1 / 17

Behavior of Attacker and Some New Possible Attacks in Vehicular Communication

These slides are related to Behavior of Attacker and Some New Possible Attacks in Vehicular Communication.<br>

Irshadsumra
Download Presentation

Behavior of Attacker and Some New Possible Attacks in Vehicular Communication

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. VANET Security Research Group (VSRG) Behavior of Attacker and Some New Possible Attacks in Vehicular Communication Dr I.A.Sumra

  2. Introduction V A E T N • Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. V2I Road Side Unit (RSU) V2V V2V Basic VANET Architecture 2

  3. Safety Applications Non Safety Applications VANET Applications Work Zone Warning:!!! Work Zone Warning:!!! Work in Progress Plz! use Alt. route Shopping MALL ( TESCO ) Parking Slot Available!!! RSU Parking Slot Available!!! 3

  4. VANET Security Requirements • Vehicular network applications require security and the objective of these applications is to serve users and make their journey secure and comfortable. • Attackers have their own role in this network and we cannot predict the dynamic behavior of the attacker. If an attacker works on a safety application and changes the content of the safety message then it poses a very difficult condition on the road and many users will be affected due to this kind of attack. • Accidents are often the result of an alteration of any safety message or the sending of even one wrong safety message in a network and many human lives are at risk [1].

  5. TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK • Network Behavior

  6. TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK • Attacker Behavior

  7. SOME NEW POSSIBLE ATTACKS IN VANET

  8. 1. Distributed Denial of service (DDOS) Attack

  9. 2. Timing Attack in VANET • Time is a key factor for safety and non safety applications and users need the right information at the right time. • This attack is a newly addressed problem in which an attacker does not disturb the contents of the messages. • The attacker just adds some time slots into the original message and creates a delay in the original message; in this way the user will receive the message after its required time.

  10. 3. Home Attack • This is a new type of attack; the Internet is one of the key services that users use during their journey. • In this attack, an attacker connects with the Internet and takes control of the user’s vehicle on the highway.

  11. 4. Man in the Middle Attack (MiMA) • MiMA is a very well known attack in communication and can be discussed in a vehicular network where the attacker resides between two or more vehicles and launches this attack. • MiMA is active eavesdropping and makes an independent connection with the victim’s vehicle.

  12. 5. Traffic Analysis Attack • The traffic analysis attack is a serious level threat to user privacy in vehicular communication. A traffic analysis attack is against the anonymity of communication between vehicle to vehicle (V2V) and vehicle to road side unit (V2R). • In this attack, the attacker defines some goal and achieves the goal through capturing different types of traffic information packets. • This includes the location of the user, the vehicle ID, the traveling route of the user or some other of the user’s traffic information; the attacker needs this information to use for its attacks.

  13. 6. Social Engineering Attack • In a vehicular network the attacker does not use these techniques due to the dynamic behavior of vehicles and also users. • There are some possible cases are considered in social engineering in a vehicular network.

  14. 7. Spamming Attack • An attacker sends spam messages in a network for the purpose of increasing the transmission latency and consuming the bandwidth of the network. • With an absence of basic infrastructure and centralized administration, it is difficult to control this kind of attack.

  15. Conclusion • The applications of vehicular networks are important and these applications must be secure; if attackers change the content of these applications then the users are directly affected by it. It is very difficult to monitor the behavior of attackers; attackers change their attacking behavior and they launch different attacks at different times. • In this paper, only the behavior of attackers and some of their possible attacks have been studied. Here, only some of the new possible attacks have been considered, but the attacker can launch many types of attacks and create problems for authentic users of a network.

  16. Thank you….. 16

  17. Conference Paper • Complete paper is available on IEEE and Research gate. • Please download complete research paper from research gate. 17

More Related