1 / 26

Trust and Trusted Computing in Vehicular ad hoc network (VANET)

These slides are related to Trust and Trusted Computing in Vehicular ad hoc network (VANET).<br>

Irshadsumra
Download Presentation

Trust and Trusted Computing in Vehicular ad hoc network (VANET)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. VANET Security Research Group (VSRG) Trust and Trusted Computing in Vehicular ad hoc network (VANET) Dr I.A.Sumra

  2. Introduction • Today major concern is to provide safety of users and save their lives from tragic road accidents. • Vehicular Ad hoc Network (VANET) received significant attention of researchers and automotive industries due to life saving factor. • Safety and non safety applications running on VANET must ensure safety of human life on road and applications must be security, trust and privacy enhanced to protect road and transport users. • We determined five different classes of attacks which need mitigation mechanisms to protect road and transport users. Research efforts are being conducted to circumvent these attacks.

  3. V A E T N • Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. V2I 3

  4. Safety Applications Non Safety Applications VANET APPLICATIONS Work Zone Warning:!!! Work Zone Warning:!!! Work in Progress Plz! use Alt. route Shopping MALL Parking Slot Available!!! RSU Parking Slot Available!!! 4

  5. Proposed Trust Model

  6. VANET User Requirement (VUR) • User is the main entity in vehicular work and objective of this new technology is to serve users and safe their lives from road accidents. • Safety and non safety VANET applications meet the all users requirement during their journey like send or receive safety message to other vehicles and use the entertainment services.

  7. Properties of Attacker 7 Outsider Insider Resources Coverage Area Technical Expertise

  8. Levels of Attackers

  9. First Level of Attackers • In first level, the attackers are more seriously performed and intensity of the attacks is higher as compared to second level.

  10. Second Level of Attackers • Second level attackers also have their own severity level which is lower as compared to the first level. An attacker in second level is outsiders and the basic aim of this kind of attacker is to seek their personal benefits.

  11. Proposed Classes of Attacks Class-E Class-D Class-C Class-B Class-A 11 Monitoring Attack Social Attack Timing Attack Application Attack Network Attack

  12. First Class: Network Attack 1. Denial of Service (DOS) attack

  13. First Class: Network Attack 2. Distributed Denial of service (DDOS) attack

  14. First Class: Network Attack 3. Sybil attack

  15. First Class: Network Attack 4. Node Impersonation Attack

  16. Second Class: Application Attack (AP)

  17. Third Class: Timing Attack

  18. Forth Class: Social Attack

  19. Fifth Class: Monitoring Attack

  20. Vehicular Trusted Computing (VTC) • Trusted computing is a relatively new technology which has gained popularity recently and Trusted Computing Group (TCG) [25] has been the main proponent of this technology. • The main aim of TCG is to enhance security in computer network by using security hardware module (called Trusted Platform Module).

  21. Trusted Entities of VANET • In this section we will explain six basic entities of trust and when all these entities work together then will develops a chain of trust in the vehicular network. • Trusted User (TU) • Trusted Vehicle (TV) • Trusted Applications (TA) • Trusted Routing (TR) • Trusted Medium (TM) • Trusted Infrastructure (TIF)

  22. Relationship between Trust and Attackers

  23. Attackers and TPM

  24. Conclusion • Security of VANET is an important issue to be addressed by designers of VANET infrastructure security. • The VANET applications are termed as an important solution for the security of the users on the road. Moreover it is believed that the Vehicular applications must be secured. Because the users are directly affected in case the attackers change the content of safety applications. Attackers change their attacking behavior and they launch different attacks at different times. Attackers always try to tamper the information and create troubles in the network. • Cryptographic functional components are considered as one of key elements for trust building and maintaining data integrity in the past research work done.

  25. Journal Paper • This is journal research paper and please download complete research paper from research gate. 25

  26. Thank you….. 26

More Related