1 / 15

Using TPM to Ensure Security, Trust and Privacy (STP) in VANET

These slides are related to Using TPM to Ensure Security, Trust and Privacy (STP) in VANET

Irshadsumra
Download Presentation

Using TPM to Ensure Security, Trust and Privacy (STP) in VANET

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. VANET Security Research Group (VSRG) Dr I.A.Sumra Using TPM to Ensure Security, Trust and Privacy (STP) in VANET

  2. Introduction V A E T N • Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. V2I Road Side Unit (RSU) V2V V2V Basic VANET Architecture 2

  3. Safety Applications Non Safety Applications VANET Applications Work Zone Warning:!!! Work Zone Warning:!!! Work in Progress Plz! use Alt. route Shopping MALL ( TESCO ) Parking Slot Available!!! RSU Parking Slot Available!!! 3

  4. VANET Security Requirements • Vehicular network applications require security and the objective of these applications is to serve users and make their journey secure and comfortable. • Attackers have their own role in this network and we cannot predict the dynamic behavior of the attacker. If an attacker works on a safety application and changes the content of the safety message then it poses a very difficult condition on the road and many users will be affected due to this kind of attack. • Accidents are often the result of an alteration of any safety message or the sending of even one wrong safety message in a network and many human lives are at risk [1].

  5. TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK • Network Behavior

  6. TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK • Attacker Behavior

  7. STP in VANET STP in VANET

  8. Vehicular TRUST

  9. TRUSTED PLATFORM MODULE (TPM) AND STP

  10. Attacker and attack with TPM

  11. TPM with Root of Trust modules

  12. PROPOSED SCHEME FOR SECURITY,TRUST ANDPRIVACY (STP)

  13. Conclusion • In trusted vehicular networks, trust and security are two key requirements for users. While privacy is a basic necessary requirement for security in life saving vehicular networks, a guarantee that not only the vehicle platform but also the infrastructure can be trusted is also vital. • When users receive any safety message in vehicular communications, it is important that the message is authentic and that the source making the request is legitimate. A new and practical cardbased scheme has been proposed in this paper to make possible the trusted authentication of users while enabling various transactions with a Vehicle Service Provider (VSP).

  14. Please download complete paper from • IEEEE website • ResearchGate 14

  15. 15

More Related