in this slide, it will discuss two new types of attacks which are called road side traffic signal attack and also Internet attack in vehicular network. The authors will explain an attacker‟s behaviour and how he/she will launch an attack on a road side traffic signal and Internet services and create problems for other users of network. Through different scenarios, it will explain the
effect of these attacks on other components of network.
2. Today major concern is to provide safety of users and
save their lives from tragic road accidents.
Vehicular ad hoc network (VANET) is taken more
attention from the end user due to its potential safety
and non-safety applications. The basic design
objective of these applications to serve the users and
provide safety of human lives during their journey.
The role of the end user is more prominent for next
generation vehicular networks. An attacker is one of
type of end user, but their role in the network is
negative and creates problems for other components
of network.
So in this slide, we will discuss two new types of
attacks which are called road side traffic signal attack
and also Internet attack in vehicular network.
2
3. Vehicular ad-hoc network is a special kind of network in which nodes
(Vehicles) can communicate with each other on the road and with its
Infrastructure.
3
V2I
4. Safety Applications
Non Safety Applications
Work
in Progress
Plz! use Alt.
route
Work Zone
Warning:!!!
Work Zone
Warning:!!!
Shopping MALL
Parking Slot
Available!!!
RSU Parking Slot
Available!!!
4
5. There are two types of users and two types of
applications in VANET.
Safety Applications
Non-Safety Applications
5
6. Recently, VANET security issue has gained a major
interest among researchers. However, J. Blum et al.
[23] have asked an important question related to
VANET security in their article, “A wireless network of
intelligent vehicles can make a highway travel safer
and faster. But can hacker(attacker) use the system to
cause accidents?”
By this question, it marked the importance of security
in future VANET applications. Attacker is one type of
users and their objective is to create problem in a
network through different types of attacks.
6
7. User is the main entity in vehicular work and objective of
this new technology is to serve users and safe their lives
from road accidents.
Safety and non safety VANET applications meet the all
users requirement during their journey like send or receive
safety message to other vehicles and use the
entertainment services.
7
11. Attacker and Attack Information:
Attacker Type: Insider Attacker
Attacker’s Node ID X
Attacker’s Node Location: L1
Nature of Attack: (Attack on green signal time slot) Actual time
slot is 00:05sec and altered time slot is 00:10sec.
11
12. Attacker and Attack Information:
Attacker Type: Insider Attacker
Attacker’s Node ID: Y
Attacker 'node Location: L2
Nature of Attack: (Attack on Red Time Slot) Actual time
slot is 00:20sec and the altered time slot is 00:05sec.
12
13. Attacker and Attack Information:
Attacker Type: Outsider Attacker (Pranksters)
Attacker’s Node ID: Z
Attacker’s Node Location: L3
Nature of Attack: (Stop the Traffic Signal), The
actual time slot is 00:20sec and the altered time slot is
00:00.
13
15. The Peer to peer applications have so far been limited
to the fixed Internet (e.g.BitTorrent) in a vehicular
network.
The processing capacity and storage of a vehicular
node (modern vehicles) makes such applications
possible also on mobile platforms in VANET. The Figure
5 shows the car BitTorrent [21].
15
16. There are two architectures of Internet access in vehicular network
using WAVE technology.
(a) WAVE RSU Solution: In this solution the RSU usually have
connection to the Backbone network (IP) and can act as the
Internet access service providers for passing by OBUs in
vehicular environments.
(b) Mycarevent VCG Solution: In this solution, all WAVE OBUs
have to self-organize into VANET on the roadway. It is
communicating with each other due to safety reasons.
16
17. This is a new type of attack; the Internet is one of the key services that
users use during their journey. In this attack, an attacker connects with
the Internet and takes control of the user’s vehicle on the highway.
There are three possible scenarios which are discussed here.
Scenario 1:- When the attacker takes control of the software of the
vehicle, it then generates false messages in the network or broadcasts
wrong messages in the network. The attacker also controls the
application unit (AU) or OBU and sends the attack into the network.
Scenario 2:- Attackers also take control of the sensors of the vehicle
and the sensors change their behaviour and work according to the
attackers‟ requirements. Sensors also show the wrong status of
information and this depends on what the attacker actually wants from
the other vehicles of the network.
17
18. Scenario 3:- This is the worst situation of the attack in which the
attacker controls the hardware part of the vehicle, i.e., the Electronic
Control Unit (ECU). It is a very serious condition for the road when a
user’s vehicle is under the control of someone else outside the
network and they can increase or decrease the vehicle’s speed.
The Figure 7 shows the details of where the attacker makes the
connection with the RSU and then connects with vehicle A. Vehicle A is
actually using the Internet service from the RSU and in this way the
attacker can easily make a connection with vehicle A.
18
19. Scenario 4: In this scenario, the attacker (Prankster) sits in the corner of the city
and makes a connection with the local Internet Service Provider (ISP). The primary
objective of the attacker is to make a connection with the ISP, and through ISP
connection it will launch attacks on the road side unit (RSU). If he/she succeeds in
making the connection with the RSU, then he/she will launch the attack (send
wrong messages, flooding) through the Internet connection.
The secondary objective of the attacker is to breakdown the services of the ISP
because if the ISP server goes down, then the whole network’s functionality will
be disturbed. The Figure 8 explains the whole scenario in which attacker lunch
attack on ISP through RSU.
19
20. A smart vehicle has an important role to perform the secure
communication in a network and smart vehicle is a combination of
several mechanical components with the ability to perform
computations.
Trusted Platform Module (TPM): Trusted Platform Module (TPM) is a
hardware module which are used inside the smart vehicle and their
purpose is to ensure the secure communication in network. The Figure 9
shows the basic architecture of the TPM and the following are key
features of the Trusted Platform Module (TPM).
20
21. TPM is based on root of trust mechanism which are reside the inside
the smart vehicle and also ensure the security and trust of TPM. TPM
also communicate with other sensors of smart vehicle and check the
functionality and working mechanism of these sensors in smart vehicle.
The Root of Trust (RoT) is play the key role to measure the security and
trust inside the TPM. So, detail description of every module of Root of
Trust (RoT) is given below.
21
22. Whenever vehicle is secure through TPM, so now it is possible to
communicate with other vehicle or with infrastructure. There are two
content of the message of one message i-e security content (valid
security key and signature), other contents includes vehicle ID,
location of vehicle and speed of vehicle and message generation time.
All parameters of any message are an important while start the
communication in network. The Figure 13, shows the communication
through step by step process approach while start the communication
in network.
22
23. In this case an attacker communicate with RUS and want to
alter the signal time slot. But TPM has responsibility to identify
and stop their communication in network.
The Figure 14 provides the detail description of case two
23
24. In this case normal user start communication with ISP and take
the internet services while travelling on highway. There are
following steps involve to start the communication between
normal user and ISP.
The Figure 15 explains the communication mechanism between
user and ISP in vehicular network.
24
25. In this case an attacker communicate with ISP and want to lunch
attack on ISP server. Objective of the attacker is to down
Internet services for other user of the network. Through TPM, we
can handle this attacks and drop their packets while they are
launching this such of attacks on ISP.
The Figure 16 provides the detail description of case two.
25
26. Security of VANET is an important issue to be addressed by
designers of VANET infrastructure security.
VANET has taken more attention of the user due to its potential
applications, and the Internet service along the road is one of
the key services in VANET. Users will enjoy high speed Internet
services along the road. However, it cannot be ignored that
there is an importance for security in a vehicular network as
attackers will always remain.
In this paper, the authors have discussed the newly addressed
attacks and the purpose of this paper has been to get the
attention of researchers into this aspect of the behaviour of an
attacker. In first section of this paper, the authors have
discussed the possible attacks on the Internet and on Road Side
Traffic Signal in next generation vehicular network through
different scenarios.
26
27. [15] Guette, G. and C. Bryce, Using tpms to secure vehicular
ad-hoc networks (vanets), in Information Security Theory and
Practices. Smart Devices, Convergence and Next Generation
Networks. 2008, Springer. p. 106-116.
[21]Gerla, M., L. Kleinrock, "Vehicular networks and the future
of the mobile internet." Computer Networks 55(2): 457-
469,2011.
[22] Yunpeng Zang; Weiss, E.; Stibor, L.; Hui Chen; Xi Cheng; ,
"Opportunistic Wireless Internet Access in Vehicular
Environments Using Enhanced WAVE Devices," Future
Generation Communication and Networking (FGCN 2007) ,
vol.1, no., pp.447-452, 6-8 Dec. 2007.
[23] J. Blum and Azim Eskandarian, "The threat of intelligent
collisions," in IT Professional, vol. 6, no. 1, pp. 24-29, Jan.-Feb.
2004.
27
28. This is journal research paper and please
download complete research paper from
research gate.
28