SlideShare a Scribd company logo
Dr. IA . Sumra
V TEA N
New Card Based Scheme to Ensure Security and Trust
in Vehicular Communications
 Introduction
 Authentication Requirement in VANET
 Related Work
 Trusted Security Module in VANET
 Proposed Card-based Scheme
 Conclusion
 References
 Q&A
2
 Vehicular ad-hoc network is a special kind of network in which nodes
(Vehicles) can communicate with each other on the road and with its
Infrastructure.
Road Side Unit (RSU)
V2VV2V
Basic VANET Architecture
3
V2I
 Safety Applications
 Non Safety Applications
Work
in Progress
Plz! use Alt.
route
Work Zone
Warning:!!!
Work Zone
Warning:!!!
Shopping MALL
Parking Slot
Available!!!
RSU Parking Slot
Available!!!
4
Authentication
Integrity
Confidentiality
Availability
5
Security Privacy
Trust
6
 “an entity can be trusted if it always behaves in the expected
manner for intended purpose”.
 all components of the network (vehicles and infrastructure) are
behaving in an
expected manner
 (secure communication between the components) and serve the
users and save human lives.
Attacker
Change
the
behavior
7
 Authentication is an open issue and key security requirement in vehicular
network and all applications are required to be authenticated.
 Authentication is needed for most tasks for sending critical messages to other
vehicle or getting some services from the network.
 Authentication is required in two different cases.
 if users send or receive safety messages in network, it should be
authenticated first by a valid user.
 when user needs any service from service providers (SP), they should check
the user information from its own billing server which later charges the users
for the use of any sort of services/resources.
8
 Authentications types in VANET
 Message Authentication
 Broadcast Message Authentication
 Pairwise Message Authentication
 GroupWise Message Authentication
 Vehicle Authentication
 Road Side Unit (RSU) Authentication
 Authentication requirement for Business Transaction
 Prepaid Package
 Post-paid Package
9
 Trusted Platform module (TPM) is a hardware
chip and it is the core component of the Trusted
Computing Group (TCG).
 TPM provides cryptographic functions, secures
storage of secret data and provides the basis to
fulfil major security requirements.
10
 Low Cost
 TPM is a low cost security module as compared to temper proof device (TPD)
 Resist Software Attacks
 TPM can resist software attacks but it cannot control hardware
tempering.
 Ownership
 TPM_takeownership command creates ownership of the
vehicle. Whenever user buys new vehicle, the authority will
assign it to be the owner of that particular vehicle. When the
vehicle is sold out then we need to change ownership to the
new user.
 Cryptographic Functions: TPM provides cryptographic function
and also ensures the data integrity in the network through
cryptographic components (SHA-1 Engine, RSA and Random
Number Generator).
 Root of Trust
 Root of trust for measurement (RTM)
 Root of trust for Reporting (RTR)
 Root of Trust for Storage (RTS)
11
 Authentication is more complex task in vehicular network compared to any fixed network
due to dynamic nature of its topology. Our scheme is based on fixed infrastructure which
is called vehicular Service Providers (VSP).
 VSP issues secret cards with different time durations like one month, two month, and six
month. When the users need to do is only to enter a 16 digits secret code into the vehicle
unit and then communicate with vehicular Service Providers server.
 The VSP server will verify the secret code through an integrity verification process and
after verification has been completed, it will activate the PCA at the user vehicle to
generate certificates for some specific time duration.
 Objective of this propose scheme to solve the problem of authentication and users should
be authentic while they join network on road and taking services.
Proposed Card Based Scheme12
 First 8 digit uses for PCA is taken from a smart card inserted to the
vehicle unit by this way, we eliminate the need for connecting with the
PCA and sending request for certificate and key for singing the messages.
 In this scenario, a vehicle A signs a message with TPM signing (SK) key,
attach valid AIK certificate and signature inside the VPS security tag and
broadcast this message to other vehicles.
 Every other vehicle checks this message that comes with security VPS
tag. If VPS tag is exist with message, its means this message is secure and
properly signs with TPM signing key (SK).
 Every time TPM generates one signing key and sends request to storage
area for AIK certificate. By frequently changing the signing key and AIK, it
maintains the security in the system.
8 Digits
XXXXXXXXYYYYYYYY
8 Digits
Vehicle
VSP
VSP
Server
Secret 16 digits
Code
Billing
Server
PCA
Billing Keys Storage
Area
TPM
Backbone Network
Process mechanism of Card-based Scheme
16 digit secret codes
First Part Second Part
13
 shows the authentic warning message with security tag.
Because of the VPS signature certificate, it can be seen
that it would be difficult for an attacker to change the
security tag.
 shows how an ideal secure and trusted communication
between the vehicles would take place using the proposed
scheme.
Message
VPS
Signature Certificate
Safety message with VPS Security Tag
Secure communication between the vehicles
First Part
14
 Next 8 digit secret codes is used for business related applications such as
taking some services and paying money for these services like telephone
and internet services on road.
 vehicle A sends request for internet access on road, so authentication and
billing sever authenticates the user together with its billing information.
After that the VPS server gathers some more parameters such as speed,
position and direction of the requesting vehicle.
 If the user of the vehicle fulfils all requirements, the VSP server provides
required road services. Another vehicle C may also sends request for any
other services, and the same procedure will be followed for serving the
required services.
Second Part
RSU
Authentication &
Billing Server
B
A
C
Web
Server
Other
services
E
D
Authentication in Business Communication15
 It is based on card which has 16 digit secret code that
provides security based on trusted platform module (TPM)
for signing safety messages and for business transactions.
 The storage area is proposed inside vehicle for saving
security keys and billing information. It eliminates the
dependency on external storage device(memory stick) that
should not use for the storage of users information.
 Users do not depend on external party for authentication
in dynamic topology vehicular communication network.
 Message tag contains signature and certificate that make
difficult for attackers to alter the tag.
 proposed scheme is based on TPM and it is low cost
security device and develop the chain of trust in vehicular
network.
16
 Security and trust are two main users’ requirements for
trusted vehicular network.
 In vehicular communications, when user receives any
safety message, it should be authentic, and that the
requesting source is valid.
 In vehicular communications, when user receives any
safety message or non safety message, it should be
authentic.
 Authentication is require for sending and messages and
also for business transaction.
 Proposed scheme are based on TPM and provides user
authentication requirement in network while
communicating with other vehicle and also taking service
from any service providers.
 We hope proposed scheme will be helpful for solving the
problem of authentication in high speed vehicular
environment.
17
18
19
 Send email: isomro28@gmail.com
 Please download complete paper
 IEEEE website
 ResearchGate
 Video Available on given link:-
 https://www.youtube.com/watch?v=0SBlL8hM_I4

More Related Content

What's hot

MOBILE RECHARGING WITH BANKING TRANSACTION USING SMS
MOBILE RECHARGING WITH BANKING TRANSACTION USING SMSMOBILE RECHARGING WITH BANKING TRANSACTION USING SMS
MOBILE RECHARGING WITH BANKING TRANSACTION USING SMS
Kuldeep Jain
 
This is a title
This is a titleThis is a title
This is a titlesailias
 
Paynet systems & Credit Card Processing
Paynet systems & Credit Card ProcessingPaynet systems & Credit Card Processing
Paynet systems & Credit Card Processing
Paynet Systems, Inc.
 
Data sheet Securepay
Data sheet  SecurepayData sheet  Securepay
Data sheet Securepay
gensoftpro
 
Hasin group profile 2019
Hasin group profile 2019Hasin group profile 2019
Hasin group profile 2019
GholamrezaGolpayegan
 
EMV Secure Remote Commerce (SRC)
EMV Secure Remote Commerce (SRC)EMV Secure Remote Commerce (SRC)
EMV Secure Remote Commerce (SRC)
Netcetera
 
SecureTrading Corporate Presentation 2010
SecureTrading Corporate Presentation 2010SecureTrading Corporate Presentation 2010
SecureTrading Corporate Presentation 2010
Secure Trading
 

What's hot (9)

M Banking
M BankingM Banking
M Banking
 
MOBILE RECHARGING WITH BANKING TRANSACTION USING SMS
MOBILE RECHARGING WITH BANKING TRANSACTION USING SMSMOBILE RECHARGING WITH BANKING TRANSACTION USING SMS
MOBILE RECHARGING WITH BANKING TRANSACTION USING SMS
 
This is a title
This is a titleThis is a title
This is a title
 
Paynet systems & Credit Card Processing
Paynet systems & Credit Card ProcessingPaynet systems & Credit Card Processing
Paynet systems & Credit Card Processing
 
Data sheet Securepay
Data sheet  SecurepayData sheet  Securepay
Data sheet Securepay
 
SmartLicence -
SmartLicence - SmartLicence -
SmartLicence -
 
Hasin group profile 2019
Hasin group profile 2019Hasin group profile 2019
Hasin group profile 2019
 
EMV Secure Remote Commerce (SRC)
EMV Secure Remote Commerce (SRC)EMV Secure Remote Commerce (SRC)
EMV Secure Remote Commerce (SRC)
 
SecureTrading Corporate Presentation 2010
SecureTrading Corporate Presentation 2010SecureTrading Corporate Presentation 2010
SecureTrading Corporate Presentation 2010
 

Similar to VANET Security and Trust

Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
Dr.Irshad Ahmed Sumra
 
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET Journal
 
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDRELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
IJCI JOURNAL
 
Efficient Conditional Anonymity With MessageIntegrity and Authentication in a...
Efficient Conditional Anonymity With MessageIntegrity and Authentication in a...Efficient Conditional Anonymity With MessageIntegrity and Authentication in a...
Efficient Conditional Anonymity With MessageIntegrity and Authentication in a...
JAYAPRAKASH JPINFOTECH
 
OEM - запчасти на проводе
OEM - запчасти на проводеOEM - запчасти на проводе
OEM - запчасти на проводе
Sergey Zhdanov
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Dr.Irshad Ahmed Sumra
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Madhur Gupta
 
Enhanced Conditional Privacy Preservation In VANETs
Enhanced Conditional Privacy Preservation In VANETsEnhanced Conditional Privacy Preservation In VANETs
Enhanced Conditional Privacy Preservation In VANETs
IJERDJOURNAL
 
OSGi Technology as it relates to Java, Smartcards, and the Automotive Industr...
OSGi Technology as it relates to Java, Smartcards, and the Automotive Industr...OSGi Technology as it relates to Java, Smartcards, and the Automotive Industr...
OSGi Technology as it relates to Java, Smartcards, and the Automotive Industr...
mfrancis
 
Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET
Pallavi Agarwal
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
 
IoT Connected Car Insights from Patents
IoT Connected Car Insights from PatentsIoT Connected Car Insights from Patents
IoT Connected Car Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
ParthaS
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
Chas Yap
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
Rexcy
 
Trusted Computing in VANET
Trusted Computing in VANETTrusted Computing in VANET
Trusted Computing in VANET
Dr.Irshad Ahmed Sumra
 
VMware Solutions for the Connected Car
VMware Solutions for the Connected CarVMware Solutions for the Connected Car
VMware Solutions for the Connected Car
Angel Villar Garea
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain
 
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET  A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
IJECEIAES
 

Similar to VANET Security and Trust (20)

Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
 
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
 
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDRELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
 
Efficient Conditional Anonymity With MessageIntegrity and Authentication in a...
Efficient Conditional Anonymity With MessageIntegrity and Authentication in a...Efficient Conditional Anonymity With MessageIntegrity and Authentication in a...
Efficient Conditional Anonymity With MessageIntegrity and Authentication in a...
 
H027045049
H027045049H027045049
H027045049
 
OEM - запчасти на проводе
OEM - запчасти на проводеOEM - запчасти на проводе
OEM - запчасти на проводе
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
 
Enhanced Conditional Privacy Preservation In VANETs
Enhanced Conditional Privacy Preservation In VANETsEnhanced Conditional Privacy Preservation In VANETs
Enhanced Conditional Privacy Preservation In VANETs
 
OSGi Technology as it relates to Java, Smartcards, and the Automotive Industr...
OSGi Technology as it relates to Java, Smartcards, and the Automotive Industr...OSGi Technology as it relates to Java, Smartcards, and the Automotive Industr...
OSGi Technology as it relates to Java, Smartcards, and the Automotive Industr...
 
Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
IoT Connected Car Insights from Patents
IoT Connected Car Insights from PatentsIoT Connected Car Insights from Patents
IoT Connected Car Insights from Patents
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
Trusted Computing in VANET
Trusted Computing in VANETTrusted Computing in VANET
Trusted Computing in VANET
 
VMware Solutions for the Connected Car
VMware Solutions for the Connected CarVMware Solutions for the Connected Car
VMware Solutions for the Connected Car
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
 
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET  A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
 

More from Dr.Irshad Ahmed Sumra

Using the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETUsing the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANET
Dr.Irshad Ahmed Sumra
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Dr.Irshad Ahmed Sumra
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A Survey
Dr.Irshad Ahmed Sumra
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
Dr.Irshad Ahmed Sumra
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANET
Dr.Irshad Ahmed Sumra
 
Comparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETComparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANET
Dr.Irshad Ahmed Sumra
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
Dr.Irshad Ahmed Sumra
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Dr.Irshad Ahmed Sumra
 
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Dr.Irshad Ahmed Sumra
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Dr.Irshad Ahmed Sumra
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Dr.Irshad Ahmed Sumra
 
VANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemVANET Security Research and Development Ecosystem
VANET Security Research and Development Ecosystem
Dr.Irshad Ahmed Sumra
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationBehavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Dr.Irshad Ahmed Sumra
 
Timing Attack in Vehicular Network
Timing Attack in Vehicular NetworkTiming Attack in Vehicular Network
Timing Attack in Vehicular Network
Dr.Irshad Ahmed Sumra
 
Classes of Attacks in VANET
Classes of Attacks in VANETClasses of Attacks in VANET
Classes of Attacks in VANET
Dr.Irshad Ahmed Sumra
 
User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET Applications
Dr.Irshad Ahmed Sumra
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement
Dr.Irshad Ahmed Sumra
 
ITS and VSS
ITS and VSSITS and VSS
VANET Trust
VANET TrustVANET Trust

More from Dr.Irshad Ahmed Sumra (19)

Using the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETUsing the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANET
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A Survey
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANET
 
Comparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETComparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANET
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
 
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
 
VANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemVANET Security Research and Development Ecosystem
VANET Security Research and Development Ecosystem
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationBehavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
 
Timing Attack in Vehicular Network
Timing Attack in Vehicular NetworkTiming Attack in Vehicular Network
Timing Attack in Vehicular Network
 
Classes of Attacks in VANET
Classes of Attacks in VANETClasses of Attacks in VANET
Classes of Attacks in VANET
 
User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET Applications
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement
 
ITS and VSS
ITS and VSSITS and VSS
ITS and VSS
 
VANET Trust
VANET TrustVANET Trust
VANET Trust
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

VANET Security and Trust

  • 1. Dr. IA . Sumra V TEA N New Card Based Scheme to Ensure Security and Trust in Vehicular Communications
  • 2.  Introduction  Authentication Requirement in VANET  Related Work  Trusted Security Module in VANET  Proposed Card-based Scheme  Conclusion  References  Q&A 2
  • 3.  Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. Road Side Unit (RSU) V2VV2V Basic VANET Architecture 3 V2I
  • 4.  Safety Applications  Non Safety Applications Work in Progress Plz! use Alt. route Work Zone Warning:!!! Work Zone Warning:!!! Shopping MALL Parking Slot Available!!! RSU Parking Slot Available!!! 4
  • 7.  “an entity can be trusted if it always behaves in the expected manner for intended purpose”.  all components of the network (vehicles and infrastructure) are behaving in an expected manner  (secure communication between the components) and serve the users and save human lives. Attacker Change the behavior 7
  • 8.  Authentication is an open issue and key security requirement in vehicular network and all applications are required to be authenticated.  Authentication is needed for most tasks for sending critical messages to other vehicle or getting some services from the network.  Authentication is required in two different cases.  if users send or receive safety messages in network, it should be authenticated first by a valid user.  when user needs any service from service providers (SP), they should check the user information from its own billing server which later charges the users for the use of any sort of services/resources. 8
  • 9.  Authentications types in VANET  Message Authentication  Broadcast Message Authentication  Pairwise Message Authentication  GroupWise Message Authentication  Vehicle Authentication  Road Side Unit (RSU) Authentication  Authentication requirement for Business Transaction  Prepaid Package  Post-paid Package 9
  • 10.  Trusted Platform module (TPM) is a hardware chip and it is the core component of the Trusted Computing Group (TCG).  TPM provides cryptographic functions, secures storage of secret data and provides the basis to fulfil major security requirements. 10
  • 11.  Low Cost  TPM is a low cost security module as compared to temper proof device (TPD)  Resist Software Attacks  TPM can resist software attacks but it cannot control hardware tempering.  Ownership  TPM_takeownership command creates ownership of the vehicle. Whenever user buys new vehicle, the authority will assign it to be the owner of that particular vehicle. When the vehicle is sold out then we need to change ownership to the new user.  Cryptographic Functions: TPM provides cryptographic function and also ensures the data integrity in the network through cryptographic components (SHA-1 Engine, RSA and Random Number Generator).  Root of Trust  Root of trust for measurement (RTM)  Root of trust for Reporting (RTR)  Root of Trust for Storage (RTS) 11
  • 12.  Authentication is more complex task in vehicular network compared to any fixed network due to dynamic nature of its topology. Our scheme is based on fixed infrastructure which is called vehicular Service Providers (VSP).  VSP issues secret cards with different time durations like one month, two month, and six month. When the users need to do is only to enter a 16 digits secret code into the vehicle unit and then communicate with vehicular Service Providers server.  The VSP server will verify the secret code through an integrity verification process and after verification has been completed, it will activate the PCA at the user vehicle to generate certificates for some specific time duration.  Objective of this propose scheme to solve the problem of authentication and users should be authentic while they join network on road and taking services. Proposed Card Based Scheme12
  • 13.  First 8 digit uses for PCA is taken from a smart card inserted to the vehicle unit by this way, we eliminate the need for connecting with the PCA and sending request for certificate and key for singing the messages.  In this scenario, a vehicle A signs a message with TPM signing (SK) key, attach valid AIK certificate and signature inside the VPS security tag and broadcast this message to other vehicles.  Every other vehicle checks this message that comes with security VPS tag. If VPS tag is exist with message, its means this message is secure and properly signs with TPM signing key (SK).  Every time TPM generates one signing key and sends request to storage area for AIK certificate. By frequently changing the signing key and AIK, it maintains the security in the system. 8 Digits XXXXXXXXYYYYYYYY 8 Digits Vehicle VSP VSP Server Secret 16 digits Code Billing Server PCA Billing Keys Storage Area TPM Backbone Network Process mechanism of Card-based Scheme 16 digit secret codes First Part Second Part 13
  • 14.  shows the authentic warning message with security tag. Because of the VPS signature certificate, it can be seen that it would be difficult for an attacker to change the security tag.  shows how an ideal secure and trusted communication between the vehicles would take place using the proposed scheme. Message VPS Signature Certificate Safety message with VPS Security Tag Secure communication between the vehicles First Part 14
  • 15.  Next 8 digit secret codes is used for business related applications such as taking some services and paying money for these services like telephone and internet services on road.  vehicle A sends request for internet access on road, so authentication and billing sever authenticates the user together with its billing information. After that the VPS server gathers some more parameters such as speed, position and direction of the requesting vehicle.  If the user of the vehicle fulfils all requirements, the VSP server provides required road services. Another vehicle C may also sends request for any other services, and the same procedure will be followed for serving the required services. Second Part RSU Authentication & Billing Server B A C Web Server Other services E D Authentication in Business Communication15
  • 16.  It is based on card which has 16 digit secret code that provides security based on trusted platform module (TPM) for signing safety messages and for business transactions.  The storage area is proposed inside vehicle for saving security keys and billing information. It eliminates the dependency on external storage device(memory stick) that should not use for the storage of users information.  Users do not depend on external party for authentication in dynamic topology vehicular communication network.  Message tag contains signature and certificate that make difficult for attackers to alter the tag.  proposed scheme is based on TPM and it is low cost security device and develop the chain of trust in vehicular network. 16
  • 17.  Security and trust are two main users’ requirements for trusted vehicular network.  In vehicular communications, when user receives any safety message, it should be authentic, and that the requesting source is valid.  In vehicular communications, when user receives any safety message or non safety message, it should be authentic.  Authentication is require for sending and messages and also for business transaction.  Proposed scheme are based on TPM and provides user authentication requirement in network while communicating with other vehicle and also taking service from any service providers.  We hope proposed scheme will be helpful for solving the problem of authentication in high speed vehicular environment. 17
  • 18. 18
  • 19. 19  Send email: isomro28@gmail.com  Please download complete paper  IEEEE website  ResearchGate  Video Available on given link:-  https://www.youtube.com/watch?v=0SBlL8hM_I4