The document proposes a card-based scheme to ensure security and trust in vehicular communications. It discusses authentication requirements in vehicular networks and introduces a trusted security module. The proposed scheme uses a secret 16-digit code from a smart card to authenticate vehicles and enable them to securely communicate and obtain services. When verified by the vehicular service provider server, the code activates the vehicle's security module to generate certificates for messages and transactions. The scheme aims to solve authentication problems and ensure users are legitimate when joining the vehicular network.
E-commerce transactions represent one of the most vulnerable industries and require additional protection against fraud. In order to grant this protection, 3D-Secure protocol was developed. More information on 3D-Secure verification process can be found at #UniPayGateway unipaygateway.com
Mobile payments and financial services technology company
Our Mission is to become the lowest cost provider of mobile commerce services and branchless banking to the vast un-banked immigrant populations from Latin America, Asia and Africa and their societies back home
UMS vertically-integrated systems allow for a wide range of flexible solutions for banks and other partners
Technology partner of our Customers.
ventas@bancamovil.com.mx
E-commerce transactions represent one of the most vulnerable industries and require additional protection against fraud. In order to grant this protection, 3D-Secure protocol was developed. More information on 3D-Secure verification process can be found at #UniPayGateway unipaygateway.com
Mobile payments and financial services technology company
Our Mission is to become the lowest cost provider of mobile commerce services and branchless banking to the vast un-banked immigrant populations from Latin America, Asia and Africa and their societies back home
UMS vertically-integrated systems allow for a wide range of flexible solutions for banks and other partners
Technology partner of our Customers.
ventas@bancamovil.com.mx
This presentation explains about credit card processing, most important features of credit card processing, payment card industry data security standard (PCI DSS), application programming interface (API), API advatages and Paynet Systems latest iPhone credit card processing application names "Credit Card Machine".
The main idea behind trusted computing is the hardware based TPM which contains active security modules that supports web of trust to be built within components of the network. We propose a new model for web of trust within vehicular to handle all types of attacks and maintain the integrity of messages.
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDIJCI JOURNAL
Vehicular Ad-hoc Networks (VANET’S) have become viable and valuable for their wide variety of novel
applications to improve driver’s experience. The topology of network is highly time varying due to high
mobility of vehicular nodes. This makes challenging to detect and diagnose errors in software
applications used in the vehicles. Software reliability in vehicles is critical factor and significant
challenge to be met. Misbehaving and faulty software applications in vehicle have to be detected and
diagnosed from disrupting operation as it is hard to address in life critical vehicular network
environment. The work proposes an advanced diagnostics system to be loaded in Road Side Units (RSU’s)
so that operating software is periodically transmits the codes generated by the vehicle configured with
OBD to the RSU for test. The software is diagnosed at the RSU accessing the data from cloud servers for
reliability. Later, a fixed patch is transmitted back to the vehicle via RSU’s. The result in this paper shows
the analysis of different temperature variables used in vehicles and are efficiently measured.
Efficient Conditional Anonymity With MessageIntegrity and Authentication in a...JAYAPRAKASH JPINFOTECH
Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network
To buy this project in ONLINE, Contact:
Email: jpinfotechprojects@gmail.com,
Website: https://www.jpinfotech.org
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Dr.Irshad Ahmed Sumra
in this research paper, we are presenting the secure business communication (SBC) model and explain the components of proposed model. TPM is a security hardware module and it is used inside the smart vehicle. TPM is a core component of proposed SBC model and it will ensure secure communication between user and business parties in VANET.
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesMadhur Gupta
White papers on Connected Vehicles on Security & Safety aspects, Vulnerabilities, impact on socio-economic life of People
Please go through this to get a glipse of the facinating opportunities and potential work streams.
Enhanced Conditional Privacy Preservation In VANETsIJERDJOURNAL
Abstract:- The Vehicle drivers (users) do not want their personal information such as vehicle names, license plate, speed, positions, moving routes, and user information to be revealed, in order to protect them against any illegal tracing or user profiling. Thus, this information must be protected from any kind of misuse or attacks. For this the obscurity of vehicular nodes should be supported to preserve privacy of vehicles and their users. Also, we should be able to investigate for accidents or liabilities from non-repudiation. Hence, we present an enhanced conditional privacy preservation scheme for vehicular ad-hoc networks (VANETs). This scheme includes an ID-based cryptosystem to assure user's obscurity using pseudonyms; however the model provides a backdoor for authorities to track misbehaving and suspicious users
Vehicular Ad Hoc Network (VANET) is a more influential network in which vehicles depend on each other to communicate and for the secure exchange of the messages. With the improvement in the technology, mainly the vehicles are equipped with Wi-Fi and GPS devices to improve the traffic handling and road safety. But many vehicles may broadcast the bogus messages for their own purpose, so it needs a trustful environment and an effective trust management schemes to prevent the network from the various malicious attacks. Trust establishment is very challenging as the network is highly mobile and vehicles may come in or depart at any time. In this paper, we first discuss the VANET model to describe the environment, and then the trust management schemes to secure the network and lastly the various cryptography fundamentals for the fast and safe message transfer.
Patents are a good information resource for obtaining IoT (Internet of Things) technology development status. Followings illustrate some examples of patents that provide current status of the IoT connected car technology development: safety/collision avoidance, traffic information for smart driving, connected car security, infotainment and self-driving car monitoring.
This presentation explains about credit card processing, most important features of credit card processing, payment card industry data security standard (PCI DSS), application programming interface (API), API advatages and Paynet Systems latest iPhone credit card processing application names "Credit Card Machine".
The main idea behind trusted computing is the hardware based TPM which contains active security modules that supports web of trust to be built within components of the network. We propose a new model for web of trust within vehicular to handle all types of attacks and maintain the integrity of messages.
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDIJCI JOURNAL
Vehicular Ad-hoc Networks (VANET’S) have become viable and valuable for their wide variety of novel
applications to improve driver’s experience. The topology of network is highly time varying due to high
mobility of vehicular nodes. This makes challenging to detect and diagnose errors in software
applications used in the vehicles. Software reliability in vehicles is critical factor and significant
challenge to be met. Misbehaving and faulty software applications in vehicle have to be detected and
diagnosed from disrupting operation as it is hard to address in life critical vehicular network
environment. The work proposes an advanced diagnostics system to be loaded in Road Side Units (RSU’s)
so that operating software is periodically transmits the codes generated by the vehicle configured with
OBD to the RSU for test. The software is diagnosed at the RSU accessing the data from cloud servers for
reliability. Later, a fixed patch is transmitted back to the vehicle via RSU’s. The result in this paper shows
the analysis of different temperature variables used in vehicles and are efficiently measured.
Efficient Conditional Anonymity With MessageIntegrity and Authentication in a...JAYAPRAKASH JPINFOTECH
Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network
To buy this project in ONLINE, Contact:
Email: jpinfotechprojects@gmail.com,
Website: https://www.jpinfotech.org
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Dr.Irshad Ahmed Sumra
in this research paper, we are presenting the secure business communication (SBC) model and explain the components of proposed model. TPM is a security hardware module and it is used inside the smart vehicle. TPM is a core component of proposed SBC model and it will ensure secure communication between user and business parties in VANET.
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesMadhur Gupta
White papers on Connected Vehicles on Security & Safety aspects, Vulnerabilities, impact on socio-economic life of People
Please go through this to get a glipse of the facinating opportunities and potential work streams.
Enhanced Conditional Privacy Preservation In VANETsIJERDJOURNAL
Abstract:- The Vehicle drivers (users) do not want their personal information such as vehicle names, license plate, speed, positions, moving routes, and user information to be revealed, in order to protect them against any illegal tracing or user profiling. Thus, this information must be protected from any kind of misuse or attacks. For this the obscurity of vehicular nodes should be supported to preserve privacy of vehicles and their users. Also, we should be able to investigate for accidents or liabilities from non-repudiation. Hence, we present an enhanced conditional privacy preservation scheme for vehicular ad-hoc networks (VANETs). This scheme includes an ID-based cryptosystem to assure user's obscurity using pseudonyms; however the model provides a backdoor for authorities to track misbehaving and suspicious users
Vehicular Ad Hoc Network (VANET) is a more influential network in which vehicles depend on each other to communicate and for the secure exchange of the messages. With the improvement in the technology, mainly the vehicles are equipped with Wi-Fi and GPS devices to improve the traffic handling and road safety. But many vehicles may broadcast the bogus messages for their own purpose, so it needs a trustful environment and an effective trust management schemes to prevent the network from the various malicious attacks. Trust establishment is very challenging as the network is highly mobile and vehicles may come in or depart at any time. In this paper, we first discuss the VANET model to describe the environment, and then the trust management schemes to secure the network and lastly the various cryptography fundamentals for the fast and safe message transfer.
Patents are a good information resource for obtaining IoT (Internet of Things) technology development status. Followings illustrate some examples of patents that provide current status of the IoT connected car technology development: safety/collision avoidance, traffic information for smart driving, connected car security, infotainment and self-driving car monitoring.
The trusted Platform module (TPM) is used inside the vehicle and plays a key role to establish trust within the vehicle and also with other vehicles and network infrastructure. In this paper, a protocol is proposed which is based on a property based attestation (PBA) also known as Vehicular Property based attestation Protocol (VPP). In this proposed protocol, it is not based on the properties of the hardware and software of the vehicle; rather it depends on the static or dynamic properties of the system which has been configured. We would expect that the protocol will fulfill the need for a more secure and trusted mechanism for users using the safety and non-safety applications and services in the vehicular network.
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET IJECEIAES
A recent development in the adhoc network is a vehicular network called VANET (Vehicular Adhoc Network). Intelligent Transportation System is the Intelligent application of VANET. Due to open nature of VANET attacker can launch various kind of attack. As VANET messages are deal with very crucial information’s which may save the life of passengers by avoiding accidents, save the time of people on a trip, exchange of secret information etc., because of this security is must be in the VANET. To ensure the highest level of security the network should be free from attackers, there by all information pass among nodes in the network must be reliable i.e. should be originated by an authenticated node. Authentication is the first line of security in VANET; it avoids nonregistered vehicle in the network. Previous research come up with some Cryptographic, Trust based, Id based, Group signature based authentication schemes. A speed of authentication and privacy preservation is important parameters in VANET authentication. This paper addresses the computational analysis of authentication schemes based on ECC. We started analysis from comparing plain ECC with our proposed AECC (Adaptive Elliptic Curve Cryptography) and EECC (Enhanced Elliptic Curve Cryptography). The result of analysis shows proposed schemes improve speed and security of authentication. In AECC key size is adaptive i.e. different sizes of keys are generated during key generation phase. Three ranges are specified for key sizes small, large and medium. In EECC we added an extra parameter during transmission of information from the vehicle to RSU for key generation. Schemes of authentications are evaluated by comparative analysis of time required for authentication and key breaking possibilities of keys used in authentication.
In this Slide, the role of the end user in a vehicular network will be discussed in detail and three levels of trust grades for users will be proposed. It is necessary for secure vehicular communication that the user’s role in the network should be in a positive direction, and other users should take more benefits from this new future technology.
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Dr.Irshad Ahmed Sumra
in this slide, it will discuss two new types of attacks which are called road side traffic signal attack and also Internet attack in vehicular network. The authors will explain an attacker‟s behaviour and how he/she will launch an attack on a road side traffic signal and Internet services and create problems for other users of network. Through different scenarios, it will explain the
effect of these attacks on other components of network.
Security issues and challenges in MANET,VANET and FANET: A SurveyDr.Irshad Ahmed Sumra
VANET and FANET are next generation network and due to safety applications more attractions for end users in these networks. In this slide, it will provide the survey on security issues and challenges in the field of MANET, VANET and FANET. The successful implementation of these networks in real environment, it is require the network will be secure and end user can take benefit from their life safety applications.
VANET is next generation vehicular network and
its applications will be play key to safe human life while journey
on highway. Security is one of the key prominent factors for
implement VANET in real environment.In this survey paper, discuss in detail the various computing methods and illustrate the relationship with vehicular network. Using these computing
methods to secure the vehicular network from attackers and
attacks.
Trust is key part of security and it is undoubtedly a necessity to develop trust in vehicular network. The main aim of this paper is to propose a trust model for vehicular environment. The proposed model contains two different modules.
Hardware plays more important role to provide a security in vehicular environment. In this paper we do comparative study of three basic security hardware modules (Event Data Recorder, Tamper Proof Device and Trusted Platform Module). There are many parameters for selecting the security modules but cost is the most important one. Automotive industry plays vital role to resolve the cost issue and make it easier for commercial users to adopt a new vehicular technology.
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
Road accident and traffic congestion are global issues faced by many countries around the world. Road accident led to fatalities and injuries, while traffic congestion led to inconvenient driving and fuel energy wastage. Vehicular Ad hoc Network (VANET), as part of Intelligent Transportation System (ITS), has the ability to provide safety and non-safety applications to users on roads for safe, reliable and comfort driving. In this paper, propose an integrated multi-level Security model and core purpose of this model is to provide the resiliency against malicious attack and aim to reduce incidents of road accidents, as well as to ease traffic congestion.
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Dr.Irshad Ahmed Sumra
Confidentiality, Integrity and Availability (CIA)
are major components of security goals. The increasing research interest, potential
applications and security problem in VANET lead to the needs to review the
attacks on security goals. In this paper, the aim is to present the survey of attacks on security goals and describe in details the nature of attacks and the behaviour of attackers through different scenarios in the network.
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Dr.Irshad Ahmed Sumra
Availability is one of the key security requirements
in vehicular network.In this slide, we are providing a survey
on the attackers and all possible attacks on the availability
requirement of vehicular network. The main aim of this study is
to describe the threat levels of all possible attacks on the
availability. It has been investigated that each level has its own
priorities. Threats levels and its priorities will be useful to
understand the behavior of attackers and attacks in the
vehicular network.
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has been developed and some possible solutions to overcome the attacks have been discussed.
Safety and non-safety applications of VANET
provides solutions for road accidents in current traffic system.
Security is one of the key research area for successful
implementation of safety and non-safety applications of VANET
in real environment. Trust and Privacy are two major
components of security and dynamic topology and high mobility
of vehicles make it more challenging task for end users in
network.
In this paper, we present the Vehicular ad hoc network (VANET) Security R&D Ecosystem is discussed. The R&D Ecosystem can be divided into four major aspects i.e. academic research, car manufacturers, government authorities, and end users. Each aspect is discussed in detail that we hope may help in successful implementation of VANET.
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationDr.Irshad Ahmed Sumra
Security is one of the most important factors in a
vehicular network due to the open wireless medium and
penitential safety and non safety applications. An attacker is the
key entity which generates different types of attacks in a life
saving vehicular network.In this paper, we
have studied the behavior of attackers in VANET.
In timing attacks, the users receive multiple copies of same message in different time slots, which pose data redundancy issues. Cases of redundancy of data such as this are mainly due to timing attack.
Vehicular Ad hoc Network (VANET) needs security to implement the wireless environment and serves users with safety and non safety applications. Attackers generate different attacks in this life saving vehicular network. In this paper, we propose five different classes of attacks and every class is expected to provide better perspective for the VANET security. The main contribution of this paper is the proposed solution for classification and identification of different attacks in VANET.
Vehicular Ad hoc Network (VANET) is a special kind of network that focuses on the safety of users and to reduce the accidents. VANET provides many potential applications that are used to fulfill basic user safety requirements. In this paper, we have proposed the user requirements model, the objective of this model is to describe the relationship with VANET potential applications and the basic users' requirements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Leading Change strategies and insights for effective change management pdf 1.pdf
VANET Security and Trust
1. Dr. IA . Sumra
V TEA N
New Card Based Scheme to Ensure Security and Trust
in Vehicular Communications
2. Introduction
Authentication Requirement in VANET
Related Work
Trusted Security Module in VANET
Proposed Card-based Scheme
Conclusion
References
Q&A
2
3. Vehicular ad-hoc network is a special kind of network in which nodes
(Vehicles) can communicate with each other on the road and with its
Infrastructure.
Road Side Unit (RSU)
V2VV2V
Basic VANET Architecture
3
V2I
4. Safety Applications
Non Safety Applications
Work
in Progress
Plz! use Alt.
route
Work Zone
Warning:!!!
Work Zone
Warning:!!!
Shopping MALL
Parking Slot
Available!!!
RSU Parking Slot
Available!!!
4
7. “an entity can be trusted if it always behaves in the expected
manner for intended purpose”.
all components of the network (vehicles and infrastructure) are
behaving in an
expected manner
(secure communication between the components) and serve the
users and save human lives.
Attacker
Change
the
behavior
7
8. Authentication is an open issue and key security requirement in vehicular
network and all applications are required to be authenticated.
Authentication is needed for most tasks for sending critical messages to other
vehicle or getting some services from the network.
Authentication is required in two different cases.
if users send or receive safety messages in network, it should be
authenticated first by a valid user.
when user needs any service from service providers (SP), they should check
the user information from its own billing server which later charges the users
for the use of any sort of services/resources.
8
9. Authentications types in VANET
Message Authentication
Broadcast Message Authentication
Pairwise Message Authentication
GroupWise Message Authentication
Vehicle Authentication
Road Side Unit (RSU) Authentication
Authentication requirement for Business Transaction
Prepaid Package
Post-paid Package
9
10. Trusted Platform module (TPM) is a hardware
chip and it is the core component of the Trusted
Computing Group (TCG).
TPM provides cryptographic functions, secures
storage of secret data and provides the basis to
fulfil major security requirements.
10
11. Low Cost
TPM is a low cost security module as compared to temper proof device (TPD)
Resist Software Attacks
TPM can resist software attacks but it cannot control hardware
tempering.
Ownership
TPM_takeownership command creates ownership of the
vehicle. Whenever user buys new vehicle, the authority will
assign it to be the owner of that particular vehicle. When the
vehicle is sold out then we need to change ownership to the
new user.
Cryptographic Functions: TPM provides cryptographic function
and also ensures the data integrity in the network through
cryptographic components (SHA-1 Engine, RSA and Random
Number Generator).
Root of Trust
Root of trust for measurement (RTM)
Root of trust for Reporting (RTR)
Root of Trust for Storage (RTS)
11
12. Authentication is more complex task in vehicular network compared to any fixed network
due to dynamic nature of its topology. Our scheme is based on fixed infrastructure which
is called vehicular Service Providers (VSP).
VSP issues secret cards with different time durations like one month, two month, and six
month. When the users need to do is only to enter a 16 digits secret code into the vehicle
unit and then communicate with vehicular Service Providers server.
The VSP server will verify the secret code through an integrity verification process and
after verification has been completed, it will activate the PCA at the user vehicle to
generate certificates for some specific time duration.
Objective of this propose scheme to solve the problem of authentication and users should
be authentic while they join network on road and taking services.
Proposed Card Based Scheme12
13. First 8 digit uses for PCA is taken from a smart card inserted to the
vehicle unit by this way, we eliminate the need for connecting with the
PCA and sending request for certificate and key for singing the messages.
In this scenario, a vehicle A signs a message with TPM signing (SK) key,
attach valid AIK certificate and signature inside the VPS security tag and
broadcast this message to other vehicles.
Every other vehicle checks this message that comes with security VPS
tag. If VPS tag is exist with message, its means this message is secure and
properly signs with TPM signing key (SK).
Every time TPM generates one signing key and sends request to storage
area for AIK certificate. By frequently changing the signing key and AIK, it
maintains the security in the system.
8 Digits
XXXXXXXXYYYYYYYY
8 Digits
Vehicle
VSP
VSP
Server
Secret 16 digits
Code
Billing
Server
PCA
Billing Keys Storage
Area
TPM
Backbone Network
Process mechanism of Card-based Scheme
16 digit secret codes
First Part Second Part
13
14. shows the authentic warning message with security tag.
Because of the VPS signature certificate, it can be seen
that it would be difficult for an attacker to change the
security tag.
shows how an ideal secure and trusted communication
between the vehicles would take place using the proposed
scheme.
Message
VPS
Signature Certificate
Safety message with VPS Security Tag
Secure communication between the vehicles
First Part
14
15. Next 8 digit secret codes is used for business related applications such as
taking some services and paying money for these services like telephone
and internet services on road.
vehicle A sends request for internet access on road, so authentication and
billing sever authenticates the user together with its billing information.
After that the VPS server gathers some more parameters such as speed,
position and direction of the requesting vehicle.
If the user of the vehicle fulfils all requirements, the VSP server provides
required road services. Another vehicle C may also sends request for any
other services, and the same procedure will be followed for serving the
required services.
Second Part
RSU
Authentication &
Billing Server
B
A
C
Web
Server
Other
services
E
D
Authentication in Business Communication15
16. It is based on card which has 16 digit secret code that
provides security based on trusted platform module (TPM)
for signing safety messages and for business transactions.
The storage area is proposed inside vehicle for saving
security keys and billing information. It eliminates the
dependency on external storage device(memory stick) that
should not use for the storage of users information.
Users do not depend on external party for authentication
in dynamic topology vehicular communication network.
Message tag contains signature and certificate that make
difficult for attackers to alter the tag.
proposed scheme is based on TPM and it is low cost
security device and develop the chain of trust in vehicular
network.
16
17. Security and trust are two main users’ requirements for
trusted vehicular network.
In vehicular communications, when user receives any
safety message, it should be authentic, and that the
requesting source is valid.
In vehicular communications, when user receives any
safety message or non safety message, it should be
authentic.
Authentication is require for sending and messages and
also for business transaction.
Proposed scheme are based on TPM and provides user
authentication requirement in network while
communicating with other vehicle and also taking service
from any service providers.
We hope proposed scheme will be helpful for solving the
problem of authentication in high speed vehicular
environment.
17
19. 19
Send email: isomro28@gmail.com
Please download complete paper
IEEEE website
ResearchGate
Video Available on given link:-
https://www.youtube.com/watch?v=0SBlL8hM_I4