2. What is a VANET (Vehicular Ad hoc
NETwork)?
Roadside
base station
Emergency
event
Inter-vehicle
communications
Vehicle-to-roadside
communications
• Communication: typically over the Dedicated Short Range Communications
(DSRC) (5.9 GHz)
• Example of protocol: IEEE 802.11p
4. A Modern Vehicle
Event data recorder (EDR)
Positioning system (GPS)
Forward radar
Communication
facility
Rear radar
Display
Human-Machine Interface Computing platform
A modern vehicle is a network of sensors/actuators on wheels !
4
5. Attackers
Insider or outsider
Insider– valid user
Outsider – Intruder, limited attack options
Malicious or rational
Malicious – No personal benefit, intends to harm
other users
Rational – seeks personal benefits, more predictable
attack
Active or passive
Active:Generates packets, participates in the network
Passive: Eavesdrop, track users
6. Security Attacks
Goals Actions Execution
Congestion Insert bogus
Creation/ congestion Single
avoidance warnings
Cause accidents Misrepresent Single, multiple
or pile-ups Location of Entities (Sybil)
accident
Track Message
Multiple
individuals suppression
Aggressive insertion
Denial of service of messages/jamming Independent Colluding
7. Security Requirements
Authentication:
React only to legitimate events. Authenticate senders of
messages.
Verification of data consistency
Legitimate senders can send false data (attack/unintentional). Can
cause immense damage even fatalities.
Availability
Network should be available under jamming attacks
Non-repudiation
Drivers causing accidents should be reliably identified
Privacy (conflicts with authentication)
Privacy of drivers against unauthorized observers.
Real-time constraints
High speed means constraints on time
8. Attack 1 : Bogus traffic information
Traffic
jam
ahead
Attacker: insider, rational, active
8
9. Attack 2 : Generate “Intelligent Collisions”
SLOW
DOWN
The way
is clear
Attacker: insider, malicious, active
9
10. Attack 3: Cheating with identity, speed, or position
Wasn’t me!
Attacker: insider, rational, active
10
15. Using switching technology
Study case of different position of vehicles
according to GPS position. Ex. In highway we can
use WiMax technology, in city we can use Wifi or
Bluetooth etc.
If jamming attack detected then node tries to
change channel. Attacker power may not be so
high in order cover all channels. If so higher
power might detect easily by using other
methods.
Problem.
1. Is it possible for listen different position
wireless networks same time.