SlideShare a Scribd company logo
1 of 49
VANET
Presented by: Ramu G
Outline
 Introduction
 Security Requirements
 System Model
 Communication Model
 Adversary Model
 Design Principles
What is VANET
Vehicular Ad–Hoc Network, or VANET
 a form of Mobile ad-hoc network
 provide communication
- among nearby vehicles
- between vehicles
- nearby fixed equipment
Introduction
 How vehicular communications work
- road-side infrastructure units (RSUs),
named network nodes, are equipped
with on-board processing and wireless
communication modules
How vehicular communications work
(Continue)
- vehicle-to-vehicle (V2V) and vehicle-to-infrastructure
(V2I) communication will be possible
What can VANET provide ?
Warnings!!!
Warnings!!!
traffic and road conditions
traffic and road conditions
What can VANET provide
The VANET can provide
 Safety
 Efficiency
 Traffic and road conditions
 Road signal alarm
 Local information
Related work
Research have been worked
 Outline challenges for VANET
- availablility, mobility
 Describe particular attacks
-DoS, alteration attacks
 Suggest solution towards attacks
This paper provide a basis for the development
of future vehicular security schemes
Security Requirements
SECURITY
Security Requirements
1. Message Authentication and Integrity
2. Message Non-Repudiation
3. Entity Authentication
4. Access Control Authorization
5. Message Confidentiality
6. Privacy and Anonymity
7. Availability
8. Liability Identification
Security Requirements
 Message Authentication and Integrity
- Message must be protected from any
alteration
 Message Non-Repudiation
- The sender of a message cannot deny having sent a
message
 Entity Authentication
- The receiver is ensured that the sender generated a
message
- The receiver has evidence of the liveness of the sender
Security Requirements
 Access Control
-determined locally by policies
- authorization established what each
node is allowed to do in the network
 Message Confidentiality
- the content of a message is kept
secret from those nodes that are not
authorized to access it
Security Requirements
Privacy and Anonymity
- vehicular communication (VC)
systems should not disclose
any personal and private
information of their users
- any observers should not know any future
actions of other nodes
- anonymity may not be a reasonable requirement
for all entities of the vehicular communications
system
Security Requirements
 Availability
- protocols and services should remain
operational even in the presence of
faults, malicious or benign
 Liability Identification
- users of vehicles are liable for their deliberate or
accidental actions that disrupt the operation of other
nodes
System Model
System Model
 Vehicular communications system
- Users
- Network nodes
- Authorities
System Model
Note. From “Securing Vehicular Communications – Assumptions, Requirements, and Principles,” by P. Papadimitratos,
V. Gligor, J-P Hubaux, In Proceedings of the Workshop on Embedded Security in Cars (ESCAR) 2006, November
2006.
System Model
 Users
- user is the owner or the
driver or a passenger
of the vehicle
 Network Nodes
- processes running on computing platforms
capable of wireless communication
- Mounted on vehicles and road-side units
(RSUs)
System Model
 Authorities
- public agencies or
corporations with
administrative powers
- for example, city or state
transportation authorities
System Model
 VC system operational assumptions
1. Authorities
2. Vehicle Identification and Credentials
3. Infrastructure Identification and Credentials
4. User Identification and Credentials
5. User and Vehicle Association
6. Trusted Components
System Model
 Authorities
- trusted entities or nodes
- issuing and manage identities and
credentials for vehicular network
- establish two-way communication with nodes
 Vehicle Identification and Credentials
- unique identity V
- a pair of private and public keys, kv and KV
- certificate CertX{KV, AV} issued by
authority X
- V denotes on-board central
processing and communication
module
System Model
Note. From “Securing Vehicular Communications – Assumptions, Requirements, and Principles,” by P.
Papadimitratos, V. Gligor, J-P Hubaux, In Proceedings of the Workshop on Embedded Security in
Cars (ESCAR) 2006, November 2006.
System Model
Infrastructure Identification and Credentials
- unique identity I
- a pair of private and public key kI and KI
- certificate CertZ{KI, AI} issued by authority Z
- gateway to the authorities
- gateway to the mobile vehicles
- RSUs’ locations are fixed
- public vehicles
-considered trustworthy
-be used to assist security
related operations
What are public vehicles ?
System Model
 User identification and Credentials
- Unique identity, U
- a pair of private and public keys, kU and KU
- Certificate CertY{KU , AU } issued by authority Y
 User and Vehicle Association
- user is the owner or the driver or a
passenger of the vehicle
- assume only one user can operate
a vehicle
- assume the user is the driver
System Model
 Trusted Components (TCs)
- nodes equipped with trusted components, i.e., built-in
hardware and firmware
- TCs enforce a policy on the interaction with
the on-board software
- Access to any information stored in the TCs and
modification of their functionality can be done only
by the interface provided by the TCs.
- perform cryptographic operations with signature
generations and verifications
Communication Model
Communication Model
 Model the wireless communication in
vehicular networks, whose connectivity can
change frequently
 Focus mainly on the data link layer
Communication Model
 Data-link layer primitives and assumption
 SendL(V,m) : transmits message m to node V within
radius R of the transmitting node
 BcastL(m) : broadcasts message m to all nodes
within radius R of the transmitting node
 ReceiveL(m) : receives message m transmitted by a
node within radius R of the receiver
 A link (W,V) exists when two nodes W and
V are able to communicate directly
Communication Model
 Links are either up or down, and their state does not
change faster than the transmission time of a single
packet
The network connectivity, at a particular
instance in time. Modeled as the graph G
the edges of which are all up links.
 Transmissions from W are received by all nodes V such
that (W, Vi) is up during the entire duration of the packet
transmission
Packets are delivered across an up link
within a maximum link delay τ or they are
not delivered at all.
Communication Model
 Communication across the network is
dependent on
 availability of sufficient resources
 bandwidth
- shared medium contend
- bandwidth can fluctuate
- unevenly distributed among neighbors
- links may be congested
Communication Model
 Communication Radius, R
 Vary over time
 Different classes of nodes may operate with different R
 Multi-domain and Highly Volatile
environment
 Nodes are not bound to administrative and geographical
boundaries
 Any two or more nodes communicate independently
Communication Model
 Frequent Broadcast Communication
 Most of the vehicular network traffic is Broadcasted at the
network or application layers
 Message are transmitted either
periodically or triggered by network events
 Transmission period is low
 Time-sensitive Communication
 Message delivery can be constrained by deadlines
- different messages have different delay requirements
Adversary Model
Adversary Model
 Network nodes
- correct or benign
- faulty or adversaries
- external adversaries
- Internal adversaries
- active adversaries
- passive adversaries
faulty is not always malicious!!!
Adversary Model
Internal Active
Adversaries
 Multiple adversarial nodes
- adversaries are
independent
- adversaries can collude
- based on TCs, colluding
adversaries are
prevented from exchanging
cryptographic material and
credentials
Adversary Model
 Internal Active Adversaries (continue)
 non-adaptive adversary  Adversarial nodes are fixed
 adaptive adversary  Adversarial nodes change over time
 Computationally bounded adversary
 adversaries are computationally limited
- limited resources and computational power
- the knowledge of an adversary is limited
- memory finite

More Related Content

Similar to VANET Security: Authentication and Communication Models

Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18raymurphy9533
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPTMeghaj Mallick
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-finASMA HADELI
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET Journal
 
Vehicular adhoc network for communication
Vehicular adhoc network for communicationVehicular adhoc network for communication
Vehicular adhoc network for communicationathirayanpericse
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksIRJET Journal
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANETPallavi Agarwal
 
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...IJMER
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography Pallavi Agarwal
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and HashingPallavi Agarwal
 
Aodv routing protocol implementation design
Aodv routing protocol implementation designAodv routing protocol implementation design
Aodv routing protocol implementation designProf Ansari
 

Similar to VANET Security: Authentication and Communication Models (20)

Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPT
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-fin
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
 
Vehicular adhoc network for communication
Vehicular adhoc network for communicationVehicular adhoc network for communication
Vehicular adhoc network for communication
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular Networks
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
Routing protocols in Vanet
Routing protocols in VanetRouting protocols in Vanet
Routing protocols in Vanet
 
VANET
VANETVANET
VANET
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANET
 
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 
Aodv routing protocol implementation design
Aodv routing protocol implementation designAodv routing protocol implementation design
Aodv routing protocol implementation design
 

Recently uploaded

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 

VANET Security: Authentication and Communication Models

  • 2. Outline  Introduction  Security Requirements  System Model  Communication Model  Adversary Model  Design Principles
  • 3.
  • 4. What is VANET Vehicular Ad–Hoc Network, or VANET  a form of Mobile ad-hoc network  provide communication - among nearby vehicles - between vehicles - nearby fixed equipment
  • 5. Introduction  How vehicular communications work - road-side infrastructure units (RSUs), named network nodes, are equipped with on-board processing and wireless communication modules
  • 6. How vehicular communications work (Continue) - vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication will be possible
  • 7.
  • 8. What can VANET provide ?
  • 11. traffic and road conditions
  • 12. traffic and road conditions
  • 13.
  • 14.
  • 15. What can VANET provide The VANET can provide  Safety  Efficiency  Traffic and road conditions  Road signal alarm  Local information
  • 16. Related work Research have been worked  Outline challenges for VANET - availablility, mobility  Describe particular attacks -DoS, alteration attacks  Suggest solution towards attacks This paper provide a basis for the development of future vehicular security schemes
  • 19. Security Requirements 1. Message Authentication and Integrity 2. Message Non-Repudiation 3. Entity Authentication 4. Access Control Authorization 5. Message Confidentiality 6. Privacy and Anonymity 7. Availability 8. Liability Identification
  • 20. Security Requirements  Message Authentication and Integrity - Message must be protected from any alteration  Message Non-Repudiation - The sender of a message cannot deny having sent a message  Entity Authentication - The receiver is ensured that the sender generated a message - The receiver has evidence of the liveness of the sender
  • 21. Security Requirements  Access Control -determined locally by policies - authorization established what each node is allowed to do in the network  Message Confidentiality - the content of a message is kept secret from those nodes that are not authorized to access it
  • 22. Security Requirements Privacy and Anonymity - vehicular communication (VC) systems should not disclose any personal and private information of their users - any observers should not know any future actions of other nodes - anonymity may not be a reasonable requirement for all entities of the vehicular communications system
  • 23. Security Requirements  Availability - protocols and services should remain operational even in the presence of faults, malicious or benign  Liability Identification - users of vehicles are liable for their deliberate or accidental actions that disrupt the operation of other nodes
  • 25. System Model  Vehicular communications system - Users - Network nodes - Authorities
  • 26. System Model Note. From “Securing Vehicular Communications – Assumptions, Requirements, and Principles,” by P. Papadimitratos, V. Gligor, J-P Hubaux, In Proceedings of the Workshop on Embedded Security in Cars (ESCAR) 2006, November 2006.
  • 27.
  • 28. System Model  Users - user is the owner or the driver or a passenger of the vehicle  Network Nodes - processes running on computing platforms capable of wireless communication - Mounted on vehicles and road-side units (RSUs)
  • 29. System Model  Authorities - public agencies or corporations with administrative powers - for example, city or state transportation authorities
  • 30. System Model  VC system operational assumptions 1. Authorities 2. Vehicle Identification and Credentials 3. Infrastructure Identification and Credentials 4. User Identification and Credentials 5. User and Vehicle Association 6. Trusted Components
  • 31. System Model  Authorities - trusted entities or nodes - issuing and manage identities and credentials for vehicular network - establish two-way communication with nodes  Vehicle Identification and Credentials - unique identity V - a pair of private and public keys, kv and KV - certificate CertX{KV, AV} issued by authority X - V denotes on-board central processing and communication module
  • 32. System Model Note. From “Securing Vehicular Communications – Assumptions, Requirements, and Principles,” by P. Papadimitratos, V. Gligor, J-P Hubaux, In Proceedings of the Workshop on Embedded Security in Cars (ESCAR) 2006, November 2006.
  • 33. System Model Infrastructure Identification and Credentials - unique identity I - a pair of private and public key kI and KI - certificate CertZ{KI, AI} issued by authority Z - gateway to the authorities - gateway to the mobile vehicles - RSUs’ locations are fixed - public vehicles -considered trustworthy -be used to assist security related operations
  • 34. What are public vehicles ?
  • 35.
  • 36. System Model  User identification and Credentials - Unique identity, U - a pair of private and public keys, kU and KU - Certificate CertY{KU , AU } issued by authority Y  User and Vehicle Association - user is the owner or the driver or a passenger of the vehicle - assume only one user can operate a vehicle - assume the user is the driver
  • 37. System Model  Trusted Components (TCs) - nodes equipped with trusted components, i.e., built-in hardware and firmware - TCs enforce a policy on the interaction with the on-board software - Access to any information stored in the TCs and modification of their functionality can be done only by the interface provided by the TCs. - perform cryptographic operations with signature generations and verifications
  • 39. Communication Model  Model the wireless communication in vehicular networks, whose connectivity can change frequently  Focus mainly on the data link layer
  • 40. Communication Model  Data-link layer primitives and assumption  SendL(V,m) : transmits message m to node V within radius R of the transmitting node  BcastL(m) : broadcasts message m to all nodes within radius R of the transmitting node  ReceiveL(m) : receives message m transmitted by a node within radius R of the receiver  A link (W,V) exists when two nodes W and V are able to communicate directly
  • 41. Communication Model  Links are either up or down, and their state does not change faster than the transmission time of a single packet The network connectivity, at a particular instance in time. Modeled as the graph G the edges of which are all up links.  Transmissions from W are received by all nodes V such that (W, Vi) is up during the entire duration of the packet transmission Packets are delivered across an up link within a maximum link delay τ or they are not delivered at all.
  • 42. Communication Model  Communication across the network is dependent on  availability of sufficient resources  bandwidth - shared medium contend - bandwidth can fluctuate - unevenly distributed among neighbors - links may be congested
  • 43. Communication Model  Communication Radius, R  Vary over time  Different classes of nodes may operate with different R  Multi-domain and Highly Volatile environment  Nodes are not bound to administrative and geographical boundaries  Any two or more nodes communicate independently
  • 44. Communication Model  Frequent Broadcast Communication  Most of the vehicular network traffic is Broadcasted at the network or application layers  Message are transmitted either periodically or triggered by network events  Transmission period is low  Time-sensitive Communication  Message delivery can be constrained by deadlines - different messages have different delay requirements
  • 46. Adversary Model  Network nodes - correct or benign - faulty or adversaries - external adversaries - Internal adversaries - active adversaries - passive adversaries
  • 47. faulty is not always malicious!!!
  • 48. Adversary Model Internal Active Adversaries  Multiple adversarial nodes - adversaries are independent - adversaries can collude - based on TCs, colluding adversaries are prevented from exchanging cryptographic material and credentials
  • 49. Adversary Model  Internal Active Adversaries (continue)  non-adaptive adversary  Adversarial nodes are fixed  adaptive adversary  Adversarial nodes change over time  Computationally bounded adversary  adversaries are computationally limited - limited resources and computational power - the knowledge of an adversary is limited - memory finite