1 / 20

Attacks on Security Goals (Confidentiality,Integrity,Availability) in VANET

These slides are related to a Survey on Attacks on Security Goals (Confidentiality,Integrity,Availability) in VANET.

Irshadsumra
Download Presentation

Attacks on Security Goals (Confidentiality,Integrity,Availability) in VANET

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. VANET Security Research Group (VSRG) Attacks on Security Goals (Confidentiality,Integrity,Availability) in VANET: A Survey Dr I.A.Sumra

  2. Introduction V A E T N • Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. V2I Road Side Unit (RSU) V2V V2V Basic VANET Architecture 2

  3. Safety Applications Non Safety Applications VANET Applications Work Zone Warning:!!! Work Zone Warning:!!! Work in Progress Plz! use Alt. route Shopping MALL ( TESCO ) Parking Slot Available!!! RSU Parking Slot Available!!! 3

  4. VANET Security Requirements • Vehicular network applications require security and the objective of these applications is to serve users and make their journey secure and comfortable. • Attackers have their own role in this network and we cannot predict the dynamic behavior of the attacker. If an attacker works on a safety application and changes the content of the safety message then it poses a very difficult condition on the road and many users will be affected due to this kind of attack. • Accidents are often the result of an alteration of any safety message or the sending of even one wrong safety message in a network and many human lives are at risk [1].

  5. TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK • Network Behavior

  6. TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK • Attacker Behavior

  7. Attacker with security goals (CIA) in VANET

  8. All Possible attacks on security goals (CIA) in VANET

  9. Attacks on Confidentiality in VANET • Monitoring Attack • Traffic Analysis Attack • Man in the Middle (MiMA) Attack

  10. Attacks on Integrity in VANET Message Alteration Attack Message Fabrication Attack Incorrect Data Injecting Attack

  11. Attacks on Availability in VANET • DENIAL OF SERVICE (DOS) • In VANET, DOS shall not be allowed to happen, where seamless life critical information must reach its intended destination securely and timely. In summary, there are three ways the attackers may achieve DOS attacks. • There are three levels of DOS attacks as described below. • Basic Level: Overwhelm the Node Resources • Extended Level: Jamming the Channel

  12. DENIAL OF SERVICE (DOS) ATTACK IN VANET • Basic Level: Overwhelm the Node Resources

  13. DENIAL OF SERVICE (DOS) ATTACK IN VANET • Extended Level: Jamming the Channel

  14. Distributed Denial of service (DDOS) Attack

  15. Attacks on Availability in VANET

  16. Security goals (CIA) with threat levels in VANET

  17. Conclusion • Based on the literature survey, it is understood that attackers launch different types of attacks while communication is in progress in the network. These attacks break the security goals like confidentiality, integrity and availability (CIA) in the VANET environment. • These goals have equal importance to serve the users but the availability leads to high priority. It is observed that the attacks related to the availability have more threat level as compare to the integrity and confidently.

  18. Thank you….. 19

  19. Journal Paper • Please download complete research paper from research gate. 20

More Related