SlideShare a Scribd company logo
1 of 19
Forming Vehicular Web of Trust in VANET
V T
E
A N
VANET Security
Research Group (VSRG)
Dr I.A.Sumra
 Introduction
 REQUIREMENT OF TRUST IN P2P VEHICULAR NETWORK
 PROPERTIES AND COMPONENTS OF TRUST IN VEHICULAR
NETWORK
 PROPOSED TRUST LEVELS
 TYPES OF TRUST IN VEHICULAR NETWORK
 Conclusion
 References
 Q&A
2
 Vehicular ad-hoc network is a special kind of network in which
nodes (Vehicles) can communicate with each other on the road
and with its Infrastructure.
Road Side Unit (RSU)
V2V
V2V
Basic VANET Architecture
3
V2I
 Safety Applications
 Non Safety Applications
Work
in Progress
Plz! use Alt.
route
Work Zone
Warning:!!!
Work Zone
Warning:!!!
Shopping MALL
( TESCO )
Parking Slot
Available!!!
RSU Parking Slot
Available!!!
4
 “an entity can be trusted if it always behaves in
the expected manner for intended purpose”.
 all components of the network (vehicles and
infrastructure) are behaving in an
expected manner
 (secure communication between the
components) and serve the users and save
human lives.
Attacker
Change
the
behavior
 User Behavior
 Node Behavior
 Road Side Unit (RSU) Behavior
Attacker RSU
Node
User
Attack
User
Node
RSU
Attacker
Attacks
Exchange
Secure
information
A B
H
F
C
G
Warning:!!!
Accident at location Y.
D E
Broadcast Road
Condition Warning !!!!!
RSU
D
C
A B
 Security is one of the most important issues in vehicular
network. Applications of vehicular network should be secure
and user receives right information while traversing along
their journey.
 Trust is also a key component of security and trust is governs
the behavior all components in the network which must
behave in the expected manner.
 User, vehicle and road side unit (RSU) are some components
of trusted vehicular network. If any of these components of
network unexpectedly change their behavior then it would
signify that there is a breach of trust in the network.
 What is TRUST : “A system or component that behaves in
expected manner for the particular purpose” .
 TRUST in VANET : All components of the network (user,
vehicles and infrastructure) are behaving in an expected
manner (trusted communication between the components)
and serve users which subsequently would save human lives.
NODE
C
NODE
B
RSU
D
NODE
A
 Context Dependence
 Function of Uncertainty
 Quantitative Values
 Transitivity
 Asymmetry
 Personalization Vehicular TRUST
Component
Behavior
Expected
Manner
Particular
Purpose
User
Node
RSU
Safety
Application
Serve
User
Non Safety
Application
Components of TRUST in Vehicular Network
 In the proposed Vehicular
Web of TRUST (VWT)
environment the each
vehicle possess a Trust
Module with a TPM
hardware module inside
the vehicle.
1. Trust between TPMs and Vehicle Sensors
2. Trusted Medium (DSRC)
3. Trust between Vehicle to Vehicle (V2V)
4. Trust between Vehicle to Infrastructure (V2I)
1. Trust between TPMs and Vehicle Sensors
2. Trusted Medium (DSRC)
 At the second level, the role of the medium is important,
dedicated short range communication (DSRC) frequency band
is used for all types of communication in VANET.
 DSRC provides multiple channels and its transmission ranges
from 5.850 to 5.925 GHz. DSRC are divided into seven
channels and each channel range is 10 MHz.
 Every vehicle in the network receives messages from other
vehicles or from infrastructure. A secure and trusted content
of message is the major concern of the users.
 3. Trust between Vehicle to Vehicle (V2V)
4. Trust between Vehicle to Infrastructure (V2I)
 DAA is a digital group signature scheme and it was
originated by Brickell, Camenisch and Chen.
 It provides the facility to a third party to validate the
TPM, and check whether the user platform is genuine.
 In VANET environment, DAA can be considered for
attesting a vehicle platform, and at the same time
protecting the privacy of the user. Using of DAA we
can develop the four level of trust in vehicular
communication.
 Reducing the death rate, avoiding congestion on
roads and makes comfortable journey some of key
objective of vehicular network.
 Security and trust are becoming increasingly key
challenges issues in vehicular network.
 TPM hardware module is the key module of trusted
computing and that supports to develop trust in
vehicular communication environment.
 In this paper we have presented new model for web
of trust within vehicular network and this model
are based on four level of trust.
18
 Please download complete paper from
◦ IEEEE website
◦ ResearchGate
19

More Related Content

What's hot

What's hot (20)

Taking VANET to the Clouds
Taking VANET to the CloudsTaking VANET to the Clouds
Taking VANET to the Clouds
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-fin
 
VANET
VANETVANET
VANET
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communication
 
Vehicle to vehicle communication
Vehicle to vehicle communication  Vehicle to vehicle communication
Vehicle to vehicle communication
 
V2V- Vehicle to Vehicle Communication
V2V- Vehicle to Vehicle CommunicationV2V- Vehicle to Vehicle Communication
V2V- Vehicle to Vehicle Communication
 
Vehicular ad hoc network
Vehicular ad hoc networkVehicular ad hoc network
Vehicular ad hoc network
 
DSRC : The future of safer driving
DSRC : The future of safer drivingDSRC : The future of safer driving
DSRC : The future of safer driving
 
VANET
VANETVANET
VANET
 
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
 
Ivwc
IvwcIvwc
Ivwc
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communication
 
Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
Ivc sem doc
Ivc sem docIvc sem doc
Ivc sem doc
 
Study of Utilising SCM – MIMO Channel Model in V2V Communication
Study of Utilising SCM – MIMO Channel Model in V2V CommunicationStudy of Utilising SCM – MIMO Channel Model in V2V Communication
Study of Utilising SCM – MIMO Channel Model in V2V Communication
 
Final_Vanet
Final_VanetFinal_Vanet
Final_Vanet
 
Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communication
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
DSRC
DSRCDSRC
DSRC
 

Similar to Forming Vehicular Web of Trust in VANET

Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETDr.Irshad Ahmed Sumra
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
 
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDRELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDIJCI JOURNAL
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Dr.Irshad Ahmed Sumra
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANETDr.Irshad Ahmed Sumra
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveyDr.Irshad Ahmed Sumra
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography Pallavi Agarwal
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and HashingPallavi Agarwal
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
Vehicular adhoc network for communication
Vehicular adhoc network for communicationVehicular adhoc network for communication
Vehicular adhoc network for communicationathirayanpericse
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network IRJET Journal
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd Iaetsd
 
IRJET- Future of Transport: Connected Vehicles
IRJET-  	  Future of Transport: Connected VehiclesIRJET-  	  Future of Transport: Connected Vehicles
IRJET- Future of Transport: Connected VehiclesIRJET Journal
 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
 

Similar to Forming Vehicular Web of Trust in VANET (20)

Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
 
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDRELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A Survey
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
Vehicular adhoc network for communication
Vehicular adhoc network for communicationVehicular adhoc network for communication
Vehicular adhoc network for communication
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
IRJET- Future of Transport: Connected Vehicles
IRJET-  	  Future of Transport: Connected VehiclesIRJET-  	  Future of Transport: Connected Vehicles
IRJET- Future of Transport: Connected Vehicles
 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
 

More from Dr.Irshad Ahmed Sumra

Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Dr.Irshad Ahmed Sumra
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANETDr.Irshad Ahmed Sumra
 
Comparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETComparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETDr.Irshad Ahmed Sumra
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Dr.Irshad Ahmed Sumra
 
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Dr.Irshad Ahmed Sumra
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
 
VANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemVANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemDr.Irshad Ahmed Sumra
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationBehavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationDr.Irshad Ahmed Sumra
 
User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsDr.Irshad Ahmed Sumra
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement Dr.Irshad Ahmed Sumra
 

More from Dr.Irshad Ahmed Sumra (16)

Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANET
 
Comparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETComparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANET
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
 
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
 
VANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemVANET Security Research and Development Ecosystem
VANET Security Research and Development Ecosystem
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationBehavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
 
Timing Attack in Vehicular Network
Timing Attack in Vehicular NetworkTiming Attack in Vehicular Network
Timing Attack in Vehicular Network
 
Classes of Attacks in VANET
Classes of Attacks in VANETClasses of Attacks in VANET
Classes of Attacks in VANET
 
User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET Applications
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement
 
VANET Security and Trust
VANET Security and TrustVANET Security and Trust
VANET Security and Trust
 
ITS and VSS
ITS and VSSITS and VSS
ITS and VSS
 
VANET Trust
VANET TrustVANET Trust
VANET Trust
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Forming Vehicular Web of Trust in VANET

  • 1. Forming Vehicular Web of Trust in VANET V T E A N VANET Security Research Group (VSRG) Dr I.A.Sumra
  • 2.  Introduction  REQUIREMENT OF TRUST IN P2P VEHICULAR NETWORK  PROPERTIES AND COMPONENTS OF TRUST IN VEHICULAR NETWORK  PROPOSED TRUST LEVELS  TYPES OF TRUST IN VEHICULAR NETWORK  Conclusion  References  Q&A 2
  • 3.  Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. Road Side Unit (RSU) V2V V2V Basic VANET Architecture 3 V2I
  • 4.  Safety Applications  Non Safety Applications Work in Progress Plz! use Alt. route Work Zone Warning:!!! Work Zone Warning:!!! Shopping MALL ( TESCO ) Parking Slot Available!!! RSU Parking Slot Available!!! 4
  • 5.  “an entity can be trusted if it always behaves in the expected manner for intended purpose”.  all components of the network (vehicles and infrastructure) are behaving in an expected manner  (secure communication between the components) and serve the users and save human lives. Attacker Change the behavior
  • 6.  User Behavior  Node Behavior  Road Side Unit (RSU) Behavior Attacker RSU Node User Attack User Node RSU Attacker Attacks Exchange Secure information A B H F C G Warning:!!! Accident at location Y. D E Broadcast Road Condition Warning !!!!! RSU D C A B
  • 7.  Security is one of the most important issues in vehicular network. Applications of vehicular network should be secure and user receives right information while traversing along their journey.  Trust is also a key component of security and trust is governs the behavior all components in the network which must behave in the expected manner.  User, vehicle and road side unit (RSU) are some components of trusted vehicular network. If any of these components of network unexpectedly change their behavior then it would signify that there is a breach of trust in the network.
  • 8.  What is TRUST : “A system or component that behaves in expected manner for the particular purpose” .  TRUST in VANET : All components of the network (user, vehicles and infrastructure) are behaving in an expected manner (trusted communication between the components) and serve users which subsequently would save human lives. NODE C NODE B RSU D NODE A
  • 9.  Context Dependence  Function of Uncertainty  Quantitative Values  Transitivity  Asymmetry  Personalization Vehicular TRUST Component Behavior Expected Manner Particular Purpose User Node RSU Safety Application Serve User Non Safety Application Components of TRUST in Vehicular Network
  • 10.  In the proposed Vehicular Web of TRUST (VWT) environment the each vehicle possess a Trust Module with a TPM hardware module inside the vehicle.
  • 11. 1. Trust between TPMs and Vehicle Sensors 2. Trusted Medium (DSRC) 3. Trust between Vehicle to Vehicle (V2V) 4. Trust between Vehicle to Infrastructure (V2I)
  • 12. 1. Trust between TPMs and Vehicle Sensors
  • 13. 2. Trusted Medium (DSRC)  At the second level, the role of the medium is important, dedicated short range communication (DSRC) frequency band is used for all types of communication in VANET.  DSRC provides multiple channels and its transmission ranges from 5.850 to 5.925 GHz. DSRC are divided into seven channels and each channel range is 10 MHz.  Every vehicle in the network receives messages from other vehicles or from infrastructure. A secure and trusted content of message is the major concern of the users.
  • 14.  3. Trust between Vehicle to Vehicle (V2V)
  • 15. 4. Trust between Vehicle to Infrastructure (V2I)
  • 16.  DAA is a digital group signature scheme and it was originated by Brickell, Camenisch and Chen.  It provides the facility to a third party to validate the TPM, and check whether the user platform is genuine.  In VANET environment, DAA can be considered for attesting a vehicle platform, and at the same time protecting the privacy of the user. Using of DAA we can develop the four level of trust in vehicular communication.
  • 17.  Reducing the death rate, avoiding congestion on roads and makes comfortable journey some of key objective of vehicular network.  Security and trust are becoming increasingly key challenges issues in vehicular network.  TPM hardware module is the key module of trusted computing and that supports to develop trust in vehicular communication environment.  In this paper we have presented new model for web of trust within vehicular network and this model are based on four level of trust.
  • 18. 18  Please download complete paper from ◦ IEEEE website ◦ ResearchGate
  • 19. 19