SlideShare uma empresa Scribd logo
1 de 16
Securing vehicular ad hoc
             network




Sirojiddin Jurayev
What is a VANET (Vehicular Ad hoc
  NETwork)?
                                Roadside
                               base station




                                                                           Emergency
                                                                             event


                                                                  Inter-vehicle
                                                                communications

                                              Vehicle-to-roadside
                                               communications


• Communication: typically over the Dedicated Short Range Communications
(DSRC) (5.9 GHz)
• Example of protocol: IEEE 802.11p
A taxonomy of vehicular communication systems




                                                3
A Modern Vehicle



                        Event data recorder (EDR)
                                                    Positioning system (GPS)
      Forward radar

                                                                  Communication
                                                                     facility




                                                               Rear radar
                Display
  Human-Machine Interface               Computing platform


  A modern vehicle is a network of sensors/actuators on wheels !

                                                                                  4
Attackers
   Insider or outsider
     Insider– valid user
     Outsider – Intruder, limited attack options
   Malicious or rational
     Malicious – No personal benefit, intends to harm
      other users
     Rational – seeks personal benefits, more predictable
      attack
   Active or passive
     Active:Generates packets, participates in the network
     Passive: Eavesdrop, track users
Security Attacks




Goals                     Actions                     Execution


        Congestion                  Insert bogus
         Creation/                   congestion                   Single
         avoidance                    warnings

    Cause accidents                 Misrepresent           Single, multiple
      or pile-ups                   Location of            Entities (Sybil)
                                      accident
          Track                      Message
                                                              Multiple
        individuals                 suppression

                               Aggressive insertion
    Denial of service          of messages/jamming    Independent Colluding
Security Requirements
   Authentication:
       React only to legitimate events. Authenticate senders of
        messages.
   Verification of data consistency
       Legitimate senders can send false data (attack/unintentional). Can
        cause immense damage even fatalities.
   Availability
       Network should be available under jamming attacks
   Non-repudiation
       Drivers causing accidents should be reliably identified
   Privacy (conflicts with authentication)
       Privacy of drivers against unauthorized observers.
   Real-time constraints
       High speed means constraints on time
Attack 1 : Bogus traffic information



                            Traffic
                             jam
                            ahead




   Attacker: insider, rational, active
                                         8
Attack 2 : Generate “Intelligent Collisions”




                                          SLOW
                                          DOWN




                      The way
                      is clear
   Attacker: insider, malicious, active
                                                 9
Attack 3: Cheating with identity, speed, or position




                                   Wasn’t me!




   Attacker: insider, rational, active
                                                       10
Attack 4: Jamming


                     Roadside
                    base station




                                   Jammer




                                            11
Attack 5: Tunnel



                   Wrong information




                              Physical tunnel or
                                jammed area




                                                   12
Proposed solution module for
DoS attack
Channel switching
 Using switching technology
 Study case of different position of vehicles
  according to GPS position. Ex. In highway we can
  use WiMax technology, in city we can use Wifi or
  Bluetooth etc.
 If jamming attack detected then node tries to
  change channel. Attacker power may not be so
  high in order cover all channels. If so higher
  power might detect easily by using other
  methods.
 Problem.
 1. Is it possible for listen different position
  wireless networks same time.
Expected layered approach for
VANET

Mais conteúdo relacionado

Mais procurados

Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour DetectionRestricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour DetectionAnkit Singh
 
Taking VANET to the Clouds
Taking VANET to the CloudsTaking VANET to the Clouds
Taking VANET to the CloudsMichele Weigle
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and HashingPallavi Agarwal
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
Security issues and solutions in vehicular adhoc network a review approach
Security issues and solutions in vehicular adhoc network  a review approachSecurity issues and solutions in vehicular adhoc network  a review approach
Security issues and solutions in vehicular adhoc network a review approachcsandit
 
Improved safety IRP using VANET
Improved safety IRP using VANETImproved safety IRP using VANET
Improved safety IRP using VANETRama Maliya
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSSridhar Raghavan
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANETPallavi Agarwal
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography Pallavi Agarwal
 
V2V Training, Vehicle to-vehicle (v2v) communications training
V2V Training, Vehicle to-vehicle (v2v) communications trainingV2V Training, Vehicle to-vehicle (v2v) communications training
V2V Training, Vehicle to-vehicle (v2v) communications trainingBryan Len
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANETSarah Baras
 
Malicious node detection in vanet
Malicious node detection in vanetMalicious node detection in vanet
Malicious node detection in vanetVYSAKHMANAYATH
 
Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)Prof Ansari
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement Dr.Irshad Ahmed Sumra
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challengesBehroz Zarrinfar
 
Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Ashok Mishra
 

Mais procurados (20)

Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour DetectionRestricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
 
Taking VANET to the Clouds
Taking VANET to the CloudsTaking VANET to the Clouds
Taking VANET to the Clouds
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
VANET overview & technical review
VANET overview &  technical reviewVANET overview &  technical review
VANET overview & technical review
 
Security issues and solutions in vehicular adhoc network a review approach
Security issues and solutions in vehicular adhoc network  a review approachSecurity issues and solutions in vehicular adhoc network  a review approach
Security issues and solutions in vehicular adhoc network a review approach
 
Improved safety IRP using VANET
Improved safety IRP using VANETImproved safety IRP using VANET
Improved safety IRP using VANET
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkS
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANET
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
 
V2V Training, Vehicle to-vehicle (v2v) communications training
V2V Training, Vehicle to-vehicle (v2v) communications trainingV2V Training, Vehicle to-vehicle (v2v) communications training
V2V Training, Vehicle to-vehicle (v2v) communications training
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANET
 
Malicious node detection in vanet
Malicious node detection in vanetMalicious node detection in vanet
Malicious node detection in vanet
 
Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challenges
 
Vanet Presentation
Vanet PresentationVanet Presentation
Vanet Presentation
 
Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 

Destaque

Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 ProtocolMiles Kevin Galario
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemMonaco Motors
 
Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)Brijesh Kaushik
 
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechtureHina Saxena
 
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...GPRS MYGPRSEXPRESS
 

Destaque (8)

Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
 
Mobile IP 1
Mobile IP 1Mobile IP 1
Mobile IP 1
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication System
 
Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)
 
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechture
 
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
 
GSM ARCHITECTURE
GSM ARCHITECTUREGSM ARCHITECTURE
GSM ARCHITECTURE
 
GPRS
GPRSGPRS
GPRS
 

Semelhante a Do s attacks in vanet presentation in vanet

B130912
B130912B130912
B130912irjes
 
Providing Location Security in Vehicular Networks
Providing Location Security in Vehicular NetworksProviding Location Security in Vehicular Networks
Providing Location Security in Vehicular NetworksMichele Weigle
 
cheat_sheet _isp.pdf
cheat_sheet _isp.pdfcheat_sheet _isp.pdf
cheat_sheet _isp.pdfJiananWang21
 
Bro Policy Assignment
Bro Policy AssignmentBro Policy Assignment
Bro Policy AssignmentTara Hardin
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876Momita Sharma
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...IJERA Editor
 
Secure mac protocols for manet.pptx
Secure mac protocols for manet.pptxSecure mac protocols for manet.pptx
Secure mac protocols for manet.pptxNitaGopal1
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...ijdpsjournal
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSystem ID Warehouse
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsAlison Hall
 
Panda lacotion
Panda lacotionPanda lacotion
Panda lacotiongeleya
 
Anatomy of an Attack
Anatomy of an AttackAnatomy of an Attack
Anatomy of an Attackspoofyroot
 

Semelhante a Do s attacks in vanet presentation in vanet (20)

B130912
B130912B130912
B130912
 
DamballaOverview
DamballaOverviewDamballaOverview
DamballaOverview
 
eChallenges2005 Seinit
eChallenges2005 SeiniteChallenges2005 Seinit
eChallenges2005 Seinit
 
M026075079
M026075079M026075079
M026075079
 
VANET
VANETVANET
VANET
 
Providing Location Security in Vehicular Networks
Providing Location Security in Vehicular NetworksProviding Location Security in Vehicular Networks
Providing Location Security in Vehicular Networks
 
cheat_sheet _isp.pdf
cheat_sheet _isp.pdfcheat_sheet _isp.pdf
cheat_sheet _isp.pdf
 
Bro Policy Assignment
Bro Policy AssignmentBro Policy Assignment
Bro Policy Assignment
 
Euro mGov Securing Mobile Services
Euro mGov Securing Mobile ServicesEuro mGov Securing Mobile Services
Euro mGov Securing Mobile Services
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
 
Double guard
Double guardDouble guard
Double guard
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
 
Ppt
PptPpt
Ppt
 
Secure mac protocols for manet.pptx
Secure mac protocols for manet.pptxSecure mac protocols for manet.pptx
Secure mac protocols for manet.pptx
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention Systems
 
Panda lacotion
Panda lacotionPanda lacotion
Panda lacotion
 
Anatomy of an Attack
Anatomy of an AttackAnatomy of an Attack
Anatomy of an Attack
 

Último

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 

Último (20)

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 

Do s attacks in vanet presentation in vanet

  • 1. Securing vehicular ad hoc network Sirojiddin Jurayev
  • 2. What is a VANET (Vehicular Ad hoc NETwork)? Roadside base station Emergency event Inter-vehicle communications Vehicle-to-roadside communications • Communication: typically over the Dedicated Short Range Communications (DSRC) (5.9 GHz) • Example of protocol: IEEE 802.11p
  • 3. A taxonomy of vehicular communication systems 3
  • 4. A Modern Vehicle Event data recorder (EDR) Positioning system (GPS) Forward radar Communication facility Rear radar Display Human-Machine Interface Computing platform A modern vehicle is a network of sensors/actuators on wheels ! 4
  • 5. Attackers  Insider or outsider  Insider– valid user  Outsider – Intruder, limited attack options  Malicious or rational  Malicious – No personal benefit, intends to harm other users  Rational – seeks personal benefits, more predictable attack  Active or passive  Active:Generates packets, participates in the network  Passive: Eavesdrop, track users
  • 6. Security Attacks Goals Actions Execution Congestion Insert bogus Creation/ congestion Single avoidance warnings Cause accidents Misrepresent Single, multiple or pile-ups Location of Entities (Sybil) accident Track Message Multiple individuals suppression Aggressive insertion Denial of service of messages/jamming Independent Colluding
  • 7. Security Requirements  Authentication:  React only to legitimate events. Authenticate senders of messages.  Verification of data consistency  Legitimate senders can send false data (attack/unintentional). Can cause immense damage even fatalities.  Availability  Network should be available under jamming attacks  Non-repudiation  Drivers causing accidents should be reliably identified  Privacy (conflicts with authentication)  Privacy of drivers against unauthorized observers.  Real-time constraints  High speed means constraints on time
  • 8. Attack 1 : Bogus traffic information Traffic jam ahead Attacker: insider, rational, active 8
  • 9. Attack 2 : Generate “Intelligent Collisions” SLOW DOWN The way is clear Attacker: insider, malicious, active 9
  • 10. Attack 3: Cheating with identity, speed, or position Wasn’t me! Attacker: insider, rational, active 10
  • 11. Attack 4: Jamming Roadside base station Jammer 11
  • 12. Attack 5: Tunnel Wrong information Physical tunnel or jammed area 12
  • 13. Proposed solution module for DoS attack
  • 15.  Using switching technology  Study case of different position of vehicles according to GPS position. Ex. In highway we can use WiMax technology, in city we can use Wifi or Bluetooth etc.  If jamming attack detected then node tries to change channel. Attacker power may not be so high in order cover all channels. If so higher power might detect easily by using other methods.  Problem.  1. Is it possible for listen different position wireless networks same time.