SlideShare a Scribd company logo
1 of 26
Dr I.A.Sumra
 Vehicular ad-hoc network is a special kind of network in which
nodes (Vehicles) can communicate with each other on the road
and with its Infrastructure.
2
V2I
Introduction
 Safety Applications
 Non Safety Applications
Work
in Progress
Plz! use Alt.
route
Work Zone
Warning:!!!
Work Zone
Warning:!!!
Shopping MALL
( TESCO )
Parking Slot
Available!!!
RSU Parking Slot
Available!!!
3
 Vehicular network applications require security and the objective of these applications is to
serve users and make their journey secure and comfortable.
 Attackers have their own role in this network and we cannot predict the dynamic behavior of the
attacker. If an attacker works on a safety application and changes the content of the safety
message then it poses a very difficult condition on the road and many users will be affected due
to this kind of attack.
 Accidents are often the result of an alteration of any safety message or the sending of even one
wrong safety message in a network and many human lives are at risk [1].
 Network Behavior
 Attacker Behavior
• Monitoring Attack
• Traffic Analysis Attack
• Man in the Middle (MiMA) Attack
Message Alteration Attack
Message Fabrication Attack
Incorrect Data Injecting Attack
 DENIAL OF SERVICE (DOS)
 In VANET, DOS shall not be allowed to happen, where
seamless life critical information must reach its
intended destination securely and timely. In summary,
there are three ways the attackers may achieve DOS
attacks.
 There are three levels of DOS attacks as described
below.
1. Basic Level: Overwhelm the Node Resources
2. Extended Level: Jamming the Channel
 Basic Level: Overwhelm the Node Resources
 Extended Level: Jamming the Channel
Tamper Proof Device (TPD)
Event Data Recorder (EDR)
Trusted Platform Module (TPM)
Global Position System (GPS)
Radar Systems (RSs)
Communication Facility (CF)
Computing Platform (CP)
Human Machine Interface (HMI)
 Event Data Recorder [7] is non volatile hardware module and
provides tamper proof storage.
 The purpose of this module is to maintain the log of any
critical events and later to use this information. It is similar to
black box used in airplane.
 There are two problems in EDR.
 1.) it does not generate any data.
 2.) it does not have any ability to encrypt the
messages. The researchers added one more
module to meet these two requirements. The
next module is Temper Proof Device (TPD).
 Trusted Platform Module is a hardware module designed for secure
computing and can be integrated into any device for example in
notebook.
 TPM is a piece of hardware and need software to communicate with
it to protect and store data in secure location. It can resist software
attacks but problem is that it cannot control hardware tempering.
 Security is an important issue of VANET as it deals
with traffic system and human lives directly. In near
future VANET will be on road and their potential
applications will be providing safety to users.
 In this slide, we presented security requirements and
then discussed in detail about security hardware
modules that are used in smart vehicle.
 The lower cost of these modules and their right
functionality in vehicular environment will make the
implementation of this technology easier.
25
 Please download complete research paper from
research gate.
26

More Related Content

Similar to Comparative study of security hardware modules in VANET

VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETDr.Irshad Ahmed Sumra
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityEditor IJMTER
 
CYBER ATTACKS ON INTRUSION DETECTION SYSTEM
CYBER ATTACKS ON INTRUSION DETECTION SYSTEMCYBER ATTACKS ON INTRUSION DETECTION SYSTEM
CYBER ATTACKS ON INTRUSION DETECTION SYSTEMijistjournal
 
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Dr.Irshad Ahmed Sumra
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANETDr.Irshad Ahmed Sumra
 
Survey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetSurvey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetijctet
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
 
Introducing Restricted Access Protocol to Enhance the Security and Eliminate ...
Introducing Restricted Access Protocol to Enhance the Security and Eliminate ...Introducing Restricted Access Protocol to Enhance the Security and Eliminate ...
Introducing Restricted Access Protocol to Enhance the Security and Eliminate ...IRJET Journal
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...IJCNCJournal
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
 
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET Journal
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1nicfs
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement Dr.Irshad Ahmed Sumra
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANETDr.Irshad Ahmed Sumra
 

Similar to Comparative study of security hardware modules in VANET (20)

VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
 
CYBER ATTACKS ON INTRUSION DETECTION SYSTEM
CYBER ATTACKS ON INTRUSION DETECTION SYSTEMCYBER ATTACKS ON INTRUSION DETECTION SYSTEM
CYBER ATTACKS ON INTRUSION DETECTION SYSTEM
 
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANET
 
Survey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetSurvey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manet
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
 
50120140501013
5012014050101350120140501013
50120140501013
 
Introducing Restricted Access Protocol to Enhance the Security and Eliminate ...
Introducing Restricted Access Protocol to Enhance the Security and Eliminate ...Introducing Restricted Access Protocol to Enhance the Security and Eliminate ...
Introducing Restricted Access Protocol to Enhance the Security and Eliminate ...
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
 
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
 

More from Dr.Irshad Ahmed Sumra

Using the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETUsing the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETDr.Irshad Ahmed Sumra
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveyDr.Irshad Ahmed Sumra
 
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Dr.Irshad Ahmed Sumra
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Dr.Irshad Ahmed Sumra
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETDr.Irshad Ahmed Sumra
 
VANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemVANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemDr.Irshad Ahmed Sumra
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationBehavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationDr.Irshad Ahmed Sumra
 
User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsDr.Irshad Ahmed Sumra
 

More from Dr.Irshad Ahmed Sumra (13)

Using the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETUsing the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANET
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A Survey
 
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
 
VANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemVANET Security Research and Development Ecosystem
VANET Security Research and Development Ecosystem
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationBehavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
 
Timing Attack in Vehicular Network
Timing Attack in Vehicular NetworkTiming Attack in Vehicular Network
Timing Attack in Vehicular Network
 
Classes of Attacks in VANET
Classes of Attacks in VANETClasses of Attacks in VANET
Classes of Attacks in VANET
 
User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET Applications
 
VANET Security and Trust
VANET Security and TrustVANET Security and Trust
VANET Security and Trust
 
ITS and VSS
ITS and VSSITS and VSS
ITS and VSS
 
VANET Trust
VANET TrustVANET Trust
VANET Trust
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 

Comparative study of security hardware modules in VANET

  • 2.  Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. 2 V2I Introduction
  • 3.  Safety Applications  Non Safety Applications Work in Progress Plz! use Alt. route Work Zone Warning:!!! Work Zone Warning:!!! Shopping MALL ( TESCO ) Parking Slot Available!!! RSU Parking Slot Available!!! 3
  • 4.  Vehicular network applications require security and the objective of these applications is to serve users and make their journey secure and comfortable.  Attackers have their own role in this network and we cannot predict the dynamic behavior of the attacker. If an attacker works on a safety application and changes the content of the safety message then it poses a very difficult condition on the road and many users will be affected due to this kind of attack.  Accidents are often the result of an alteration of any safety message or the sending of even one wrong safety message in a network and many human lives are at risk [1].
  • 7.
  • 8.
  • 9. • Monitoring Attack • Traffic Analysis Attack • Man in the Middle (MiMA) Attack
  • 10. Message Alteration Attack Message Fabrication Attack Incorrect Data Injecting Attack
  • 11.
  • 12.  DENIAL OF SERVICE (DOS)  In VANET, DOS shall not be allowed to happen, where seamless life critical information must reach its intended destination securely and timely. In summary, there are three ways the attackers may achieve DOS attacks.  There are three levels of DOS attacks as described below. 1. Basic Level: Overwhelm the Node Resources 2. Extended Level: Jamming the Channel
  • 13.  Basic Level: Overwhelm the Node Resources
  • 14.  Extended Level: Jamming the Channel
  • 15.
  • 16.
  • 17.
  • 18. Tamper Proof Device (TPD) Event Data Recorder (EDR) Trusted Platform Module (TPM) Global Position System (GPS) Radar Systems (RSs) Communication Facility (CF) Computing Platform (CP) Human Machine Interface (HMI)
  • 19.
  • 20.  Event Data Recorder [7] is non volatile hardware module and provides tamper proof storage.  The purpose of this module is to maintain the log of any critical events and later to use this information. It is similar to black box used in airplane.
  • 21.  There are two problems in EDR.  1.) it does not generate any data.  2.) it does not have any ability to encrypt the messages. The researchers added one more module to meet these two requirements. The next module is Temper Proof Device (TPD).
  • 22.  Trusted Platform Module is a hardware module designed for secure computing and can be integrated into any device for example in notebook.  TPM is a piece of hardware and need software to communicate with it to protect and store data in secure location. It can resist software attacks but problem is that it cannot control hardware tempering.
  • 23.
  • 24.  Security is an important issue of VANET as it deals with traffic system and human lives directly. In near future VANET will be on road and their potential applications will be providing safety to users.  In this slide, we presented security requirements and then discussed in detail about security hardware modules that are used in smart vehicle.  The lower cost of these modules and their right functionality in vehicular environment will make the implementation of this technology easier.
  • 25. 25
  • 26.  Please download complete research paper from research gate. 26