440 likes | 628 Views
Securing Vehicular Communications. Sharaf J. Malebary. CSCE 790 Wireless Networking - Spring’08 Presented: April 15, 2008 University of South Carolina. CONTENT: . 1. Introduction & background. 2. Goals. 3. Vulnerabilities. 4. Challenges. 5. Attackers. 6. Sec. architecture.
E N D
Securing Vehicular Communications Sharaf J. Malebary CSCE 790 Wireless Networking - Spring’08 Presented: April 15, 2008 University of South Carolina
CONTENT: 1. Introduction & background. 2. Goals. 3. Vulnerabilities. 4. Challenges. 5. Attackers. 6. Sec. architecture. 7. Future & related work & CA. 8. Questions & Answers. CSCE 715
1. DEFINITIONS: VANET – Vehicular Ad-Hoc Network CSCE 715
INTRO TO VANET CSCE 715
INTRO TO VANET CSCE 715
INTRO TO VANET CSCE 715
VANET APPLICATIONS CSCE 715
3. VANET APPLICATIONS Intersection Collision warning Stop Signal violation warning CSCE 715
VANET APPLICATIONS V2V Hazard Warning CSCE 715
VANET APPLICATIONS V2I Hazard Warning CSCE 715
VANET APPLICATIONS CSCE 715
3. VANET APPLICATIONS Adaptive Drivetrain Management CSCE 715
3. VANET APPLICATIONS Electronic toll payment CSCE 715
VANET APPLICATIONS CSCE 715
VANET APPLICATIONS Software update CSCE 715
VANET APPLICATIONS Parking spot locator CSCE 715
VANET APPLICATIONS Instant Messaging (between vehicles) CSCE 715
GOALS • Some Applications (safety, traffic efficincy, driver assist. And infotainment) • VC is a double edged sword? • What is the paper about? CSCE 715
Vulnerabilities: Jamming CSCE 715
Spectrum Jamming CSCE 715
Jamming Attack Scenario: A jammer may remain quiet when there is no activity on the network, and start interference as soon as it detects a transmission. CSCE 715
Vulnerabilities: Forgery CSCE 715
Vulnerabilities: Intransit TT CSCE 715
Vulnerabilities: Impersonation CSCE 715
Vulnerabilities: Privacy Violation CSCE 715
Vulnerabilities: On-board Tampering SLOW DOWN The way is clear Similar attack: stop a highway CSCE 715
Challenges: CSCE 715
Network Volatility Liability VS. Privacy Delay Sensitive app. Network Scale Heterogeneity CSCE 715
ATTACKERS Who are they? CSCE 715
ATTACKERS Who are they? Greedy Drivers CSCE 715
ATTACKERS Who are they? Industrial insiders CSCE 715
ATTACKERS Who are they? Malicious attackers CSCE 715
ATTACKERS Who are they? Pranksters CSCE 715
Security Architecture: Over View CSCE 715
Security Architecture: Authentication Security HW. VPK Infrastr. Cert. Revocation Privacy Security HW. CSCE 715
Certificates issue: CSCE 715
7. FUTURE WORK CSCE 715
THANK YOU CSCE 715
Guys if any one has a question please ask, else I am going to ask you about what I just present CSCE 715
REFERENCES: In this presentation graphical images and schemes were used from the sources as follows: [1] F. Kargl. Vehicular Communications and VANETs [2] M. Weigle. Introduction to Vehicular Networks [3] M. Torrent-Moreno, H. Hartenstein. Current View on VANETs (Safety, Fairness and Fading ) October 14th 2005. [4] Car-to-Car Communication Stephan Eichler, Christoph Schroth, Jörg Eberspächer [5] Google Images [6] the slides were taking from a classmate who present for 727, then they were updated and adjusted by me. CSCE 715