SlideShare une entreprise Scribd logo
1  sur  22
Akanksha Upadhyay
M.Tech.
Organization of the Presentation






Introduction to VANET technology
VANET Security Threats
Challenges in VANET
Security Requirements

Akanksha Upadhyay
0108CS12MT26
Introduction to VANET

Vehicles connected to each others through an ad hoc formation
form a wireless network called “Vehicular Ad Hoc Network”.
Vehicular ad hoc networks (VANETs) are a subgroup of mobile
ad hoc networks (MANETs).
It includes V2V communications and V2R communications and
is important component of ITS.
Nodes are expected to communicate by means of North
American DSRC standard that employs the IEEE 802.11p
standard for wireless communication.

Akanksha Upadhyay
0108CS12MT26
Why VANET

• Increase traveler safety
o10.8

million vehicle crashes from 1990 to 2009

o36,000

o

fatalities in 2009 only

24,000 of these due to collision with other vehicles /

objects.
o

Costs more than $100 billion per year

• Boost on-board luxury
Akanksha Upadhyay
0108CS12MT26
VANET

Akanksha Upadhyay
0108CS12MT26
Architecture

V2V

V2R

Road Side
Unit (RSU)
Server (Traffic
Monitoring)

Server (Location
Based Service)

Akanksha Upadhyay
0108CS12MT26
Applications

Akanksha Upadhyay
0108CS12MT26
Applications

Akanksha Upadhyay
0108CS12MT26
Characteristics of VANET

•
•

High mobility of nodes
Rapidly changing network topology (predictable to some
extent)

•

Unbounded network size

•

Potential support from infrastructure

•

Real-time, time-sensitive data exchange

•

Crucial effect of security and privacy

Akanksha Upadhyay
0108CS12MT26
Security in VANETs
• When data is compromised, the whole system suffers.
• The nature of VANETs could lead to malicious attacks.
o Predictable movement of nodes.
o High mobility of victim/attacker.
• Adversaries could break the system.
o Data sinkholes (black hole).
o Feed false information.
o Sybil attacks.
o Flood the system.
• Security measures must be taken to avoid malicious attacks on
the system.
Akanksha Upadhyay
0108CS12MT26
Threats in VANET

Threats to Availability
Threats to Authentication
Threats to driver’s Confidentiality

Akanksha Upadhyay
0108CS12MT26
Threats to Availability

Akanksha Upadhyay
0108CS12MT26
Threats to Authentication

Akanksha Upadhyay
0108CS12MT26
Threats to Confidentiality

Because VANET mobility is higher than MANET, routing with
capability of ensuring security in VANET is more problematic
than Adhoc.
Illegal collection of messages by eavesdropping and gathering of
location information available through the transmission of
broadcast messages.
Location privacy and anonymity are important issues for vehicle
users .
Akanksha Upadhyay
0108CS12MT26
Challenges in VANETs

•
•
•
•
•

Mobility
Volatility
Privacy VS Authentication
Privacy VS Liability
Network Scalability

Akanksha Upadhyay
0108CS12MT26
Security Requirements

•
•
•
•
•
•
•
•

Message authentication and integrity.
Message non-repudiation.
Node authentication.
Access control.
Message confidentiality.
Availability
Accountability.
Privacy protection.

Akanksha Upadhyay
0108CS12MT26
Authentication

• Every message must be authenticated to make sure its origin
and to control authorization level of the vehicles
• Vehicles sign messages with their private keys along with
digital certificate
• Digital signature causes an overhead. To reduce this overhead
ECC (Elliptic Curve Cryptography) can be used

Akanksha Upadhyay
0108CS12MT26

17
Availability
• Vehicular network must be available all the time, in real-time
• A delay in seconds for some applications will make the
message meaningless and maybe the result will be devastating
• Attempting to meet real-time demands makes the system
vulnerable to the DoS attack.

Akanksha Upadhyay
0108CS12MT26

18
Accountability/Non-repudiation
• Non-repudiation will facilitate the ability to identify the
attackers even after the attack happens. This prevents cheaters
from denying their crimes.
• Accountability is related to the ability to provide necessary
evidence to show how each party involves in the
communications.
• Any information related to the car, e.g. the trip route, speed,
time, any violation will be stored in a tamper-proof OBU, any
official side holding authorization can retrieve this data.

Akanksha Upadhyay
0108CS12MT26

19
Privacy

• Keeping the information of the drivers away from unauthorized
observers, this information like real identity, trip path, speed etc…
• The privacy could be achieved by using temporary (one-time) keys.
Keys are stored in the tamper-proof OBU. The keys will be reloaded
in next time that the vehicle makes an official checkup.
• For preserving the real identity of the driver, an ELP (Electronic
License Plate) is used, this license is installed in the factory for
every new vehicle, it provides an identification number for the
vehicle, to identify the vehicle in anywhere, with the RFID
technology to hold the ELP.
• In case when the police or any official wants the real identity, it can
take an order from the judge to recover the identity of specific
vehicles ELP.
Akanksha Upadhyay
0108CS12MT26

20
Secure Routing Requirements
• Two major routing categories:
o ID based.
o Geography based.
• Depending on the needs, each category has its advantages.
o ID methods are for sending data to an individual node.
o Geography methods are for sending data to a group of
nodes.

Akanksha Upadhyay
0108CS12MT26

21
Thanks!!

Contenu connexe

Tendances

Tendances (20)

VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs Presentation
 
VANET
VANETVANET
VANET
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
VANET
VANETVANET
VANET
 
VANET (BY-VEDANT)
VANET (BY-VEDANT)VANET (BY-VEDANT)
VANET (BY-VEDANT)
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
V2X Communications: Getting our Cars Talking
V2X Communications: Getting our Cars TalkingV2X Communications: Getting our Cars Talking
V2X Communications: Getting our Cars Talking
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
MANET VS VANET
MANET VS VANETMANET VS VANET
MANET VS VANET
 
Vehicular network
Vehicular networkVehicular network
Vehicular network
 
V2V tech
V2V techV2V tech
V2V tech
 
Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)
 
Cellular V2X
Cellular V2XCellular V2X
Cellular V2X
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication System
 
MANET
MANETMANET
MANET
 
Vehicular Networks
Vehicular NetworksVehicular Networks
Vehicular Networks
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
ITS (Intelligent Teleportation System)
ITS (Intelligent Teleportation System)ITS (Intelligent Teleportation System)
ITS (Intelligent Teleportation System)
 

En vedette

Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTS
Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTSGestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTS
Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTSMkMk Kachallah
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetsirojiddin
 
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...GPRS MYGPRSEXPRESS
 
Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)Brijesh Kaushik
 
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechtureHina Saxena
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 ProtocolMiles Kevin Galario
 

En vedette (9)

Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTS
Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTSGestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTS
Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTS
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanet
 
Mobile IP 1
Mobile IP 1Mobile IP 1
Mobile IP 1
 
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
 
Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)
 
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechture
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
 
GSM ARCHITECTURE
GSM ARCHITECTUREGSM ARCHITECTURE
GSM ARCHITECTURE
 
GPRS
GPRSGPRS
GPRS
 

Similaire à Introduction to VANET

Intelligent transport system (ITS)
Intelligent transport system (ITS)Intelligent transport system (ITS)
Intelligent transport system (ITS)Aravind Samala
 
COMMUNICABLE AUTONOMOUS SECURED VEHICLE
COMMUNICABLE AUTONOMOUS SECURED VEHICLECOMMUNICABLE AUTONOMOUS SECURED VEHICLE
COMMUNICABLE AUTONOMOUS SECURED VEHICLEVed Prakash
 
INTELLIGENT TRANSPORTATION SYSTEM .pptx
INTELLIGENT TRANSPORTATION SYSTEM  .pptxINTELLIGENT TRANSPORTATION SYSTEM  .pptx
INTELLIGENT TRANSPORTATION SYSTEM .pptxSanthosh Kumar B V
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communicationNavin B S
 
Creating a Safer, Smarter ride - NFV for Automotive
Creating a Safer, Smarter ride - NFV for AutomotiveCreating a Safer, Smarter ride - NFV for Automotive
Creating a Safer, Smarter ride - NFV for AutomotiveTrinath Somanchi
 
Intelligent Transportation System Modified
Intelligent Transportation System ModifiedIntelligent Transportation System Modified
Intelligent Transportation System ModifiedDurgesh Mishra
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communicationR prasad
 
Connectivity Challenges for CAVs - Athonet Group
Connectivity Challenges for CAVs - Athonet GroupConnectivity Challenges for CAVs - Athonet Group
Connectivity Challenges for CAVs - Athonet GrouptechUK
 
Intelligent Transportation System
Intelligent Transportation SystemIntelligent Transportation System
Intelligent Transportation SystemUsama Qazi
 
Dedicated roads for autonomous vehicles
Dedicated roads for autonomous vehicles Dedicated roads for autonomous vehicles
Dedicated roads for autonomous vehicles Jeffrey Funk
 
VANET based Intelligent TransportationSystem using Li-Fi technology
VANET based Intelligent TransportationSystem using Li-Fi technologyVANET based Intelligent TransportationSystem using Li-Fi technology
VANET based Intelligent TransportationSystem using Li-Fi technologyIOSRJECE
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETDr.Irshad Ahmed Sumra
 

Similaire à Introduction to VANET (20)

Intelligent transport system (ITS)
Intelligent transport system (ITS)Intelligent transport system (ITS)
Intelligent transport system (ITS)
 
COMMUNICABLE AUTONOMOUS SECURED VEHICLE
COMMUNICABLE AUTONOMOUS SECURED VEHICLECOMMUNICABLE AUTONOMOUS SECURED VEHICLE
COMMUNICABLE AUTONOMOUS SECURED VEHICLE
 
INTELLIGENT TRANSPORTATION SYSTEM .pptx
INTELLIGENT TRANSPORTATION SYSTEM  .pptxINTELLIGENT TRANSPORTATION SYSTEM  .pptx
INTELLIGENT TRANSPORTATION SYSTEM .pptx
 
Electronic toll system
Electronic toll systemElectronic toll system
Electronic toll system
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communication
 
vanets presentation-.pdf
vanets presentation-.pdfvanets presentation-.pdf
vanets presentation-.pdf
 
Creating a Safer, Smarter ride - NFV for Automotive
Creating a Safer, Smarter ride - NFV for AutomotiveCreating a Safer, Smarter ride - NFV for Automotive
Creating a Safer, Smarter ride - NFV for Automotive
 
Intelligent Transportation System Modified
Intelligent Transportation System ModifiedIntelligent Transportation System Modified
Intelligent Transportation System Modified
 
final.pptx
final.pptxfinal.pptx
final.pptx
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communication
 
Connectivity Challenges for CAVs - Athonet Group
Connectivity Challenges for CAVs - Athonet GroupConnectivity Challenges for CAVs - Athonet Group
Connectivity Challenges for CAVs - Athonet Group
 
Intelligent Transportation System
Intelligent Transportation SystemIntelligent Transportation System
Intelligent Transportation System
 
Deepak
DeepakDeepak
Deepak
 
Deepak
DeepakDeepak
Deepak
 
Dedicated roads for autonomous vehicles
Dedicated roads for autonomous vehicles Dedicated roads for autonomous vehicles
Dedicated roads for autonomous vehicles
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
VANET based Intelligent TransportationSystem using Li-Fi technology
VANET based Intelligent TransportationSystem using Li-Fi technologyVANET based Intelligent TransportationSystem using Li-Fi technology
VANET based Intelligent TransportationSystem using Li-Fi technology
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
 
Automotive Telematics
Automotive TelematicsAutomotive Telematics
Automotive Telematics
 
EMV 201 EMF June 2016
EMV 201 EMF June 2016EMV 201 EMF June 2016
EMV 201 EMF June 2016
 

Dernier

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Introduction to VANET

  • 2. Organization of the Presentation     Introduction to VANET technology VANET Security Threats Challenges in VANET Security Requirements Akanksha Upadhyay 0108CS12MT26
  • 3. Introduction to VANET Vehicles connected to each others through an ad hoc formation form a wireless network called “Vehicular Ad Hoc Network”. Vehicular ad hoc networks (VANETs) are a subgroup of mobile ad hoc networks (MANETs). It includes V2V communications and V2R communications and is important component of ITS. Nodes are expected to communicate by means of North American DSRC standard that employs the IEEE 802.11p standard for wireless communication. Akanksha Upadhyay 0108CS12MT26
  • 4. Why VANET • Increase traveler safety o10.8 million vehicle crashes from 1990 to 2009 o36,000 o fatalities in 2009 only 24,000 of these due to collision with other vehicles / objects. o Costs more than $100 billion per year • Boost on-board luxury Akanksha Upadhyay 0108CS12MT26
  • 6. Architecture V2V V2R Road Side Unit (RSU) Server (Traffic Monitoring) Server (Location Based Service) Akanksha Upadhyay 0108CS12MT26
  • 9. Characteristics of VANET • • High mobility of nodes Rapidly changing network topology (predictable to some extent) • Unbounded network size • Potential support from infrastructure • Real-time, time-sensitive data exchange • Crucial effect of security and privacy Akanksha Upadhyay 0108CS12MT26
  • 10. Security in VANETs • When data is compromised, the whole system suffers. • The nature of VANETs could lead to malicious attacks. o Predictable movement of nodes. o High mobility of victim/attacker. • Adversaries could break the system. o Data sinkholes (black hole). o Feed false information. o Sybil attacks. o Flood the system. • Security measures must be taken to avoid malicious attacks on the system. Akanksha Upadhyay 0108CS12MT26
  • 11. Threats in VANET Threats to Availability Threats to Authentication Threats to driver’s Confidentiality Akanksha Upadhyay 0108CS12MT26
  • 12. Threats to Availability Akanksha Upadhyay 0108CS12MT26
  • 13. Threats to Authentication Akanksha Upadhyay 0108CS12MT26
  • 14. Threats to Confidentiality Because VANET mobility is higher than MANET, routing with capability of ensuring security in VANET is more problematic than Adhoc. Illegal collection of messages by eavesdropping and gathering of location information available through the transmission of broadcast messages. Location privacy and anonymity are important issues for vehicle users . Akanksha Upadhyay 0108CS12MT26
  • 15. Challenges in VANETs • • • • • Mobility Volatility Privacy VS Authentication Privacy VS Liability Network Scalability Akanksha Upadhyay 0108CS12MT26
  • 16. Security Requirements • • • • • • • • Message authentication and integrity. Message non-repudiation. Node authentication. Access control. Message confidentiality. Availability Accountability. Privacy protection. Akanksha Upadhyay 0108CS12MT26
  • 17. Authentication • Every message must be authenticated to make sure its origin and to control authorization level of the vehicles • Vehicles sign messages with their private keys along with digital certificate • Digital signature causes an overhead. To reduce this overhead ECC (Elliptic Curve Cryptography) can be used Akanksha Upadhyay 0108CS12MT26 17
  • 18. Availability • Vehicular network must be available all the time, in real-time • A delay in seconds for some applications will make the message meaningless and maybe the result will be devastating • Attempting to meet real-time demands makes the system vulnerable to the DoS attack. Akanksha Upadhyay 0108CS12MT26 18
  • 19. Accountability/Non-repudiation • Non-repudiation will facilitate the ability to identify the attackers even after the attack happens. This prevents cheaters from denying their crimes. • Accountability is related to the ability to provide necessary evidence to show how each party involves in the communications. • Any information related to the car, e.g. the trip route, speed, time, any violation will be stored in a tamper-proof OBU, any official side holding authorization can retrieve this data. Akanksha Upadhyay 0108CS12MT26 19
  • 20. Privacy • Keeping the information of the drivers away from unauthorized observers, this information like real identity, trip path, speed etc… • The privacy could be achieved by using temporary (one-time) keys. Keys are stored in the tamper-proof OBU. The keys will be reloaded in next time that the vehicle makes an official checkup. • For preserving the real identity of the driver, an ELP (Electronic License Plate) is used, this license is installed in the factory for every new vehicle, it provides an identification number for the vehicle, to identify the vehicle in anywhere, with the RFID technology to hold the ELP. • In case when the police or any official wants the real identity, it can take an order from the judge to recover the identity of specific vehicles ELP. Akanksha Upadhyay 0108CS12MT26 20
  • 21. Secure Routing Requirements • Two major routing categories: o ID based. o Geography based. • Depending on the needs, each category has its advantages. o ID methods are for sending data to an individual node. o Geography methods are for sending data to a group of nodes. Akanksha Upadhyay 0108CS12MT26 21

Notes de l'éditeur

  1. 1. Smart vehicles2. 75 MHz in the 5.9 GHz band licensed for Dedicated Short Range Communication
  2. 1. Smart vehicles2. 75 MHz in the 5.9 GHz band licensed for Dedicated Short Range Communication
  3. 1. Smart vehicles2. 75 MHz in the 5.9 GHz band licensed for Dedicated Short Range Communication