Title: Towards Improving Security in VANET: Some New Possible Attacks and their Possible Solutions
1 Towards Improving Security in VANET Some New
Possible Attacks and their Possible Solutions
Dr I.A.Sumra
2Introduction
- Today major concern is to provide safety of users
and save their lives from tragic road accidents. - Vehicular ad hoc network (VANET) is taken more
attention from the end user due to its potential
safety and non-safety applications. The basic
design objective of these applications to serve
the users and provide safety of human lives
during their journey. - The role of the end user is more prominent for
next generation vehicular networks. An attacker
is one of type of end user, but their role in the
network is negative and creates problems for
other components of network. - So in this slide, we will discuss two new types
of attacks which are called road side traffic
signal attack and also Internet attack in
vehicular network.
2
3- Vehicular ad-hoc network is a special kind of
network in which nodes (Vehicles) can communicate
with each other on the road and with its
Infrastructure.
V2I
3
4VANET APPLICATIONS
- Safety Applications
- Non Safety Applications
Work Zone Warning!!!
Work Zone Warning!!!
Work in Progress Plz! use Alt. route
Shopping MALL
Parking Slot Available!!!
Parking Slot Available!!!
RSU
4
5VANET Applications End Users
- There are two types of users and two types of
applications in VANET. - Safety Applications
- Non-Safety Applications
5
6 SECURITY importance in future VANET
- Recently, VANET security issue has gained a major
interest among researchers. However, J. Blum et
al. 23 have asked an important question related
to VANET security in their article, A wireless
network of intelligent vehicles can make a
highway travel safer and faster. But can
hacker(attacker) use the system to cause
accidents? - By this question, it marked the importance of
security in future VANET applications. Attacker
is one type of users and their objective is to
create problem in a network through different
types of attacks.
6
7VANET User Requirement (VUR)
- User is the main entity in vehicular work and
objective of this new technology is to serve
users and safe their lives from road accidents. - Safety and non safety VANET applications meet the
all users requirement during their journey like
send or receive safety message to other vehicles
and use the entertainment services.
7
8 Properties of Attacker
8
9Proposed New Possible Attacks in VANET
- A. RSU Attack in VANET
- B. INTERNET Attack in VANET
9
10A. RSU Attack in VANET
11A. RSU Attack in VANET
- Attacker and Attack Information
- ? Attacker Type Insider Attacker
- ? Attackers Node ID X
- ? Attackers Node Location L1
- ? Nature of Attack (Attack on green signal time
slot) Actual time - slot is 0005sec and altered time slot is
0010sec.
11
12New Possible Attacks in VANET
- Attacker and Attack Information
- ? Attacker Type Insider Attacker
- ? Attackers Node ID Y
- ? Attacker 'node Location L2
- ? Nature of Attack (Attack on Red Time Slot)
Actual time - slot is 0020sec and the altered
time slot is 0005sec.
12
13New Possible Attacks in VANET
- Attacker and Attack Information
- ? Attacker Type Outsider Attacker (Pranksters)
- ? Attackers Node ID Z
- ? Attackers Node Location L3
- ? Nature of Attack (Stop the Traffic Signal),
The actual time slot is 0020sec and the
altered time slot is - 0000.
13
14 B. INTERNET Attack in VANET
15B. INTERNET Attack in VANET
- The Peer to peer applications have so far been
limited to the fixed Internet (e.g.BitTorrent) in
a vehicular network. - The processing capacity and storage of a
vehicular node (modern vehicles) makes such
applications possible also on mobile platforms in
VANET. The Figure 5 shows the car BitTorrent 21.
15
16B. INTERNET Attack in VANET
- There are two architectures of Internet access in
vehicular network using WAVE technology. - (a) WAVE RSU Solution In this solution the RSU
usually have connection to the Backbone network
(IP) and can act as the Internet access service
providers for passing by OBUs in vehicular
environments. - (b) Mycarevent VCG Solution In this solution,
all WAVE OBUs have to self-organize into VANET on
the roadway. It is communicating with each other
due to safety reasons.
16
17Internet Attack through RSU
- This is a new type of attack the Internet is one
of the key services that users use during their
journey. In this attack, an attacker connects
with the Internet and takes control of the users
vehicle on the highway. - There are three possible scenarios which are
discussed here. - Scenario 1- When the attacker takes control of
the software of the vehicle, it then generates
false messages in the network or broadcasts wrong
messages in the network. The attacker also
controls the application unit (AU) or OBU and
sends the attack into the network. - Scenario 2- Attackers also take control of the
sensors of the vehicle and the sensors change
their behaviour and work according to the
attackers" requirements. Sensors also show the
wrong status of information and this depends on
what the attacker actually wants from the other
vehicles of the network.
17
18Internet Attack through RSU
- Scenario 3- This is the worst situation of the
attack in which the attacker controls the
hardware part of the vehicle, i.e., the
Electronic Control Unit (ECU). It is a very
serious condition for the road when a users
vehicle is under the control of someone else
outside the network and they can increase or
decrease the vehicles speed. - The Figure 7 shows the details of where the
attacker makes the connection with the RSU and
then connects with vehicle A. Vehicle A is
actually using the Internet service from the RSU
and in this way the attacker can easily make a
connection with vehicle A.
18
19Internet Attack through RSU
- Scenario 4 In this scenario, the attacker
(Prankster) sits in the corner of the city and
makes a connection with the local Internet
Service Provider (ISP). The primary objective of
the attacker is to make a connection with the
ISP, and through ISP connection it will launch
attacks on the road side unit (RSU). If he/she
succeeds in making the connection with the RSU,
then he/she will launch the attack (send wrong
messages, flooding) through the Internet
connection. - The secondary objective of the attacker is to
breakdown the services of the ISP because if the
ISP server goes down, then the whole networks
functionality will be disturbed. The Figure 8
explains the whole scenario in which attacker
lunch attack on ISP through RSU.
19
20Possible Solutions of Attacks - TPM
- A smart vehicle has an important role to perform
the secure communication in a network and smart
vehicle is a combination of several mechanical
components with the ability to perform
computations. - Trusted Platform Module (TPM) Trusted Platform
Module (TPM) is a hardware module which are used
inside the smart vehicle and their purpose is to
ensure the secure communication in network. The
Figure 9 shows the basic architecture of the TPM
and the following are key features of the Trusted
Platform Module (TPM).
20
21Smart vehicle with TPM modules
- TPM is based on root of trust mechanism which are
reside the inside the smart vehicle and also
ensure the security and trust of TPM. TPM also
communicate with other sensors of smart vehicle
and check the functionality and working mechanism
of these sensors in smart vehicle. - The Root of Trust (RoT) is play the key role to
measure the security and trust inside the TPM.
So, detail description of every module of Root of
Trust (RoT) is given below.
21
22Case One Communication with Normal User
- Whenever vehicle is secure through TPM, so now it
is possible to communicate with other vehicle or
with infrastructure. There are two content of the
message of one message i-e security content
(valid security key and signature), other
contents includes vehicle ID, location of vehicle
and speed of vehicle and message generation time. - All parameters of any message are an important
while start the communication in network. The
Figure 13, shows the communication through step
by step process approach while start the
communication in network.
22
23Case Two Communication with Attacker User
- In this case an attacker communicate with RUS and
want to alter the signal time slot. But TPM has
responsibility to identify and stop their
communication in network. - The Figure 14 provides the detail description of
case two
23
24Case One Communication with Normal User
- In this case normal user start communication with
ISP and take the internet services while
travelling on highway. There are following steps
involve to start the communication between normal
user and ISP. - The Figure 15 explains the communication
mechanism between user and ISP in vehicular
network.
24
25Case Two Communication with Attacker User
- In this case an attacker communicate with ISP and
want to lunch attack on ISP server. Objective of
the attacker is to down Internet services for
other user of the network. Through TPM, we can
handle this attacks and drop their packets while
they are launching this such of attacks on ISP. - The Figure 16 provides the detail description of
case two.
25
26Conclusion
- Security of VANET is an important issue to be
addressed by designers of VANET infrastructure
security. - VANET has taken more attention of the user due to
its potential applications, and the Internet
service along the road is one of the key services
in VANET. Users will enjoy high speed Internet
services along the road. However, it cannot be
ignored that there is an importance for security
in a vehicular network as attackers will always
remain. - In this paper, the authors have discussed the
newly addressed attacks and the purpose of this
paper has been to get the attention of
researchers into this aspect of the behaviour of
an attacker. In first section of this paper, the
authors have discussed the possible attacks on
the Internet and on Road Side Traffic Signal in
next generation vehicular network through
different scenarios.
26
27References
- 15 Guette, G. and C. Bryce, Using tpms to
secure vehicular ad-hoc networks (vanets), in
Information Security Theory and Practices. Smart
Devices, Convergence and Next Generation
Networks. 2008, Springer. p. 106-116. - 21Gerla, M., L. Kleinrock, "Vehicular networks
and the future of the mobile internet." Computer
Networks 55(2) 457-469,2011. - 22 Yunpeng Zang Weiss, E. Stibor, L. Hui
Chen Xi Cheng , "Opportunistic Wireless
Internet Access in Vehicular Environments Using
Enhanced WAVE Devices," Future Generation
Communication and Networking (FGCN 2007) , vol.1,
no., pp.447-452, 6-8 Dec. 2007. - 23 J. Blum and Azim Eskandarian, "The threat of
intelligent collisions," in IT Professional, vol.
6, no. 1, pp. 24-29, Jan.-Feb. 2004.
27
28Journal Paper
- This is journal research paper and please
download complete research paper from research
gate.
28
29Thank you..
29