Securing Vehicular Communications CSCE 790 Wireless Networking - Spring’08 Presented: April 15, 2008 University of South Carolina Sharaf J. Malebary
6/11/2015CSCE 7152 CONTENT: 1. Introduction & background. 2. Goals. 3. Vulnerabilities. 4. Challenges. 5. Attackers. 6. Sec. architecture. 7. Future & related work & CA. 8. Questions & Answers.
6/11/2015CSCE DEFINITIONS: VANET – Vehicular Ad-Hoc Network
6/11/2015CSCE 7154 INTRO TO VANET
6/11/2015CSCE 7155 INTRO TO VANET
6/11/2015CSCE 7156 INTRO TO VANET
6/11/2015CSCE 7157 VANET APPLICATIONS
6/11/2015CSCE VANET APPLICATIONS Intersection Collision warning Stop Signal violation warning
6/11/2015CSCE 7159 VANET APPLICATIONS V2V Hazard Warning
6/11/2015CSCE VANET APPLICATIONS V2I Hazard Warning
6/11/2015CSCE VANET APPLICATIONS
6/11/2015CSCE VANET APPLICATIONS Adaptive Drivetrain Management
6/11/2015CSCE VANET APPLICATIONS Electronic toll payment
6/11/2015CSCE VANET APPLICATIONS
6/11/2015CSCE VANET APPLICATIONS Software update
6/11/2015CSCE VANET APPLICATIONS Parking spot locator
6/11/2015CSCE VANET APPLICATIONS Instant Messaging (between vehicles)
GOALS Some Applications (safety, traffic efficincy, driver assist. And infotainment) VC is a double edged sword? What is the paper about? 6/11/2015CSCE 71518
6/11/2015CSCE Vulnerabilities: Jamming
6/11/2015CSCE Spectrum Jamming
6/11/2015CSCE A jammer may remain quiet when there is no activity on the network, and start interference as soon as it detects a transmission. Jamming Attack Scenario:
6/11/2015CSCE Vulnerabilities: Forgery
6/11/2015CSCE Vulnerabilities: Intransit TT
6/11/2015CSCE Vulnerabilities: Impersonation
6/11/2015CSCE Vulnerabilities: Privacy Violation
6/11/2015CSCE Vulnerabilities: On-board Tampering SLOW DOWN The way is clear Similar attack: stop a highway
6/11/2015CSCE Challenges:
6/11/2015CSCE Network Volatility Network Scale Delay Sensitive app. Liability VS. Privacy Heterogeneity
6/11/2015CSCE ATTACKERS Who are they?
6/11/2015CSCE ATTACKERS Who are they? Greedy Drivers
6/11/2015CSCE ATTACKERS Who are they? Industrial insiders
6/11/2015CSCE ATTACKERS Who are they? Malicious attackers
6/11/2015CSCE ATTACKERS Who are they? Pranksters
6/11/2015CSCE Security Architecture: Over View
6/11/2015CSCE Security Architecture: Security HW.VPK Infrastr.Authentication Cert. Revocation Privacy Security HW.
6/11/2015CSCE 71536
6/11/2015CSCE 71537
6/11/2015CSCE 71538
6/11/2015CSCE 71539
Certificates issue: 6/11/2015CSCE 71540
6/11/2015CSCE FUTURE WORK
6/11/2015CSCE THANK YOU
Guys if any one has a question please ask, else I am going to ask you about what I just present 6/11/2015CSCE 71543
6/11/2015CSCE REFERENCES: In this presentation graphical images and schemes were used from the sources as follows: [1] F. Kargl. Vehicular Communications and VANETsVehicular Communications and VANETs [2] M. Weigle. Introduction to Vehicular NetworksIntroduction to Vehicular Networks [3] M. Torrent-Moreno, H. Hartenstein. Current View on VANETs (Safety, Fairness and Fading ) October 14th 2005.Current View on VANETs (Safety, Fairness and Fading ) [4] Car-to-Car Communication Stephan Eichler, Christoph Schroth, Jörg Eberspächer [5] Google Images [6] the slides were taking from a classmate who present for 727, then they were updated and adjusted by me.