SlideShare a Scribd company logo
1 of 31
Securing Vehicular Ad Hoc
Networks:Summary
Summary
USA.EDU.PK
2016/12/27
1
Outline
2
• What is a Vehicular Ad Hoc
Network(VANET)?
• Problems and Security requirements
• Related work
• Discussions and Conclusions
What is a Vehicular Ad Hoc Network
(VANET)?
(VANET)?• VANET
– OBU (On-Board Units)
– communication devices
mounted on vehicles
– RSU (RoadSide Units)
– communication units located
aside the roads
– OBU used to communicate
with other vehicles or RSUs
– RSUs connect with
application servers
and trust authorities OBU
3
OBU
What is a VANET? – Cont.
• Communication patterns
– Roadside-to-Vehicle
Communications (RVC
or V2I)
– Inter-Vehicle
Communications (IVC or
V2V)
Roadside
base station
Inter-vehicle
communications
Vehicle-to-roadside
communications
Emergency
event
Roadside
units (RSU)
roadside -to-vehicle
communications
4
Why do we need VANETs?
5
• Safety is the primary incentive
– 1960s - safety goal led to the seatbelt
– Survive the crash
– 1980s - safety goal led to the airbag
– Survive a worse crash
– 2000s - safety goal enabled by new technology
– Eliminate the crash
• Infotainment applications
– Traffic information, location of gas stations, Internet access
DSRC (Dedicated Short Range Communications ) is the
heart of the technology advance
Introduction – DSRC
6
• A short range communication system for safety and
infotainment applications in both roadside-to-vehicle
and vehicle-to-vehicle environment
• Designed to provide the high data transfer rates and
minimum latency in the communication link
• Federal Communication Commission allocated
5.9 GHz band (5.850-5.925 GHz) for DSRC to be
used by Intelligent Transportation Systems
Introduction – 5.9 GHz DSRC
7
• IEEE 802.11p
– an approved amendment
to the IEEE 802.11
standard to add wireless
access in vehicular
environments (WAVE)
•IEEE 1609
– a higher
layer standard on IEEE
802.11p
Introduction – 5.9 GHz DSRC
• IEEE 1609.1
–WAVE-Resource Manager
• IEEE 1609.2
–WAVE-Security Services
for Applications and
Management Messages
• IEEE 1609.3
–WAVE-Networking
Services
• IEEE 1609.4
–WAVE-Multi-channel
Operations
8
Introduction – IEEE 1609.2
9
• Public key algorithm
– All implementations of this standard shall support the
signing algorithm ECDSA over the two NIST curves
p224 and p256
– All implementations of this standard shall support the
encryption algorithm ECIES over the NIST curve p256
• Symmetric algorithm
– The only symmetric algorithm currently supported is
AES-128 in CCM mode
Introduction – 5.9 GHz DSRC
10
5.9 GHz DSRC implementation
11
• Spectrum
• Channels
75MHZ (5.850-5.925 GHz)
7 channels
(1 control channel, 6 service channels)
• Implementation
Communication
range
Data rate Broadcast
period
300 meters 6 Mbps 300 ms
VANET Characteristics
12

High mobility nodes

Critical latency requirements

No problem with power

Fast verification of high data amount
Outline
13
• What is a Vehicular Ad Hoc
Network(VANET)?
• Problems and Security requirements
• Related work
• Discussions and Conclusions
Problems in VANET
• Bogus information
– Attackers diffuse false information to affect the behavior of other
drivers
V changes its
route and frees
the road
A2 sends a false
message with1
2
14traffic info
Problems in VANET
• ID disclosure
– Attackers tracks vehicles to obtain those drivers’ private
information
151
*A at (x1,y1,) at time t1
*A communicates with B
2
*A refuels at time t2 and
location (x2,y2)
3
*A enters the parking lot at time
t3
*A downloads from Server x
Problems in VANET
• Masquerade
– Attackers use false identities to pretend another vehicles
16
SLOW
DOWN
The way
is clear
Problems in VANET
• Denial of Service
– Attackers want to bring down the VANET
Jammer
Roadside unit
17
Security Requirements
18
• Authentication
– Authenticate legitimate OBUs and senders of messages
• Message Integrity
– Ensure data integrity
• Privacy
– Provide message unlinkability and prevent driver’s tracking
• Traceability and revocation
– Trace and disable abusing OBUs by the authority
• Availability
– Provide network availability under jamming attacks
• Efficiency
– Impose low computation and communication overheads due
to constraints on time
Outline
19
• What is a Vehicular Ad Hoc
Network(VANET)?
• Problems and Security requirements
• Related work
• Discussions and Conclusions
Assumptions

Roadways are divided into
geographic regions

Trusted authorities
– Define regions to identify
the positions of the RSUs
– Issue certificates to RSUs
and OBUs
OBU
OBU
20
Assumptions

RSUs
– Act as the regional authorities
for their regions
– Are the tamper-proof devices
– Get a copy of the authority’s
public key

OBUs
– Know their current location
• GPS provides enough accuracy
– Know how to contact a RSU
– Get a copy of the authority’s
public key
OBU
OBU
21
Related Work – 1
22

Public Key Infrastructure (Blum & Eskandarian, 2004…)
– They use PKI and virtual infrastructure to resist the
collisions
intentionally caused by malicious vehicles
– PKI using certificates and fixed public key can authenticate
message, identify valid vehicles and remove malicious
vehicles
– OBU signs a safety message using its private key, and then
sends the message, signature and its certificate
OBU → OBU : M , Sig( prk _ OBU , M ), cert _ OBUFixed public keys allow an eavesdropper to associate a key
with a vehicle so as to violate driver’s privacy
Related Work – 2
23

Multiple Certificates Per OBU (Raya & Hubaux, 2007…)
– Each OBU owns a set of certified public/private key pairs
– A large set of keys needs to periodically renewed (during
regular vehicle maintenance visits)
– OBUs contact trust authorities through RSUs and send the
created pseudonym and public key. Authorities send the built
certificates back
– Each key is used for a short period of time
Suffering from a Sybil attack
– A malicious OBU can pose as multiple vehicles Large
overhead to revoke a OBU
Related Work – 3

Group Signatures (Lin et al., 2007…)
– Group signature guarantees the unlinkability of the
messages since group member can anonymously sign on
behalf of the group
– OBU uses a group signature to sign a message to prove that
the signer is a valid OBU (not which OBU)
– Group manager can trace the identity of a signer from the
group signature and revoke the group member
42
Reduce the storage cost of multiple public/ private key pairs
and the bandwidth consumption used to transmit the
certificate revocation list
Computationally expensive
Security Requirements – Privacy
Privacy
Long-term
Unlinkability
Short-term
Unlinkability
Linkability
25

RSUs act as the regional
authorities for their regions
• Long-term unlinkability
– An attacker cannot identify
messages from the same OBU
in the communication range of
the different RSUs (inter-
domain)
• Short-term linkability
– A OBU can identify messages
sent by the same sender in the
communication range of
the same RSU (intra-domain)
Security Requirements – Privacy
Privacy
Long-term
Unlinkability
Short-term
Unlinkability
Linkability
26
• Short-term unlinkability
– RVC  Signcryption
– V2V  Group signature
(batch verification)
• Short-term linkability
– inter-domain  Group
signature
– intra-domain  ECDSA ,
TELSA
Outline
27
• What is a Vehicular Ad Hoc
Network(VANET)?
• Problems and Security requirements
• Related work
• Discussions and Conclusions
Discussions and Conclusions
28
• VANET security is an emerging area
• As different VANET protocols and applications are
based on different assumptions, a common evaluation
framework is needed to compare different security
research contributions
• Detection of malicious vehicles is still a challenge
• Multicast source authentication which essentially
guarantees that the received data is sent from the
claimed source
References
29

J. Blum and A. Eskandarian, “The threat of intelligent
collisions,” IT Professional, vol. 6, no. 1, pp.
24–29, 2004

R. Chen, D. Ma, and A. Regan, “TARI: Meeting delay
requirements in VANETs with efficient authentication and
revocation,” In Proceedings of WAVE, 2009
 X. Lin, X. Sun, P. Ho, and X. Shen, “GSIS: A secure and privacy
preserving protocol for vehicular communications,” IEEE Trans.
Veh. Technol., vol. 56, no. 6, pp. 3442–3456, 2007

A. Perrig, R. Canetti, D. Tygar, D. Song, “The TESLA broadcast
authentication protocol,” CryptoBytes, vol. 5,2002
 M. Raya and J. Hubaux, “Securing vehicular ad hoc networks,” J.
Comput. Secur., vol. 15, no. 1, pp. 39–68, 2007
References
30

A. Studer, E. Shi, F. Bai, and A. Perrig, “TACKing Together
efficient authentication revocation, and privacy in VANETs,”
In Proceedings of SECON, pp. 22–26, 2009

C. Zhang, X. Lin, R. Lu, P.-H. Ho, and X. Shen, “ An
efficient message authentication scheme for vehicular
communications,” IEEE Trans. Veh. Technol., vol. 57, no. 6,
pp. 3357–3368, 2008

C. Zhang, R. Lu, X. Lin, P.-H. Ho and X. Shen, “An
efficient identity-based batch verification scheme for vehicular
sensor networks,” In Proceedings of INFOCOM, 2008

L. Zhang, Q. Wu, A. Solanas, D.-F. Josep, “A scalable robust
authentication protocol for secure vehicular communications,”
IEEE Trans. Veh. Technol., vol. 59, no. 4, pp. 1606–1617,
2010
Thanks for your patience

More Related Content

What's hot

Improved safety IRP using VANET
Improved safety IRP using VANETImproved safety IRP using VANET
Improved safety IRP using VANETRama Maliya
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwarirahulpandey510
 
Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Ashok Mishra
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANETSarah Baras
 
Presentation pfe
Presentation pfePresentation pfe
Presentation pfeMalik Riahi
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network SecurityLim Jung
 
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Prof Ansari
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography Pallavi Agarwal
 
Malicious node detection in vanet
Malicious node detection in vanetMalicious node detection in vanet
Malicious node detection in vanetVYSAKHMANAYATH
 
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...Joarder Kamal
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challengesBehroz Zarrinfar
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetsirojiddin
 
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...pijans
 

What's hot (20)

Improved safety IRP using VANET
Improved safety IRP using VANETImproved safety IRP using VANET
Improved safety IRP using VANET
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
14251D6514
14251D651414251D6514
14251D6514
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwari
 
Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANET
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
 
VANET (BY-VEDANT)
VANET (BY-VEDANT)VANET (BY-VEDANT)
VANET (BY-VEDANT)
 
Presentation pfe
Presentation pfePresentation pfe
Presentation pfe
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Routing protocols in Vanet
Routing protocols in VanetRouting protocols in Vanet
Routing protocols in Vanet
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
 
Malicious node detection in vanet
Malicious node detection in vanetMalicious node detection in vanet
Malicious node detection in vanet
 
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challenges
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanet
 
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
 

Similar to Securing VANETs: Summary of Security Issues and Solutions

Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPTMeghaj Mallick
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANETPallavi Agarwal
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETDr.Irshad Ahmed Sumra
 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksIRJET Journal
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYIJCI JOURNAL
 
Architecture Security in VANET
Architecture Security in VANET Architecture Security in VANET
Architecture Security in VANET VivekRajawat9
 
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Networkpaperpublications3
 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
 
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANETIRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANETIRJET Journal
 

Similar to Securing VANETs: Summary of Security Issues and Solutions (20)

VANET Ppt.ppt
VANET Ppt.pptVANET Ppt.ppt
VANET Ppt.ppt
 
VANET PRESENT.ppt
VANET PRESENT.pptVANET PRESENT.ppt
VANET PRESENT.ppt
 
VANET Presentation.ppt
VANET Presentation.pptVANET Presentation.ppt
VANET Presentation.ppt
 
VANET.ppt
VANET.pptVANET.ppt
VANET.ppt
 
VANET-Guo.ppt
VANET-Guo.pptVANET-Guo.ppt
VANET-Guo.ppt
 
VANET PRE.ppt
VANET PRE.pptVANET PRE.ppt
VANET PRE.ppt
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPT
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANET
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular Networks
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
Architecture Security in VANET
Architecture Security in VANET Architecture Security in VANET
Architecture Security in VANET
 
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
 
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANETIRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
 
Advancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen AutomotiveAdvancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen Automotive
 

More from LGS, GBHS&IC, University Of South-Asia, TARA-Technologies

More from LGS, GBHS&IC, University Of South-Asia, TARA-Technologies (20)

GAT Dogar Sons E book
GAT Dogar Sons E bookGAT Dogar Sons E book
GAT Dogar Sons E book
 
POSIMS Point Of Sale & Inventory Management System
POSIMS Point Of Sale & Inventory Management SystemPOSIMS Point Of Sale & Inventory Management System
POSIMS Point Of Sale & Inventory Management System
 
Waste management app launched for lahore | TARA-Technologies
Waste management app launched for lahore | TARA-Technologies Waste management app launched for lahore | TARA-Technologies
Waste management app launched for lahore | TARA-Technologies
 
CV-HMFTJ
CV-HMFTJ CV-HMFTJ
CV-HMFTJ
 
The Way To Perform Hajj Islamic Pilgrimage
The Way To Perform Hajj Islamic PilgrimageThe Way To Perform Hajj Islamic Pilgrimage
The Way To Perform Hajj Islamic Pilgrimage
 
Hajj All Duas * Pilgrimage Supplications
Hajj All Duas *  Pilgrimage SupplicationsHajj All Duas *  Pilgrimage Supplications
Hajj All Duas * Pilgrimage Supplications
 
Web Development Roadmaps ~hmftj
Web Development Roadmaps  ~hmftj Web Development Roadmaps  ~hmftj
Web Development Roadmaps ~hmftj
 
Top Software Houses In Pakistan
Top Software Houses In PakistanTop Software Houses In Pakistan
Top Software Houses In Pakistan
 
Russian Conversations and Dialogues​ -hmftj
Russian Conversations and Dialogues​ -hmftjRussian Conversations and Dialogues​ -hmftj
Russian Conversations and Dialogues​ -hmftj
 
hmftj-curriculum vitae-resume
hmftj-curriculum vitae-resumehmftj-curriculum vitae-resume
hmftj-curriculum vitae-resume
 
Continuous Integration vs Continuous Delivery vs Continuous Deployment
Continuous Integration vs Continuous Delivery vs Continuous Deployment Continuous Integration vs Continuous Delivery vs Continuous Deployment
Continuous Integration vs Continuous Delivery vs Continuous Deployment
 
Emotional Intelligence Info-graphic
Emotional Intelligence Info-graphicEmotional Intelligence Info-graphic
Emotional Intelligence Info-graphic
 
Human Computer Interaction Evaluation
Human Computer Interaction EvaluationHuman Computer Interaction Evaluation
Human Computer Interaction Evaluation
 
A9-HSMS: HCI Prototype Project
A9-HSMS: HCI Prototype Project A9-HSMS: HCI Prototype Project
A9-HSMS: HCI Prototype Project
 
hcimidtermhmftj
hcimidtermhmftjhcimidtermhmftj
hcimidtermhmftj
 
thehomemaster
thehomemasterthehomemaster
thehomemaster
 
cchmftjb-18298
cchmftjb-18298cchmftjb-18298
cchmftjb-18298
 
Good Men Live For Others Precis Writing -hmftj
Good Men Live For Others Precis Writing -hmftjGood Men Live For Others Precis Writing -hmftj
Good Men Live For Others Precis Writing -hmftj
 
Four colors of lies ~hmftj
Four colors of lies ~hmftjFour colors of lies ~hmftj
Four colors of lies ~hmftj
 
R&D Comes to Services: Software House's Pathbreaking Experiments
R&D Comes to Services: Software House's Pathbreaking ExperimentsR&D Comes to Services: Software House's Pathbreaking Experiments
R&D Comes to Services: Software House's Pathbreaking Experiments
 

Recently uploaded

(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样gfghbihg
 
办理科廷科技大学毕业证Curtin毕业证留信学历认证
办理科廷科技大学毕业证Curtin毕业证留信学历认证办理科廷科技大学毕业证Curtin毕业证留信学历认证
办理科廷科技大学毕业证Curtin毕业证留信学历认证jdkhjh
 
办理阿德莱德大学毕业证Adelaide毕业证留信学历认证
办理阿德莱德大学毕业证Adelaide毕业证留信学历认证办理阿德莱德大学毕业证Adelaide毕业证留信学历认证
办理阿德莱德大学毕业证Adelaide毕业证留信学历认证jdkhjh
 
原版1:1复刻俄亥俄州立大学毕业证OSU毕业证留信学历认证
原版1:1复刻俄亥俄州立大学毕业证OSU毕业证留信学历认证原版1:1复刻俄亥俄州立大学毕业证OSU毕业证留信学历认证
原版1:1复刻俄亥俄州立大学毕业证OSU毕业证留信学历认证jdkhjh
 
Can't Roll Up Your Audi A4 Power Window Let's Uncover the Issue!
Can't Roll Up Your Audi A4 Power Window Let's Uncover the Issue!Can't Roll Up Your Audi A4 Power Window Let's Uncover the Issue!
Can't Roll Up Your Audi A4 Power Window Let's Uncover the Issue!Mint Automotive
 
Equity & Freight Electrification by Jose Miguel Acosta Cordova
Equity & Freight Electrification by Jose Miguel Acosta CordovaEquity & Freight Electrification by Jose Miguel Acosta Cordova
Equity & Freight Electrification by Jose Miguel Acosta CordovaForth
 
原版1:1定制中央昆士兰大学毕业证(CQU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制中央昆士兰大学毕业证(CQU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制中央昆士兰大学毕业证(CQU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制中央昆士兰大学毕业证(CQU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
248649330-Animatronics-Technical-Seminar-Report-by-Aswin-Sarang.pdf
248649330-Animatronics-Technical-Seminar-Report-by-Aswin-Sarang.pdf248649330-Animatronics-Technical-Seminar-Report-by-Aswin-Sarang.pdf
248649330-Animatronics-Technical-Seminar-Report-by-Aswin-Sarang.pdfkushkruthik555
 
Centering Equity Panel by Samantha Bingham
Centering Equity Panel by Samantha BinghamCentering Equity Panel by Samantha Bingham
Centering Equity Panel by Samantha BinghamForth
 
Dubai Call Girls Services Call 09900000000
Dubai Call Girls Services Call 09900000000Dubai Call Girls Services Call 09900000000
Dubai Call Girls Services Call 09900000000Komal Khan
 
Electric Nation Upper Midwest Inter-Tribal Electric Vehicle (EV) Charging Com...
Electric Nation Upper Midwest Inter-Tribal Electric Vehicle (EV) Charging Com...Electric Nation Upper Midwest Inter-Tribal Electric Vehicle (EV) Charging Com...
Electric Nation Upper Midwest Inter-Tribal Electric Vehicle (EV) Charging Com...Forth
 
Pros and cons of buying used fleet vehicles.pptx
Pros and cons of buying used fleet vehicles.pptxPros and cons of buying used fleet vehicles.pptx
Pros and cons of buying used fleet vehicles.pptxjennifermiller8137
 
907MTAMount Coventry University Bachelor's Diploma in Engineering
907MTAMount Coventry University Bachelor's Diploma in Engineering907MTAMount Coventry University Bachelor's Diploma in Engineering
907MTAMount Coventry University Bachelor's Diploma in EngineeringFi sss
 
原版定制copy澳洲查尔斯顿大学毕业证UC毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯顿大学毕业证UC毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯顿大学毕业证UC毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯顿大学毕业证UC毕业证成绩单留信学历认证保障质量sehgh15heh
 
Program Design by Prateek Suri and Christian Williss
Program Design by Prateek Suri and Christian WillissProgram Design by Prateek Suri and Christian Williss
Program Design by Prateek Suri and Christian WillissForth
 
原版1:1定制阳光海岸大学毕业证(JCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制阳光海岸大学毕业证(JCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制阳光海岸大学毕业证(JCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制阳光海岸大学毕业证(JCU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
原版1:1定制宾州州立大学毕业证(PSU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制宾州州立大学毕业证(PSU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制宾州州立大学毕业证(PSU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制宾州州立大学毕业证(PSU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
-The-Present-Simple-Tense.pdf english hh
-The-Present-Simple-Tense.pdf english hh-The-Present-Simple-Tense.pdf english hh
-The-Present-Simple-Tense.pdf english hhmhamadhawlery16
 
原版工艺美国普林斯顿大学毕业证Princeton毕业证成绩单修改留信学历认证
原版工艺美国普林斯顿大学毕业证Princeton毕业证成绩单修改留信学历认证原版工艺美国普林斯顿大学毕业证Princeton毕业证成绩单修改留信学历认证
原版工艺美国普林斯顿大学毕业证Princeton毕业证成绩单修改留信学历认证jjrehjwj11gg
 
EPA Funding Opportunities for Equitable Electric Transportation by Mike Moltzen
EPA Funding Opportunities for Equitable Electric Transportationby Mike MoltzenEPA Funding Opportunities for Equitable Electric Transportationby Mike Moltzen
EPA Funding Opportunities for Equitable Electric Transportation by Mike MoltzenForth
 

Recently uploaded (20)

(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样
 
办理科廷科技大学毕业证Curtin毕业证留信学历认证
办理科廷科技大学毕业证Curtin毕业证留信学历认证办理科廷科技大学毕业证Curtin毕业证留信学历认证
办理科廷科技大学毕业证Curtin毕业证留信学历认证
 
办理阿德莱德大学毕业证Adelaide毕业证留信学历认证
办理阿德莱德大学毕业证Adelaide毕业证留信学历认证办理阿德莱德大学毕业证Adelaide毕业证留信学历认证
办理阿德莱德大学毕业证Adelaide毕业证留信学历认证
 
原版1:1复刻俄亥俄州立大学毕业证OSU毕业证留信学历认证
原版1:1复刻俄亥俄州立大学毕业证OSU毕业证留信学历认证原版1:1复刻俄亥俄州立大学毕业证OSU毕业证留信学历认证
原版1:1复刻俄亥俄州立大学毕业证OSU毕业证留信学历认证
 
Can't Roll Up Your Audi A4 Power Window Let's Uncover the Issue!
Can't Roll Up Your Audi A4 Power Window Let's Uncover the Issue!Can't Roll Up Your Audi A4 Power Window Let's Uncover the Issue!
Can't Roll Up Your Audi A4 Power Window Let's Uncover the Issue!
 
Equity & Freight Electrification by Jose Miguel Acosta Cordova
Equity & Freight Electrification by Jose Miguel Acosta CordovaEquity & Freight Electrification by Jose Miguel Acosta Cordova
Equity & Freight Electrification by Jose Miguel Acosta Cordova
 
原版1:1定制中央昆士兰大学毕业证(CQU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制中央昆士兰大学毕业证(CQU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制中央昆士兰大学毕业证(CQU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制中央昆士兰大学毕业证(CQU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
248649330-Animatronics-Technical-Seminar-Report-by-Aswin-Sarang.pdf
248649330-Animatronics-Technical-Seminar-Report-by-Aswin-Sarang.pdf248649330-Animatronics-Technical-Seminar-Report-by-Aswin-Sarang.pdf
248649330-Animatronics-Technical-Seminar-Report-by-Aswin-Sarang.pdf
 
Centering Equity Panel by Samantha Bingham
Centering Equity Panel by Samantha BinghamCentering Equity Panel by Samantha Bingham
Centering Equity Panel by Samantha Bingham
 
Dubai Call Girls Services Call 09900000000
Dubai Call Girls Services Call 09900000000Dubai Call Girls Services Call 09900000000
Dubai Call Girls Services Call 09900000000
 
Electric Nation Upper Midwest Inter-Tribal Electric Vehicle (EV) Charging Com...
Electric Nation Upper Midwest Inter-Tribal Electric Vehicle (EV) Charging Com...Electric Nation Upper Midwest Inter-Tribal Electric Vehicle (EV) Charging Com...
Electric Nation Upper Midwest Inter-Tribal Electric Vehicle (EV) Charging Com...
 
Pros and cons of buying used fleet vehicles.pptx
Pros and cons of buying used fleet vehicles.pptxPros and cons of buying used fleet vehicles.pptx
Pros and cons of buying used fleet vehicles.pptx
 
907MTAMount Coventry University Bachelor's Diploma in Engineering
907MTAMount Coventry University Bachelor's Diploma in Engineering907MTAMount Coventry University Bachelor's Diploma in Engineering
907MTAMount Coventry University Bachelor's Diploma in Engineering
 
原版定制copy澳洲查尔斯顿大学毕业证UC毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯顿大学毕业证UC毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯顿大学毕业证UC毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯顿大学毕业证UC毕业证成绩单留信学历认证保障质量
 
Program Design by Prateek Suri and Christian Williss
Program Design by Prateek Suri and Christian WillissProgram Design by Prateek Suri and Christian Williss
Program Design by Prateek Suri and Christian Williss
 
原版1:1定制阳光海岸大学毕业证(JCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制阳光海岸大学毕业证(JCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制阳光海岸大学毕业证(JCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制阳光海岸大学毕业证(JCU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
原版1:1定制宾州州立大学毕业证(PSU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制宾州州立大学毕业证(PSU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制宾州州立大学毕业证(PSU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制宾州州立大学毕业证(PSU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
-The-Present-Simple-Tense.pdf english hh
-The-Present-Simple-Tense.pdf english hh-The-Present-Simple-Tense.pdf english hh
-The-Present-Simple-Tense.pdf english hh
 
原版工艺美国普林斯顿大学毕业证Princeton毕业证成绩单修改留信学历认证
原版工艺美国普林斯顿大学毕业证Princeton毕业证成绩单修改留信学历认证原版工艺美国普林斯顿大学毕业证Princeton毕业证成绩单修改留信学历认证
原版工艺美国普林斯顿大学毕业证Princeton毕业证成绩单修改留信学历认证
 
EPA Funding Opportunities for Equitable Electric Transportation by Mike Moltzen
EPA Funding Opportunities for Equitable Electric Transportationby Mike MoltzenEPA Funding Opportunities for Equitable Electric Transportationby Mike Moltzen
EPA Funding Opportunities for Equitable Electric Transportation by Mike Moltzen
 

Securing VANETs: Summary of Security Issues and Solutions

  • 1. Securing Vehicular Ad Hoc Networks:Summary Summary USA.EDU.PK 2016/12/27 1
  • 2. Outline 2 • What is a Vehicular Ad Hoc Network(VANET)? • Problems and Security requirements • Related work • Discussions and Conclusions
  • 3. What is a Vehicular Ad Hoc Network (VANET)? (VANET)?• VANET – OBU (On-Board Units) – communication devices mounted on vehicles – RSU (RoadSide Units) – communication units located aside the roads – OBU used to communicate with other vehicles or RSUs – RSUs connect with application servers and trust authorities OBU 3 OBU
  • 4. What is a VANET? – Cont. • Communication patterns – Roadside-to-Vehicle Communications (RVC or V2I) – Inter-Vehicle Communications (IVC or V2V) Roadside base station Inter-vehicle communications Vehicle-to-roadside communications Emergency event Roadside units (RSU) roadside -to-vehicle communications 4
  • 5. Why do we need VANETs? 5 • Safety is the primary incentive – 1960s - safety goal led to the seatbelt – Survive the crash – 1980s - safety goal led to the airbag – Survive a worse crash – 2000s - safety goal enabled by new technology – Eliminate the crash • Infotainment applications – Traffic information, location of gas stations, Internet access DSRC (Dedicated Short Range Communications ) is the heart of the technology advance
  • 6. Introduction – DSRC 6 • A short range communication system for safety and infotainment applications in both roadside-to-vehicle and vehicle-to-vehicle environment • Designed to provide the high data transfer rates and minimum latency in the communication link • Federal Communication Commission allocated 5.9 GHz band (5.850-5.925 GHz) for DSRC to be used by Intelligent Transportation Systems
  • 7. Introduction – 5.9 GHz DSRC 7 • IEEE 802.11p – an approved amendment to the IEEE 802.11 standard to add wireless access in vehicular environments (WAVE) •IEEE 1609 – a higher layer standard on IEEE 802.11p
  • 8. Introduction – 5.9 GHz DSRC • IEEE 1609.1 –WAVE-Resource Manager • IEEE 1609.2 –WAVE-Security Services for Applications and Management Messages • IEEE 1609.3 –WAVE-Networking Services • IEEE 1609.4 –WAVE-Multi-channel Operations 8
  • 9. Introduction – IEEE 1609.2 9 • Public key algorithm – All implementations of this standard shall support the signing algorithm ECDSA over the two NIST curves p224 and p256 – All implementations of this standard shall support the encryption algorithm ECIES over the NIST curve p256 • Symmetric algorithm – The only symmetric algorithm currently supported is AES-128 in CCM mode
  • 10. Introduction – 5.9 GHz DSRC 10
  • 11. 5.9 GHz DSRC implementation 11 • Spectrum • Channels 75MHZ (5.850-5.925 GHz) 7 channels (1 control channel, 6 service channels) • Implementation Communication range Data rate Broadcast period 300 meters 6 Mbps 300 ms
  • 12. VANET Characteristics 12  High mobility nodes  Critical latency requirements  No problem with power  Fast verification of high data amount
  • 13. Outline 13 • What is a Vehicular Ad Hoc Network(VANET)? • Problems and Security requirements • Related work • Discussions and Conclusions
  • 14. Problems in VANET • Bogus information – Attackers diffuse false information to affect the behavior of other drivers V changes its route and frees the road A2 sends a false message with1 2 14traffic info
  • 15. Problems in VANET • ID disclosure – Attackers tracks vehicles to obtain those drivers’ private information 151 *A at (x1,y1,) at time t1 *A communicates with B 2 *A refuels at time t2 and location (x2,y2) 3 *A enters the parking lot at time t3 *A downloads from Server x
  • 16. Problems in VANET • Masquerade – Attackers use false identities to pretend another vehicles 16 SLOW DOWN The way is clear
  • 17. Problems in VANET • Denial of Service – Attackers want to bring down the VANET Jammer Roadside unit 17
  • 18. Security Requirements 18 • Authentication – Authenticate legitimate OBUs and senders of messages • Message Integrity – Ensure data integrity • Privacy – Provide message unlinkability and prevent driver’s tracking • Traceability and revocation – Trace and disable abusing OBUs by the authority • Availability – Provide network availability under jamming attacks • Efficiency – Impose low computation and communication overheads due to constraints on time
  • 19. Outline 19 • What is a Vehicular Ad Hoc Network(VANET)? • Problems and Security requirements • Related work • Discussions and Conclusions
  • 20. Assumptions  Roadways are divided into geographic regions  Trusted authorities – Define regions to identify the positions of the RSUs – Issue certificates to RSUs and OBUs OBU OBU 20
  • 21. Assumptions  RSUs – Act as the regional authorities for their regions – Are the tamper-proof devices – Get a copy of the authority’s public key  OBUs – Know their current location • GPS provides enough accuracy – Know how to contact a RSU – Get a copy of the authority’s public key OBU OBU 21
  • 22. Related Work – 1 22  Public Key Infrastructure (Blum & Eskandarian, 2004…) – They use PKI and virtual infrastructure to resist the collisions intentionally caused by malicious vehicles – PKI using certificates and fixed public key can authenticate message, identify valid vehicles and remove malicious vehicles – OBU signs a safety message using its private key, and then sends the message, signature and its certificate OBU → OBU : M , Sig( prk _ OBU , M ), cert _ OBUFixed public keys allow an eavesdropper to associate a key with a vehicle so as to violate driver’s privacy
  • 23. Related Work – 2 23  Multiple Certificates Per OBU (Raya & Hubaux, 2007…) – Each OBU owns a set of certified public/private key pairs – A large set of keys needs to periodically renewed (during regular vehicle maintenance visits) – OBUs contact trust authorities through RSUs and send the created pseudonym and public key. Authorities send the built certificates back – Each key is used for a short period of time Suffering from a Sybil attack – A malicious OBU can pose as multiple vehicles Large overhead to revoke a OBU
  • 24. Related Work – 3  Group Signatures (Lin et al., 2007…) – Group signature guarantees the unlinkability of the messages since group member can anonymously sign on behalf of the group – OBU uses a group signature to sign a message to prove that the signer is a valid OBU (not which OBU) – Group manager can trace the identity of a signer from the group signature and revoke the group member 42 Reduce the storage cost of multiple public/ private key pairs and the bandwidth consumption used to transmit the certificate revocation list Computationally expensive
  • 25. Security Requirements – Privacy Privacy Long-term Unlinkability Short-term Unlinkability Linkability 25  RSUs act as the regional authorities for their regions • Long-term unlinkability – An attacker cannot identify messages from the same OBU in the communication range of the different RSUs (inter- domain) • Short-term linkability – A OBU can identify messages sent by the same sender in the communication range of the same RSU (intra-domain)
  • 26. Security Requirements – Privacy Privacy Long-term Unlinkability Short-term Unlinkability Linkability 26 • Short-term unlinkability – RVC  Signcryption – V2V  Group signature (batch verification) • Short-term linkability – inter-domain  Group signature – intra-domain  ECDSA , TELSA
  • 27. Outline 27 • What is a Vehicular Ad Hoc Network(VANET)? • Problems and Security requirements • Related work • Discussions and Conclusions
  • 28. Discussions and Conclusions 28 • VANET security is an emerging area • As different VANET protocols and applications are based on different assumptions, a common evaluation framework is needed to compare different security research contributions • Detection of malicious vehicles is still a challenge • Multicast source authentication which essentially guarantees that the received data is sent from the claimed source
  • 29. References 29  J. Blum and A. Eskandarian, “The threat of intelligent collisions,” IT Professional, vol. 6, no. 1, pp. 24–29, 2004  R. Chen, D. Ma, and A. Regan, “TARI: Meeting delay requirements in VANETs with efficient authentication and revocation,” In Proceedings of WAVE, 2009  X. Lin, X. Sun, P. Ho, and X. Shen, “GSIS: A secure and privacy preserving protocol for vehicular communications,” IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442–3456, 2007  A. Perrig, R. Canetti, D. Tygar, D. Song, “The TESLA broadcast authentication protocol,” CryptoBytes, vol. 5,2002  M. Raya and J. Hubaux, “Securing vehicular ad hoc networks,” J. Comput. Secur., vol. 15, no. 1, pp. 39–68, 2007
  • 30. References 30  A. Studer, E. Shi, F. Bai, and A. Perrig, “TACKing Together efficient authentication revocation, and privacy in VANETs,” In Proceedings of SECON, pp. 22–26, 2009  C. Zhang, X. Lin, R. Lu, P.-H. Ho, and X. Shen, “ An efficient message authentication scheme for vehicular communications,” IEEE Trans. Veh. Technol., vol. 57, no. 6, pp. 3357–3368, 2008  C. Zhang, R. Lu, X. Lin, P.-H. Ho and X. Shen, “An efficient identity-based batch verification scheme for vehicular sensor networks,” In Proceedings of INFOCOM, 2008  L. Zhang, Q. Wu, A. Solanas, D.-F. Josep, “A scalable robust authentication protocol for secure vehicular communications,” IEEE Trans. Veh. Technol., vol. 59, no. 4, pp. 1606–1617, 2010
  • 31. Thanks for your patience