Do s attacks in vanet presentation in vanet


Published on

DoS attacks in VANET.

Published in: Education, Technology, Business
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Do s attacks in vanet presentation in vanet

  1. 1. Securing vehicular ad hoc networkSirojiddin Jurayev
  2. 2. What is a VANET (Vehicular Ad hoc NETwork)? Roadside base station Emergency event Inter-vehicle communications Vehicle-to-roadside communications• Communication: typically over the Dedicated Short Range Communications(DSRC) (5.9 GHz)• Example of protocol: IEEE 802.11p
  3. 3. A taxonomy of vehicular communication systems 3
  4. 4. A Modern Vehicle Event data recorder (EDR) Positioning system (GPS) Forward radar Communication facility Rear radar Display Human-Machine Interface Computing platform A modern vehicle is a network of sensors/actuators on wheels ! 4
  5. 5. Attackers Insider or outsider  Insider– valid user  Outsider – Intruder, limited attack options Malicious or rational  Malicious – No personal benefit, intends to harm other users  Rational – seeks personal benefits, more predictable attack Active or passive  Active:Generates packets, participates in the network  Passive: Eavesdrop, track users
  6. 6. Security AttacksGoals Actions Execution Congestion Insert bogus Creation/ congestion Single avoidance warnings Cause accidents Misrepresent Single, multiple or pile-ups Location of Entities (Sybil) accident Track Message Multiple individuals suppression Aggressive insertion Denial of service of messages/jamming Independent Colluding
  7. 7. Security Requirements Authentication:  React only to legitimate events. Authenticate senders of messages. Verification of data consistency  Legitimate senders can send false data (attack/unintentional). Can cause immense damage even fatalities. Availability  Network should be available under jamming attacks Non-repudiation  Drivers causing accidents should be reliably identified Privacy (conflicts with authentication)  Privacy of drivers against unauthorized observers. Real-time constraints  High speed means constraints on time
  8. 8. Attack 1 : Bogus traffic information Traffic jam ahead Attacker: insider, rational, active 8
  9. 9. Attack 2 : Generate “Intelligent Collisions” SLOW DOWN The way is clear Attacker: insider, malicious, active 9
  10. 10. Attack 3: Cheating with identity, speed, or position Wasn’t me! Attacker: insider, rational, active 10
  11. 11. Attack 4: Jamming Roadside base station Jammer 11
  12. 12. Attack 5: Tunnel Wrong information Physical tunnel or jammed area 12
  13. 13. Proposed solution module forDoS attack
  14. 14. Channel switching
  15. 15.  Using switching technology Study case of different position of vehicles according to GPS position. Ex. In highway we can use WiMax technology, in city we can use Wifi or Bluetooth etc. If jamming attack detected then node tries to change channel. Attacker power may not be so high in order cover all channels. If so higher power might detect easily by using other methods. Problem. 1. Is it possible for listen different position wireless networks same time.
  16. 16. Expected layered approach forVANET