150 likes | 163 Views
These slides are related to Using TPM to Ensure Security, Trust and Privacy (STP) in VANET
E N D
VANET Security Research Group (VSRG) Dr I.A.Sumra Using TPM to Ensure Security, Trust and Privacy (STP) in VANET
Introduction V A E T N • Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. V2I Road Side Unit (RSU) V2V V2V Basic VANET Architecture 2
Safety Applications Non Safety Applications VANET Applications Work Zone Warning:!!! Work Zone Warning:!!! Work in Progress Plz! use Alt. route Shopping MALL ( TESCO ) Parking Slot Available!!! RSU Parking Slot Available!!! 3
VANET Security Requirements • Vehicular network applications require security and the objective of these applications is to serve users and make their journey secure and comfortable. • Attackers have their own role in this network and we cannot predict the dynamic behavior of the attacker. If an attacker works on a safety application and changes the content of the safety message then it poses a very difficult condition on the road and many users will be affected due to this kind of attack. • Accidents are often the result of an alteration of any safety message or the sending of even one wrong safety message in a network and many human lives are at risk [1].
TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK • Network Behavior
TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK • Attacker Behavior
STP in VANET STP in VANET
Conclusion • In trusted vehicular networks, trust and security are two key requirements for users. While privacy is a basic necessary requirement for security in life saving vehicular networks, a guarantee that not only the vehicle platform but also the infrastructure can be trusted is also vital. • When users receive any safety message in vehicular communications, it is important that the message is authentic and that the source making the request is legitimate. A new and practical cardbased scheme has been proposed in this paper to make possible the trusted authentication of users while enabling various transactions with a Vehicle Service Provider (VSP).
Please download complete paper from • IEEEE website • ResearchGate 14