SlideShare une entreprise Scribd logo
1  sur  21
NAME: SULAIMAN MUSARIA KARIM
Data Privacy and Security in Autonomous
Vehicles
Outline
• Introduction
• The Components Of Autonomous Vehicles
• Autonomous Vehicles Mode
• Challenges For Autonomous Car
• Security Issues
• Research scope :-
• Why Autonomous Vehicle Security ?
Definition:
Autonomous car or a self driving car is a vehicle that is
capable of sensing its environment and navigating without
human inputs.
Introduction
• Still under development, but several partial-automation technologies
are in vehicles on the roads right now
The components of autonomous vehicles
• Several sensors used by Av’s:-
• LiDAR:- Measures distance by illuminating target with pulsed
laser light and measuring reflected pulses with sensors to create 3-
D map of area.
• RADAR:- Radio waves detect short & long-range depth.
• GPS:- Triangulates position of car using satellites. Current GPS
technology is limited to a certain distance. Advanced GPS is in
development.
• more technologies = more attack vectors
• Vehicle Communications have to type :-
1- Vehicle To Vehicle (V2V)
2- Vehicle To Infrastructure (V2I)
The components of autonomous vehicles
1. Autonomous Driving: Navigating a vehicle without
human input from passengers using sensory (LIDAR),
control, and navigation equipment that responds to the
environment when traveling.
2. Driver Assistance: Enhances vehicle systems for safety
and improved driving when the driver is in control.
Technology includes blind-spot detection, pedestrian
detection, lane-departure warnings, intelligent braking,
traffic-sign recognition, automatic braking, and adaptive
cruise control.
Autonomous Vehicles Mode
Challenges for autonomous car
Challenges for autonomous car
1- Social: problems associated with the use of autonomous car
such as consumer approval or not to the moral behind using it.
2- policy :- A variety of opportunities are available, but with
new policy provided by governments as traffic laws, standards,
and driving responsibility.
3- Non-Technical :- Challenges must also be addressed before
autonomous cars commercialized such as cost, robustness.
4- Technical :- Discuss autonomous cars’ technical challenges.
These challenges include validation and testing, trust, software
quality, computational resources, safety, reliability, privacy and
security. The present research falls into finding solutions for such
challenges especially security.
One of the most important challenges in
autonomous vehicles is security
Security issues
1-Authentication
2-Availability
3-Integrity
4- Privacy
Authentication is one the excellent techniques for securing the
vehicle messages since they sign each of the messages before
passing them to the acceptor side. It uses a Public key
Infrastructure(PKI) to provide security due to huge number of
individuals in the network. Each of the vehicle in the network
will be before it is transferred and includes Certification
Authority(CA).
What is the Authentication ?
Attacks on Authentication
No Asset Vulnerability Target Attack Solution weakness
1 Vehicle/
Vehicle User
Software flaw
(Weak
message
propagation
algorithm)
Privacy
leakage of
sensitive
information
Malware
Integration
Updating
antivirus,
Sandbox
approach
the difficulty in defining
an appropriate policy for
each target program
2 Vehicle Vehicular
hardware
Flaws
Disclosure
of
sensitive
information
Sensor
Impersonation
SPECS SPECS is vulnerable to
impersonation attack
3 Vehicle OBU
vulnerabilities
,
Sensors
malfunctions
Network
flooding
with
wrong
information
Bogus
Information
ECDSA derive the signer’s private
key in case he uses the
same random number for
to generate two
signatures for two
different messages.
SPECS=Standard Performance Evaluation Corporation service
ECDSA=The Elliptic Curve Digital Signature Algorithm
Availability implies that information is available to the authorized
parties whenever required. Unavailability to data and systems can
have serious consequences.
It is essential to have plans and procedures in place to prevent or
mitigate data loss as a result of a disaster. A disaster recovery plan
must include unpredictable events such as natural disasters and fire.
What is the Availability ?
Attacks on Availability
No Asset Target Threat Attack Solution weakness
1 Vehicle/
Vehicule User
Software flaw
(Weak
message
propagation
algorithm)
Privacy
leakage of
sensitive
information
Malware
Integration
Updating antivirus,
Sandbox approach
the difficulty in
defining an appropriate
policy for each target
program
2 Vehicle OBU
vulnerability
Unauthorized
manipulation
of routing table
Jamming attacks
at vehicle level
Frequency hopping,
Multiple radio transceivers
Current transmitters are
susceptible to selective
jamming
3 Information Non-encrypted
messages,
Insecure
wireless
communication
channel
Message
modification
with wrong
and
compromised
messages
MITM attacks Strong cryptographic
Techniques
cryptographic attacks like
namely guess-and-
determine attacks.
In the context of the information security world, integrity means
that when a sender sends data, the receiver must receive exactly
the same data as sent by the sender.
Data must not be changed in transit. For example, if someone
sends a message “Hello!”, then the receiver must receive
“Hello!” That is, it must BE exactly the same data as sent by the
sender. Any addition or subtraction of data during transit would
mean the integrity has been compromised.
What is the Integrity ?
Attacks on Integrity
N
o
Asset Vulnerability Target Attack Solution weakness
1 Vehicle OBU
vulnerabilities
,
Sensors
malfunctions
Network
flooding
with
wrong
information
Bogus
Information
ECDSA
derive the
signer’s private
key in case he
uses the same
random number
for to generate
two signatures for
two different
messages.
2 Vehicle/
Vehicle
User
Software
flaws, Weak
Password
Privacy
leakage
of sensitive
data
Social
engineering
attack
Encrypted and
strong password
for message
communication
potential points
of entry and weak
security
protocols, needed
to proceed with
the attack.
In simple terms, Privacy means something that is secret and is not supposed to be
disclosed to unintended people or entities.
Privacy ensures that sensitive information is accessed only by an authorized
person and kept away from those not authorized to possess them.
Everyone has information which they wish to keep secret. Thus Protecting such
information is an important part of information security.
What is the Privacy ?
Attacks on Privacy
No Asset Vulnerability Threat Attack Solution weakness
1 Vehicle/
Vehicle User
Software flaws,
Weak
Password
Privacy
leakage
of sensitive
data
Social
engineering
attack
Encrypted and
strong password
for message
communication
potential points of entry and
weak security protocols,
needed to proceed with the
attack.
2 Vehicle User OBU
vulnerabilities,
Insecure
wireless
Communication
Revelation of
users
Identity
User privacy
Disclosure
Holistic
approach for
data
Transmission
Modification of messages
3 Information Broadcast nature
of
messages via
wireless
communication
channel
Revelation of
sensitive
information
and user’s
private
credentials
Eavesdropping Strong
encrypted
message
for user’s
communication
attacks like detection,
modification, extraction and
destruction the data
The research will be focussed onto the improvement
of security on Autonomous vehicles. privacy during
information exchange (V2V or V2I) will be part of
the research. The work on one of the weakness that
privacy have it ,also this work will solve this
weakness to be secure in future.
19
The Research scope :-
Why Autonomous vehicle security ?
Autonomous Vehicles and its connectivity to the Internet via IoT
and IoE is an emerging technical and scientific topics. Many
challenges, especially in data security and is facing the
development of this sector.
The improvement of the security in V2V and V2I communication
will lead to a robust trustable reliable and safer system.
Thanks For Your Attention
Any Questions

Contenu connexe

Tendances

IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
Vehicle to vehicle communication
Vehicle to vehicle communication  Vehicle to vehicle communication
Vehicle to vehicle communication Mohamed Zaki
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine TechnologySamip jain
 
IoT applications for connected vehicle and ITS
IoT applications for connected vehicle and ITSIoT applications for connected vehicle and ITS
IoT applications for connected vehicle and ITSShashank Dhaneshwar
 
Smart parking system
Smart parking systemSmart parking system
Smart parking systemslmnsvn
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Advanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadAdvanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadNishanth C
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Internet of Vehicles (IoV)
Internet of Vehicles (IoV)Internet of Vehicles (IoV)
Internet of Vehicles (IoV)jangezkhan
 
Machine Learning
Machine LearningMachine Learning
Machine LearningRahul Kumar
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxIOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxMeghaShree665225
 
automatic number plate recognition
automatic number plate recognitionautomatic number plate recognition
automatic number plate recognitionSairam Taduvai
 
RFID BASED TOLL TAX COLLECTION SYSTEM
RFID BASED TOLL TAX COLLECTION SYSTEMRFID BASED TOLL TAX COLLECTION SYSTEM
RFID BASED TOLL TAX COLLECTION SYSTEMparthbabariya151
 
Driver Drowsiness Detection report
Driver Drowsiness Detection reportDriver Drowsiness Detection report
Driver Drowsiness Detection reportPurvanshJain1
 
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Bill Harpley
 

Tendances (20)

IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Smart parking
Smart parkingSmart parking
Smart parking
 
Vehicle to vehicle communication
Vehicle to vehicle communication  Vehicle to vehicle communication
Vehicle to vehicle communication
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
IoT applications for connected vehicle and ITS
IoT applications for connected vehicle and ITSIoT applications for connected vehicle and ITS
IoT applications for connected vehicle and ITS
 
Smart parking system
Smart parking systemSmart parking system
Smart parking system
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Advanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadAdvanced vehicle security system 2016 upload
Advanced vehicle security system 2016 upload
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Internet of Vehicles (IoV)
Internet of Vehicles (IoV)Internet of Vehicles (IoV)
Internet of Vehicles (IoV)
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxIOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
 
automatic number plate recognition
automatic number plate recognitionautomatic number plate recognition
automatic number plate recognition
 
RFID BASED TOLL TAX COLLECTION SYSTEM
RFID BASED TOLL TAX COLLECTION SYSTEMRFID BASED TOLL TAX COLLECTION SYSTEM
RFID BASED TOLL TAX COLLECTION SYSTEM
 
Driver Drowsiness Detection report
Driver Drowsiness Detection reportDriver Drowsiness Detection report
Driver Drowsiness Detection report
 
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
 

Similaire à Data Privacy and Security in Autonomous Vehicles

Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersCrawsec
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdfZeeshanMajeed15
 
Unit 2.design computing architecture 2.1
Unit 2.design computing architecture 2.1Unit 2.design computing architecture 2.1
Unit 2.design computing architecture 2.1Swapnali Pawar
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesMadhur Gupta
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
 
Understanding Vulnerability Assessment.pdf
Understanding Vulnerability Assessment.pdfUnderstanding Vulnerability Assessment.pdf
Understanding Vulnerability Assessment.pdf247 tech
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwarirahulpandey510
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfDorleControls
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfVishwanathMahalle
 
Emerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxEmerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxkoushikichakraborty3
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYIJCI JOURNAL
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network IRJET Journal
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network securityAnkit Anand
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securitypptSachin Roy
 

Similaire à Data Privacy and Security in Autonomous Vehicles (20)

Module 4.pdf
Module 4.pdfModule 4.pdf
Module 4.pdf
 
Module 4 Cyber Security Vulnerabilities& Safe Guards
Module 4 Cyber Security Vulnerabilities& Safe GuardsModule 4 Cyber Security Vulnerabilities& Safe Guards
Module 4 Cyber Security Vulnerabilities& Safe Guards
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdf
 
Unit 2.design computing architecture 2.1
Unit 2.design computing architecture 2.1Unit 2.design computing architecture 2.1
Unit 2.design computing architecture 2.1
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Understanding Vulnerability Assessment.pdf
Understanding Vulnerability Assessment.pdfUnderstanding Vulnerability Assessment.pdf
Understanding Vulnerability Assessment.pdf
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwari
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
 
Emerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxEmerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docx
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securityppt
 

Dernier

AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...Health
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 

Dernier (20)

AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 

Data Privacy and Security in Autonomous Vehicles

  • 1. NAME: SULAIMAN MUSARIA KARIM Data Privacy and Security in Autonomous Vehicles
  • 2. Outline • Introduction • The Components Of Autonomous Vehicles • Autonomous Vehicles Mode • Challenges For Autonomous Car • Security Issues • Research scope :- • Why Autonomous Vehicle Security ?
  • 3. Definition: Autonomous car or a self driving car is a vehicle that is capable of sensing its environment and navigating without human inputs. Introduction
  • 4. • Still under development, but several partial-automation technologies are in vehicles on the roads right now The components of autonomous vehicles • Several sensors used by Av’s:- • LiDAR:- Measures distance by illuminating target with pulsed laser light and measuring reflected pulses with sensors to create 3- D map of area. • RADAR:- Radio waves detect short & long-range depth. • GPS:- Triangulates position of car using satellites. Current GPS technology is limited to a certain distance. Advanced GPS is in development. • more technologies = more attack vectors • Vehicle Communications have to type :- 1- Vehicle To Vehicle (V2V) 2- Vehicle To Infrastructure (V2I)
  • 5. The components of autonomous vehicles
  • 6. 1. Autonomous Driving: Navigating a vehicle without human input from passengers using sensory (LIDAR), control, and navigation equipment that responds to the environment when traveling. 2. Driver Assistance: Enhances vehicle systems for safety and improved driving when the driver is in control. Technology includes blind-spot detection, pedestrian detection, lane-departure warnings, intelligent braking, traffic-sign recognition, automatic braking, and adaptive cruise control. Autonomous Vehicles Mode
  • 8. Challenges for autonomous car 1- Social: problems associated with the use of autonomous car such as consumer approval or not to the moral behind using it. 2- policy :- A variety of opportunities are available, but with new policy provided by governments as traffic laws, standards, and driving responsibility. 3- Non-Technical :- Challenges must also be addressed before autonomous cars commercialized such as cost, robustness. 4- Technical :- Discuss autonomous cars’ technical challenges. These challenges include validation and testing, trust, software quality, computational resources, safety, reliability, privacy and security. The present research falls into finding solutions for such challenges especially security.
  • 9. One of the most important challenges in autonomous vehicles is security
  • 11. Authentication is one the excellent techniques for securing the vehicle messages since they sign each of the messages before passing them to the acceptor side. It uses a Public key Infrastructure(PKI) to provide security due to huge number of individuals in the network. Each of the vehicle in the network will be before it is transferred and includes Certification Authority(CA). What is the Authentication ?
  • 12. Attacks on Authentication No Asset Vulnerability Target Attack Solution weakness 1 Vehicle/ Vehicle User Software flaw (Weak message propagation algorithm) Privacy leakage of sensitive information Malware Integration Updating antivirus, Sandbox approach the difficulty in defining an appropriate policy for each target program 2 Vehicle Vehicular hardware Flaws Disclosure of sensitive information Sensor Impersonation SPECS SPECS is vulnerable to impersonation attack 3 Vehicle OBU vulnerabilities , Sensors malfunctions Network flooding with wrong information Bogus Information ECDSA derive the signer’s private key in case he uses the same random number for to generate two signatures for two different messages. SPECS=Standard Performance Evaluation Corporation service ECDSA=The Elliptic Curve Digital Signature Algorithm
  • 13. Availability implies that information is available to the authorized parties whenever required. Unavailability to data and systems can have serious consequences. It is essential to have plans and procedures in place to prevent or mitigate data loss as a result of a disaster. A disaster recovery plan must include unpredictable events such as natural disasters and fire. What is the Availability ?
  • 14. Attacks on Availability No Asset Target Threat Attack Solution weakness 1 Vehicle/ Vehicule User Software flaw (Weak message propagation algorithm) Privacy leakage of sensitive information Malware Integration Updating antivirus, Sandbox approach the difficulty in defining an appropriate policy for each target program 2 Vehicle OBU vulnerability Unauthorized manipulation of routing table Jamming attacks at vehicle level Frequency hopping, Multiple radio transceivers Current transmitters are susceptible to selective jamming 3 Information Non-encrypted messages, Insecure wireless communication channel Message modification with wrong and compromised messages MITM attacks Strong cryptographic Techniques cryptographic attacks like namely guess-and- determine attacks.
  • 15. In the context of the information security world, integrity means that when a sender sends data, the receiver must receive exactly the same data as sent by the sender. Data must not be changed in transit. For example, if someone sends a message “Hello!”, then the receiver must receive “Hello!” That is, it must BE exactly the same data as sent by the sender. Any addition or subtraction of data during transit would mean the integrity has been compromised. What is the Integrity ?
  • 16. Attacks on Integrity N o Asset Vulnerability Target Attack Solution weakness 1 Vehicle OBU vulnerabilities , Sensors malfunctions Network flooding with wrong information Bogus Information ECDSA derive the signer’s private key in case he uses the same random number for to generate two signatures for two different messages. 2 Vehicle/ Vehicle User Software flaws, Weak Password Privacy leakage of sensitive data Social engineering attack Encrypted and strong password for message communication potential points of entry and weak security protocols, needed to proceed with the attack.
  • 17. In simple terms, Privacy means something that is secret and is not supposed to be disclosed to unintended people or entities. Privacy ensures that sensitive information is accessed only by an authorized person and kept away from those not authorized to possess them. Everyone has information which they wish to keep secret. Thus Protecting such information is an important part of information security. What is the Privacy ?
  • 18. Attacks on Privacy No Asset Vulnerability Threat Attack Solution weakness 1 Vehicle/ Vehicle User Software flaws, Weak Password Privacy leakage of sensitive data Social engineering attack Encrypted and strong password for message communication potential points of entry and weak security protocols, needed to proceed with the attack. 2 Vehicle User OBU vulnerabilities, Insecure wireless Communication Revelation of users Identity User privacy Disclosure Holistic approach for data Transmission Modification of messages 3 Information Broadcast nature of messages via wireless communication channel Revelation of sensitive information and user’s private credentials Eavesdropping Strong encrypted message for user’s communication attacks like detection, modification, extraction and destruction the data
  • 19. The research will be focussed onto the improvement of security on Autonomous vehicles. privacy during information exchange (V2V or V2I) will be part of the research. The work on one of the weakness that privacy have it ,also this work will solve this weakness to be secure in future. 19 The Research scope :-
  • 20. Why Autonomous vehicle security ? Autonomous Vehicles and its connectivity to the Internet via IoT and IoE is an emerging technical and scientific topics. Many challenges, especially in data security and is facing the development of this sector. The improvement of the security in V2V and V2I communication will lead to a robust trustable reliable and safer system.
  • 21. Thanks For Your Attention Any Questions