SlideShare une entreprise Scribd logo
1  sur  22
Akanksha Upadhyay
M.Tech.
Organization of the Presentation






Introduction to VANET technology
VANET Security Threats
Challenges in VANET
Security Requirements

Akanksha Upadhyay
0108CS12MT26
Introduction to VANET

Vehicles connected to each others through an ad hoc formation
form a wireless network called “Vehicular Ad Hoc Network”.
Vehicular ad hoc networks (VANETs) are a subgroup of mobile
ad hoc networks (MANETs).
It includes V2V communications and V2R communications and
is important component of ITS.
Nodes are expected to communicate by means of North
American DSRC standard that employs the IEEE 802.11p
standard for wireless communication.

Akanksha Upadhyay
0108CS12MT26
Why VANET

• Increase traveler safety
o10.8

million vehicle crashes from 1990 to 2009

o36,000

o

fatalities in 2009 only

24,000 of these due to collision with other vehicles /

objects.
o

Costs more than $100 billion per year

• Boost on-board luxury
Akanksha Upadhyay
0108CS12MT26
VANET

Akanksha Upadhyay
0108CS12MT26
Architecture

V2V

V2R

Road Side
Unit (RSU)
Server (Traffic
Monitoring)

Server (Location
Based Service)

Akanksha Upadhyay
0108CS12MT26
Applications

Akanksha Upadhyay
0108CS12MT26
Applications

Akanksha Upadhyay
0108CS12MT26
Characteristics of VANET

•
•

High mobility of nodes
Rapidly changing network topology (predictable to some
extent)

•

Unbounded network size

•

Potential support from infrastructure

•

Real-time, time-sensitive data exchange

•

Crucial effect of security and privacy

Akanksha Upadhyay
0108CS12MT26
Security in VANETs
• When data is compromised, the whole system suffers.
• The nature of VANETs could lead to malicious attacks.
o Predictable movement of nodes.
o High mobility of victim/attacker.
• Adversaries could break the system.
o Data sinkholes (black hole).
o Feed false information.
o Sybil attacks.
o Flood the system.
• Security measures must be taken to avoid malicious attacks on
the system.
Akanksha Upadhyay
0108CS12MT26
Threats in VANET

Threats to Availability
Threats to Authentication
Threats to driver’s Confidentiality

Akanksha Upadhyay
0108CS12MT26
Threats to Availability

Akanksha Upadhyay
0108CS12MT26
Threats to Authentication

Akanksha Upadhyay
0108CS12MT26
Threats to Confidentiality

Because VANET mobility is higher than MANET, routing with
capability of ensuring security in VANET is more problematic
than Adhoc.
Illegal collection of messages by eavesdropping and gathering of
location information available through the transmission of
broadcast messages.
Location privacy and anonymity are important issues for vehicle
users .
Akanksha Upadhyay
0108CS12MT26
Challenges in VANETs

•
•
•
•
•

Mobility
Volatility
Privacy VS Authentication
Privacy VS Liability
Network Scalability

Akanksha Upadhyay
0108CS12MT26
Security Requirements

•
•
•
•
•
•
•
•

Message authentication and integrity.
Message non-repudiation.
Node authentication.
Access control.
Message confidentiality.
Availability
Accountability.
Privacy protection.

Akanksha Upadhyay
0108CS12MT26
Authentication

• Every message must be authenticated to make sure its origin
and to control authorization level of the vehicles
• Vehicles sign messages with their private keys along with
digital certificate
• Digital signature causes an overhead. To reduce this overhead
ECC (Elliptic Curve Cryptography) can be used

Akanksha Upadhyay
0108CS12MT26

17
Availability
• Vehicular network must be available all the time, in real-time
• A delay in seconds for some applications will make the
message meaningless and maybe the result will be devastating
• Attempting to meet real-time demands makes the system
vulnerable to the DoS attack.

Akanksha Upadhyay
0108CS12MT26

18
Accountability/Non-repudiation
• Non-repudiation will facilitate the ability to identify the
attackers even after the attack happens. This prevents cheaters
from denying their crimes.
• Accountability is related to the ability to provide necessary
evidence to show how each party involves in the
communications.
• Any information related to the car, e.g. the trip route, speed,
time, any violation will be stored in a tamper-proof OBU, any
official side holding authorization can retrieve this data.

Akanksha Upadhyay
0108CS12MT26

19
Privacy

• Keeping the information of the drivers away from unauthorized
observers, this information like real identity, trip path, speed etc…
• The privacy could be achieved by using temporary (one-time) keys.
Keys are stored in the tamper-proof OBU. The keys will be reloaded
in next time that the vehicle makes an official checkup.
• For preserving the real identity of the driver, an ELP (Electronic
License Plate) is used, this license is installed in the factory for
every new vehicle, it provides an identification number for the
vehicle, to identify the vehicle in anywhere, with the RFID
technology to hold the ELP.
• In case when the police or any official wants the real identity, it can
take an order from the judge to recover the identity of specific
vehicles ELP.
Akanksha Upadhyay
0108CS12MT26

20
Secure Routing Requirements
• Two major routing categories:
o ID based.
o Geography based.
• Depending on the needs, each category has its advantages.
o ID methods are for sending data to an individual node.
o Geography methods are for sending data to a group of
nodes.

Akanksha Upadhyay
0108CS12MT26

21
Thanks!!

Contenu connexe

Tendances

Tendances (20)

Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challenges
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPT
 
VANET
VANETVANET
VANET
 
MANET VS VANET
MANET VS VANETMANET VS VANET
MANET VS VANET
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communication
 
Vehicular Networks
Vehicular NetworksVehicular Networks
Vehicular Networks
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwari
 
Vehicular network
Vehicular networkVehicular network
Vehicular network
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
The Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANETThe Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANET
 
Cellular V2X is Gaining Momentum
Cellular V2X is Gaining MomentumCellular V2X is Gaining Momentum
Cellular V2X is Gaining Momentum
 
Vehicular ad hoc network
Vehicular ad hoc networkVehicular ad hoc network
Vehicular ad hoc network
 
Internet of vehicles
Internet of vehiclesInternet of vehicles
Internet of vehicles
 
Manet
ManetManet
Manet
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Cellular V2X
Cellular V2XCellular V2X
Cellular V2X
 

En vedette

Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTS
Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTSGestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTS
Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTSMkMk Kachallah
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemMonaco Motors
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetsirojiddin
 
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...GPRS MYGPRSEXPRESS
 
Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)Brijesh Kaushik
 
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechtureHina Saxena
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 ProtocolMiles Kevin Galario
 

En vedette (10)

Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTS
Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTSGestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTS
Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTS
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication System
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanet
 
Mobile IP 1
Mobile IP 1Mobile IP 1
Mobile IP 1
 
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
 
Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)
 
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechture
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
 
GSM ARCHITECTURE
GSM ARCHITECTUREGSM ARCHITECTURE
GSM ARCHITECTURE
 
GPRS
GPRSGPRS
GPRS
 

Similaire à Introduction to VANET

Intelligent transport system (ITS)
Intelligent transport system (ITS)Intelligent transport system (ITS)
Intelligent transport system (ITS)Aravind Samala
 
COMMUNICABLE AUTONOMOUS SECURED VEHICLE
COMMUNICABLE AUTONOMOUS SECURED VEHICLECOMMUNICABLE AUTONOMOUS SECURED VEHICLE
COMMUNICABLE AUTONOMOUS SECURED VEHICLEVed Prakash
 
INTELLIGENT TRANSPORTATION SYSTEM .pptx
INTELLIGENT TRANSPORTATION SYSTEM  .pptxINTELLIGENT TRANSPORTATION SYSTEM  .pptx
INTELLIGENT TRANSPORTATION SYSTEM .pptxSanthosh Kumar B V
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communicationNavin B S
 
Creating a Safer, Smarter ride - NFV for Automotive
Creating a Safer, Smarter ride - NFV for AutomotiveCreating a Safer, Smarter ride - NFV for Automotive
Creating a Safer, Smarter ride - NFV for AutomotiveTrinath Somanchi
 
Intelligent Transportation System Modified
Intelligent Transportation System ModifiedIntelligent Transportation System Modified
Intelligent Transportation System ModifiedDurgesh Mishra
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communicationR prasad
 
Connectivity Challenges for CAVs - Athonet Group
Connectivity Challenges for CAVs - Athonet GroupConnectivity Challenges for CAVs - Athonet Group
Connectivity Challenges for CAVs - Athonet GrouptechUK
 
Intelligent Transportation System
Intelligent Transportation SystemIntelligent Transportation System
Intelligent Transportation SystemUsama Qazi
 
Dedicated roads for autonomous vehicles
Dedicated roads for autonomous vehicles Dedicated roads for autonomous vehicles
Dedicated roads for autonomous vehicles Jeffrey Funk
 
VANET based Intelligent TransportationSystem using Li-Fi technology
VANET based Intelligent TransportationSystem using Li-Fi technologyVANET based Intelligent TransportationSystem using Li-Fi technology
VANET based Intelligent TransportationSystem using Li-Fi technologyIOSRJECE
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETDr.Irshad Ahmed Sumra
 

Similaire à Introduction to VANET (20)

Intelligent transport system (ITS)
Intelligent transport system (ITS)Intelligent transport system (ITS)
Intelligent transport system (ITS)
 
COMMUNICABLE AUTONOMOUS SECURED VEHICLE
COMMUNICABLE AUTONOMOUS SECURED VEHICLECOMMUNICABLE AUTONOMOUS SECURED VEHICLE
COMMUNICABLE AUTONOMOUS SECURED VEHICLE
 
INTELLIGENT TRANSPORTATION SYSTEM .pptx
INTELLIGENT TRANSPORTATION SYSTEM  .pptxINTELLIGENT TRANSPORTATION SYSTEM  .pptx
INTELLIGENT TRANSPORTATION SYSTEM .pptx
 
Electronic toll system
Electronic toll systemElectronic toll system
Electronic toll system
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communication
 
vanets presentation-.pdf
vanets presentation-.pdfvanets presentation-.pdf
vanets presentation-.pdf
 
Creating a Safer, Smarter ride - NFV for Automotive
Creating a Safer, Smarter ride - NFV for AutomotiveCreating a Safer, Smarter ride - NFV for Automotive
Creating a Safer, Smarter ride - NFV for Automotive
 
Intelligent Transportation System Modified
Intelligent Transportation System ModifiedIntelligent Transportation System Modified
Intelligent Transportation System Modified
 
final.pptx
final.pptxfinal.pptx
final.pptx
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communication
 
Connectivity Challenges for CAVs - Athonet Group
Connectivity Challenges for CAVs - Athonet GroupConnectivity Challenges for CAVs - Athonet Group
Connectivity Challenges for CAVs - Athonet Group
 
Intelligent Transportation System
Intelligent Transportation SystemIntelligent Transportation System
Intelligent Transportation System
 
Deepak
DeepakDeepak
Deepak
 
Deepak
DeepakDeepak
Deepak
 
Dedicated roads for autonomous vehicles
Dedicated roads for autonomous vehicles Dedicated roads for autonomous vehicles
Dedicated roads for autonomous vehicles
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
VANET based Intelligent TransportationSystem using Li-Fi technology
VANET based Intelligent TransportationSystem using Li-Fi technologyVANET based Intelligent TransportationSystem using Li-Fi technology
VANET based Intelligent TransportationSystem using Li-Fi technology
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
 
Automotive Telematics
Automotive TelematicsAutomotive Telematics
Automotive Telematics
 
EMV 201 EMF June 2016
EMV 201 EMF June 2016EMV 201 EMF June 2016
EMV 201 EMF June 2016
 

Dernier

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Dernier (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Introduction to VANET

  • 2. Organization of the Presentation     Introduction to VANET technology VANET Security Threats Challenges in VANET Security Requirements Akanksha Upadhyay 0108CS12MT26
  • 3. Introduction to VANET Vehicles connected to each others through an ad hoc formation form a wireless network called “Vehicular Ad Hoc Network”. Vehicular ad hoc networks (VANETs) are a subgroup of mobile ad hoc networks (MANETs). It includes V2V communications and V2R communications and is important component of ITS. Nodes are expected to communicate by means of North American DSRC standard that employs the IEEE 802.11p standard for wireless communication. Akanksha Upadhyay 0108CS12MT26
  • 4. Why VANET • Increase traveler safety o10.8 million vehicle crashes from 1990 to 2009 o36,000 o fatalities in 2009 only 24,000 of these due to collision with other vehicles / objects. o Costs more than $100 billion per year • Boost on-board luxury Akanksha Upadhyay 0108CS12MT26
  • 6. Architecture V2V V2R Road Side Unit (RSU) Server (Traffic Monitoring) Server (Location Based Service) Akanksha Upadhyay 0108CS12MT26
  • 9. Characteristics of VANET • • High mobility of nodes Rapidly changing network topology (predictable to some extent) • Unbounded network size • Potential support from infrastructure • Real-time, time-sensitive data exchange • Crucial effect of security and privacy Akanksha Upadhyay 0108CS12MT26
  • 10. Security in VANETs • When data is compromised, the whole system suffers. • The nature of VANETs could lead to malicious attacks. o Predictable movement of nodes. o High mobility of victim/attacker. • Adversaries could break the system. o Data sinkholes (black hole). o Feed false information. o Sybil attacks. o Flood the system. • Security measures must be taken to avoid malicious attacks on the system. Akanksha Upadhyay 0108CS12MT26
  • 11. Threats in VANET Threats to Availability Threats to Authentication Threats to driver’s Confidentiality Akanksha Upadhyay 0108CS12MT26
  • 12. Threats to Availability Akanksha Upadhyay 0108CS12MT26
  • 13. Threats to Authentication Akanksha Upadhyay 0108CS12MT26
  • 14. Threats to Confidentiality Because VANET mobility is higher than MANET, routing with capability of ensuring security in VANET is more problematic than Adhoc. Illegal collection of messages by eavesdropping and gathering of location information available through the transmission of broadcast messages. Location privacy and anonymity are important issues for vehicle users . Akanksha Upadhyay 0108CS12MT26
  • 15. Challenges in VANETs • • • • • Mobility Volatility Privacy VS Authentication Privacy VS Liability Network Scalability Akanksha Upadhyay 0108CS12MT26
  • 16. Security Requirements • • • • • • • • Message authentication and integrity. Message non-repudiation. Node authentication. Access control. Message confidentiality. Availability Accountability. Privacy protection. Akanksha Upadhyay 0108CS12MT26
  • 17. Authentication • Every message must be authenticated to make sure its origin and to control authorization level of the vehicles • Vehicles sign messages with their private keys along with digital certificate • Digital signature causes an overhead. To reduce this overhead ECC (Elliptic Curve Cryptography) can be used Akanksha Upadhyay 0108CS12MT26 17
  • 18. Availability • Vehicular network must be available all the time, in real-time • A delay in seconds for some applications will make the message meaningless and maybe the result will be devastating • Attempting to meet real-time demands makes the system vulnerable to the DoS attack. Akanksha Upadhyay 0108CS12MT26 18
  • 19. Accountability/Non-repudiation • Non-repudiation will facilitate the ability to identify the attackers even after the attack happens. This prevents cheaters from denying their crimes. • Accountability is related to the ability to provide necessary evidence to show how each party involves in the communications. • Any information related to the car, e.g. the trip route, speed, time, any violation will be stored in a tamper-proof OBU, any official side holding authorization can retrieve this data. Akanksha Upadhyay 0108CS12MT26 19
  • 20. Privacy • Keeping the information of the drivers away from unauthorized observers, this information like real identity, trip path, speed etc… • The privacy could be achieved by using temporary (one-time) keys. Keys are stored in the tamper-proof OBU. The keys will be reloaded in next time that the vehicle makes an official checkup. • For preserving the real identity of the driver, an ELP (Electronic License Plate) is used, this license is installed in the factory for every new vehicle, it provides an identification number for the vehicle, to identify the vehicle in anywhere, with the RFID technology to hold the ELP. • In case when the police or any official wants the real identity, it can take an order from the judge to recover the identity of specific vehicles ELP. Akanksha Upadhyay 0108CS12MT26 20
  • 21. Secure Routing Requirements • Two major routing categories: o ID based. o Geography based. • Depending on the needs, each category has its advantages. o ID methods are for sending data to an individual node. o Geography methods are for sending data to a group of nodes. Akanksha Upadhyay 0108CS12MT26 21

Notes de l'éditeur

  1. 1. Smart vehicles2. 75 MHz in the 5.9 GHz band licensed for Dedicated Short Range Communication
  2. 1. Smart vehicles2. 75 MHz in the 5.9 GHz band licensed for Dedicated Short Range Communication
  3. 1. Smart vehicles2. 75 MHz in the 5.9 GHz band licensed for Dedicated Short Range Communication