150 likes | 158 Views
These slides are related to Trusted Computing in Vehicular Ad hoc Network (VANET). <br>
E N D
VANET Security Research Group (VSRG) Trusted Computing in Vehicular Ad hoc Network (VANET) Dr I.A.Sumra
V A E T N • Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. V2I Road Side Unit (RSU) V2V V2V Basic VANET Architecture 2
Safety Applications Non Safety Applications VANET Applications Work Zone Warning:!!! Work Zone Warning:!!! Work in Progress Plz! use Alt. route Shopping MALL ( TESCO ) Parking Slot Available!!! RSU Parking Slot Available!!! 3
Trust • “an entity can be trusted if it always behaves in the expected manner for intended purpose”. • all components of the network (vehicles and infrastructure) are behaving in an expected manner • (secure communication between the components) and serve the users and save human lives. Change the behavior Attacker
Component Behavior • User Behavior • Node Behavior • Road Side Unit (RSU) Behavior
Security and Trust • Security is one of the most important issues in vehicular network. Applications of vehicular network should be secure and user receives right information while traversing along their journey. • Trust is also a key component of security and trust is governs the behavior all components in the network which must behave in the expected manner. • User, vehicle and road side unit (RSU) are some components of trusted vehicular network. If any of these components of network unexpectedly change their behavior then it would signify that there is a breach of trust in the network.
Smart vehicle and Security Hardware Modules Tamper Proof Device (TPD) Event Data Recorder (EDR) Trusted Platform Module (TPM) Global Position System (GPS) Radar Systems (RSs) Communication Facility (CF) Computing Platform (CP) Human Machine Interface (HMI)
Trusted Platform Module (TPM) • Trusted Platform Module is a hardware module designed for secure computing and can be integrated into any device for example in notebook. • TPM is a piece of hardware and need software to communicate with it to protect and store data in secure location. It can resist software attacks but problem is that it cannot control hardware tempering.
Vehicular Property Based Attestation Protocol (VPP) • The proposed protocol is also based on the PBA protocol which provides attestation on some security properties in a vehicular environment. We view that attestation is critically necessary for vehicles and RSU trusted platforms. • In this proposed protocol, the focus is mainly on properties making attestation on the basis of the required properties only which should be dynamic and may consist of security, trust or privacy properties. If users conform to the required properties for using the applications or services, then they would be allowed to become a part of the network and use the services.
Conclusion • Trusted computing ensures security and trust in a vehicular environment. The TPM is the key module of a trusted computing group (TCG) and plays a key role for the security of a platform. • The attestation mechanism is to ensure the security of the platform and the Property based attestation is one of the possible attestation mechanisms used to attest platforms on the basis of some particular properties. • In this paper, a protocol has been proposed and this protocol is based on the property based attestation (PBA).The purpose of using this attestation method in a vehicular network is due to its dynamic behavior and the high mobility of the network node.
Please download complete paper from • IEEEE website • ResearchGate 14