180 likes | 318 Views
These slides are related to Classes of Attacks in VANET.
E N D
VANET Security Research Group (VSRG) Classes of Attacks in VANET Dr I.A.Sumra
OVERVIEW • Introduction • Authentication Requirement in VANET • Related Work • Trusted Security Module in VANET • Proposed Card-based Scheme • Conclusion • References • Q&A 2
Introduction • Today major concern is to provide safety of users and save their lives from tragic road accidents. • Vehicular Ad hoc Network (VANET) received significant attention of researchers and automotive industries due to life saving factor. • Safety and non safety applications running on VANET must ensure safety of human life on road and applications must be security, trust and privacy enhanced to protect road and transport users. • We determined five different classes of attacks which need mitigation mechanisms to protect road and transport users. Research efforts are being conducted to circumvent these attacks. 3
V A E T N • Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. V2I Road Side Unit (RSU) V2V V2V Basic VANET Architecture 4
Safety Applications Non Safety Applications VANET APPLICATIONS Work Zone Warning:!!! Work Zone Warning:!!! Work in Progress Plz! use Alt. route Shopping MALL Parking Slot Available!!! RSU Parking Slot Available!!! 5
Properties of Attacker 6 Outsider Insider Resources Coverage Area Technical Expertise
Proposed Classes of Attacks Class-E Class-D Class-C Class-B Class-A 7 Monitoring Attack Social Attack Timing Attack Application Attack Network Attack
First Class: Network Attack 1. Denial of Service (DOS) attack 8
First Class: Network Attack 2. Distributed Denial of service (DDOS) attack 9
First Class: Network Attack 3. Sybil attack 10
First Class: Network Attack 4. Node Impersonation Attack 11
Attacks Process Mechanism Steps 1.Attacker launches first class attack to other vehicle in the network. E.g. Sybil attack. 2. Attacker launches first class attack to infrastructure. E.g. DOS attack 3. Attacker receives safety message from authentic vehicle. 4. Attacker receives safety message from infrastructure. 5. Attacker alters the content of the message and passes this message to authentic vehicle. 6. Attacker forwards wrong message to infrastructure. 7. Attacker launches another timing attacks to authentic vehicle. 8. Attacker launches social attack to near by authentic vehicle. 9. Attacker monitors the communication between the vehicles or infrastructure and achieves his/her benefit. 16
Conclusion • Users require safety on road in future vehicular network. VANET applications must implement trusted computing based solution to promote trust amongst road users and their vehicles and the infrastructure. • The proposed attacks classes is an initial effort to identify various attacks and future research works will overcome these issues using trusted computing and privacy enhancing technologies. 17
Conference Paper • Saudi International Electronics, Communications and Photonics Conference (SIECPC)- 2011 • Complete paper is available on IEEE and Research gate. • Please download complete research paper from research gate. 18