1 / 18

Classes of Attacks in VANET

These slides are related to Classes of Attacks in VANET.

Irshadsumra
Download Presentation

Classes of Attacks in VANET

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. VANET Security Research Group (VSRG) Classes of Attacks in VANET Dr I.A.Sumra

  2. OVERVIEW • Introduction • Authentication Requirement in VANET • Related Work • Trusted Security Module in VANET • Proposed Card-based Scheme • Conclusion • References • Q&A 2

  3. Introduction • Today major concern is to provide safety of users and save their lives from tragic road accidents. • Vehicular Ad hoc Network (VANET) received significant attention of researchers and automotive industries due to life saving factor. • Safety and non safety applications running on VANET must ensure safety of human life on road and applications must be security, trust and privacy enhanced to protect road and transport users. • We determined five different classes of attacks which need mitigation mechanisms to protect road and transport users. Research efforts are being conducted to circumvent these attacks. 3

  4. V A E T N • Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. V2I Road Side Unit (RSU) V2V V2V Basic VANET Architecture 4

  5. Safety Applications Non Safety Applications VANET APPLICATIONS Work Zone Warning:!!! Work Zone Warning:!!! Work in Progress Plz! use Alt. route Shopping MALL Parking Slot Available!!! RSU Parking Slot Available!!! 5

  6. Properties of Attacker 6 Outsider Insider Resources Coverage Area Technical Expertise

  7. Proposed Classes of Attacks Class-E Class-D Class-C Class-B Class-A 7 Monitoring Attack Social Attack Timing Attack Application Attack Network Attack

  8. First Class: Network Attack 1. Denial of Service (DOS) attack 8

  9. First Class: Network Attack 2. Distributed Denial of service (DDOS) attack 9

  10. First Class: Network Attack 3. Sybil attack 10

  11. First Class: Network Attack 4. Node Impersonation Attack 11

  12. Second Class: Application Attack (AP) 12

  13. Third Class: Timing Attack 13

  14. Forth Class: Social Attack 14

  15. Fifth Class: Monitoring Attack 15

  16. Attacks Process Mechanism Steps 1.Attacker launches first class attack to other vehicle in the network. E.g. Sybil attack. 2. Attacker launches first class attack to infrastructure. E.g. DOS attack 3. Attacker receives safety message from authentic vehicle. 4. Attacker receives safety message from infrastructure. 5. Attacker alters the content of the message and passes this message to authentic vehicle. 6. Attacker forwards wrong message to infrastructure. 7. Attacker launches another timing attacks to authentic vehicle. 8. Attacker launches social attack to near by authentic vehicle. 9. Attacker monitors the communication between the vehicles or infrastructure and achieves his/her benefit. 16

  17. Conclusion • Users require safety on road in future vehicular network. VANET applications must implement trusted computing based solution to promote trust amongst road users and their vehicles and the infrastructure. • The proposed attacks classes is an initial effort to identify various attacks and future research works will overcome these issues using trusted computing and privacy enhancing technologies. 17

  18. Conference Paper • Saudi International Electronics, Communications and Photonics Conference (SIECPC)- 2011 • Complete paper is available on IEEE and Research gate. • Please download complete research paper from research gate. 18

More Related