260 likes | 273 Views
These slides are related to Comparative Study of Security hardware modules (EDR, TPD and TPM) in VANET.
E N D
VANET Security Research Group (VSRG) Comparative Study of Security hardware modules (EDR, TPD and TPM) in VANET Dr I.A.Sumra
Introduction V A E T N • Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. V2I 2
Safety Applications Non Safety Applications VANET Applications Work Zone Warning:!!! Work Zone Warning:!!! Work in Progress Plz! use Alt. route Shopping MALL ( TESCO ) Parking Slot Available!!! RSU Parking Slot Available!!! 3
VANET Security Requirements • Vehicular network applications require security and the objective of these applications is to serve users and make their journey secure and comfortable. • Attackers have their own role in this network and we cannot predict the dynamic behavior of the attacker. If an attacker works on a safety application and changes the content of the safety message then it poses a very difficult condition on the road and many users will be affected due to this kind of attack. • Accidents are often the result of an alteration of any safety message or the sending of even one wrong safety message in a network and many human lives are at risk [1].
TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK • Network Behavior
TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK • Attacker Behavior
Attacks on Confidentiality in VANET • Monitoring Attack • Traffic Analysis Attack • Man in the Middle (MiMA) Attack
Attacks on Integrity in VANET Message Alteration Attack Message Fabrication Attack Incorrect Data Injecting Attack
Attacks on Availability in VANET • DENIAL OF SERVICE (DOS) • In VANET, DOS shall not be allowed to happen, where seamless life critical information must reach its intended destination securely and timely. In summary, there are three ways the attackers may achieve DOS attacks. • There are three levels of DOS attacks as described below. • Basic Level: Overwhelm the Node Resources • Extended Level: Jamming the Channel
DENIAL OF SERVICE (DOS) ATTACK IN VANET • Basic Level: Overwhelm the Node Resources
DENIAL OF SERVICE (DOS) ATTACK IN VANET • Extended Level: Jamming the Channel
Smart vehicle and Security Hardware Modules Tamper Proof Device (TPD) Event Data Recorder (EDR) Trusted Platform Module (TPM) Global Position System (GPS) Radar Systems (RSs) Communication Facility (CF) Computing Platform (CP) Human Machine Interface (HMI)
Event Data Recorder (EDR) • Event Data Recorder [7] is non volatile hardware module and provides tamper proof storage. • The purpose of this module is to maintain the log of any critical events and later to use this information. It is similar to black box used in airplane.
Temper Proof Device (TPD) • There are two problems in EDR. • 1.) it does not generate any data. • 2.) it does not have any ability to encrypt the messages. The researchers added one more module to meet these two requirements. The next module is Temper Proof Device (TPD).
Trusted Platform Module (TPM) • Trusted Platform Module is a hardware module designed for secure computing and can be integrated into any device for example in notebook. • TPM is a piece of hardware and need software to communicate with it to protect and store data in secure location. It can resist software attacks but problem is that it cannot control hardware tempering.
Conclusion • Security is an important issue of VANET as it deals with traffic system and human lives directly. In near future VANET will be on road and their potential applications will be providing safety to users. • In this slide, we presented security requirements and then discussed in detail about security hardware modules that are used in smart vehicle. • The lower cost of these modules and their right functionality in vehicular environment will make the implementation of this technology easier.
Thank you….. 25
Conference Paper • Please download complete research paper from research gate. 26