Securing Vehicular Communications CSCE 790 Wireless Networking - Spring’08 Presented: April 15, 2008 University of South Carolina Sharaf J. Malebary.

Slides:



Advertisements
Similar presentations
Challenges in Securing Vehicular Networks
Advertisements

FACULTY OF ENGINEERING & INFORMATION TECHNOLOGIES Interference-Aware Message Forwarding for Vehicular Networks Centre for Distributed and High Performance.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Survey of Vehicular Network Security Jonathan Van Eenwyk.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
BILL WHITE Presents… VEHICULAR NETWORKING: A SURVEY AND TUTORIAL ON REQUIREMENTS, ARCHITECTURES, CHALLENGES, STANDARDS, AND SOLUTIONS GEORGIO KARAGIANNIS.
Delay bounded Routing in Vehicular Ad-hoc Networks Antonios Skordylis Niki Trigoni MobiHoc 2008 Slides by Alex Papadimitriou.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Smart city for VANETs using warning messages, traffic statistics and intelligent traffic lights (2012 Intelligent Vehicles SymposiumAlcalá de Henares,
Connected Vehicles AASHTO Annual Meeting | October 17, 2013 | Denver, CO Mike Cammisa Director, Safety Association of Global Automakers.
ITS Joint Program Office 62 nd Illinois Traffic Engineering and Safety Conference October 24, 2013 Walton Fehr.
FGDC Coordinaton Group Connected Vehicles & Digital Infrastructure Carl K. Andersen U.S. Department of Transportation Federal Highway Administration 21.
SUCCESSIVE INTERFERENCE CANCELLATION IN VEHICULAR NETWORKS TO RELIEVE THE NEGATIVE IMPACT OF THE HIDDEN NODE PROBLEM Carlos Miguel Silva Couto Pereira.
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
Secure Vehicle Communication 1 Secure Vehicular Communications Workshop Lausanne. February 1st/2nd 2006 Hosted by EFPL Antonio Kung SEVECOM Project Co-ordinator.
InVANET(Intelligent Vehicular Ad Hoc Network
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
University1 GVGrid: A QoS Routing Protocol for Vehicular Ad Hoc Networks Weihua Sun, Hirozumi Yamaguchi, Koji Yukimasa, Shinji.
1 Credentials Revocation in Vehicular Networks: Design & Evaluation Ghita Mezzour Panos Papadimitratos.
1 Measure and model vehicular- to-infrastructure communication.
VITP and CARS: A Distributed Service Model and Rate Adaptation for VANETs Liviu Iftode Department of Computer Science Rutgers University.
Wireless Sensor Network Security Anuj Nagar CS 590.
TEMPLATE DESIGN © Privacy Issues of Vehicular Ad-hoc Networks (VANETs) Hang Dok and Ruben Echevarria Advisor: Dr. Huirong.
Secure pseudonym generation for efficient broadcast authentication in VANETs Deepak N Ananth and Manjusha Gadiraju CSC / ECE 774.
Cooperative crash prevention using human behavior monitoring Susumu Ishihara*† and Mario Gerla† (*Shizuoka University / †UCLA) Danger ! ! !
M-Commerce and the Future of Communication in Relationship to Vehicular Networks ISYM 540 – Current Topics Week One – Business Issues Keneth R. Rhodes.
Secure Local Data Aggregation and Delay Tolerant Dissemination in VANETs.
IntelliDrive Policy and Institutional Issues Research Valerie Briggs Team Lead, Knowledge Transfer and Policy, ITS Joint Program Office, RITA May 4, 2010.
Privacy Issues in Vehicular Ad Hoc Networks.
National VII Architecture – Data Perspective Michael Schagrin ITS Joint Program Office US Department of Transportation TRB 2008 Annual Meeting Session.
Intelligent Transportation System (ITS) ISYM 540 Current Topics in Information System Management Anas Hardan.
SAT: Situation Aware Trust Architecture for Vehicular Networks Xiaoyan Hong, Univ of Alabama Dijiang Huang, Arizona State Univ Mario Gerla, UCLA Zhen Cao,
Cooperation in Autonomous Vehicular Networks Sidi Mohammed Senouci, Abderrahim Benslimane, Hassnaa Moustafa WILEY Publisher 1.
HYBRID ROUTING PROTOCOL FOR VANET
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
2. Survey of VANETs A Tutorial Survey on Vehicular Ad Hoc Networks
Eric Eiswerth Safety Research Project Manager FORD AUTOMOTIVE SAFETY OFFICE 2011 AASHTO Annual Meeting The Vehicle of the Future: Greener, Safer, Smarter.
A Traffic Chaos Reduction Approach for Emergency Scenarios A Traffic Chaos Reduction Approach for Emergency Scenarios Syed R. Rizvi †, Stephan Olariu †,
Slide title minimum 48 pt Slide subtitle minimum 30 pt Its challenges and the future internet René Rembarz Technology & Business lab Ericsson eurolab,
Mike Schagrin US Department of Transportation ITS Joint Program Office IntelliDrive Safety Program Overview.
A Security Architecture Concept for Vehicular Network Nodes 蔡嘉翔 許閔傑.
Doc.: IEEE /875r1 Submission Hyun Seo Oh, ETRI July 2008 Slide 1 Radio Transmission Technology for V2V/V2I Applications Date: Authors:
V2V and V2I communication: SODIT experimentation Jean-Jacques HENRY President, SODIT 11 September,2010 SODIT (Société pour le Développement and l’Innovation.
Small-Scale and Large-Scale Routing in Vehicular Ad Hoc Networks Wenjing Wang 1, Fei Xie 2 and Mainak Chatterjee 1 1 School of Electrical Engineering and.
IntelliDriveSM Update
Potential Consequences of an Executive Order vs. Sample Law to Ban Texting Greg Fitch, Ph.D. Senior Research Associate Virginia Tech Transportation Institute.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
TDMA Slot Reservation in Cluster-Based VANET Ph.D. Gathering By Mohammad S. Almalag Advisor Michele C. Weigle Department of Computer Science Old Dominion.
Research on the Connected Car Hans-J. Reumerman Philips Technology Research Laboratories Aachen Connectivity Systems Application Industry relations Technology.
BY PREETHI.E. * For people living in developed countries the absolute volume of road traffic can be a daily nuisance. In addition, the road traffic.
Doc.: IEEE /0361r0 Submission Hyun Seo Oh, ETRI March 2008 Slide 1 March 2008 Slide 1 WAVE Enhancement Technologies Date: Authors:
1 Vehicular Networks Slides are integrated from researchers at EPFL.
Challenge: Peers on Wheels – A Road to New Traffic Information Systems Jedrzej Rybicki, Björn Scheuermann, Wolfgang Kiess Christian Lochert, Pezhman Fallahi,
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
Eyal Hamo Berry Shnaider בס " ד 1.
1 DIVYA K 1RN09IS016 RNSIT. 2 The main purpose in car-to-car networks is to improve communication performance. To demonstrate real scenarios with car-to-car.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
ARTEMIS Industry Association Title Presentation - 1 ASP 6 Report by: Sandro Etalle
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
Koji Nakao, Dai Arisue NICT, Japan
VANET.
Adaptable safety and security in v2x systems
Project: IEEE P Interest Group for Wireless Personal Area Networks (WPANs) Submission Title: ITS OCC system based vehicle-to-vehicle communication.
Accelerating the Introduction of
WAVE Enhancement Technologies
Norfolk State University Department of Computer Science Colloquium
Developing Vehicular Data Cloud Services in the IoT Environment
Presentation transcript:

Securing Vehicular Communications CSCE 790 Wireless Networking - Spring’08 Presented: April 15, 2008 University of South Carolina Sharaf J. Malebary

6/11/2015CSCE 7152 CONTENT: 1. Introduction & background. 2. Goals. 3. Vulnerabilities. 4. Challenges. 5. Attackers. 6. Sec. architecture. 7. Future & related work & CA. 8. Questions & Answers.

6/11/2015CSCE DEFINITIONS: VANET – Vehicular Ad-Hoc Network

6/11/2015CSCE 7154 INTRO TO VANET

6/11/2015CSCE 7155 INTRO TO VANET

6/11/2015CSCE 7156 INTRO TO VANET

6/11/2015CSCE 7157 VANET APPLICATIONS

6/11/2015CSCE VANET APPLICATIONS Intersection Collision warning Stop Signal violation warning

6/11/2015CSCE 7159 VANET APPLICATIONS V2V Hazard Warning

6/11/2015CSCE VANET APPLICATIONS V2I Hazard Warning

6/11/2015CSCE VANET APPLICATIONS

6/11/2015CSCE VANET APPLICATIONS Adaptive Drivetrain Management

6/11/2015CSCE VANET APPLICATIONS Electronic toll payment

6/11/2015CSCE VANET APPLICATIONS

6/11/2015CSCE VANET APPLICATIONS Software update

6/11/2015CSCE VANET APPLICATIONS Parking spot locator

6/11/2015CSCE VANET APPLICATIONS Instant Messaging (between vehicles)

GOALS Some Applications (safety, traffic efficincy, driver assist. And infotainment) VC is a double edged sword? What is the paper about? 6/11/2015CSCE 71518

6/11/2015CSCE Vulnerabilities: Jamming

6/11/2015CSCE Spectrum Jamming

6/11/2015CSCE A jammer may remain quiet when there is no activity on the network, and start interference as soon as it detects a transmission. Jamming Attack Scenario:

6/11/2015CSCE Vulnerabilities: Forgery

6/11/2015CSCE Vulnerabilities: Intransit TT

6/11/2015CSCE Vulnerabilities: Impersonation

6/11/2015CSCE Vulnerabilities: Privacy Violation

6/11/2015CSCE Vulnerabilities: On-board Tampering SLOW DOWN The way is clear Similar attack: stop a highway

6/11/2015CSCE Challenges:

6/11/2015CSCE Network Volatility Network Scale Delay Sensitive app. Liability VS. Privacy Heterogeneity

6/11/2015CSCE ATTACKERS Who are they?

6/11/2015CSCE ATTACKERS Who are they? Greedy Drivers

6/11/2015CSCE ATTACKERS Who are they? Industrial insiders

6/11/2015CSCE ATTACKERS Who are they? Malicious attackers

6/11/2015CSCE ATTACKERS Who are they? Pranksters

6/11/2015CSCE Security Architecture: Over View

6/11/2015CSCE Security Architecture: Security HW.VPK Infrastr.Authentication Cert. Revocation Privacy Security HW.

6/11/2015CSCE 71536

6/11/2015CSCE 71537

6/11/2015CSCE 71538

6/11/2015CSCE 71539

Certificates issue: 6/11/2015CSCE 71540

6/11/2015CSCE FUTURE WORK

6/11/2015CSCE THANK YOU

Guys if any one has a question please ask, else I am going to ask you about what I just present 6/11/2015CSCE 71543

6/11/2015CSCE REFERENCES: In this presentation graphical images and schemes were used from the sources as follows: [1] F. Kargl. Vehicular Communications and VANETsVehicular Communications and VANETs [2] M. Weigle. Introduction to Vehicular NetworksIntroduction to Vehicular Networks [3] M. Torrent-Moreno, H. Hartenstein. Current View on VANETs (Safety, Fairness and Fading ) October 14th 2005.Current View on VANETs (Safety, Fairness and Fading ) [4] Car-to-Car Communication Stephan Eichler, Christoph Schroth, Jörg Eberspächer [5] Google Images [6] the slides were taking from a classmate who present for 727, then they were updated and adjusted by me.