SlideShare a Scribd company logo
1 of 29
Towards Improving Security in VANET:
Some New Possible Attacks and their
Possible Solutions
Dr I.A.Sumra
 Today major concern is to provide safety of users and
save their lives from tragic road accidents.
 Vehicular ad hoc network (VANET) is taken more
attention from the end user due to its potential safety
and non-safety applications. The basic design
objective of these applications to serve the users and
provide safety of human lives during their journey.
 The role of the end user is more prominent for next
generation vehicular networks. An attacker is one of
type of end user, but their role in the network is
negative and creates problems for other components
of network.
 So in this slide, we will discuss two new types of
attacks which are called road side traffic signal attack
and also Internet attack in vehicular network.
2
 Vehicular ad-hoc network is a special kind of network in which nodes
(Vehicles) can communicate with each other on the road and with its
Infrastructure.
3
V2I
 Safety Applications
 Non Safety Applications
Work
in Progress
Plz! use Alt.
route
Work Zone
Warning:!!!
Work Zone
Warning:!!!
Shopping MALL
Parking Slot
Available!!!
RSU Parking Slot
Available!!!
4
 There are two types of users and two types of
applications in VANET.
 Safety Applications
 Non-Safety Applications
5
 Recently, VANET security issue has gained a major
interest among researchers. However, J. Blum et al.
[23] have asked an important question related to
VANET security in their article, “A wireless network of
intelligent vehicles can make a highway travel safer
and faster. But can hacker(attacker) use the system to
cause accidents?”
 By this question, it marked the importance of security
in future VANET applications. Attacker is one type of
users and their objective is to create problem in a
network through different types of attacks.
6
 User is the main entity in vehicular work and objective of
this new technology is to serve users and safe their lives
from road accidents.
 Safety and non safety VANET applications meet the all
users requirement during their journey like send or receive
safety message to other vehicles and use the
entertainment services.
7
8
Resources
Outsider Insider
Coverage Area
Technical
Expertise
 A. RSU Attack in VANET
 B. INTERNET Attack in VANET
9
A. RSU Attack in VANET
 Attacker and Attack Information:
Attacker Type: Insider Attacker
Attacker’s Node ID X
Attacker’s Node Location: L1
Nature of Attack: (Attack on green signal time slot) Actual time
slot is 00:05sec and altered time slot is 00:10sec.
11
 Attacker and Attack Information:
Attacker Type: Insider Attacker
Attacker’s Node ID: Y
Attacker 'node Location: L2
Nature of Attack: (Attack on Red Time Slot) Actual time
slot is 00:20sec and the altered time slot is 00:05sec.
12
 Attacker and Attack Information:
Attacker Type: Outsider Attacker (Pranksters)
Attacker’s Node ID: Z
Attacker’s Node Location: L3
Nature of Attack: (Stop the Traffic Signal), The
actual time slot is 00:20sec and the altered time slot is
00:00.
13
B. INTERNET Attack in VANET
 The Peer to peer applications have so far been limited
to the fixed Internet (e.g.BitTorrent) in a vehicular
network.
 The processing capacity and storage of a vehicular
node (modern vehicles) makes such applications
possible also on mobile platforms in VANET. The Figure
5 shows the car BitTorrent [21].
15
 There are two architectures of Internet access in vehicular network
using WAVE technology.
 (a) WAVE RSU Solution: In this solution the RSU usually have
connection to the Backbone network (IP) and can act as the
Internet access service providers for passing by OBUs in
vehicular environments.
 (b) Mycarevent VCG Solution: In this solution, all WAVE OBUs
have to self-organize into VANET on the roadway. It is
communicating with each other due to safety reasons.
16
 This is a new type of attack; the Internet is one of the key services that
users use during their journey. In this attack, an attacker connects with
the Internet and takes control of the user’s vehicle on the highway.
 There are three possible scenarios which are discussed here.
 Scenario 1:- When the attacker takes control of the software of the
vehicle, it then generates false messages in the network or broadcasts
wrong messages in the network. The attacker also controls the
application unit (AU) or OBU and sends the attack into the network.
 Scenario 2:- Attackers also take control of the sensors of the vehicle
and the sensors change their behaviour and work according to the
attackers‟ requirements. Sensors also show the wrong status of
information and this depends on what the attacker actually wants from
the other vehicles of the network.
17
 Scenario 3:- This is the worst situation of the attack in which the
attacker controls the hardware part of the vehicle, i.e., the Electronic
Control Unit (ECU). It is a very serious condition for the road when a
user’s vehicle is under the control of someone else outside the
network and they can increase or decrease the vehicle’s speed.
 The Figure 7 shows the details of where the attacker makes the
connection with the RSU and then connects with vehicle A. Vehicle A is
actually using the Internet service from the RSU and in this way the
attacker can easily make a connection with vehicle A.
18
 Scenario 4: In this scenario, the attacker (Prankster) sits in the corner of the city
and makes a connection with the local Internet Service Provider (ISP). The primary
objective of the attacker is to make a connection with the ISP, and through ISP
connection it will launch attacks on the road side unit (RSU). If he/she succeeds in
making the connection with the RSU, then he/she will launch the attack (send
wrong messages, flooding) through the Internet connection.
 The secondary objective of the attacker is to breakdown the services of the ISP
because if the ISP server goes down, then the whole network’s functionality will
be disturbed. The Figure 8 explains the whole scenario in which attacker lunch
attack on ISP through RSU.
19
 A smart vehicle has an important role to perform the secure
communication in a network and smart vehicle is a combination of
several mechanical components with the ability to perform
computations.
 Trusted Platform Module (TPM): Trusted Platform Module (TPM) is a
hardware module which are used inside the smart vehicle and their
purpose is to ensure the secure communication in network. The Figure 9
shows the basic architecture of the TPM and the following are key
features of the Trusted Platform Module (TPM).
20
 TPM is based on root of trust mechanism which are reside the inside
the smart vehicle and also ensure the security and trust of TPM. TPM
also communicate with other sensors of smart vehicle and check the
functionality and working mechanism of these sensors in smart vehicle.
 The Root of Trust (RoT) is play the key role to measure the security and
trust inside the TPM. So, detail description of every module of Root of
Trust (RoT) is given below.
21
 Whenever vehicle is secure through TPM, so now it is possible to
communicate with other vehicle or with infrastructure. There are two
content of the message of one message i-e security content (valid
security key and signature), other contents includes vehicle ID,
location of vehicle and speed of vehicle and message generation time.
 All parameters of any message are an important while start the
communication in network. The Figure 13, shows the communication
through step by step process approach while start the communication
in network.
22
 In this case an attacker communicate with RUS and want to
alter the signal time slot. But TPM has responsibility to identify
and stop their communication in network.
 The Figure 14 provides the detail description of case two
23
 In this case normal user start communication with ISP and take
the internet services while travelling on highway. There are
following steps involve to start the communication between
normal user and ISP.
 The Figure 15 explains the communication mechanism between
user and ISP in vehicular network.
24
 In this case an attacker communicate with ISP and want to lunch
attack on ISP server. Objective of the attacker is to down
Internet services for other user of the network. Through TPM, we
can handle this attacks and drop their packets while they are
launching this such of attacks on ISP.
 The Figure 16 provides the detail description of case two.
25
 Security of VANET is an important issue to be addressed by
designers of VANET infrastructure security.
 VANET has taken more attention of the user due to its potential
applications, and the Internet service along the road is one of
the key services in VANET. Users will enjoy high speed Internet
services along the road. However, it cannot be ignored that
there is an importance for security in a vehicular network as
attackers will always remain.
 In this paper, the authors have discussed the newly addressed
attacks and the purpose of this paper has been to get the
attention of researchers into this aspect of the behaviour of an
attacker. In first section of this paper, the authors have
discussed the possible attacks on the Internet and on Road Side
Traffic Signal in next generation vehicular network through
different scenarios.
26
 [15] Guette, G. and C. Bryce, Using tpms to secure vehicular
ad-hoc networks (vanets), in Information Security Theory and
Practices. Smart Devices, Convergence and Next Generation
Networks. 2008, Springer. p. 106-116.
 [21]Gerla, M., L. Kleinrock, "Vehicular networks and the future
of the mobile internet." Computer Networks 55(2): 457-
469,2011.
 [22] Yunpeng Zang; Weiss, E.; Stibor, L.; Hui Chen; Xi Cheng; ,
"Opportunistic Wireless Internet Access in Vehicular
Environments Using Enhanced WAVE Devices," Future
Generation Communication and Networking (FGCN 2007) ,
vol.1, no., pp.447-452, 6-8 Dec. 2007.
 [23] J. Blum and Azim Eskandarian, "The threat of intelligent
collisions," in IT Professional, vol. 6, no. 1, pp. 24-29, Jan.-Feb.
2004.
27
 This is journal research paper and please
download complete research paper from
research gate.
28
29

More Related Content

What's hot

VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
Editor IJCATR
 
1102060,1102073,1102083
1102060,1102073,11020831102060,1102073,1102083
1102060,1102073,1102083
Maksuda Mou
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
Lim Jung
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication System
IOSR Journals
 

What's hot (20)

A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
 
Security attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveySecurity attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a survey
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANET
 
Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
 
VANET
VANETVANET
VANET
 
A review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networksA review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networks
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 
Overview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksOverview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security Attacks
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Atta...
Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Atta...Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Atta...
Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Atta...
 
1102060,1102073,1102083
1102060,1102073,11020831102060,1102073,1102083
1102060,1102073,1102083
 
VANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEWVANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEW
 
VANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEWVANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEW
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication System
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
 
A REVIEW ON SYBIL ATTACK DETECTION TECHNIQUES
A REVIEW ON SYBIL ATTACK DETECTION TECHNIQUESA REVIEW ON SYBIL ATTACK DETECTION TECHNIQUES
A REVIEW ON SYBIL ATTACK DETECTION TECHNIQUES
 

Similar to Towards Improving Security in VANET: Some New Possible Attacks and their Possible Solutions

VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
Editor IJCATR
 
Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular...
Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular...Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular...
Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular...
Dr. Amarjeet Singh
 
B130912
B130912B130912
B130912
irjes
 

Similar to Towards Improving Security in VANET: Some New Possible Attacks and their Possible Solutions (20)

Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationBehavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
 
Comparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETComparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANET
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-fin
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
SURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETSSURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETS
 
SURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETSSURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETS
 
A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...
A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...
A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...
 
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 
Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular...
Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular...Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular...
Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular...
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
 
Detection of Sybil attack in vehicular ad hoc networks by analyzing network ...
Detection of Sybil attack in vehicular ad hoc networks by  analyzing network ...Detection of Sybil attack in vehicular ad hoc networks by  analyzing network ...
Detection of Sybil attack in vehicular ad hoc networks by analyzing network ...
 
B130912
B130912B130912
B130912
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANET
 
Classes of Attacks in VANET
Classes of Attacks in VANETClasses of Attacks in VANET
Classes of Attacks in VANET
 
MALICIOUS NODE DETECTION THROUGH AODV IN VANET
MALICIOUS NODE DETECTION THROUGH AODV IN VANET MALICIOUS NODE DETECTION THROUGH AODV IN VANET
MALICIOUS NODE DETECTION THROUGH AODV IN VANET
 

More from Dr.Irshad Ahmed Sumra

More from Dr.Irshad Ahmed Sumra (8)

Trusted Computing in VANET
Trusted Computing in VANETTrusted Computing in VANET
Trusted Computing in VANET
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
 
VANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemVANET Security Research and Development Ecosystem
VANET Security Research and Development Ecosystem
 
Timing Attack in Vehicular Network
Timing Attack in Vehicular NetworkTiming Attack in Vehicular Network
Timing Attack in Vehicular Network
 
User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET Applications
 
VANET Security and Trust
VANET Security and TrustVANET Security and Trust
VANET Security and Trust
 
ITS and VSS
ITS and VSSITS and VSS
ITS and VSS
 
VANET Trust
VANET TrustVANET Trust
VANET Trust
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Towards Improving Security in VANET: Some New Possible Attacks and their Possible Solutions

  • 1. Towards Improving Security in VANET: Some New Possible Attacks and their Possible Solutions Dr I.A.Sumra
  • 2.  Today major concern is to provide safety of users and save their lives from tragic road accidents.  Vehicular ad hoc network (VANET) is taken more attention from the end user due to its potential safety and non-safety applications. The basic design objective of these applications to serve the users and provide safety of human lives during their journey.  The role of the end user is more prominent for next generation vehicular networks. An attacker is one of type of end user, but their role in the network is negative and creates problems for other components of network.  So in this slide, we will discuss two new types of attacks which are called road side traffic signal attack and also Internet attack in vehicular network. 2
  • 3.  Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. 3 V2I
  • 4.  Safety Applications  Non Safety Applications Work in Progress Plz! use Alt. route Work Zone Warning:!!! Work Zone Warning:!!! Shopping MALL Parking Slot Available!!! RSU Parking Slot Available!!! 4
  • 5.  There are two types of users and two types of applications in VANET.  Safety Applications  Non-Safety Applications 5
  • 6.  Recently, VANET security issue has gained a major interest among researchers. However, J. Blum et al. [23] have asked an important question related to VANET security in their article, “A wireless network of intelligent vehicles can make a highway travel safer and faster. But can hacker(attacker) use the system to cause accidents?”  By this question, it marked the importance of security in future VANET applications. Attacker is one type of users and their objective is to create problem in a network through different types of attacks. 6
  • 7.  User is the main entity in vehicular work and objective of this new technology is to serve users and safe their lives from road accidents.  Safety and non safety VANET applications meet the all users requirement during their journey like send or receive safety message to other vehicles and use the entertainment services. 7
  • 9.  A. RSU Attack in VANET  B. INTERNET Attack in VANET 9
  • 10. A. RSU Attack in VANET
  • 11.  Attacker and Attack Information: Attacker Type: Insider Attacker Attacker’s Node ID X Attacker’s Node Location: L1 Nature of Attack: (Attack on green signal time slot) Actual time slot is 00:05sec and altered time slot is 00:10sec. 11
  • 12.  Attacker and Attack Information: Attacker Type: Insider Attacker Attacker’s Node ID: Y Attacker 'node Location: L2 Nature of Attack: (Attack on Red Time Slot) Actual time slot is 00:20sec and the altered time slot is 00:05sec. 12
  • 13.  Attacker and Attack Information: Attacker Type: Outsider Attacker (Pranksters) Attacker’s Node ID: Z Attacker’s Node Location: L3 Nature of Attack: (Stop the Traffic Signal), The actual time slot is 00:20sec and the altered time slot is 00:00. 13
  • 14. B. INTERNET Attack in VANET
  • 15.  The Peer to peer applications have so far been limited to the fixed Internet (e.g.BitTorrent) in a vehicular network.  The processing capacity and storage of a vehicular node (modern vehicles) makes such applications possible also on mobile platforms in VANET. The Figure 5 shows the car BitTorrent [21]. 15
  • 16.  There are two architectures of Internet access in vehicular network using WAVE technology.  (a) WAVE RSU Solution: In this solution the RSU usually have connection to the Backbone network (IP) and can act as the Internet access service providers for passing by OBUs in vehicular environments.  (b) Mycarevent VCG Solution: In this solution, all WAVE OBUs have to self-organize into VANET on the roadway. It is communicating with each other due to safety reasons. 16
  • 17.  This is a new type of attack; the Internet is one of the key services that users use during their journey. In this attack, an attacker connects with the Internet and takes control of the user’s vehicle on the highway.  There are three possible scenarios which are discussed here.  Scenario 1:- When the attacker takes control of the software of the vehicle, it then generates false messages in the network or broadcasts wrong messages in the network. The attacker also controls the application unit (AU) or OBU and sends the attack into the network.  Scenario 2:- Attackers also take control of the sensors of the vehicle and the sensors change their behaviour and work according to the attackers‟ requirements. Sensors also show the wrong status of information and this depends on what the attacker actually wants from the other vehicles of the network. 17
  • 18.  Scenario 3:- This is the worst situation of the attack in which the attacker controls the hardware part of the vehicle, i.e., the Electronic Control Unit (ECU). It is a very serious condition for the road when a user’s vehicle is under the control of someone else outside the network and they can increase or decrease the vehicle’s speed.  The Figure 7 shows the details of where the attacker makes the connection with the RSU and then connects with vehicle A. Vehicle A is actually using the Internet service from the RSU and in this way the attacker can easily make a connection with vehicle A. 18
  • 19.  Scenario 4: In this scenario, the attacker (Prankster) sits in the corner of the city and makes a connection with the local Internet Service Provider (ISP). The primary objective of the attacker is to make a connection with the ISP, and through ISP connection it will launch attacks on the road side unit (RSU). If he/she succeeds in making the connection with the RSU, then he/she will launch the attack (send wrong messages, flooding) through the Internet connection.  The secondary objective of the attacker is to breakdown the services of the ISP because if the ISP server goes down, then the whole network’s functionality will be disturbed. The Figure 8 explains the whole scenario in which attacker lunch attack on ISP through RSU. 19
  • 20.  A smart vehicle has an important role to perform the secure communication in a network and smart vehicle is a combination of several mechanical components with the ability to perform computations.  Trusted Platform Module (TPM): Trusted Platform Module (TPM) is a hardware module which are used inside the smart vehicle and their purpose is to ensure the secure communication in network. The Figure 9 shows the basic architecture of the TPM and the following are key features of the Trusted Platform Module (TPM). 20
  • 21.  TPM is based on root of trust mechanism which are reside the inside the smart vehicle and also ensure the security and trust of TPM. TPM also communicate with other sensors of smart vehicle and check the functionality and working mechanism of these sensors in smart vehicle.  The Root of Trust (RoT) is play the key role to measure the security and trust inside the TPM. So, detail description of every module of Root of Trust (RoT) is given below. 21
  • 22.  Whenever vehicle is secure through TPM, so now it is possible to communicate with other vehicle or with infrastructure. There are two content of the message of one message i-e security content (valid security key and signature), other contents includes vehicle ID, location of vehicle and speed of vehicle and message generation time.  All parameters of any message are an important while start the communication in network. The Figure 13, shows the communication through step by step process approach while start the communication in network. 22
  • 23.  In this case an attacker communicate with RUS and want to alter the signal time slot. But TPM has responsibility to identify and stop their communication in network.  The Figure 14 provides the detail description of case two 23
  • 24.  In this case normal user start communication with ISP and take the internet services while travelling on highway. There are following steps involve to start the communication between normal user and ISP.  The Figure 15 explains the communication mechanism between user and ISP in vehicular network. 24
  • 25.  In this case an attacker communicate with ISP and want to lunch attack on ISP server. Objective of the attacker is to down Internet services for other user of the network. Through TPM, we can handle this attacks and drop their packets while they are launching this such of attacks on ISP.  The Figure 16 provides the detail description of case two. 25
  • 26.  Security of VANET is an important issue to be addressed by designers of VANET infrastructure security.  VANET has taken more attention of the user due to its potential applications, and the Internet service along the road is one of the key services in VANET. Users will enjoy high speed Internet services along the road. However, it cannot be ignored that there is an importance for security in a vehicular network as attackers will always remain.  In this paper, the authors have discussed the newly addressed attacks and the purpose of this paper has been to get the attention of researchers into this aspect of the behaviour of an attacker. In first section of this paper, the authors have discussed the possible attacks on the Internet and on Road Side Traffic Signal in next generation vehicular network through different scenarios. 26
  • 27.  [15] Guette, G. and C. Bryce, Using tpms to secure vehicular ad-hoc networks (vanets), in Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks. 2008, Springer. p. 106-116.  [21]Gerla, M., L. Kleinrock, "Vehicular networks and the future of the mobile internet." Computer Networks 55(2): 457- 469,2011.  [22] Yunpeng Zang; Weiss, E.; Stibor, L.; Hui Chen; Xi Cheng; , "Opportunistic Wireless Internet Access in Vehicular Environments Using Enhanced WAVE Devices," Future Generation Communication and Networking (FGCN 2007) , vol.1, no., pp.447-452, 6-8 Dec. 2007.  [23] J. Blum and Azim Eskandarian, "The threat of intelligent collisions," in IT Professional, vol. 6, no. 1, pp. 24-29, Jan.-Feb. 2004. 27
  • 28.  This is journal research paper and please download complete research paper from research gate. 28
  • 29. 29