300 likes | 314 Views
These slides are related to An Integrated Multi-level Security Model for Malicious Attacks Resiliency in Vehicular Ad hoc Network (VANET).
E N D
VANET Security Research Group (VSRG) An Integrated Multi-level Security Model for Malicious Attacks Resiliency in Vehicular Ad hoc Network (VANET) Dr I.A.Sumra
Introduction V A E T N • Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. V2I 2
Safety Applications Non Safety Applications VANET Applications Work Zone Warning:!!! Work Zone Warning:!!! Work in Progress Plz! use Alt. route Shopping MALL ( TESCO ) Parking Slot Available!!! RSU Parking Slot Available!!! 3
VANET Security Requirements • Vehicular network applications require security and the objective of these applications is to serve users and make their journey secure and comfortable. • Attackers have their own role in this network and we cannot predict the dynamic behavior of the attacker. If an attacker works on a safety application and changes the content of the safety message then it poses a very difficult condition on the road and many users will be affected due to this kind of attack. • Accidents are often the result of an alteration of any safety message or the sending of even one wrong safety message in a network and many human lives are at risk [1].
TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK • Network Behavior
TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK • Attacker Behavior
Attacks on Confidentiality in VANET • Monitoring Attack • Traffic Analysis Attack • Man in the Middle (MiMA) Attack
Attacks on Integrity in VANET Message Alteration Attack Message Fabrication Attack Incorrect Data Injecting Attack
Attacks on Availability in VANET • DENIAL OF SERVICE (DOS) • In VANET, DOS shall not be allowed to happen, where seamless life critical information must reach its intended destination securely and timely. In summary, there are three ways the attackers may achieve DOS attacks. • There are three levels of DOS attacks as described below. • Basic Level: Overwhelm the Node Resources • Extended Level: Jamming the Channel
DENIAL OF SERVICE (DOS) ATTACK IN VANET • Basic Level: Overwhelm the Node Resources
DENIAL OF SERVICE (DOS) ATTACK IN VANET • Extended Level: Jamming the Channel
Chain of Trust (COT) • 1. Trust Inside TPM • 2. Trust between TPM and embedded Smart Vehicle Sensors • 3. Trust between Vehicle to Vehicle (V2V) • 4. Trust between Vehicle to RSU (V2R)
Chain of Trust (COT) • Trust Inside TPM
Chain of Trust (COT) • 2. Trust between TPM and embedded Smart Vehicle Sensors
Chain of Trust (COT) • 3. Trust between Vehicle to Vehicle (V2V)
Conclusion • Security is the top level module that is always demanded for safe and reliable VANET communications. However, the dynamic nature of the vehicular network makes it difficult to identify the attackers, attack types and behavior of the attackers. • The aim of an attacker is to launch attacks in the network and create problems for other users to achieve their particular goals. Whenever a normal user changes his/her behavior to become an attacker and launches an attack, this attack would create problems for other components of the network and users who utilize that particular component(s). • Each attack has its own effect level and it is very hard to identify that particular attack in a particular region of network.
Thank you….. 29
Journal Paper • Please download complete research paper from research gate. 30