정형검증 도구인 Casper를 이용한 VANET 인증 프로토콜 분석

Analysis of VANET Authentication Protocol using Casper in the Formal Verification

  • 이수연 (백석문화대학교 인터넷정보학부) ;
  • 안효범 (공주대학교 정보통신공학부)
  • 투고 : 2012.03.03
  • 심사 : 2012.03.21
  • 발행 : 2012.03.30

초록

VANET(Vehicular Ad-hoc Network)은 지능형 차량들로 이루어진 애드혹 네트워크 환경으로서 최근 들어 그 연구가 활발하게 진행되고 있는 분야이다. VANET은 원활한 교통 소통, 사고 방지 등 여러 가지 편리한 기능들을 제공하지만 그 기반을 애드혹 네트워크에 두고 있기 때문에 애드혹 망에서 발생하는 보안 문제를 가지고 있고 또한 그 환경적 특성에 따라 추가적인 보안 요구 사항이 존재한다. 본 논문에서는 해쉬함수를 이용한 기존의 V2I 인증프로토콜에 대하여 검토하고, 이를 정형적 검증 방법인 Casper를 이용하여 인증 프로토콜의 안정성을 분석하였고 그 결과 안전함을 증명하였다.

VANET(Vehicular Ad-hoc Network) is a kind of ad hoc networks consist of intelligence vehicular ad nodes, and has become a hot emerging research project in many fields. It provide traffic safety, cooperative driving and etc. but has also some security problems that can be occurred in general ad hoc networks. Also, in VANET, vehiculars sho uld be able to authenticate each other to securely communicate with network-based infrastructure, and their location s and identifiers should not be exposed from the communication messages. This paper explains V2I authentication pr otocol using a hash function that preserves the user privacy. In addition, we analyze the security stability of the V2I authentication protocol using Casper in the formal verification technique. As a result, V2I authentication protocol us ing hash function prove a stability.

키워드

참고문헌

  1. G. Calandriello, P. Papadimitratos and J. P. Hub aux, "Efficient and Robust Pseudonymous Auth entication in VANET, " In Proc. International Workshop VANET, pp.19-28, 2007.
  2. J. Zhang, L. Ma, W. Su, and Y. Wang, "Privacy-Preserving Authentication Based on Short Group Signature in Vehicular Networks," Proceedings of the First International Symposium on Data, Privacy, and E-Commerce, pp. 138-142,
  3. B.H.Hwang, D.H.Lee, "An efficient authentication protocol between vehicle and communication infrastructure for intelligent vehicular networks", proceeding of the ITFE Summer conference, pp 500-503,August, 2008.
  4. M..raya and J.Hubaux, "Securing vehicular ad hoc networks," J. of Computer Security, vol. 15, no. 1, pp. 39-68, Jan.2007
  5. X. Lin, X. Sun, P,-H, Ho and X. Shen, "GSIS: A Secure and Privacy Preserving Protocol for Vehicular Coomunications", IEEE Trans, on Vehicular Technology, vol, 56, no.6, pp.3442-3456, 2007.
  6. Hoare, C.A.R., Communication Sequential Porcesses, Prentice-Hall, 1985 N), LNCS, pp 149-164, 2004.
  7. G. Calandriello, P. Papadimitratos and J. P. Hu baux, "Efficient and Robust Pseudonymous Authentication in VANET," In Proc. International Workshop VANET, pp. 19-28, 2007.
  8. Hoare, C.A.R, Communicating Sequential Proces ses, Prentice-Hall, 1985.
  9. Formal System Ltd, FDR2 User Manual, Aug, 1999.
  10. Lowq, G., "Casper: A Compiler for the analysis of Security Protocols," In Proc. of the 1997 IEEE Computer Security Foundation Workshop X, IEEE Computer Society, Silver Spring, MD, pp, 18-30, 1997.