Download presentation
Presentation is loading. Please wait.
1
VANET
2
Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called “Vehicular Ad Hoc Network”. -Vehicular ad hoc networks (VANETs) are a subgroup of mobile ad hoc networks (MANETs). -It includes V2V communications and V2R communications and is important component of ITS. -Nodes are expected to communicate by means of North American DSRC standard that employs the IEEE p standard for wireless communication.
3
It provides comfort and commercial applications to the road users.
Continued.. Vehicular Ad Hoc Network (VANET) provides wireless communication among vehicles and vehicle to road side equipment's. It provides comfort and commercial applications to the road users. Figure : Working structure of VANET
4
Why VANET Increase traveler safety
10.8 million vehicle crashes from 1990 to 2009 36,000 fatalities in 2009 only 24,000 Deaths due to collision with other vehicles / objects. Waste Oil around $100 billion per year Boost on-board luxury
5
VANET
6
ARCHITECTURE Road Side Unit (RSU) V2R V2V
Server (Location Based Service) Server (Traffic Monitoring)
8
Applications of VANET
9
Security in VANETs When data is compromised, the whole system suffers.
The nature of VANETs could lead to malicious attacks. Predictable movement of nodes. High mobility of victim/attacker. Adversaries could break the system. Data sinkholes (black hole) Feed false information. Sybil attacks. Flood the system. Security measures must be taken to avoid malicious attacks on the system. Security in VANETs
10
Threats in VANET Threats to Availability Threats to Authentication
Threats to driver’s Confidentiality
11
Threats to Availability
12
Black Hole Problem Fig. Black Hole Problem Fig. Black Hole Problem
13
Threats to Authentication
14
Threats to Confidentiality
Because VANET mobility is higher than MANET, routing with capability of ensuring security in VANET is more problematic than Ad-hoc. Illegal collection of messages by eavesdropping and gathering of location information available through the transmission of broadcast messages. Location privacy and anonymity are important issues for vehicle users . Threats to Confidentiality Fig. Black Hole Problem
15
Challenges in VANETs Mobility Volatility Privacy VS Authentication
Privacy VS Liability Network Scalability Challenges in VANETs
16
Security Requirements
Message authentication and integrity. Message non-repudiation. Node authentication. Access control. Message confidentiality. Availability Accountability. Privacy protection.
17
Authentication Every message must be authenticated to make sure its origin and to control authorization level of the vehicles Vehicles sign messages with their private keys along with digital certificate Digital signature causes an overhead. To reduce this overhead ECC (Elliptic Curve Cryptography) can be used Fig. Black Hole Problem
18
Availability - Vehicular network must be available all the time, in real-time - A delay in seconds for some applications will make the message meaningless and maybe the result will be devastating - Attempting to meet real-time demands makes the system vulnerable to the DoS attack.
19
Accountability/Non-repudiation
Non-repudiation will facilitate the ability to identify the attackers even after the attack happens. This prevents cheaters from denying their crimes. Accountability is related to the ability to provide necessary evidence to show how each party involves in the communications. Any information related to the car, e.g. the trip route, speed, time, any violation will be stored in a tamper-proof OBU, any official side holding authorization can retrieve this data.
20
Privacy Keeping the information of the drivers away from unauthorized observers, this information like real identity, trip path, speed etc. The privacy could be achieved by using temporary (one-time) keys. Keys are stored in the tamper-proof OBU. The keys will be reloaded in next time that the vehicle makes an official checkup.
21
Continued.. For preserving the real identity of the driver, an ELP (Electronic License Plate) is used, this license is installed in the factory for every new vehicle, it provides an identification number for the vehicle, to identify the vehicle in anywhere, with the RFID technology to hold the ELP. In case when the police or any official wants the real identity, it can take an order from the judge to recover the identity of specific vehicles ELP.
22
Secure Routing Requirements
Keeping the information of the drivers away from unauthorized observers, this information like real identity, trip path, speed etc. The privacy could be achieved by using temporary (one-time) keys. Keys are stored in the tamper-proof OBU. The keys will be reloaded in next time that the vehicle makes an official checkup.
23
Continued.. For preserving the real identity of the driver, an ELP (Electronic License Plate) is used, this license is installed in the factory for every new vehicle, it provides an identification number for the vehicle, to identify the vehicle in anywhere, with the RFID technology to hold the ELP. In case when the police or any official wants the real identity, it can take an order from the judge to recover the identity of specific vehicles ELP.
24
THANK YOU you can find us at queries@thesisscientist.com
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.