Title: Classes of Attacks in Vehicular Ad hoc Network (VANET)
1VANET Security Research Group (VSRG)
Classes of Attacks in VANET
2- Introduction
- Authentication Requirement in VANET
- Related Work
- Trusted Security Module in VANET
- Proposed Card-based Scheme
- Conclusion
- References
- QA
OVERVIEW
2
3Introduction
- Today major concern is to provide safety of users
and save their lives from tragic road accidents. - Vehicular Ad hoc Network (VANET) received
significant attention of researchers and
automotive industries due to life saving factor. - Safety and non safety applications running on
VANET must ensure safety of human life on road
and applications must be security, trust and
privacy enhanced to protect road and transport
users. - We determined five different classes of attacks
which need mitigation mechanisms to protect road
and transport users. Research efforts are being
conducted to circumvent these attacks.
4- Vehicular ad-hoc network is a special kind of
network in which nodes (Vehicles) can communicate
with each other on the road and with its
Infrastructure.
V2I
4
5VANET APPLICATIONS
- Safety Applications
- Non Safety Applications
Work Zone Warning!!!
Work Zone Warning!!!
Work in Progress Plz! use Alt. route
Shopping MALL
Parking Slot Available!!!
Parking Slot Available!!!
RSU
5
6 Properties of Attacker
6
7 Proposed Classes of Attacks
Class-E
Class-D
Class-C
Class-B
Class-A
7
8First Class Network Attack
- 1. Denial of Service (DOS) attack
92. Distributed Denial of service (DDOS) attack
First Class Network Attack
103. Sybil attack
First Class Network Attack
11First Class Network Attack
- 4. Node Impersonation Attack
12Second Class Application Attack (AP)
13Third Class Timing Attack
14Forth Class Social Attack
15Fifth Class Monitoring Attack
16Attacks Process Mechanism
- Steps
- 1.Attacker launches first class attack to other
vehicle in the network. E.g. Sybil attack. - 2. Attacker launches first class attack to
infrastructure. E.g. DOS attack - 3. Attacker receives safety message from
authentic vehicle. - 4. Attacker receives safety message from
infrastructure. - 5. Attacker alters the content of the message and
passes this message to authentic vehicle. - 6. Attacker forwards wrong message to
infrastructure. - 7. Attacker launches another timing attacks to
authentic vehicle. - 8. Attacker launches social attack to near by
authentic vehicle. - 9. Attacker monitors the communication between
the vehicles or infrastructure and achieves
his/her benefit.
17Conclusion
- Users require safety on road in future vehicular
network. VANET applications must implement
trusted computing based solution to promote trust
amongst road users and their vehicles and the
infrastructure. - The proposed attacks classes is an initial effort
to identify various attacks and future research
works will overcome these issues using trusted
computing and privacy enhancing technologies.
18Conference Paper
- Saudi International Electronics, Communications
and Photonics Conference (SIECPC)- 2011 - Complete paper is available on IEEE and Research
gate. - Please download complete research paper from
research gate.
18