Do s attacks in vanet presentation in vanet
Upcoming SlideShare
Loading in...5
×
 

Do s attacks in vanet presentation in vanet

on

  • 1,627 views

DoS attacks in VANET.

DoS attacks in VANET.

Statistics

Views

Total Views
1,627
Views on SlideShare
1,625
Embed Views
2

Actions

Likes
1
Downloads
120
Comments
0

1 Embed 2

http://www.slashdocs.com 2

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Do s attacks in vanet presentation in vanet Do s attacks in vanet presentation in vanet Presentation Transcript

  • Securing vehicular ad hoc networkSirojiddin Jurayev
  • What is a VANET (Vehicular Ad hoc NETwork)? Roadside base station Emergency event Inter-vehicle communications Vehicle-to-roadside communications• Communication: typically over the Dedicated Short Range Communications(DSRC) (5.9 GHz)• Example of protocol: IEEE 802.11p
  • A taxonomy of vehicular communication systems 3
  • A Modern Vehicle Event data recorder (EDR) Positioning system (GPS) Forward radar Communication facility Rear radar Display Human-Machine Interface Computing platform A modern vehicle is a network of sensors/actuators on wheels ! 4
  • Attackers Insider or outsider  Insider– valid user  Outsider – Intruder, limited attack options Malicious or rational  Malicious – No personal benefit, intends to harm other users  Rational – seeks personal benefits, more predictable attack Active or passive  Active:Generates packets, participates in the network  Passive: Eavesdrop, track users
  • Security AttacksGoals Actions Execution Congestion Insert bogus Creation/ congestion Single avoidance warnings Cause accidents Misrepresent Single, multiple or pile-ups Location of Entities (Sybil) accident Track Message Multiple individuals suppression Aggressive insertion Denial of service of messages/jamming Independent Colluding
  • Security Requirements Authentication:  React only to legitimate events. Authenticate senders of messages. Verification of data consistency  Legitimate senders can send false data (attack/unintentional). Can cause immense damage even fatalities. Availability  Network should be available under jamming attacks Non-repudiation  Drivers causing accidents should be reliably identified Privacy (conflicts with authentication)  Privacy of drivers against unauthorized observers. Real-time constraints  High speed means constraints on time
  • Attack 1 : Bogus traffic information Traffic jam ahead Attacker: insider, rational, active 8
  • Attack 2 : Generate “Intelligent Collisions” SLOW DOWN The way is clear Attacker: insider, malicious, active 9
  • Attack 3: Cheating with identity, speed, or position Wasn’t me! Attacker: insider, rational, active 10
  • Attack 4: Jamming Roadside base station Jammer 11
  • Attack 5: Tunnel Wrong information Physical tunnel or jammed area 12
  • Proposed solution module forDoS attack
  • Channel switching
  •  Using switching technology Study case of different position of vehicles according to GPS position. Ex. In highway we can use WiMax technology, in city we can use Wifi or Bluetooth etc. If jamming attack detected then node tries to change channel. Attacker power may not be so high in order cover all channels. If so higher power might detect easily by using other methods. Problem. 1. Is it possible for listen different position wireless networks same time.
  • Expected layered approach forVANET