2. Organization of the Presentation
Introduction to VANET technology
VANET Security Threats
Challenges in VANET
Security Requirements
Akanksha Upadhyay
0108CS12MT26
3. Introduction to VANET
Vehicles connected to each others through an ad hoc formation
form a wireless network called “Vehicular Ad Hoc Network”.
Vehicular ad hoc networks (VANETs) are a subgroup of mobile
ad hoc networks (MANETs).
It includes V2V communications and V2R communications and
is important component of ITS.
Nodes are expected to communicate by means of North
American DSRC standard that employs the IEEE 802.11p
standard for wireless communication.
Akanksha Upadhyay
0108CS12MT26
4. Why VANET
• Increase traveler safety
o10.8
million vehicle crashes from 1990 to 2009
o36,000
o
fatalities in 2009 only
24,000 of these due to collision with other vehicles /
objects.
o
Costs more than $100 billion per year
• Boost on-board luxury
Akanksha Upadhyay
0108CS12MT26
9. Characteristics of VANET
•
•
High mobility of nodes
Rapidly changing network topology (predictable to some
extent)
•
Unbounded network size
•
Potential support from infrastructure
•
Real-time, time-sensitive data exchange
•
Crucial effect of security and privacy
Akanksha Upadhyay
0108CS12MT26
10. Security in VANETs
• When data is compromised, the whole system suffers.
• The nature of VANETs could lead to malicious attacks.
o Predictable movement of nodes.
o High mobility of victim/attacker.
• Adversaries could break the system.
o Data sinkholes (black hole).
o Feed false information.
o Sybil attacks.
o Flood the system.
• Security measures must be taken to avoid malicious attacks on
the system.
Akanksha Upadhyay
0108CS12MT26
11. Threats in VANET
Threats to Availability
Threats to Authentication
Threats to driver’s Confidentiality
Akanksha Upadhyay
0108CS12MT26
14. Threats to Confidentiality
Because VANET mobility is higher than MANET, routing with
capability of ensuring security in VANET is more problematic
than Adhoc.
Illegal collection of messages by eavesdropping and gathering of
location information available through the transmission of
broadcast messages.
Location privacy and anonymity are important issues for vehicle
users .
Akanksha Upadhyay
0108CS12MT26
17. Authentication
• Every message must be authenticated to make sure its origin
and to control authorization level of the vehicles
• Vehicles sign messages with their private keys along with
digital certificate
• Digital signature causes an overhead. To reduce this overhead
ECC (Elliptic Curve Cryptography) can be used
Akanksha Upadhyay
0108CS12MT26
17
18. Availability
• Vehicular network must be available all the time, in real-time
• A delay in seconds for some applications will make the
message meaningless and maybe the result will be devastating
• Attempting to meet real-time demands makes the system
vulnerable to the DoS attack.
Akanksha Upadhyay
0108CS12MT26
18
19. Accountability/Non-repudiation
• Non-repudiation will facilitate the ability to identify the
attackers even after the attack happens. This prevents cheaters
from denying their crimes.
• Accountability is related to the ability to provide necessary
evidence to show how each party involves in the
communications.
• Any information related to the car, e.g. the trip route, speed,
time, any violation will be stored in a tamper-proof OBU, any
official side holding authorization can retrieve this data.
Akanksha Upadhyay
0108CS12MT26
19
20. Privacy
• Keeping the information of the drivers away from unauthorized
observers, this information like real identity, trip path, speed etc…
• The privacy could be achieved by using temporary (one-time) keys.
Keys are stored in the tamper-proof OBU. The keys will be reloaded
in next time that the vehicle makes an official checkup.
• For preserving the real identity of the driver, an ELP (Electronic
License Plate) is used, this license is installed in the factory for
every new vehicle, it provides an identification number for the
vehicle, to identify the vehicle in anywhere, with the RFID
technology to hold the ELP.
• In case when the police or any official wants the real identity, it can
take an order from the judge to recover the identity of specific
vehicles ELP.
Akanksha Upadhyay
0108CS12MT26
20
21. Secure Routing Requirements
• Two major routing categories:
o ID based.
o Geography based.
• Depending on the needs, each category has its advantages.
o ID methods are for sending data to an individual node.
o Geography methods are for sending data to a group of
nodes.
Akanksha Upadhyay
0108CS12MT26
21