected, by deleting their public key from the certificate stores.
01. Intercambio cifrado de datos sobre elementos estáticos y dinámicos de la carretera 01. Encrypted exchange of data on static and dynamic road elements
Este módulo constituye el segundo elemento fundamental de la invención. El intercambio cifrado de la información obtenida sobre la carretera y el tráfico, que tengan almacenada en ese momento los nodos es necesario para evitar comportamientos pasivos de usuarios que pretendan aprovecharse de la VANET sin cooperar para su funcionamiento. El uso de un criptosistema de clave secreta es recomendable dada la dimensión del fichero de datos. Nuestra invención propone para ello usar una clave secreta temporal del emisor. C8. Autenticación de datos This module constitutes the second fundamental element of the invention. The encrypted exchange of information obtained on the road and traffic, which nodes have stored at that time is necessary to avoid passive behavior of users who intend to take advantage of the VANET without cooperating for its operation. The use of a secret key cryptosystem is recommended given the size of the data file. Our invention proposes to use a temporary secret key of the issuer. C8 Data authentication
El tercer elemento fundamental de la invención es parte de este módulo. Para el buen funcionamiento de la red es imprescindible la verificación de integridad y origen de los datos recibidos mediante firma digital, evaluación de características verificables (frescura, localización, relevancia, corrección, etc.) y comprobación de coincidencias con agregación, ya que se debe comprobar en todo momento que la información retransmitida es auténtica, actual y válida. En esta invención autogestionada esto es sólo posible combinando técnicas de verificación de integridad y origen, evaluación de características verificables, y comprobación de coincidencias con otros mensajes recibidos mediante agregación de datos. A continuación se describen varios conceptos y algoritmos propuestos como realización preferida de la invención, con el objetivo concreto mencionado.  The third fundamental element of the invention is part of this module. For the proper functioning of the network it is essential to verify the integrity and origin of the data received by digital signature, evaluation of verifiable characteristics (freshness, location, relevance, correction, etc.) and verification of coincidences with aggregation, since it is due check at all times that the retransmitted information is authentic, current and valid. In this self-managed invention this is only possible by combining techniques of integrity and origin verification, evaluation of verifiable characteristics, and verification of coincidences with other messages received through data aggregation. Several concepts and algorithms proposed as a preferred embodiment of the invention are described below, with the specific objective mentioned.
Para el módulo Cl se propone como realización particular, que la clave pública de identidad se genere como valor decimal de la representación binaria correspondiente a la submatriz triangular superior de la matriz simétrica de adyacencia que contiene los elementos correspondientes a un circuito hamiltoniano en un grafo (ver Figura 6). En el módulo C3 proponemos en esta realización específica, que el seudónimo variable de cada nodo sea el hash del listado de IDs de los nodos presentes en su almacén de claves públicas en ese momento. Dado que dicho almacén va variando, el seudónimo también varía. Además así se puede realizar la comprobación de que los IDs enviados en el primer paso de la autenticación se corresponden con el hash enviado en el beacon correspondiente. For module Cl, it is proposed as a particular embodiment that the public identity key be generated as a decimal value of the binary representation corresponding to the upper triangular submatrix of the adjacent symmetric matrix containing the elements corresponding to a Hamiltonian circuit in a graph ( see Figure 6). In module C3 we propose in this specific embodiment, that the variable pseudonym of each node be the hash of the list of IDs of the nodes present in its public keystore at that time. Since this store varies, the pseudonym also varies. In addition, it is possible to verify that the IDs sent in the first authentication step correspond to the hash sent in the corresponding beacon.
En el módulo C4 proponemos para esta realización concreta, según se muestra en la Figura 7, que un nodo B que desee establecer contacto con un nodo A en primer lugar le solicite el listado de IDs de su almacén en ese momento, compruebe coincidencia de su hash con el seudónimo enviado por A en su beacon, y le responda indicando una clave X presente en la intersección de ambos almacenes. Luego, la demostración de conocimiento nulo mutua se realiza sobre la clave pública X de manera que cada nodo construye a partir de dicha clave, considerándola como circuito hamiltoniano, un grafo G en el que X sea solución al problema difícil del circuito hamiltoniano, y lo envía al otro nodo. Después se realizan al menos dos iteraciones de la demostración de forma que en un primer paso cada nodo envía al otro como testigo de compromiso un grafo isomorfo GI al grafo previamente enviado. A continuación cada nodo envía al otro un reto aleatorio indicando si desea recibir del otro nodo el isomorfísmo entre ambos grafos o bien un circuito hamiltoniano en el grafo isomorfo. Al finalizar la demostración de conocimiento nulo, ambos nodos saben que comparten la clave pública X, que usan para cifrar mediante el cifrado simétrico descrito más adelante, y enviar al otro nodo su propia clave pública de identidad. Después se intercambian sus claves secretas temporales cifradas con la clave pública del otro nodo y finalmente cada uno usa su propia clave secreta temporal para cifrar con el cifrado simétrico descrito a continuación, y enviar cifrado su almacén de claves, que es contrastado contra el seudónimo remitido en el beacon y el listado de IDs enviado en el primer paso de la autenticación. In module C4 we propose for this specific embodiment, as shown in Figure 7, that a node B that wishes to establish contact with a node A first asks you to list its store IDs at that time, check its match hash with the pseudonym sent by A in your beacon, and respond by indicating an X key present at the intersection of both stores. Then, the demonstration of mutual null knowledge is carried out on the public key X so that each node builds from said key, considering it as a Hamiltonian circuit, a graph G in which X is a solution to the difficult problem of the Hamiltonian circuit, and what Send to the other node. Then at least two iterations of the demonstration are performed so that in a first step each node sends an isomorphic GI graph to the other as a compromise to the previously sent graph. Each node then sends the other a random challenge indicating whether it wishes to receive from the other node the isomorphism between both graphs or a Hamiltonian circuit in the isomorphic graph. At the end of the demonstration of null knowledge, both nodes know that they share the public key X, which they use to encrypt using the symmetric encryption described below, and send their own public identity key to the other node. Then they exchange their encrypted temporary secret keys with the public key of the other node and finally each uses their own temporary secret key to encrypt with the symmetric encryption described below, and send encrypted their keystore, which is contrasted against the pseudonym forwarded in the beacon and the list of IDs sent in the first authentication step.
Para la implementación del módulo C5 proponemos que se utilice el algoritmo de actualización de almacén descrito a continuación. En él cada nodo escoge para guardar en su almacén aquellos certificados de claves públicas de los nodos que más certificados válidos han emitido o recibido, ya que con ello maximizan la probabilidad de intersección entre almacenes, necesaria en el módulo C4. Los certificados y nodos del almacén se tratan en dicho algoritmo respectivamente como aristas y vértices de un grafo. Función Actualización _Almacén() For the implementation of the C5 module we propose that the warehouse update algorithm described below be used. In it, each node chooses to store in its warehouse those public key certificates of the nodes that have issued or received more valid certificates, since this maximizes the probability of intersection between warehouses, required in module C4. The certificates and nodes of the store are treated in said algorithm respectively as edges and vertices of a graph. Update Function _Store ()
Inicializar las estructuras de datos;  Initialize data structures;
u:=B;  u: = B;
Para cada (u,ID) e AlmacénA^Almacéne For each (u, ID) and Warehouse A ^ Store
Si grado_ponderado(ID)>máximo(grado_ponderado(AlmacénA^AlmacénB)  If weighted_degree (ID)> maximum (weighted_degree (WarehouseA ^ WarehouseB)
Si cardinal(AlmacénB)<lím ó If cardinal (Warehouse B ) <limit
grado_ponderado(ID)>máximo(grado_ponderado(AlmacénB))  weighted_degree (ID)> maximum (weighted_degree (WarehouseB))
Añadir (u,ID) a Almacéne;  Add (u, ID) to Almacéne;
u:=ID;  u: = ID;
Fin si  End yes
Fin si  End yes
Fin para  End for
Fin función Para la implementación del módulo C6 proponemos que al nodo deshonesto, en lugar de borrar directamente su clave pública del almacén tras un comportamiento indebido, se refleje su conducta asignando en el almacén un peso negativo a las aristas correspondientes a certificados emitidos o recibidos por él, de forma que al recibir dichos certificados un peso negativo, el vértice dejará progresivamente de estar presente en los almacenes actualizados. Este esquema se combina en el algoritmo de actualización de almacenes con una asignación de pesos a aristas en el almacén, según el siguiente criterio: 2 para certificados emitidos o recibidos directamente por el nodo, 1 para el resto de certificados, -2 para certificados denunciados directamente por el nodo, y -1 para certificados denunciados por otros nodos. Para su uso en el módulo C7, así como para el cifrado de clave secreta contemplado en el módulo C4 proponemos un cifrado simétrico eficiente. Dicha eficiencia es imprescindible ya que en su primer uso en el módulo C4 la longitud de la clave usada, al tratarse de una clave pública, es en general superior a la establecida como segura para los cifrados simétricos, mientras que en su segundo uso en C4, el almacén de claves en general es un fichero muy grande. También en el propio módulo C7 el fichero a cifrar conteniendo los datos de tráfico y carretera será en general muy grande. Así pues, proponemos como cifrado simétrico el cifrado en flujo binario usando como generador de secuencia cifrante el descrito en la Figura 8, que está basado en un registro de desplazamiento con polinomio de realimentación primitivo sobre GF(2), 1+ C!X+ c2x2+—+ CLXL, de grado L igual a la longitud de la clave usada en cada momento, y alimentado con la semilla formada por dicha clave. El polinomio de realimentación del registro viene dado por el polinomio primitivo de menores coeficientes no nulos y número de dichos coeficientes dado por el menor número posible mayor que 0,07 *L, para mejorar la eficiencia. El orden de la función de filtrado es el número primo p más cercano a L/2, para garantizar complejidad lineal grande. Dicha función incluye un término lineal correspondiente a su orden, además de un número de términos de cada orden i=l,2,..., p dado por la parte entera de L/i, obtenidos multiplicando etapas sucesivas, para lograr seudoaleatoriedad y confusión. Para evitar ataques por correlación, la salida de dicho filtrado no lineal se decima irregularmente de manera que la salida del registro determina en cada momento si la correspondiente salida del filtrado se utiliza o se descarta. Finalmente, con objeto de garantizar una salida estable, se incluye un buffer de tamaño 4. End of function For the implementation of module C6 we propose that the dishonest node, instead of directly deleting its public key from the warehouse after improper behavior, reflects its conduct by assigning a negative weight to the edges corresponding to certificates issued or received by he, so that upon receiving said certificates a negative weight, the vertex will progressively cease to be present in the updated warehouses. This scheme is combined in the warehouse update algorithm with an assignment of weights to edges in the warehouse, according to the following criteria: 2 for certificates issued or received directly by the node, 1 for other certificates, -2 for denounced certificates directly by the node, and -1 for certificates denounced by other nodes. For use in the C7 module, as well as for the secret key encryption contemplated in the C4 module we propose efficient symmetric encryption. This efficiency is essential since in its first use in module C4 the length of the key used, as it is a public key, is generally greater than that established as safe for symmetric encryption, while in its second use in C4 , the keystore in general is a very large file. Also in the C7 module itself the file to be encrypted containing the traffic and road data will in general be very large. Thus, we propose as symmetric encryption the binary flow encryption using as an encrypted sequence generator the one described in Figure 8, which is based on a shift register with primitive feedback polynomial on GF (2), 1+ C! X + c 2 x 2 + - + CLX L , of degree L equal to the length of the key used at any time, and fed with the seed formed by said key. The register feedback polynomial is given by the primitive polynomial of lower non-zero coefficients and number of said coefficients given by the smallest possible number greater than 0.07 * L, to improve efficiency. The order of the filtering function is the prime number p closest to L / 2, to ensure large linear complexity. This function includes a linear term corresponding to its order, in addition to a number of terms of each order i = l, 2, ..., p given by the integer part of L / i, obtained by multiplying successive stages, to achieve pseudo-randomness and confusion. To avoid correlation attacks, the output of said non-linear filtering is irregularly declined so that the log output determines at any time whether the corresponding filtrate output is used or discarded. Finally, in order to guarantee a stable output, a size 4 buffer is included.
Como propuesta específica para la implementación del módulo C8 proponemos que la comprobación de coincidencias mediante agregación de datos se realice según un protocolo probabilístico basado en grupos reactivos, es decir, generados ad-hoc para producir un paquete agregado (ver Figura 9). Se distinguen para ello tres situaciones en las que se pueden encontrar los vehículos respecto a un incidente: Vehículos que son capaces de detectar un obstáculo o incidente en la carretera y se encargan de generar los correspondientes mensajes de advertencia; Vehículos que reciben los mensajes de advertencias y pueden confirmar que la información es cierta porque tienen contacto directo con el incidente; y Vehículos que reciben los mensajes de advertencia pero no son capaces de confirmar o desmentir dicha información dado que están fuera de rango. Por otra parte, dado que en la mayoría de casos la información generada en un determinado punto nos es de interés fuera de cierto radio de distancia respecto a dicho punto, se consideran tres zonas geográficas respecto a un incidente (ver Figura 10): Zona de Peligro (Zl) o zona central del área donde el peligro puede ser detectado directamente por el vehículo; Zona de incertidumbre (Z2) que rodea la zona de peligro y donde no es posible confirmar la información directamente pero donde la toma de decisiones debe ser rápida y eficaz porque en un corto periodo de tiempo el vehículo entrará en la zona de peligro; y Zona de Seguridad (Z3), donde los nodos se comportan siguiendo el paradigma de store-and-carry reuniendo evidencias acerca de un mismo peligro obtenidas mediante diferentes paquetes. Asimismo proponemos el establecimiento de grupos reactivos cuando se detecta un peligro, de manera que los vehículos cooperen formando grupos dentro de su rango, en la misma celda geográfica y generando información agregada evitando colisiones, retardos, sobrecargas en la red y repeticiones de información. Con la utilización de grupos pretendemos evitar que el número de paquetes generados en una zona de peligro para advertir de un problema crezca infinitamente, además de permitir la reducción del número de firmas contenidas en un paquete. El centro del área geográfica se corresponde con la localización del peligro existente y a partir de éste se generan los diferentes grupos. En cada grupo existe un líder encargado de construir el paquete y agregar las firmas de todos los vehículos de su grupo. La verificación de un mensaje de agregación solo se realiza en aquellos vehículos que son incapaces de verificar directamente la información, es decir, cuando un vehículo recibe un mensaje de advertencia sobre un incidente que está fuera de la cobertura de su antena y quiere confirmar la autenticidad del mensaje recibido. La verificación que realizan los vehículos depende del sentido de la marcha y de la zona geográfica en la que se encuentre. En la zona de incertidumbre, si un vehículo recibe un mensaje de agregación conteniendo n firmas, usa el registro de desplazamiento de longitud n definido en el módulo C7 alimentado con el primer bit de cada una de las firmas para generar n bits y verificar sólo las firmas indicadas por dicha salida. En la zona de seguridad, los vehículos comprueban una serie de firmas contenidas en el paquete tal como se describió en el caso anterior, pero además los vehículos podrán realizar otras verificaciones que les proporcionen mayor nivel de fiabilidad sobre la información recibida. Así, estando en esta zona, es posible recibir varios paquetes agregados correspondientes a un mismo peligro pero provenientes de diferentes grupos. As a specific proposal for the implementation of the C8 module, we propose that the verification of matches by aggregation of data be carried out according to a probabilistic protocol based on reactive groups, that is, generated ad-hoc to produce an aggregate package (see Figure 9). There are three situations in which vehicles can be found in relation to an incident: Vehicles that are capable of detecting an obstacle or incident on the road and are responsible for generating the corresponding warning messages; Vehicles that receive warning messages and can confirm that the information is true because they have direct contact with the incident; and Vehicles that receive warning messages but are not able to confirm or deny such information since they are out of range. On the other hand, since in most cases the information generated at a given point is of interest to us outside a certain distance radius from that point, three geographical areas are considered in relation to an incident (see Figure 10): Danger (Zl) or central area of the area where the hazard can be detected directly by the vehicle; Zone of uncertainty (Z2) that surrounds the danger zone and where it is not possible to confirm the information directly but where the decision-making must be quick and efficient because in a short period of time the vehicle will enter the danger zone; and Security Zone (Z3), where the nodes behave following the store-and-carry paradigm gathering evidence about the same danger obtained through different packages. We also propose the establishment of reactive groups when a hazard is detected, so that vehicles cooperate forming groups within their range, in the same geographical cell and generating aggregate information avoiding collisions, delays, network overloads and repetitions of information. With the use of groups we intend to prevent the number of packages generated in a danger zone to warn of a problem grow infinitely, in addition to allowing the reduction of the number of signatures contained in a package. The center of the geographical area corresponds to the location of the existing danger and from it the different groups are generated. In each group there is a leader in charge of building the package and adding the signatures of all the vehicles in his group. Verification of an aggregation message is only performed on those vehicles that are unable to directly verify the information, that is, when a vehicle receives a warning message about an incident that is outside the coverage of its antenna and wants to confirm the authenticity of the message received. The verification carried out by the vehicles depends on the direction of travel and the geographical area in which it is located. In the area of uncertainty, if a vehicle receives an aggregation message containing n signatures, it uses the offset register of length n defined in module C7 fed with the first bit of each of the signatures to generate n bits and verify only the signatures indicated by said exit. In the security zone, the vehicles check a series of signatures contained in the package as described in the previous case, but in addition the vehicles will be able to perform other verifications that provide them with a higher level of reliability on the information received. Thus, being in this area, it is possible to receive several aggregate packages corresponding to the same danger but coming from different groups.
A los 8 módulos básicos del sistema descritos se añade para la realización concreta, un último módulo que posibilita la detección automática de condiciones anómalas de la carretera con el objeto de avisar con antelación a los conductores para evitar o reducir los atascos. To the 8 basic modules of the system described, a final module is added for the specific implementation, which allows automatic detection of anomalous road conditions in order to notify drivers in advance to avoid or reduce traffic jams.
C9. Cálculo de velocidad, condiciones anómalas de tráfico y rutas alternativas: C9. Speed calculation, anomalous traffic conditions and alternative routes:
Este módulo usa la información recibida de un receptor de un sistema global de navegación por satélite. Es necesario para poder usar la red con objeto de ayudar a la conducción sin tener que instalar ningún tipo de infraestructura ni en el vehículo ni en la carretera (ver Figura 11). This module uses the information received from a receiver of a global satellite navigation system. It is necessary to be able to use the network in order to help driving without having to install any type of infrastructure either in the vehicle or on the road (see Figure 11).
A pesar de que se ha descrito y representado una realización concreta de la presente invención, es evidente que el experto en la materia podrá introducir variantes y modificaciones, o sustituir los detalles por otros técnicamente equivalentes, sin apartarse del ámbito de protección definido por las reivindicaciones adjuntas. Although a specific embodiment of the present invention has been described and represented, it is clear that the person skilled in the art will be able to introduce variants and modifications, or replace the details with technically equivalent ones, without departing from the scope of protection defined by the appended claims.

Claims

REIVINDICACIONES
1. Sistema de comunicaciones seguras en una red ad-hoc vehicular espontánea y autogestionada que comprende: 1. Secure communications system in a spontaneous and self-managed vehicular ad-hoc network comprising:
- un módulo de generación de claves de identidad y de firma digital;  - a module for generating identity and digital signature keys;
- un módulo que contenga arquitectura cliente/servidor con posibilidad de conexión a múltiples usuarios a la vez;  - a module containing client / server architecture with the possibility of connecting to multiple users at the same time;
- un módulo de envío multicast y recepción inalámbrica de beacons con seudónimos variables;  - a module for multicast sending and wireless reception of beacons with variable pseudonyms;
- un módulo para autenticación mutua de nodos, con intercambio de claves públicas fijas, claves secretas temporales, y almacenes de claves públicas basado en un esquema interactivo de reto-respuesta;  - a module for mutual authentication of nodes, with exchange of fixed public keys, temporary secret keys, and public key stores based on an interactive challenge-response scheme;
- un módulo de actualización de los almacenes de claves públicas;  - a module for updating public key stores;
- un módulo de reputación de nodos, que borra de los almacenes a los nodos deshonestos, mediante el borrado de su clave pública de los almacenes de certificados;  - a node reputation module, which deletes dishonest nodes from stores, by erasing their public key from certificate stores;
- un módulo de intercambio cifrado de datos sobre elementos estáticos y dinámicos de la carretera, mediante la utilización de una clave secreta temporal del emisor; - a module for the encrypted exchange of data on static and dynamic elements of the road, through the use of a temporary secret key of the transmitter;
- un módulo de autenticación de datos mediante la comprobación de coincidencias con otros mensajes recibidos mediante agregación de datos. - a data authentication module by checking matches with other messages received through data aggregation.
2. Sistema de comunicaciones seguras en una red ad-hoc vehicular espontánea y autogestionada según la reivindicación 1 para la reducción de atascos en carretera en la que: 2. Secure communications system in a spontaneous and self-managed vehicular ad-hoc network according to claim 1 for the reduction of road jams in which:
- el módulo de generación de claves de identidad y de firma digital se basa en la generación del valor decimal de la representación binaria correspondiente a la submatriz triangular superior de la matriz simétrica de adyacencia que contiene los elementos correspondientes a un circuito hamiltoniano en un grafo;  - the module for generating identity and digital signature keys is based on the generation of the decimal value of the binary representation corresponding to the upper triangular submatrix of the adjacent symmetric matrix containing the elements corresponding to a Hamiltonian circuit in a graph;
- el módulo de envío multicast y recepción inalámbrica de beacons con seudónimos variables se basa en el hash del listado de IDs de los nodos presentes en su almacén de claves públicas en ese momento;  - the module for multicast sending and wireless reception of beacons with variable pseudonyms is based on the hash of the list of IDs of the nodes present in your public keystore at that time;
- el módulo para autenticación mutua de nodos se basa en que un nodo B que desee establecer contacto con un nodo A en primer lugar le solicite el listado de IDs de su almacén en ese momento, compruebe coincidencia de su hash con el seudónimo enviado por A en su beacon, y le responda indicando una clave X presente en la intersección de ambos almacenes. Luego, se realiza una demostración de conocimiento nulo mutua sobre la clave pública X de manera que cada nodo construye a partir de dicha clave, considerándola como circuito hamiltoniano, un grafo G en el que X sea solución al problema difícil del circuito hamiltoniano, y lo envía al otro nodo. Después se realizan al menos dos iteraciones de la demostración de forma que en un primer paso cada nodo envía al otro como testigo de compromiso un grafo isomorfo GI al grafo previamente enviado. A continuación cada nodo envía al otro un reto aleatorio indicando si desea recibir del otro nodo el isomorfismo entre ambos grafos o bien un circuito hamiltoniano en el grafo isomorfo. Al finalizar la demostración de conocimiento nulo, ambos nodos saben que comparten la clave pública X, que usan para cifrar mediante el cifrado simétrico descrito más adelante, y enviar al otro nodo su propia clave pública de identidad. Después se intercambian sus claves secretas temporales cifradas con la clave pública del otro nodo y finalmente cada uno usa su propia clave secreta temporal para cifrar con el cifrado simétrico descrito a continuación, y enviar cifrado su almacén de claves, que es contrastado contra el seudónimo remitido en el beacon y el listado de IDs enviado en el primer paso de la autenticación; - the module for mutual authentication of nodes is based on the fact that a node B that wishes to establish contact with a node A first requests the list of IDs from your store at that time, check your hash match with the pseudonym sent by A on your beacon, and respond by indicating an X key present at the intersection of both stores. Then, a demonstration of mutual null knowledge about the public key X is carried out so that each node builds from said key, considering it as a Hamiltonian circuit, a graph G in which X is a solution to the difficult problem of the Hamiltonian circuit, and what Send to the other node. Then at least two iterations of the demonstration are performed so that in a first step each node sends an isomorphic GI graph to the other as a compromise to the previously sent graph. Each node then sends the other a random challenge indicating whether it wishes to receive from the other node the isomorphism between both graphs or a Hamiltonian circuit in the isomorphic graph. At the end of the demonstration of null knowledge, both nodes know that they share the public key X, which they use to encrypt using the symmetric encryption described below, and send their own public identity key to the other node. Then they exchange their encrypted temporary secret keys with the public key of the other node and finally each uses their own temporary secret key to encrypt with the symmetric encryption described below, and send encrypted their keystore, which is contrasted against the pseudonym forwarded in the beacon and the list of IDs sent in the first step of the authentication;
- el módulo de actualización de los almacenes de claves públicas se basa en utilizar un algoritmo en el cada nodo escoge para guardar en su almacén aquellos certificados de claves públicas de los nodos que más certificados válidos han emitido o recibido. Los certificados y nodos del almacén se tratan en dicho algoritmo respectivamente como aristas y vértices de un grafo;  - The module for updating public key stores is based on using an algorithm in each node that chooses to store in its store those public key certificates of the nodes that have issued or received more valid certificates. The certificates and nodes of the store are treated in said algorithm respectively as edges and vertices of a graph;
- el módulo de reputación de nodos se basa en reflejar la conducta de un nodo deshonesto asignando en el almacén un peso negativo a las aristas correspondientes a certificados emitidos o recibidos por él, de forma que al recibir dichos certificados un peso negativo, el vértice dejará progresivamente de estar presente en los almacenes actualizados. Este esquema se combina en el algoritmo de actualización de almacenes con una asignación de pesos a aristas en el almacén, según el siguiente criterio: 2 para certificados emitidos o recibidos directamente por el nodo, 1 para el resto de certificados, -2 para certificados denunciados directamente por el nodo, y -1 para certificados denunciados por otros nodos; - the node reputation module is based on reflecting the conduct of a dishonest node by assigning in the warehouse a negative weight to the edges corresponding to certificates issued or received by it, so that upon receiving said certificates a negative weight, the vertex will leave progressively being present in updated stores. This scheme is combined in the warehouse update algorithm with an assignment of weights to edges in the warehouse, according to the following criteria: 2 for certificates issued or received directly by the node, 1 for the rest of the certificates, -2 for certificates denounced directly by the node, and -1 for certificates denounced by other nodes;
- el módulo de intercambio cifrado de datos se basa en un cifrado en flujo binario usando como generador de secuencia cifrante un filtrado no lineal decimado y con buffer, de un registro de desplazamiento con polinomio de realimentación primitivo sobre GF(2) de grado L igual a la longitud de la clave usada en cada momento, alimentado con la semilla formada por dicha clave, y con polinomio de realimentación dado por el polinomio primitivo de menores coeficientes no nulos y número de dichos coeficientes dado por el menor número posible mayor que 0,07*L. La función no lineal del filtrado tiene como orden el número primo p más cercano a L/2, incluye un término lineal correspondiente a su orden, además de un número de términos de cada orden i=l,2,..., p dado por la parte entera de L/i, obtenidos multiplicando etapas sucesivas. La salida de dicho filtrado no lineal se decima irregularmente de manera que la salida del registro determina en cada momento si la correspondiente salida del filtrado se utiliza o se descarta, introduciéndose en el primer caso en un buffer de tamaño 4;  - The encrypted data exchange module is based on a binary flow encryption using a declined and non-linear filtering generator with a buffer, of a shift register with primitive feedback polynomial on GF (2) of equal degree L to the length of the key used at any time, fed with the seed formed by said key, and with feedback polynomial given by the primitive polynomial of lower non-zero coefficients and number of said coefficients given by the smallest possible number greater than 0, 07 * L. The nonlinear function of filtering has as its order the prime number p closest to L / 2, includes a linear term corresponding to its order, in addition to a number of terms of each order i = l, 2, ..., p given for the entire part of L / i, obtained by multiplying successive stages. The output of said non-linear filtering is irregularly declined so that the log output determines at any time whether the corresponding filtrate output is used or discarded, being introduced in the first case in a size 4 buffer;
- el módulo de autenticación de datos se basa en un esquema de agregación de datos basado en grupos reactivos en los que cada líder se encarga de construir el paquete y agregar las firmas de todos los vehículos de su grupo, y donde la verificación se realiza según un protocolo probabilístico que depende de la zona geográfica en la que se encuentre cada vehículo;  - the data authentication module is based on a data aggregation scheme based on reactive groups in which each leader is responsible for building the package and adding the signatures of all the vehicles in their group, and where the verification is carried out according to a probabilistic protocol that depends on the geographical area in which each vehicle is located;
- se añade un módulo de detección automática de condiciones anómalas para el cálculo de velocidad, basado en la información recibida de un receptor de un sistema global de navegación por satélite.  - an automatic anomaly detection module is added for speed calculation, based on the information received from a receiver of a global satellite navigation system.
PCT/ES2011/000220 2010-06-29 2011-06-29 System for securely communicating in a spontaneous self-managed ad-hoc vehicular network WO2012007609A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ES201000865A ES2372841B2 (en) 2010-06-29 2010-06-29 SECURE COMMUNICATIONS SYSTEM IN AN AD-HOC SPONTANEOUS AND SELF-MANAGED VEHICLE NETWORK.
ESP201000865 2010-06-29

Publications (1)

Publication Number Publication Date
WO2012007609A1 true WO2012007609A1 (en) 2012-01-19

Family

ID=45446403

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/ES2011/000220 WO2012007609A1 (en) 2010-06-29 2011-06-29 System for securely communicating in a spontaneous self-managed ad-hoc vehicular network

Country Status (2)

Country Link
ES (1) ES2372841B2 (en)
WO (1) WO2012007609A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9971800B2 (en) 2016-04-12 2018-05-15 Cisco Technology, Inc. Compressing indices in a video stream
US20190136022A1 (en) * 2016-04-27 2019-05-09 Borealis Ag Crosslinked polymer composition for cable accessories

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017158208A1 (en) * 2016-03-18 2017-09-21 Universidad De La Laguna System and method for the automation and safe use of mobile applications in vehicles

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"Pretty Good Privacy", ARTICULO WIKIPEDIA, 18 June 2010 (2010-06-18), Retrieved from the Internet <URL:http://es.wikipedia.org/w/index.php?title=Pretty_Good_Privacy&oldid=38143026> [retrieved on 20111202] *
CABALLERO-GIL ET AL.: "Self-organized authentication architecture for Mobile Ad-hoc Networks", INTERNATIONAL SYMPOSIUM ON 6TH MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS AND WORKSHOPS, 2008. WIOPT 2008, 1 August 2008 (2008-08-01), PISCATAWAY, NJ, USA., pages 217 - 224 *
CAPKUN ET AL.: "Self-organized public-key management for mobile ad hoc networks", IEEE TRANSACTIONS ON MOBILE COMPUTING (2003), vol. 2, no. 1, 31 March 2003 (2003-03-31), PISCATAWAY, NJ, USA., pages 52 - 64, XP001171685, DOI: doi:10.1109/TMC.2003.1195151 *
RAYA ET AL.: "Efficient Secure Aggregation in VANETs", PROCEEDINGS OF THE 3RD INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS 2006, 31 December 2006 (2006-12-31), pages 67 - 75 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9971800B2 (en) 2016-04-12 2018-05-15 Cisco Technology, Inc. Compressing indices in a video stream
US20190136022A1 (en) * 2016-04-27 2019-05-09 Borealis Ag Crosslinked polymer composition for cable accessories
US10889705B2 (en) * 2016-04-27 2021-01-12 Borealis Ag Crosslinked polymer composition for cable accessories

Also Published As

Publication number Publication date
ES2372841A1 (en) 2012-01-27
ES2372841B2 (en) 2013-04-16

Similar Documents

Publication Publication Date Title
Yang et al. DeQoS attack: Degrading quality of service in VANETs and its mitigation
Mishra et al. Security in vehicular adhoc networks: a survey
Park et al. Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support
Jan et al. A survey on privacy-preserving authentication schemes in VANETs: Attacks, challenges and open issues
Reddy et al. Sybil attack detection technique using session key certificate in vehicular ad hoc networks
Singh et al. MPFSLP: Masqueraded probabilistic flooding for source-location privacy in VANETs
Molina-Gil et al. Aggregation and probabilistic verification for data authentication in VANETs
Fan et al. Strongly privacy-preserving communication protocol for VANETs
Lin et al. Vehicular ad hoc network security and privacy
Ravi et al. Securing vanet using blockchain technology
Caballero-Gil et al. How to build vehicular ad-hoc networks on smartphones
ES2372841B2 (en) SECURE COMMUNICATIONS SYSTEM IN AN AD-HOC SPONTANEOUS AND SELF-MANAGED VEHICLE NETWORK.
Nirala et al. Performance evaluation of loss packet percentage for asymmetric key cryptography in VANET
Premasudha et al. A Review of Security Threats, Solutions and Trust Management in VANETs.
Malik et al. An overview of security challenges in vehicular ad-hoc networks
Singh Overview of Challenges in VANET
Caballero-Gil et al. Flexible authentication in vehicular ad hoc networks
Das et al. 5G Enabled VANET Architecture Incorporating Security and Trust Management Mechanism
Sunnadkal et al. A four-stage design approach towards securing a vehicular ad hoc networks architecture
Jiang et al. LPTM: Lightweight and privacy‐preserving traffic monitoring scheme
Sun Anonymous, secure and efficient vehicular communications
Kacem VANET-Sec: A Framework to Secure Vehicular Ad-Hoc Networks Using a Permissioned Blockchain
Caballero-Gil et al. On Privacy and Integrity in Vehicular Ad hoc Networks.
Ranganathan et al. An implementation of secure authentication scheme in vanets
Nampally et al. A survey on secure clustering approaches for VANET

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11806328

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11806328

Country of ref document: EP

Kind code of ref document: A1