Your SlideShare is downloading. ×
  • Like
Do s attacks in vanet presentation in vanet
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Do s attacks in vanet presentation in vanet

  • 1,704 views
Published

DoS attacks in VANET.

DoS attacks in VANET.

Published in Education , Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
1,704
On SlideShare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
150
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Securing vehicular ad hoc networkSirojiddin Jurayev
  • 2. What is a VANET (Vehicular Ad hoc NETwork)? Roadside base station Emergency event Inter-vehicle communications Vehicle-to-roadside communications• Communication: typically over the Dedicated Short Range Communications(DSRC) (5.9 GHz)• Example of protocol: IEEE 802.11p
  • 3. A taxonomy of vehicular communication systems 3
  • 4. A Modern Vehicle Event data recorder (EDR) Positioning system (GPS) Forward radar Communication facility Rear radar Display Human-Machine Interface Computing platform A modern vehicle is a network of sensors/actuators on wheels ! 4
  • 5. Attackers Insider or outsider  Insider– valid user  Outsider – Intruder, limited attack options Malicious or rational  Malicious – No personal benefit, intends to harm other users  Rational – seeks personal benefits, more predictable attack Active or passive  Active:Generates packets, participates in the network  Passive: Eavesdrop, track users
  • 6. Security AttacksGoals Actions Execution Congestion Insert bogus Creation/ congestion Single avoidance warnings Cause accidents Misrepresent Single, multiple or pile-ups Location of Entities (Sybil) accident Track Message Multiple individuals suppression Aggressive insertion Denial of service of messages/jamming Independent Colluding
  • 7. Security Requirements Authentication:  React only to legitimate events. Authenticate senders of messages. Verification of data consistency  Legitimate senders can send false data (attack/unintentional). Can cause immense damage even fatalities. Availability  Network should be available under jamming attacks Non-repudiation  Drivers causing accidents should be reliably identified Privacy (conflicts with authentication)  Privacy of drivers against unauthorized observers. Real-time constraints  High speed means constraints on time
  • 8. Attack 1 : Bogus traffic information Traffic jam ahead Attacker: insider, rational, active 8
  • 9. Attack 2 : Generate “Intelligent Collisions” SLOW DOWN The way is clear Attacker: insider, malicious, active 9
  • 10. Attack 3: Cheating with identity, speed, or position Wasn’t me! Attacker: insider, rational, active 10
  • 11. Attack 4: Jamming Roadside base station Jammer 11
  • 12. Attack 5: Tunnel Wrong information Physical tunnel or jammed area 12
  • 13. Proposed solution module forDoS attack
  • 14. Channel switching
  • 15.  Using switching technology Study case of different position of vehicles according to GPS position. Ex. In highway we can use WiMax technology, in city we can use Wifi or Bluetooth etc. If jamming attack detected then node tries to change channel. Attacker power may not be so high in order cover all channels. If so higher power might detect easily by using other methods. Problem. 1. Is it possible for listen different position wireless networks same time.
  • 16. Expected layered approach forVANET