SlideShare a Scribd company logo
1 of 15
Using TPM to Ensure Security, Trust and
Privacy (STP) in VANET
VANET Security Research Group
(VSRG)
Dr I.A.Sumra
 Vehicular ad-hoc network is a special kind of network in which
nodes (Vehicles) can communicate with each other on the road
and with its Infrastructure.
Road Side Unit (RSU)
V2V
V2V
Basic VANET Architecture
2
V2I
Introduction
 Safety Applications
 Non Safety Applications
Work
in Progress
Plz! use Alt.
route
Work Zone
Warning:!!!
Work Zone
Warning:!!!
Shopping MALL
( TESCO )
Parking Slot
Available!!!
RSU Parking Slot
Available!!!
3
 Vehicular network applications require security and the objective of these applications is to
serve users and make their journey secure and comfortable.
 Attackers have their own role in this network and we cannot predict the dynamic behavior of the
attacker. If an attacker works on a safety application and changes the content of the safety
message then it poses a very difficult condition on the road and many users will be affected due
to this kind of attack.
 Accidents are often the result of an alteration of any safety message or the sending of even one
wrong safety message in a network and many human lives are at risk [1].
 Network Behavior
 Attacker Behavior
STP in VANET
 In trusted vehicular networks, trust and security are two key
requirements for users. While privacy is a basic necessary
requirement for security in life saving vehicular networks, a
guarantee that not only the vehicle platform but also the
infrastructure can be trusted is also vital.
 When users receive any safety message in vehicular
communications, it is important that the message is authentic
and that the source making the request is legitimate. A new
and practical cardbased scheme has been proposed in this
paper to make possible the trusted authentication of users
while enabling various transactions with a Vehicle Service
Provider (VSP).
14
 Please download complete paper from
◦ IEEEE website
◦ ResearchGate
15

More Related Content

What's hot

V2V Training, Vehicle to-vehicle (v2v) communications training
V2V Training, Vehicle to-vehicle (v2v) communications trainingV2V Training, Vehicle to-vehicle (v2v) communications training
V2V Training, Vehicle to-vehicle (v2v) communications trainingBryan Len
 
Security attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveySecurity attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveypijans
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network SecurityLim Jung
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
SURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETSSURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETSIJNSA Journal
 
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529ISSA LA
 

What's hot (7)

V2V Training, Vehicle to-vehicle (v2v) communications training
V2V Training, Vehicle to-vehicle (v2v) communications trainingV2V Training, Vehicle to-vehicle (v2v) communications training
V2V Training, Vehicle to-vehicle (v2v) communications training
 
Security attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveySecurity attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a survey
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
SURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETSSURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETS
 
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
 

Similar to Using tpm to ensure Security,Trust and Privacy (STP) in VANET

Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETDr.Irshad Ahmed Sumra
 
SURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETSSURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETSIJNSA Journal
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network IRJET Journal
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveyDr.Irshad Ahmed Sumra
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
 
Overview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksOverview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksIRJET Journal
 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANETDr.Irshad Ahmed Sumra
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and HashingPallavi Agarwal
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETIJNSA Journal
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETIJNSA Journal
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Dr.Irshad Ahmed Sumra
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Dr.Irshad Ahmed Sumra
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYIJCI JOURNAL
 
A secure alert messaging for vehicular ad hoc networks
A secure alert messaging for vehicular ad hoc networksA secure alert messaging for vehicular ad hoc networks
A secure alert messaging for vehicular ad hoc networksIAEME Publication
 

Similar to Using tpm to ensure Security,Trust and Privacy (STP) in VANET (20)

Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
 
SURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETSSURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETS
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A Survey
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
Trusted Computing in VANET
Trusted Computing in VANETTrusted Computing in VANET
Trusted Computing in VANET
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
 
Overview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksOverview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security Attacks
 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANET
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
 
A secure alert messaging for vehicular ad hoc networks
A secure alert messaging for vehicular ad hoc networksA secure alert messaging for vehicular ad hoc networks
A secure alert messaging for vehicular ad hoc networks
 

More from Dr.Irshad Ahmed Sumra

More from Dr.Irshad Ahmed Sumra (10)

Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
 
Comparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETComparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANET
 
VANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemVANET Security Research and Development Ecosystem
VANET Security Research and Development Ecosystem
 
Timing Attack in Vehicular Network
Timing Attack in Vehicular NetworkTiming Attack in Vehicular Network
Timing Attack in Vehicular Network
 
Classes of Attacks in VANET
Classes of Attacks in VANETClasses of Attacks in VANET
Classes of Attacks in VANET
 
User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET Applications
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement
 
VANET Security and Trust
VANET Security and TrustVANET Security and Trust
VANET Security and Trust
 
ITS and VSS
ITS and VSSITS and VSS
ITS and VSS
 
VANET Trust
VANET TrustVANET Trust
VANET Trust
 

Recently uploaded

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Using tpm to ensure Security,Trust and Privacy (STP) in VANET

  • 1. Using TPM to Ensure Security, Trust and Privacy (STP) in VANET VANET Security Research Group (VSRG) Dr I.A.Sumra
  • 2.  Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. Road Side Unit (RSU) V2V V2V Basic VANET Architecture 2 V2I Introduction
  • 3.  Safety Applications  Non Safety Applications Work in Progress Plz! use Alt. route Work Zone Warning:!!! Work Zone Warning:!!! Shopping MALL ( TESCO ) Parking Slot Available!!! RSU Parking Slot Available!!! 3
  • 4.  Vehicular network applications require security and the objective of these applications is to serve users and make their journey secure and comfortable.  Attackers have their own role in this network and we cannot predict the dynamic behavior of the attacker. If an attacker works on a safety application and changes the content of the safety message then it poses a very difficult condition on the road and many users will be affected due to this kind of attack.  Accidents are often the result of an alteration of any safety message or the sending of even one wrong safety message in a network and many human lives are at risk [1].
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.  In trusted vehicular networks, trust and security are two key requirements for users. While privacy is a basic necessary requirement for security in life saving vehicular networks, a guarantee that not only the vehicle platform but also the infrastructure can be trusted is also vital.  When users receive any safety message in vehicular communications, it is important that the message is authentic and that the source making the request is legitimate. A new and practical cardbased scheme has been proposed in this paper to make possible the trusted authentication of users while enabling various transactions with a Vehicle Service Provider (VSP).
  • 14. 14  Please download complete paper from ◦ IEEEE website ◦ ResearchGate
  • 15. 15