1 / 13

Timing Attack in Vehicular Network

These slides are related to Timing Attack in Vehicular Network.

Irshadsumra
Download Presentation

Timing Attack in Vehicular Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. VANET Security Research Group (VSRG) Timing Attack in Vehicular Network Dr I.A.Sumra

  2. Overview • Introduction • VANET Applications and Time Requirements • Delay Types in VANET • Possible Timing Attack in VANET Problem due to Timing Attack Conclusion and Future Work • References • Q&A 2

  3. Introduction V A E T N • Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. V2I Road Side Unit (RSU) V2V V2V Basic VANET Architecture 3

  4. Safety Applications Non Safety Applications VANET Applications Work Zone Warning:!!! Work Zone Warning:!!! Work in Progress Plz! use Alt. route Shopping MALL ( TESCO ) Parking Slot Available!!! RSU Parking Slot Available!!! 4

  5. VANET Applications and Time Requirements • In safety message, time and contents of the message are both important. Right information must be received the users in right time, this is basic requirement of the safety applications. • Warning applications provide information about warning messages and these messages are time critical and its importance is also high for safety of human life. • If an attacker creates delay in it then it could result in very serious tragedy on the road and many accidents may occur due to this.

  6. Delay Types in VANET • Congestion Delay • High mobility of vehicle, dynamic topology and high rate of vehicles on road are the reasons for increasing number of issues of congestion in VANET. • Large numbers of vehicles on road and each vehicle sending, receiving safety and non safety messages, may consequently result in the network becoming overloaded and congested. • Routing Delay • There are many routing protocols that are used for sending messages from source to destination by using of different hops. • A-STAR, MDDV, VADD and DGRP are some of routing protocol has the drawback of generating maximum delay while sending packet from source to destination. Edge Node Based Greedy Routing Algorithm (EBGR) protocol has been proposed to mitigate this issue by reducing packet transmission delay in VANET.

  7. Possible Timing Attack in VANET Vehicle-to-Vehicle (V2V) Timing Attack Basic Level Attack (a) Before Peer to Peer (P2P) timing Attack (b) After Peer to Peer (P2P) timing Attack

  8. Possible Timing Attack in VANET • Extended Level Attack • In extended level attack more than one user would be affected due to timing attack. • attacker launches timing attack using a multicast technique in which attacker targets a specific group of vehicles.

  9. Timing attack in Vehicle to infrastructure (V2I) Communication • Case One:Timing Attack for Authentication (a) Timing Attack for authentication (b) Timing Attack for authentication

  10. Case Two: Timing Attack for Taking Services • Timing attack for taking services from different RSUs

  11. Problem due to Timing Attack • Data Redundancy • In timing attacks, the users receive multiple copies of same message in different time slots, which pose data redundancy issues. t2.L2 > t1.L1 (1)

  12. Conclusion • Security is one of the key challenges in vehicular network. • In this paper we have discussed some issues related to timing attack on vehicular network. This is newly address problem and need attention to researcher to provide solution. • In future work we will some possible solution may be based on digital signature and trusted platform module (TPM) to maintain the integrity of the messages in vehicular network and overcome timing attacks.

  13. Thank you….. 13

More Related