290 likes | 303 Views
These slides are related to Towards Improving Security in VANET:Some New Possible Attacks and their Possible Solutions.<br>
E N D
VANET Security Research Group (VSRG) Towards Improving Security in VANET: Some New Possible Attacks and their Possible Solutions Dr I.A.Sumra
Introduction • Today major concern is to provide safety of users and save their lives from tragic road accidents. • Vehicular ad hoc network (VANET) is taken more attention from the end user due to its potential safety and non-safety applications. The basic design objective of these applications to serve the users and provide safety of human lives during their journey. • The role of the end user is more prominent for next generation vehicular networks. An attacker is one of type of end user, but their role in the network is negative and creates problems for other components of network. • So in this slide, we will discuss two new types of attacks which are called road side traffic signal attack and also Internet attack in vehicular network. 2
V A E T N • Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. V2I 3
Safety Applications Non Safety Applications VANET APPLICATIONS Work Zone Warning:!!! Work Zone Warning:!!! Work in Progress Plz! use Alt. route Shopping MALL Parking Slot Available!!! RSU Parking Slot Available!!! 4
VANET Applications End Users • There are two types of users and two types of applications in VANET. • Safety Applications • Non-Safety Applications 5
SECURITY importance in future VANET • Recently, VANET security issue has gained a major interest among researchers. However, J. Blum et al. [23] have asked an important question related to VANET security in their article, “A wireless network of intelligent vehicles can make a highway travel safer and faster. But can hacker(attacker) use the system to cause accidents?” • By this question, it marked the importance of security in future VANET applications. Attacker is one type of users and their objective is to create problem in a network through different types of attacks. 6
VANET User Requirement (VUR) • User is the main entity in vehicular work and objective of this new technology is to serve users and safe their lives from road accidents. • Safety and non safety VANET applications meet the all users requirement during their journey like send or receive safety message to other vehicles and use the entertainment services. 7
Properties of Attacker 8 Outsider Insider Resources Coverage Area Technical Expertise
Proposed New Possible Attacks in VANET • A. RSU Attack in VANET • B. INTERNET Attack in VANET 9
A. RSU Attack in VANET • Attacker and Attack Information: Attacker Type: Insider Attacker Attacker’s Node ID X Attacker’s Node Location: L1 Nature of Attack: (Attack on green signal time slot) Actual time slot is 00:05sec and altered time slot is 00:10sec. 11
New Possible Attacks in VANET • Attacker and Attack Information: Attacker Type: Insider Attacker Attacker’s Node ID: Y Attacker 'node Location: L2 Nature of Attack: (Attack on Red Time Slot) Actual time slot is 00:20sec and the altered time slot is 00:05sec. 12
New Possible Attacks in VANET • Attacker and Attack Information: Attacker Type: Outsider Attacker (Pranksters) Attacker’s Node ID: Z Attacker’s Node Location: L3 Nature of Attack: (Stop the Traffic Signal), The actual time slot is 00:20sec and the altered time slot is 00:00. 13
B. INTERNET Attack in VANET • The Peer to peer applications have so far been limited to the fixed Internet (e.g.BitTorrent) in a vehicular network. • The processing capacity and storage of a vehicular node (modern vehicles) makes such applications possible also on mobile platforms in VANET. The Figure 5 shows the car BitTorrent [21]. 15
B. INTERNET Attack in VANET • There are two architectures of Internet access in vehicular network using WAVE technology. • (a) WAVE RSU Solution: In this solution the RSU usually have connection to the Backbone network (IP) and can act as the Internet access service providers for passing by OBUs in vehicular environments. • (b) Mycarevent VCG Solution: In this solution, all WAVE OBUs have to self-organize into VANET on the roadway. It is communicating with each other due to safety reasons. 16
Internet Attack through RSU • This is a new type of attack; the Internet is one of the key services that users use during their journey. In this attack, an attacker connects with the Internet and takes control of the user’s vehicle on the highway. • There are three possible scenarios which are discussed here. • Scenario 1:- When the attacker takes control of the software of the vehicle, it then generates false messages in the network or broadcasts wrong messages in the network. The attacker also controls the application unit (AU) or OBU and sends the attack into the network. • Scenario 2:- Attackers also take control of the sensors of the vehicle and the sensors change their behaviour and work according to the attackers‟ requirements. Sensors also show the wrong status of information and this depends on what the attacker actually wants from the other vehicles of the network. 17
Internet Attack through RSU • Scenario 3:- This is the worst situation of the attack in which the attacker controls the hardware part of the vehicle, i.e., the Electronic Control Unit (ECU). It is a very serious condition for the road when a user’s vehicle is under the control of someone else outside the network and they can increase or decrease the vehicle’s speed. • The Figure 7 shows the details of where the attacker makes the connection with the RSU and then connects with vehicle A. Vehicle A is actually using the Internet service from the RSU and in this way the attacker can easily make a connection with vehicle A. 18
Internet Attack through RSU • Scenario 4: In this scenario, the attacker (Prankster) sits in the corner of the city and makes a connection with the local Internet Service Provider (ISP). The primary objective of the attacker is to make a connection with the ISP, and through ISP connection it will launch attacks on the road side unit (RSU). If he/she succeeds in making the connection with the RSU, then he/she will launch the attack (send wrong messages, flooding) through the Internet connection. • The secondary objective of the attacker is to breakdown the services of the ISP because if the ISP server goes down, then the whole network’s functionality will be disturbed. The Figure 8 explains the whole scenario in which attacker lunch attack on ISP through RSU. 19
Possible Solutions of Attacks - TPM • A smart vehicle has an important role to perform the secure communication in a network and smart vehicle is a combination of several mechanical components with the ability to perform computations. • Trusted Platform Module (TPM): Trusted Platform Module (TPM) is a hardware module which are used inside the smart vehicle and their purpose is to ensure the secure communication in network. The Figure 9 shows the basic architecture of the TPM and the following are key features of the Trusted Platform Module (TPM). 20
Smart vehicle with TPM modules • TPM is based on root of trust mechanism which are reside the inside the smart vehicle and also ensure the security and trust of TPM. TPM also communicate with other sensors of smart vehicle and check the functionality and working mechanism of these sensors in smart vehicle. • The Root of Trust (RoT) is play the key role to measure the security and trust inside the TPM. So, detail description of every module of Root of Trust (RoT) is given below. 21
Case One: Communication with Normal User: • Whenever vehicle is secure through TPM, so now it is possible to communicate with other vehicle or with infrastructure. There are two content of the message of one message i-e security content (valid security key and signature), other contents includes vehicle ID, location of vehicle and speed of vehicle and message generation time. • All parameters of any message are an important while start the communication in network. The Figure 13, shows the communication through step by step process approach while start the communication in network. 22
Case Two: Communication with Attacker User: • In this case an attacker communicate with RUS and want to alter the signal time slot. But TPM has responsibility to identify and stop their communication in network. • The Figure 14 provides the detail description of case two 23
Case One: Communication with Normal User: • In this case normal user start communication with ISP and take the internet services while travelling on highway. There are following steps involve to start the communication between normal user and ISP. • The Figure 15 explains the communication mechanism between user and ISP in vehicular network. 24
Case Two: Communication with Attacker User: • In this case an attacker communicate with ISP and want to lunch attack on ISP server. Objective of the attacker is to down Internet services for other user of the network. Through TPM, we can handle this attacks and drop their packets while they are launching this such of attacks on ISP. • The Figure 16 provides the detail description of case two. 25
Conclusion • Security of VANET is an important issue to be addressed by designers of VANET infrastructure security. • VANET has taken more attention of the user due to its potential applications, and the Internet service along the road is one of the key services in VANET. Users will enjoy high speed Internet services along the road. However, it cannot be ignored that there is an importance for security in a vehicular network as attackers will always remain. • In this paper, the authors have discussed the newly addressed attacks and the purpose of this paper has been to get the attention of researchers into this aspect of the behaviour of an attacker. In first section of this paper, the authors have discussed the possible attacks on the Internet and on Road Side Traffic Signal in next generation vehicular network through different scenarios. 26
References • [15] Guette, G. and C. Bryce, Using tpms to secure vehicular ad-hoc networks (vanets), in Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks. 2008, Springer. p. 106-116. • [21]Gerla, M., L. Kleinrock, "Vehicular networks and the future of the mobile internet." Computer Networks 55(2): 457-469,2011. • [22] Yunpeng Zang; Weiss, E.; Stibor, L.; Hui Chen; Xi Cheng; , "Opportunistic Wireless Internet Access in Vehicular Environments Using Enhanced WAVE Devices," Future Generation Communication and Networking (FGCN 2007) , vol.1, no., pp.447-452, 6-8 Dec. 2007. • [23] J. Blum and Azim Eskandarian, "The threat of intelligent collisions," in IT Professional, vol. 6, no. 1, pp. 24-29, Jan.-Feb. 2004. 27
Journal Paper • This is journal research paper and please download complete research paper from research gate. 28
Thank you….. 29