Effects of Attackers and Attacks on Availability Requirement in Vehicular Network: A Survey - PowerPoint PPT Presentation

About This Presentation
Title:

Effects of Attackers and Attacks on Availability Requirement in Vehicular Network: A Survey

Description:

Due to open nature of wireless medium, the attackers can affect the vehicular environment. In this paper, we are providing a survey on the attackers and all possible attacks on the availability requirement of vehicular network. The main aim of this study is to describe the threat levels of all possible attacks on the availability. – PowerPoint PPT presentation

Number of Views:43

less

Transcript and Presenter's Notes

Title: Effects of Attackers and Attacks on Availability Requirement in Vehicular Network: A Survey


1
Effects of Attackers and Attacks on Availability
Requirement in Vehicular Network A Survey
  • Dr I.A.Sumra

2
Introduction
  • Vehicular ad-hoc network is a special kind of
    network in which nodes (Vehicles) can communicate
    with each other on the road and with its
    Infrastructure.

V2I
2
3
VANET Applications
  • Safety Applications
  • Non Safety Applications

Work Zone Warning!!!
Work Zone Warning!!!
Work in Progress Plz! use Alt. route
Shopping MALL ( TESCO )
Parking Slot Available!!!
Parking Slot Available!!!
RSU
3
4
VANET Security Requirements
  • Vehicular network applications require security
    and the objective of these applications is to
    serve users and make their journey secure and
    comfortable.
  • Attackers have their own role in this network and
    we cannot predict the dynamic behavior of the
    attacker. If an attacker works on a safety
    application and changes the content of the safety
    message then it poses a very difficult condition
    on the road and many users will be affected due
    to this kind of attack.
  • Accidents are often the result of an alteration
    of any safety message or the sending of even one
    wrong safety message in a network and many human
    lives are at risk 1.

5
TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
  • Network Behavior

6
TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
  • Attacker Behavior

7
AVAILABILITY REQUIREMENT IN VANET
  • Availability is one of the hot research topics in
    vehicular communication. The purpose of a
    vehicular network is to serve the users. But if
    the network is not available for communication
    then the main goal of the network has become
  • useless.
  • If an accident happens in location X and the user
    sends this information to another vehicle but the
    channel is not available due to a DoS attack,
    this makes availability of network a significant
    factor.

8
SECURITY REQUIREMENTS WITH SAFETY APPLICATIONS
9
ATTACKERS AND ATTACKS ON AVAILABILITY IN VANET
10
A.DENIAL OF SERVICE (DOS) ATTACK IN VANET
  • In VANET, DOS shall not be allowed to happen,
    where seamless life critical information must
    reach its intended destination securely and
    timely. In summary, there are three ways the
    attackers may achieve DOS attacks.
  • There are three levels of DOS attacks as
    described below.
  • Basic Level Overwhelm the Node Resources
  • Extended Level Jamming the Channel

11
A. DENIAL OF SERVICE (DOS) ATTACK IN VANET
  • Drop Communication Packets
  • It is also called network DoS attack, selfish
    node or malicious node drop communication packets
    in network. This is also one of the aspects
    related to behavior of an attacker in which an
    attacker just drops the packets the purpose of
    this is to ensure that users do not perform any
    type of communication in the network.

12
B. Distributed Denial of Service (DDoS) Attack
13
C- Broadcast Tampering Attack
  • In this case, an attacker tampers with the
    broadcast safety message and possibly injects
    false safety message. The purpose of this is to
    cause road accidents or change the flow of
    traffic on some specific route.

14
D- Malware Attack
  • A vehicle has its own software and application
    unit (AU) which performs its own task and
    communicates with other users as well as the road
    side unit (RSU).
  • There is some possibility to enter a virus and
    worm into the vehicle and disturb the operation
    of the network.

15
E- Spamming Attack
  • In this situation, the sole purpose of the
    attacker is to increase the latency of the
    transmission and use up the bandwidth of the
    network so no service is available to other
  • users this is achieved by sending spam messages
    through the network.
  • It is nearly impossible to control attacks of
    this type when there is no basic infrastructure
    or centralized administration available.

16
F- Black Hole Attack
  • Blackhole is a different kind of attack and there
    are two possible cases in any particular
    vehicular network.
  • When any new user wants to start communication
    with other users or simply participate in a
    network, then other users simply refuse it. In
    Fig. 11, user D wants to start communication with
    user X, but user X refuses it and simply sends a
    reply with SORRY. So now user D tries To
    communicate with any other user of that network.
  • One user starts communication with other users of
    the network and it is suddenly dropped out of the
    communication.

17
ATTACKS ON AVAILABILITY WITH THREAT LEVELS
18
Conclusion
  • In vehicular network, the attackers can launch
    different kind of attacks in network and purposes
    of these attacks are creating problems for
    authentic users of network and also break the
    security requirements.
  • So, availability is one of the key security
    requirements in network and due to negative
    behaviour of attackers and attackers this
    security requirements is also effected.
  • In this paper, we have provided the detail
    description about the availability security
    requirements and also mentioned the different
    types of attackers who launch attacks related to
    availability of network.

19
Thank you..
19
20
Journal Paper
  • Please download complete research paper from
    research gate.

20
Write a Comment
User Comments (0)
About PowerShow.com