Towards Improving Security in VANET: Some New Possible Attacks and their Possible Solutions - PowerPoint PPT Presentation

About This Presentation
Title:

Towards Improving Security in VANET: Some New Possible Attacks and their Possible Solutions

Description:

So in this paper, we will discuss two new types of attacks which are called road side traffic signal attack and also Internet attack in vehicular network. The authors will explain an attacker‟s behaviour and how he/she will launch an attack on a road side traffic signal and Internet services and create problems for other users of network. Through different scenarios, it will explain the effect of these attacks on other components of network. – PowerPoint PPT presentation

Number of Views:85

less

Transcript and Presenter's Notes

Title: Towards Improving Security in VANET: Some New Possible Attacks and their Possible Solutions


1
Towards Improving Security in VANET Some New
Possible Attacks and their Possible Solutions
Dr I.A.Sumra
2
Introduction
  • Today major concern is to provide safety of users
    and save their lives from tragic road accidents.
  • Vehicular ad hoc network (VANET) is taken more
    attention from the end user due to its potential
    safety and non-safety applications. The basic
    design objective of these applications to serve
    the users and provide safety of human lives
    during their journey.
  • The role of the end user is more prominent for
    next generation vehicular networks. An attacker
    is one of type of end user, but their role in the
    network is negative and creates problems for
    other components of network.
  • So in this slide, we will discuss two new types
    of attacks which are called road side traffic
    signal attack and also Internet attack in
    vehicular network.

2
3
  • Vehicular ad-hoc network is a special kind of
    network in which nodes (Vehicles) can communicate
    with each other on the road and with its
    Infrastructure.

V2I
3
4
VANET APPLICATIONS
  • Safety Applications
  • Non Safety Applications

Work Zone Warning!!!
Work Zone Warning!!!
Work in Progress Plz! use Alt. route
Shopping MALL
Parking Slot Available!!!
Parking Slot Available!!!
RSU
4
5
VANET Applications End Users
  • There are two types of users and two types of
    applications in VANET.
  • Safety Applications
  • Non-Safety Applications

5
6
SECURITY importance in future VANET
  • Recently, VANET security issue has gained a major
    interest among researchers. However, J. Blum et
    al. 23 have asked an important question related
    to VANET security in their article, A wireless
    network of intelligent vehicles can make a
    highway travel safer and faster. But can
    hacker(attacker) use the system to cause
    accidents?
  • By this question, it marked the importance of
    security in future VANET applications. Attacker
    is one type of users and their objective is to
    create problem in a network through different
    types of attacks.

6
7
VANET User Requirement (VUR)
  • User is the main entity in vehicular work and
    objective of this new technology is to serve
    users and safe their lives from road accidents.
  • Safety and non safety VANET applications meet the
    all users requirement during their journey like
    send or receive safety message to other vehicles
    and use the entertainment services.

7
8
Properties of Attacker
8
9
Proposed New Possible Attacks in VANET
  • A. RSU Attack in VANET
  • B. INTERNET Attack in VANET

9
10
A. RSU Attack in VANET
11
A. RSU Attack in VANET
  • Attacker and Attack Information
  • ? Attacker Type Insider Attacker
  • ? Attackers Node ID X
  • ? Attackers Node Location L1
  • ? Nature of Attack (Attack on green signal time
    slot) Actual time
  • slot is 0005sec and altered time slot is
    0010sec.

11
12
New Possible Attacks in VANET
  • Attacker and Attack Information
  • ? Attacker Type Insider Attacker
  • ? Attackers Node ID Y
  • ? Attacker 'node Location L2
  • ? Nature of Attack (Attack on Red Time Slot)
    Actual time
  • slot is 0020sec and the altered
    time slot is 0005sec.

12
13
New Possible Attacks in VANET
  • Attacker and Attack Information
  • ? Attacker Type Outsider Attacker (Pranksters)
  • ? Attackers Node ID Z
  • ? Attackers Node Location L3
  • ? Nature of Attack (Stop the Traffic Signal),
    The actual time slot is 0020sec and the
    altered time slot is
  • 0000.

13
14
B. INTERNET Attack in VANET
15
B. INTERNET Attack in VANET
  • The Peer to peer applications have so far been
    limited to the fixed Internet (e.g.BitTorrent) in
    a vehicular network.
  • The processing capacity and storage of a
    vehicular node (modern vehicles) makes such
    applications possible also on mobile platforms in
    VANET. The Figure 5 shows the car BitTorrent 21.

15
16
B. INTERNET Attack in VANET
  • There are two architectures of Internet access in
    vehicular network using WAVE technology.
  • (a) WAVE RSU Solution In this solution the RSU
    usually have connection to the Backbone network
    (IP) and can act as the Internet access service
    providers for passing by OBUs in vehicular
    environments.
  • (b) Mycarevent VCG Solution In this solution,
    all WAVE OBUs have to self-organize into VANET on
    the roadway. It is communicating with each other
    due to safety reasons.

16
17
Internet Attack through RSU
  • This is a new type of attack the Internet is one
    of the key services that users use during their
    journey. In this attack, an attacker connects
    with the Internet and takes control of the users
    vehicle on the highway.
  • There are three possible scenarios which are
    discussed here.
  • Scenario 1- When the attacker takes control of
    the software of the vehicle, it then generates
    false messages in the network or broadcasts wrong
    messages in the network. The attacker also
    controls the application unit (AU) or OBU and
    sends the attack into the network.
  • Scenario 2- Attackers also take control of the
    sensors of the vehicle and the sensors change
    their behaviour and work according to the
    attackers" requirements. Sensors also show the
    wrong status of information and this depends on
    what the attacker actually wants from the other
    vehicles of the network.

17
18
Internet Attack through RSU
  • Scenario 3- This is the worst situation of the
    attack in which the attacker controls the
    hardware part of the vehicle, i.e., the
    Electronic Control Unit (ECU). It is a very
    serious condition for the road when a users
    vehicle is under the control of someone else
    outside the network and they can increase or
    decrease the vehicles speed.
  • The Figure 7 shows the details of where the
    attacker makes the connection with the RSU and
    then connects with vehicle A. Vehicle A is
    actually using the Internet service from the RSU
    and in this way the attacker can easily make a
    connection with vehicle A.

18
19
Internet Attack through RSU
  • Scenario 4 In this scenario, the attacker
    (Prankster) sits in the corner of the city and
    makes a connection with the local Internet
    Service Provider (ISP). The primary objective of
    the attacker is to make a connection with the
    ISP, and through ISP connection it will launch
    attacks on the road side unit (RSU). If he/she
    succeeds in making the connection with the RSU,
    then he/she will launch the attack (send wrong
    messages, flooding) through the Internet
    connection.
  • The secondary objective of the attacker is to
    breakdown the services of the ISP because if the
    ISP server goes down, then the whole networks
    functionality will be disturbed. The Figure 8
    explains the whole scenario in which attacker
    lunch attack on ISP through RSU.

19
20
Possible Solutions of Attacks - TPM
  • A smart vehicle has an important role to perform
    the secure communication in a network and smart
    vehicle is a combination of several mechanical
    components with the ability to perform
    computations.
  • Trusted Platform Module (TPM) Trusted Platform
    Module (TPM) is a hardware module which are used
    inside the smart vehicle and their purpose is to
    ensure the secure communication in network. The
    Figure 9 shows the basic architecture of the TPM
    and the following are key features of the Trusted
    Platform Module (TPM).

20
21
Smart vehicle with TPM modules
  • TPM is based on root of trust mechanism which are
    reside the inside the smart vehicle and also
    ensure the security and trust of TPM. TPM also
    communicate with other sensors of smart vehicle
    and check the functionality and working mechanism
    of these sensors in smart vehicle.
  • The Root of Trust (RoT) is play the key role to
    measure the security and trust inside the TPM.
    So, detail description of every module of Root of
    Trust (RoT) is given below.

21
22
Case One Communication with Normal User
  • Whenever vehicle is secure through TPM, so now it
    is possible to communicate with other vehicle or
    with infrastructure. There are two content of the
    message of one message i-e security content
    (valid security key and signature), other
    contents includes vehicle ID, location of vehicle
    and speed of vehicle and message generation time.
  • All parameters of any message are an important
    while start the communication in network. The
    Figure 13, shows the communication through step
    by step process approach while start the
    communication in network.

22
23
Case Two Communication with Attacker User
  • In this case an attacker communicate with RUS and
    want to alter the signal time slot. But TPM has
    responsibility to identify and stop their
    communication in network.
  • The Figure 14 provides the detail description of
    case two

23
24
Case One Communication with Normal User
  • In this case normal user start communication with
    ISP and take the internet services while
    travelling on highway. There are following steps
    involve to start the communication between normal
    user and ISP.
  • The Figure 15 explains the communication
    mechanism between user and ISP in vehicular
    network.

24
25
Case Two Communication with Attacker User
  • In this case an attacker communicate with ISP and
    want to lunch attack on ISP server. Objective of
    the attacker is to down Internet services for
    other user of the network. Through TPM, we can
    handle this attacks and drop their packets while
    they are launching this such of attacks on ISP.
  • The Figure 16 provides the detail description of
    case two.

25
26
Conclusion
  • Security of VANET is an important issue to be
    addressed by designers of VANET infrastructure
    security.
  • VANET has taken more attention of the user due to
    its potential applications, and the Internet
    service along the road is one of the key services
    in VANET. Users will enjoy high speed Internet
    services along the road. However, it cannot be
    ignored that there is an importance for security
    in a vehicular network as attackers will always
    remain.
  • In this paper, the authors have discussed the
    newly addressed attacks and the purpose of this
    paper has been to get the attention of
    researchers into this aspect of the behaviour of
    an attacker. In first section of this paper, the
    authors have discussed the possible attacks on
    the Internet and on Road Side Traffic Signal in
    next generation vehicular network through
    different scenarios.

26
27
References
  • 15 Guette, G. and C. Bryce, Using tpms to
    secure vehicular ad-hoc networks (vanets), in
    Information Security Theory and Practices. Smart
    Devices, Convergence and Next Generation
    Networks. 2008, Springer. p. 106-116.
  • 21Gerla, M., L. Kleinrock, "Vehicular networks
    and the future of the mobile internet." Computer
    Networks 55(2) 457-469,2011.
  • 22 Yunpeng Zang Weiss, E. Stibor, L. Hui
    Chen Xi Cheng , "Opportunistic Wireless
    Internet Access in Vehicular Environments Using
    Enhanced WAVE Devices," Future Generation
    Communication and Networking (FGCN 2007) , vol.1,
    no., pp.447-452, 6-8 Dec. 2007.
  • 23 J. Blum and Azim Eskandarian, "The threat of
    intelligent collisions," in IT Professional, vol.
    6, no. 1, pp. 24-29, Jan.-Feb. 2004.

27
28
Journal Paper
  • This is journal research paper and please
    download complete research paper from research
    gate.

28
29
Thank you..
29
Write a Comment
User Comments (0)
About PowerShow.com