Upload
akanksha-upadhyay
View
5.254
Download
7
Embed Size (px)
DESCRIPTION
Introduction to VANET technology. A way ti implement Intelligent Transportation System.
Citation preview
Akanksha UpadhyayM.Tech.
Organization of the Presentation
Introduction to VANET technology VANET Security Threats Challenges in VANET Security Requirements
Akanksha Upadhyay 0108CS12MT26
Introduction to VANET
Vehicles connected to each others through an ad hoc formation form a wireless network called “Vehicular Ad Hoc Network”.
Vehicular ad hoc networks (VANETs) are a subgroup of mobile ad hoc networks (MANETs).
It includes V2V communications and V2R communications and is important component of ITS.
Nodes are expected to communicate by means of North American DSRC standard that employs the IEEE 802.11p standard for wireless communication.
Akanksha Upadhyay 0108CS12MT26
Why VANET
• Increase traveler safety
o10.8 million vehicle crashes from 1990 to 2009
o36,000 fatalities in 2009 only
o 24,000 of these due to collision with other vehicles /
objects.
o Costs more than $100 billion per year
• Boost on-board luxury
Akanksha Upadhyay 0108CS12MT26
VANET
Akanksha Upadhyay 0108CS12MT26
Road Side Unit (RSU)
V2RV2V
Server (Location Based Service)
Server (Traffic Monitoring)
Architecture
Akanksha Upadhyay 0108CS12MT26
Applications
Akanksha Upadhyay 0108CS12MT26
Applications
Akanksha Upadhyay 0108CS12MT26
Characteristics of VANET
• High mobility of nodes
• Rapidly changing network topology (predictable to some
extent)
• Unbounded network size
• Potential support from infrastructure
• Real-time, time-sensitive data exchange
• Crucial effect of security and privacy
Akanksha Upadhyay 0108CS12MT26
Security in VANETs
• When data is compromised, the whole system suffers.• The nature of VANETs could lead to malicious attacks.
o Predictable movement of nodes.o High mobility of victim/attacker.
• Adversaries could break the system.o Data sinkholes (black hole).o Feed false information.o Sybil attacks.o Flood the system.
• Security measures must be taken to avoid malicious attacks on the system.
Akanksha Upadhyay 0108CS12MT26
Threats in VANET
Threats to Availability
Threats to Authentication
Threats to driver’s Confidentiality
Akanksha Upadhyay 0108CS12MT26
Threats to Availability
Akanksha Upadhyay 0108CS12MT26
Threats to Authentication
Akanksha Upadhyay 0108CS12MT26
Threats to Confidentiality
Because VANET mobility is higher than MANET, routing with
capability of ensuring security in VANET is more problematic
than Adhoc.
Illegal collection of messages by eavesdropping and gathering of
location information available through the transmission of
broadcast messages.
Location privacy and anonymity are important issues for vehicle
users .
Akanksha Upadhyay 0108CS12MT26
Challenges in VANETs
• Mobility• Volatility• Privacy VS Authentication• Privacy VS Liability• Network Scalability
Akanksha Upadhyay 0108CS12MT26
Security Requirements
• Message authentication and integrity.• Message non-repudiation.• Node authentication.• Access control.• Message confidentiality.• Availability• Accountability.• Privacy protection.
Akanksha Upadhyay 0108CS12MT26
Authentication
• Every message must be authenticated to make sure its origin and to control authorization level of the vehicles
• Vehicles sign messages with their private keys along with digital certificate
• Digital signature causes an overhead. To reduce this overhead ECC (Elliptic Curve Cryptography) can be used
17Akanksha Upadhyay 0108CS12MT26
Availability
• Vehicular network must be available all the time, in real-time• A delay in seconds for some applications will make the
message meaningless and maybe the result will be devastating• Attempting to meet real-time demands makes the system
vulnerable to the DoS attack.
18Akanksha Upadhyay 0108CS12MT26
Accountability/Non-repudiation
• Non-repudiation will facilitate the ability to identify the attackers even after the attack happens. This prevents cheaters from denying their crimes.
• Accountability is related to the ability to provide necessary evidence to show how each party involves in the communications.
• Any information related to the car, e.g. the trip route, speed, time, any violation will be stored in a tamper-proof OBU, any official side holding authorization can retrieve this data.
19Akanksha Upadhyay 0108CS12MT26
Privacy
• Keeping the information of the drivers away from unauthorized observers, this information like real identity, trip path, speed etc…
• The privacy could be achieved by using temporary (one-time) keys. Keys are stored in the tamper-proof OBU. The keys will be reloaded in next time that the vehicle makes an official checkup.
• For preserving the real identity of the driver, an ELP (Electronic License Plate) is used, this license is installed in the factory for every new vehicle, it provides an identification number for the vehicle, to identify the vehicle in anywhere, with the RFID technology to hold the ELP.
• In case when the police or any official wants the real identity, it can take an order from the judge to recover the identity of specific vehicles ELP.
20Akanksha Upadhyay 0108CS12MT26
Secure Routing Requirements
• Two major routing categories:o ID based.o Geography based.
• Depending on the needs, each category has its advantages.o ID methods are for sending data to an individual node.o Geography methods are for sending data to a group of
nodes.
21Akanksha Upadhyay 0108CS12MT26
Thanks!!