• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
The Security and Privacy Requirements in VANET
 

The Security and Privacy Requirements in VANET

on

  • 5,426 views

The Security and Privacy Requirements in Vehicular ad-hoc Network (VANET)

The Security and Privacy Requirements in Vehicular ad-hoc Network (VANET)

Statistics

Views

Total Views
5,426
Views on SlideShare
5,425
Embed Views
1

Actions

Likes
3
Downloads
381
Comments
0

1 Embed 1

http://www.linkedin.com 1

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    The Security and Privacy Requirements in VANET The Security and Privacy Requirements in VANET Presentation Transcript

    • Introduction to VANET Scenarios Security Requirements Privacy Requirements Bibliography The Security and Privacy Requirements in VANET Ankit Singhmailto:ankit.singh@sit.fraunhofer.de June 24, 2011 Ankit Singh The Security and Privacy Requirements in VANET
    • Introduction to VANET Scenarios Security Requirements Privacy Requirements Bibliography1 Introduction to VANET History Overview Overview of Basic Components in VANETs2 Scenarios Vehicle to Vehicle Communication Vehicle to Infrastructure Communication3 Security Requirements4 Privacy Requirements5 Bibliography Ankit Singh The Security and Privacy Requirements in VANET
    • Introduction to VANET Scenarios History Security Requirements Overview Privacy Requirements Overview of Basic Components in VANETs BibliographyHistory of Vehicles I Figure: Cars were Pure Mechanical Devices Ankit Singh The Security and Privacy Requirements in VANET
    • Introduction to VANET Scenarios History Security Requirements Overview Privacy Requirements Overview of Basic Components in VANETs BibliographyHistory of Vehicles II Figure: Todays cars with almost fully controlled Software devices Ankit Singh The Security and Privacy Requirements in VANET
    • Introduction to VANET Scenarios History Security Requirements Overview Privacy Requirements Overview of Basic Components in VANETs BibliographyHistory of Vehicles III Figure: Future smart cars fully controlled by softwares (Concept model of Audi A9 will repairs itself) Ankit Singh The Security and Privacy Requirements in VANET
    • Introduction to VANET Scenarios History Security Requirements Overview Privacy Requirements Overview of Basic Components in VANETs BibliographyWhat is VANET? I Vehicles Transformed into “Computers on the Wheels” or “Networks on the Wheel” Vehicular Communication System (VCS):- Two main type of communications Vehicle to Vehicle (V2V) Communication:- Vehicle to Infrastructure (V2I) communication:- Advantage and Usage of VCS:- Information sharing Co-operative driving Other value added services like Navigation, internet access etc. Communication between C2C adn C2I are “ad-hoc” in nature. This special kind of communication network is known as “Vehicular Ad-hoc Network (VANET)” Ankit Singh The Security and Privacy Requirements in VANET
    • Introduction to VANET Scenarios History Security Requirements Overview Privacy Requirements Overview of Basic Components in VANETs BibliographyWhat is VANET? II VANET will become Worlds largest ad-hoc network Ankit Singh The Security and Privacy Requirements in VANET
    • Introduction to VANET Scenarios History Security Requirements Overview Privacy Requirements Overview of Basic Components in VANETs BibliographyWhy we need VANET? I Ankit Singh The Security and Privacy Requirements in VANET
    • Introduction to VANET Scenarios History Security Requirements Overview Privacy Requirements Overview of Basic Components in VANETs BibliographyOverview of Basic Components in VANETs I Figure: Basic Component of VANET Ankit Singh The Security and Privacy Requirements in VANET
    • Introduction to VANET Scenarios History Security Requirements Overview Privacy Requirements Overview of Basic Components in VANETs BibliographyOverview of Basic Components in VANETs II Communication:- Wireless Access in Vehicular Environment (WAVE): IEEE 1609.2 Standard also Known DSRC 802.11p . Supports Multi-Hop communication for vehicles out of range (Max. Range DSRC is 1000m) On-Board Unit (OBU):- A device which is inside the vehicle which - processes the data collected from various sensors fitted inside the cars and gives conditions of the vehicles is responsible for communication with outside network i.e with other vehicles and infrastructure. Road Side Unit (RSU): Infrastructure for communication between the cars for sharing and information from various vehicles. Ankit Singh The Security and Privacy Requirements in VANET
    • Introduction to VANET Scenarios Vehicle to Vehicle Communication Security Requirements Vehicle to Infrastructure Communication Privacy Requirements BibliographyVehicle to Vehicle Communication I Figure: Scenarios in V2V Possible Threat Scenarios in V2V above:- Pre-crash warning:- trust on the warning message, Denial of Service, Jamming Traffic condition warning:- Linkablity of Private Credentials (Tracking/profiling), Message fabrication/tamper Ankit Singh The Security and Privacy Requirements in VANET
    • Introduction to VANET Scenarios Vehicle to Vehicle Communication Security Requirements Vehicle to Infrastructure Communication Privacy Requirements BibliographyVehicle to Vehicle Communication II Vehicle Status Warning:- Drops/Tamper Message Ankit Singh The Security and Privacy Requirements in VANET
    • Introduction to VANET Scenarios Vehicle to Vehicle Communication Security Requirements Vehicle to Infrastructure Communication Privacy Requirements BibliographyVehicle to Infrastructure Communication I Figure: Scenarios in V2I Ankit Singh The Security and Privacy Requirements in VANET
    • Introduction to VANET Scenarios Vehicle to Vehicle Communication Security Requirements Vehicle to Infrastructure Communication Privacy Requirements BibliographyVehicle to Infrastructure Communication II Possible Threat in Scenarios of V2I above:- Electronic Toll collection/Automatic access control/parking access:- Privacy Violation, Impersonation, Infotainment:- Penetration attack, Privacy violation Remote Fleet Management:- Tracking/Profiling Tax payment: The authority can link or indentify using previous transaction or other vehicle can hack transaction information and reveal the identity of the sender. Ankit Singh The Security and Privacy Requirements in VANET
    • Introduction to VANET Scenarios Security Requirements Privacy Requirements BibliographySecurity Requirements I Various Security Requirements for VANET’s:- Authentication Accountability Verification of Data Consistency Availability Non-Repudiation Credential revocation Ankit Singh The Security and Privacy Requirements in VANET
    • Introduction to VANET Scenarios Security Requirements Privacy Requirements BibliographyPrivacy Requirements I Various Privacy Requirements for VANET’s:- Anonymity Unlinkablility Restricted credential usage Perfect forward Privacy Ankit Singh The Security and Privacy Requirements in VANET
    • Introduction to VANET Scenarios Security Requirements Privacy Requirements BibliographyBibliography I Security Engineering for Vehicular IT Systems, Improving the Trustworthiness and Dependability of Automotive IT Applications, Marko Wolf How much does software add to the cost of today’s vehicles? How about tomorrow’s electric cars? by Sebastian Blanco on Jun 8th 2010, at Auto Blog Green: autobloggreen.com Design of 5.9GHz DSRC-based Vehicular Safety Communication, Daniel Jiang1 , Vikas Taliwal1 , Andreas Meier1 , Wieland Holfelder1 , Ralf Herrtwich2 , 1 DaimlerChrysler Research and Technology North America, Inc., 2 DaimlerChrysler AG, Vehicle IT and Services Research and Advanced Engineering DSRC range comparison with FM Radio, cellular Phone, Satellite, Check FAQs Security in Vehicular Ad Hoc Networks, Xiaodong Lin, Rongxing Lu, Chenxi Zhang, Haojin Zhu, Pin-Han Ho, and Xuemin (Sherman) Shen, University of Waterloo Privacy Requirements in Vehicular Communications Systems, Florian Schaub, Zhendong Ma, and Frank Kargl, Institute of Media Informatics, Ulm University, Germany The Security of Vehicular Ad Hoc Networks, Maxim Raya and Jean-Pierre Hubaux, Laboratory of computer Communications and Applications (LCA), School of Computer and Communication Sciences, EPFL, Switzerland Ankit Singh The Security and Privacy Requirements in VANET
    • Introduction to VANET Scenarios Security Requirements Privacy Requirements BibliographyBibliography II Securing Vehicular Communications, Maxim Raya, Panos Papadimitratos, Jean-Pierre Hubaux, Laboratory of computer Communications and Applications (LCA), School of Computer and Communication Sciences, EPFL, Switzerland Security Engineering for VANETs, Frank Kargl, Zhendong Ma, and Elmar Schoch, Ulm University, Institute of Media Informatics Privacy in VANETs using Changing Pseudonyms - Ideal and Real, Matthias Gerlach and Felix G¨ttler u Adaptive Privacy-Preserving Authentication in Vehicular Networks (Invited Paper) Kewi Sha1 , Yong Xi1 , Weisong Shi1 , Loren Schwiebert1 , and Tao Zhang2 , 1 Department of computer Science, Wayne state University, 2 Telcordia Technologies, Inc. Strong and Affordable Location Privacy in VANETs: Identity Diffusion Using Time-Slots and Swapping, David Eckhoff , Christoph Sommer , Tobias Gansen† , Reinhard German and Falko Dressler∗ , ∗ Computer Networks and Communication Systems, Dept. of Computer Science, University of Erlangen, Germany, † Audi Electronics Venture GmbH, Gaimersheim, Germany Current Trends in Vehicular Ad Hoc Networks, Ghassan M. T. Abdalla∗ , Mosa Ali Abu-Rgheff∗ and Sidi Mohammad Senouci∗∗ , ∗ University of Plymouth - School of Computing, Communications & Electronics, UK, ∗∗ France T´l´com - Recherche et D´veloppment CORE, France ee e Ankit Singh The Security and Privacy Requirements in VANET