Title: Effects of Attackers and Attacks on Availability Requirement in Vehicular Network: A Survey
1Effects of Attackers and Attacks on Availability
Requirement in Vehicular Network A Survey
2Introduction
- Vehicular ad-hoc network is a special kind of
network in which nodes (Vehicles) can communicate
with each other on the road and with its
Infrastructure.
V2I
2
3VANET Applications
- Safety Applications
- Non Safety Applications
Work Zone Warning!!!
Work Zone Warning!!!
Work in Progress Plz! use Alt. route
Shopping MALL ( TESCO )
Parking Slot Available!!!
Parking Slot Available!!!
RSU
3
4VANET Security Requirements
- Vehicular network applications require security
and the objective of these applications is to
serve users and make their journey secure and
comfortable. - Attackers have their own role in this network and
we cannot predict the dynamic behavior of the
attacker. If an attacker works on a safety
application and changes the content of the safety
message then it poses a very difficult condition
on the road and many users will be affected due
to this kind of attack. - Accidents are often the result of an alteration
of any safety message or the sending of even one
wrong safety message in a network and many human
lives are at risk 1.
5TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
6TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
7AVAILABILITY REQUIREMENT IN VANET
- Availability is one of the hot research topics in
vehicular communication. The purpose of a
vehicular network is to serve the users. But if
the network is not available for communication
then the main goal of the network has become - useless.
- If an accident happens in location X and the user
sends this information to another vehicle but the
channel is not available due to a DoS attack,
this makes availability of network a significant
factor.
8SECURITY REQUIREMENTS WITH SAFETY APPLICATIONS
9ATTACKERS AND ATTACKS ON AVAILABILITY IN VANET
10A.DENIAL OF SERVICE (DOS) ATTACK IN VANET
- In VANET, DOS shall not be allowed to happen,
where seamless life critical information must
reach its intended destination securely and
timely. In summary, there are three ways the
attackers may achieve DOS attacks. - There are three levels of DOS attacks as
described below. - Basic Level Overwhelm the Node Resources
- Extended Level Jamming the Channel
11A. DENIAL OF SERVICE (DOS) ATTACK IN VANET
- Drop Communication Packets
- It is also called network DoS attack, selfish
node or malicious node drop communication packets
in network. This is also one of the aspects
related to behavior of an attacker in which an
attacker just drops the packets the purpose of
this is to ensure that users do not perform any
type of communication in the network.
12B. Distributed Denial of Service (DDoS) Attack
13C- Broadcast Tampering Attack
- In this case, an attacker tampers with the
broadcast safety message and possibly injects
false safety message. The purpose of this is to
cause road accidents or change the flow of
traffic on some specific route.
14D- Malware Attack
- A vehicle has its own software and application
unit (AU) which performs its own task and
communicates with other users as well as the road
side unit (RSU). - There is some possibility to enter a virus and
worm into the vehicle and disturb the operation
of the network.
15E- Spamming Attack
- In this situation, the sole purpose of the
attacker is to increase the latency of the
transmission and use up the bandwidth of the
network so no service is available to other - users this is achieved by sending spam messages
through the network. - It is nearly impossible to control attacks of
this type when there is no basic infrastructure
or centralized administration available.
16F- Black Hole Attack
- Blackhole is a different kind of attack and there
are two possible cases in any particular
vehicular network. - When any new user wants to start communication
with other users or simply participate in a
network, then other users simply refuse it. In
Fig. 11, user D wants to start communication with
user X, but user X refuses it and simply sends a
reply with SORRY. So now user D tries To
communicate with any other user of that network. - One user starts communication with other users of
the network and it is suddenly dropped out of the
communication.
17ATTACKS ON AVAILABILITY WITH THREAT LEVELS
18Conclusion
- In vehicular network, the attackers can launch
different kind of attacks in network and purposes
of these attacks are creating problems for
authentic users of network and also break the
security requirements. - So, availability is one of the key security
requirements in network and due to negative
behaviour of attackers and attackers this
security requirements is also effected. - In this paper, we have provided the detail
description about the availability security
requirements and also mentioned the different
types of attackers who launch attacks related to
availability of network.
19Thank you..
19
20Journal Paper
- Please download complete research paper from
research gate.
20