Download presentation
Presentation is loading. Please wait.
1
Securing Vehicular Communications CSCE 790 Wireless Networking - Spring’08 Presented: April 15, 2008 University of South Carolina Sharaf J. Malebary
2
6/11/2015CSCE 7152 CONTENT: 1. Introduction & background. 2. Goals. 3. Vulnerabilities. 4. Challenges. 5. Attackers. 6. Sec. architecture. 7. Future & related work & CA. 8. Questions & Answers.
3
6/11/2015CSCE 7153 1. DEFINITIONS: VANET – Vehicular Ad-Hoc Network
4
6/11/2015CSCE 7154 INTRO TO VANET
5
6/11/2015CSCE 7155 INTRO TO VANET
6
6/11/2015CSCE 7156 INTRO TO VANET
7
6/11/2015CSCE 7157 VANET APPLICATIONS
8
6/11/2015CSCE 7158 3. VANET APPLICATIONS Intersection Collision warning Stop Signal violation warning
9
6/11/2015CSCE 7159 VANET APPLICATIONS V2V Hazard Warning
10
6/11/2015CSCE 71510 VANET APPLICATIONS V2I Hazard Warning
11
6/11/2015CSCE 71511 VANET APPLICATIONS
12
6/11/2015CSCE 71512 3. VANET APPLICATIONS Adaptive Drivetrain Management
13
6/11/2015CSCE 71513 3. VANET APPLICATIONS Electronic toll payment
14
6/11/2015CSCE 71514 VANET APPLICATIONS
15
6/11/2015CSCE 71515 VANET APPLICATIONS Software update
16
6/11/2015CSCE 71516 VANET APPLICATIONS Parking spot locator
17
6/11/2015CSCE 71517 VANET APPLICATIONS Instant Messaging (between vehicles)
18
GOALS Some Applications (safety, traffic efficincy, driver assist. And infotainment) VC is a double edged sword? What is the paper about? 6/11/2015CSCE 71518
19
6/11/2015CSCE 71519 Vulnerabilities: Jamming
20
6/11/2015CSCE 71520 Spectrum Jamming
21
6/11/2015CSCE 71521 A jammer may remain quiet when there is no activity on the network, and start interference as soon as it detects a transmission. Jamming Attack Scenario:
22
6/11/2015CSCE 71522 Vulnerabilities: Forgery
23
6/11/2015CSCE 71523 Vulnerabilities: Intransit TT
24
6/11/2015CSCE 71524 Vulnerabilities: Impersonation
25
6/11/2015CSCE 71525 Vulnerabilities: Privacy Violation
26
6/11/2015CSCE 71526 Vulnerabilities: On-board Tampering SLOW DOWN The way is clear Similar attack: stop a highway
27
6/11/2015CSCE 71527 Challenges:
28
6/11/2015CSCE 71528 Network Volatility Network Scale Delay Sensitive app. Liability VS. Privacy Heterogeneity
29
6/11/2015CSCE 71529 ATTACKERS Who are they?
30
6/11/2015CSCE 71530 ATTACKERS Who are they? Greedy Drivers
31
6/11/2015CSCE 71531 ATTACKERS Who are they? Industrial insiders
32
6/11/2015CSCE 71532 ATTACKERS Who are they? Malicious attackers
33
6/11/2015CSCE 71533 ATTACKERS Who are they? Pranksters
34
6/11/2015CSCE 71534 Security Architecture: Over View
35
6/11/2015CSCE 71535 Security Architecture: Security HW.VPK Infrastr.Authentication Cert. Revocation Privacy Security HW.
36
6/11/2015CSCE 71536
37
6/11/2015CSCE 71537
38
6/11/2015CSCE 71538
39
6/11/2015CSCE 71539
40
Certificates issue: 6/11/2015CSCE 71540
41
6/11/2015CSCE 71541 7. FUTURE WORK
42
6/11/2015CSCE 71542 THANK YOU
43
Guys if any one has a question please ask, else I am going to ask you about what I just present 6/11/2015CSCE 71543
44
6/11/2015CSCE 71544 REFERENCES: In this presentation graphical images and schemes were used from the sources as follows: [1] F. Kargl. Vehicular Communications and VANETsVehicular Communications and VANETs [2] M. Weigle. Introduction to Vehicular NetworksIntroduction to Vehicular Networks [3] M. Torrent-Moreno, H. Hartenstein. Current View on VANETs (Safety, Fairness and Fading ) October 14th 2005.Current View on VANETs (Safety, Fairness and Fading ) [4] Car-to-Car Communication Stephan Eichler, Christoph Schroth, Jörg Eberspächer [5] Google Images [6] the slides were taking from a classmate who present for 727, then they were updated and adjusted by me.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.