Security Infrastructure in VANETs - PowerPoint PPT Presentation

1 / 13
About This Presentation
Title:

Security Infrastructure in VANETs

Description:

Traffic Optimisation. Secure Transactions. Time Criticality. Need for Security ... Time and Location from GPS. CoS. Criteria to accept and drop messages ... – PowerPoint PPT presentation

Number of Views:685
Avg rating:3.0/5.0
Slides: 14
Provided by: genieIi
Category:

less

Transcript and Presenter's Notes

Title: Security Infrastructure in VANETs


1
Security Infrastructure in VANETs
  • Ashwin Rao
  • 2006ANY7513
  • Supervisor Dr. Arzad A. Kherani

2
Introduction
  • Vehicular Ad hoc Networks (VANETs)
  • Vehicle to Vehicle (V2V)
  • Vehicle to Infrastructure (V2I).
  • Different from traditional ad hoc networks
  • Mobility at very high speeds
  • Applications
  • Early Warning Messages
  • Traffic Optimisation
  • Secure Transactions
  • Time Criticality

3
Need for Security
  • Authentication
  • Distinguish - Malicious and Genuine nodes
  • Availability of Info. needed to Authenticate
  • Anonymity
  • Right to privacy
  • Integrity
  • Data received without any modifications.
  • Low Overheads
  • Overheads should retain usefulness

4
1609.x Protocol Suite
  • Application Class ID
  • Application Context Mark
  • Certificates CRLs
  • Neighbour Information
  • Priority queues for channel contention.

5
Current Scenario
  • Anonymity multiple certificates
  • Data Integrity Authentication using EDSA
  • Sha224 or Sha256 for hash
  • NIST224 or NIST256 for curve values
  • PKI Organisation CRL distribution mechanism
    absent in standard
  • Time and Location from GPS

6
CoS
  • Criteria to accept and drop messages
  • CoS Confidence in Security Infrastructure
  • Freshness of Certificates
  • Complements honest majority
  • Cost overheads
  • Freshness of CRLs
  • Penetration Capacity of CRL Information
  • CoS dependent on Security Infrastructure
  • Performance dependent on CoS

7
Factors Affecting Design Of Security
Infrastructure
  • Storage capacity on OBU
  • Limits max no. of CRLs in OBU
  • Life time of certificates
  • Relocation Model and Mobility model
  • Interaction with vehicles
  • CRL distribution
  • More vehicles per CA, more information to
    propagate.

8
Organisation of Security Infrastructure
  • One CA for all
  • Manufacturer Based
  • A manufacturer or a representative of
    manufacturers
  • Geographical
  • One CA for all regions
  • Each region has different CA
  • CA represents a set of regions

9
Future Work
  • Analysis of different Security Infrastructure
    mechanisms
  • Impact on CoS
  • Impact on Performance
  • Simulations to support theoretical results

10
Conclusion
  • Robust Security Infrastructure equally important
    for effective security.

11
Thank You
12
Some Questions
  • Anonymity at the MAC Layer
  • Deciding channel for communication
  • Role of WBSS, Ipv6, TCP and UDP
  • Abstract essentials for initial simulations

13
Simulators to Use
  • GrooveNet - CMU
  • TraNS EPFL (built on ns)
Write a Comment
User Comments (0)
About PowerShow.com