SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
Introduction to VANET
                   Scenarios
      Security Requirements
       Privacy Requirements
                Bibliography




  The Security and Privacy
    Requirements in VANET

             Ankit Singh
mailto:ankit.singh@sit.fraunhofer.de


                   June 24, 2011




                Ankit Singh    The Security and Privacy Requirements in VANET
Introduction to VANET
                                 Scenarios
                    Security Requirements
                     Privacy Requirements
                              Bibliography




1   Introduction to VANET
       History
       Overview
       Overview of Basic Components in VANETs

2   Scenarios
      Vehicle to Vehicle Communication
      Vehicle to Infrastructure Communication

3   Security Requirements

4   Privacy Requirements

5   Bibliography


                              Ankit Singh    The Security and Privacy Requirements in VANET
Introduction to VANET
                              Scenarios   History
                 Security Requirements    Overview
                  Privacy Requirements    Overview of Basic Components in VANETs
                           Bibliography


History of Vehicles I




             Figure: Cars were Pure Mechanical Devices

                           Ankit Singh    The Security and Privacy Requirements in VANET
Introduction to VANET
                                 Scenarios   History
                    Security Requirements    Overview
                     Privacy Requirements    Overview of Basic Components in VANETs
                              Bibliography


History of Vehicles II




     Figure: Todays cars with almost fully controlled Software devices



                              Ankit Singh    The Security and Privacy Requirements in VANET
Introduction to VANET
                                  Scenarios   History
                     Security Requirements    Overview
                      Privacy Requirements    Overview of Basic Components in VANETs
                               Bibliography


History of Vehicles III




  Figure: Future smart cars fully controlled by softwares (Concept model of
  Audi A9 will repairs itself)



                               Ankit Singh    The Security and Privacy Requirements in VANET
Introduction to VANET
                               Scenarios   History
                  Security Requirements    Overview
                   Privacy Requirements    Overview of Basic Components in VANETs
                            Bibliography


What is VANET? I

     Vehicles Transformed into “Computers on the Wheels” or
     “Networks on the Wheel”
     Vehicular Communication System (VCS):- Two main type of
     communications
         Vehicle to Vehicle (V2V) Communication:-
         Vehicle to Infrastructure (V2I) communication:-
     Advantage and Usage of VCS:-
         Information sharing
         Co-operative driving
         Other value added services like Navigation, internet access etc.
     Communication between C2C adn C2I are “ad-hoc” in nature.
     This special kind of communication network is known as
     “Vehicular Ad-hoc Network (VANET)”

                            Ankit Singh    The Security and Privacy Requirements in VANET
Introduction to VANET
                              Scenarios   History
                 Security Requirements    Overview
                  Privacy Requirements    Overview of Basic Components in VANETs
                           Bibliography


What is VANET? II
     VANET will become Worlds largest ad-hoc network




                           Ankit Singh    The Security and Privacy Requirements in VANET
Introduction to VANET
                           Scenarios   History
              Security Requirements    Overview
               Privacy Requirements    Overview of Basic Components in VANETs
                        Bibliography


Why we need VANET? I




                        Ankit Singh    The Security and Privacy Requirements in VANET
Introduction to VANET
                            Scenarios   History
               Security Requirements    Overview
                Privacy Requirements    Overview of Basic Components in VANETs
                         Bibliography


Overview of Basic Components in VANETs I




             Figure: Basic Component of VANET

                         Ankit Singh    The Security and Privacy Requirements in VANET
Introduction to VANET
                               Scenarios   History
                  Security Requirements    Overview
                   Privacy Requirements    Overview of Basic Components in VANETs
                            Bibliography


Overview of Basic Components in VANETs II
     Communication:- Wireless Access in Vehicular Environment
     (WAVE): IEEE 1609.2 Standard also Known DSRC 802.11p .
     Supports Multi-Hop communication for vehicles out of range
     (Max. Range DSRC is 1000m)
     On-Board Unit (OBU):- A device which is inside the vehicle
     which -
         processes the data collected from various sensors fitted inside
         the cars and gives conditions of the vehicles
         is responsible for communication with outside network i.e with
         other vehicles and infrastructure.
     Road Side Unit (RSU): Infrastructure for communication
     between the cars for sharing and information from various
     vehicles.

                            Ankit Singh    The Security and Privacy Requirements in VANET
Introduction to VANET
                                Scenarios
                                            Vehicle to Vehicle Communication
                   Security Requirements
                                            Vehicle to Infrastructure Communication
                    Privacy Requirements
                             Bibliography


Vehicle to Vehicle Communication I




                         Figure: Scenarios in V2V


  Possible Threat Scenarios in V2V above:-
      Pre-crash warning:- trust on the warning message, Denial of
      Service, Jamming
      Traffic condition warning:- Linkablity of Private Credentials
      (Tracking/profiling), Message fabrication/tamper
                             Ankit Singh    The Security and Privacy Requirements in VANET
Introduction to VANET
                               Scenarios
                                           Vehicle to Vehicle Communication
                  Security Requirements
                                           Vehicle to Infrastructure Communication
                   Privacy Requirements
                            Bibliography


Vehicle to Vehicle Communication II
      Vehicle Status Warning:- Drops/Tamper Message




                            Ankit Singh    The Security and Privacy Requirements in VANET
Introduction to VANET
                             Scenarios
                                         Vehicle to Vehicle Communication
                Security Requirements
                                         Vehicle to Infrastructure Communication
                 Privacy Requirements
                          Bibliography


Vehicle to Infrastructure Communication I




                       Figure: Scenarios in V2I



                          Ankit Singh    The Security and Privacy Requirements in VANET
Introduction to VANET
                                 Scenarios
                                             Vehicle to Vehicle Communication
                    Security Requirements
                                             Vehicle to Infrastructure Communication
                     Privacy Requirements
                              Bibliography


Vehicle to Infrastructure Communication II
  Possible Threat in Scenarios of V2I above:-
      Electronic Toll collection/Automatic access control/parking
      access:- Privacy Violation, Impersonation,
      Infotainment:- Penetration attack, Privacy violation
      Remote Fleet Management:- Tracking/Profiling
      Tax payment: The authority can link or indentify using
      previous transaction or other vehicle can hack transaction
      information and reveal the identity of the sender.




                              Ankit Singh    The Security and Privacy Requirements in VANET
Introduction to VANET
                                   Scenarios
                      Security Requirements
                       Privacy Requirements
                                Bibliography


Security Requirements I

  Various Security Requirements for VANET’s:-
      Authentication
      Accountability
      Verification of Data Consistency
      Availability
      Non-Repudiation
      Credential revocation




                                Ankit Singh    The Security and Privacy Requirements in VANET
Introduction to VANET
                                 Scenarios
                    Security Requirements
                     Privacy Requirements
                              Bibliography


Privacy Requirements I

  Various Privacy Requirements for VANET’s:-
      Anonymity
      Unlinkablility
      Restricted credential usage
      Perfect forward Privacy




                              Ankit Singh    The Security and Privacy Requirements in VANET
Introduction to VANET
                                         Scenarios
                            Security Requirements
                             Privacy Requirements
                                      Bibliography


Bibliography I
     Security Engineering for Vehicular IT Systems, Improving the Trustworthiness and Dependability of
     Automotive IT Applications, Marko Wolf

     How much does software add to the cost of today’s vehicles? How about tomorrow’s electric cars? by
     Sebastian Blanco on Jun 8th 2010, at Auto Blog Green: autobloggreen.com

     Design of 5.9GHz DSRC-based Vehicular Safety Communication, Daniel Jiang1 , Vikas Taliwal1 , Andreas
     Meier1 , Wieland Holfelder1 , Ralf Herrtwich2 , 1 DaimlerChrysler Research and Technology North America,
     Inc., 2 DaimlerChrysler AG, Vehicle IT and Services Research and Advanced Engineering

     DSRC range comparison with FM Radio, cellular Phone, Satellite, Check FAQs

     Security in Vehicular Ad Hoc Networks, Xiaodong Lin, Rongxing Lu, Chenxi Zhang, Haojin Zhu, Pin-Han
     Ho, and Xuemin (Sherman) Shen, University of Waterloo

     Privacy Requirements in Vehicular Communications Systems, Florian Schaub, Zhendong Ma, and Frank
     Kargl, Institute of Media Informatics, Ulm University, Germany

     The Security of Vehicular Ad Hoc Networks, Maxim Raya and Jean-Pierre Hubaux, Laboratory of computer
     Communications and Applications (LCA), School of Computer and Communication Sciences, EPFL,
     Switzerland




                                       Ankit Singh       The Security and Privacy Requirements in VANET
Introduction to VANET
                                          Scenarios
                             Security Requirements
                              Privacy Requirements
                                       Bibliography


Bibliography II
      Securing Vehicular Communications, Maxim Raya, Panos Papadimitratos, Jean-Pierre Hubaux, Laboratory
      of computer Communications and Applications (LCA), School of Computer and Communication Sciences,
      EPFL, Switzerland

      Security Engineering for VANETs, Frank Kargl, Zhendong Ma, and Elmar Schoch, Ulm University, Institute
      of Media Informatics
      Privacy in VANETs using Changing Pseudonyms - Ideal and Real, Matthias Gerlach and Felix G¨ttler
                                                                                                u

      Adaptive Privacy-Preserving Authentication in Vehicular Networks (Invited Paper) Kewi Sha1 , Yong Xi1 ,
      Weisong Shi1 , Loren Schwiebert1 , and Tao Zhang2 , 1 Department of computer Science, Wayne state
      University, 2 Telcordia Technologies, Inc.

      Strong and Affordable Location Privacy in VANETs: Identity Diffusion Using Time-Slots and Swapping,
      David Eckhoff , Christoph Sommer , Tobias Gansen† , Reinhard German and Falko Dressler∗ ,
      ∗
       Computer Networks and Communication Systems, Dept. of Computer Science, University of Erlangen,
      Germany, † Audi Electronics Venture GmbH, Gaimersheim, Germany

      Current Trends in Vehicular Ad Hoc Networks, Ghassan M. T. Abdalla∗ , Mosa Ali Abu-Rgheff∗ and Sidi
      Mohammad Senouci∗∗ , ∗ University of Plymouth - School of Computing, Communications & Electronics,
      UK, ∗∗ France T´l´com - Recherche et D´veloppment CORE, France
                     ee                     e




                                        Ankit Singh       The Security and Privacy Requirements in VANET

Weitere ähnliche Inhalte

Was ist angesagt?

V2V communications
V2V communicationsV2V communications
V2V communicationsSai Avinash
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communicationAbdullah Khosa
 
Adaptive Cruise control
Adaptive Cruise controlAdaptive Cruise control
Adaptive Cruise controlShijo T Daniel
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challengesBehroz Zarrinfar
 
Collision Avoidance System
Collision Avoidance SystemCollision Avoidance System
Collision Avoidance SystemSiddharth Mehta
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANETSarah Baras
 
Connected Car Security
Connected Car SecurityConnected Car Security
Connected Car SecuritySuresh Mandava
 
vechile to vechile communication
vechile to vechile communicationvechile to vechile communication
vechile to vechile communicationSangita Das
 
Machine Learning for Self-Driving Cars
Machine Learning for Self-Driving CarsMachine Learning for Self-Driving Cars
Machine Learning for Self-Driving CarsJan Wiegelmann
 
Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)Priyanka Aash
 
Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...Dr. Anish Cheriyan (PhD)
 
Advanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadAdvanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadNishanth C
 
Various Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANETVarious Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANETKishan Patel
 
collision avoidance system,automobile technology,safety systems in car
collision avoidance system,automobile technology,safety systems in carcollision avoidance system,automobile technology,safety systems in car
collision avoidance system,automobile technology,safety systems in carSai Ram Vakkalagadda
 
IoT services in the automotive sector
IoT services in the automotive sectorIoT services in the automotive sector
IoT services in the automotive sectorPRIME
 
Consolidation of Instrument Cluster and In Vehicle Infotainment
Consolidation of Instrument Cluster and In Vehicle InfotainmentConsolidation of Instrument Cluster and In Vehicle Infotainment
Consolidation of Instrument Cluster and In Vehicle InfotainmentKarolina Janowicz
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communicationMrityunjaya Chauhan
 
Enabling the Connected Car Revolution

Enabling the Connected Car Revolution
Enabling the Connected Car Revolution

Enabling the Connected Car Revolution
Cloudera, Inc.
 

Was ist angesagt? (20)

VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
V2V communications
V2V communicationsV2V communications
V2V communications
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communication
 
Adaptive Cruise control
Adaptive Cruise controlAdaptive Cruise control
Adaptive Cruise control
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challenges
 
Collision Avoidance System
Collision Avoidance SystemCollision Avoidance System
Collision Avoidance System
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANET
 
Connected Car Security
Connected Car SecurityConnected Car Security
Connected Car Security
 
vechile to vechile communication
vechile to vechile communicationvechile to vechile communication
vechile to vechile communication
 
Machine Learning for Self-Driving Cars
Machine Learning for Self-Driving CarsMachine Learning for Self-Driving Cars
Machine Learning for Self-Driving Cars
 
Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)
 
Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...
 
Advanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadAdvanced vehicle security system 2016 upload
Advanced vehicle security system 2016 upload
 
Various Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANETVarious Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANET
 
collision avoidance system,automobile technology,safety systems in car
collision avoidance system,automobile technology,safety systems in carcollision avoidance system,automobile technology,safety systems in car
collision avoidance system,automobile technology,safety systems in car
 
IoT services in the automotive sector
IoT services in the automotive sectorIoT services in the automotive sector
IoT services in the automotive sector
 
Consolidation of Instrument Cluster and In Vehicle Infotainment
Consolidation of Instrument Cluster and In Vehicle InfotainmentConsolidation of Instrument Cluster and In Vehicle Infotainment
Consolidation of Instrument Cluster and In Vehicle Infotainment
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communication
 
Enabling the Connected Car Revolution

Enabling the Connected Car Revolution
Enabling the Connected Car Revolution

Enabling the Connected Car Revolution

 

Ähnlich wie The Security and Privacy Requirements in VANET

Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour DetectionRestricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour DetectionAnkit Singh
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETDr.Irshad Ahmed Sumra
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveyDr.Irshad Ahmed Sumra
 
Automotive Security.docx
Automotive Security.docxAutomotive Security.docx
Automotive Security.docxurshari
 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETDr.Irshad Ahmed Sumra
 
VANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEWVANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
 
VANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEWVANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
 
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...apidays
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Dr.Irshad Ahmed Sumra
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
 
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2rpark31
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETIJNSA Journal
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETIJNSA Journal
 
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannotapidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannotapidays
 
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdfYounesChafi1
 
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapSecurity and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapMaanak Gupta, Ph.D.
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network IRJET Journal
 
SecureΙοΤ CCAD use case pitch presentation
SecureΙοΤ CCAD use case pitch presentationSecureΙοΤ CCAD use case pitch presentation
SecureΙοΤ CCAD use case pitch presentationMariza Konidi
 

Ähnlich wie The Security and Privacy Requirements in VANET (20)

Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour DetectionRestricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A Survey
 
Automotive Security.docx
Automotive Security.docxAutomotive Security.docx
Automotive Security.docx
 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
 
VANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEWVANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEW
 
VANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEWVANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEW
 
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
 
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
 
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannotapidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
 
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf
 
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapSecurity and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network
 
SecureΙοΤ CCAD use case pitch presentation
SecureΙοΤ CCAD use case pitch presentationSecureΙοΤ CCAD use case pitch presentation
SecureΙοΤ CCAD use case pitch presentation
 
VANET Security and Trust
VANET Security and TrustVANET Security and Trust
VANET Security and Trust
 

Mehr von Ankit Singh

IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...
IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...
IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...Ankit Singh
 
Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Ankit Singh
 
Parallex - The Supercomputer
Parallex - The SupercomputerParallex - The Supercomputer
Parallex - The SupercomputerAnkit Singh
 
Cooperative Linux
Cooperative LinuxCooperative Linux
Cooperative LinuxAnkit Singh
 
Design Alternative for Parallel Systems
Design Alternative for Parallel SystemsDesign Alternative for Parallel Systems
Design Alternative for Parallel SystemsAnkit Singh
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingAnkit Singh
 
Master Teset Specification SRCP
Master Teset Specification SRCPMaster Teset Specification SRCP
Master Teset Specification SRCPAnkit Singh
 
MicazXpl Intelligent Sensors Network Project Presentation
MicazXpl Intelligent Sensors Network Project PresentationMicazXpl Intelligent Sensors Network Project Presentation
MicazXpl Intelligent Sensors Network Project PresentationAnkit Singh
 
Micazxpl - Intelligent Sensors Network project report
Micazxpl - Intelligent Sensors Network project reportMicazxpl - Intelligent Sensors Network project report
Micazxpl - Intelligent Sensors Network project reportAnkit Singh
 
DO-178B/ED-12B Presentation
DO-178B/ED-12B PresentationDO-178B/ED-12B Presentation
DO-178B/ED-12B PresentationAnkit Singh
 
Toilet etiquettes
Toilet etiquettesToilet etiquettes
Toilet etiquettesAnkit Singh
 
Indian German Unity
Indian German UnityIndian German Unity
Indian German UnityAnkit Singh
 
TINYOS Oscilloscope Application
TINYOS Oscilloscope ApplicationTINYOS Oscilloscope Application
TINYOS Oscilloscope ApplicationAnkit Singh
 
Mote Mote Radio Communication
Mote Mote Radio CommunicationMote Mote Radio Communication
Mote Mote Radio CommunicationAnkit Singh
 
TinyOS installation Guide And Manual
TinyOS installation Guide And ManualTinyOS installation Guide And Manual
TinyOS installation Guide And ManualAnkit Singh
 
Simple Railroad Command Protocol
Simple Railroad Command ProtocolSimple Railroad Command Protocol
Simple Railroad Command ProtocolAnkit Singh
 
Dane presentation
Dane presentationDane presentation
Dane presentationAnkit Singh
 
Anti Collision Railways System
Anti Collision Railways SystemAnti Collision Railways System
Anti Collision Railways SystemAnkit Singh
 
Software Fault Tolerance
Software Fault ToleranceSoftware Fault Tolerance
Software Fault ToleranceAnkit Singh
 

Mehr von Ankit Singh (19)

IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...
IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...
IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...
 
Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)
 
Parallex - The Supercomputer
Parallex - The SupercomputerParallex - The Supercomputer
Parallex - The Supercomputer
 
Cooperative Linux
Cooperative LinuxCooperative Linux
Cooperative Linux
 
Design Alternative for Parallel Systems
Design Alternative for Parallel SystemsDesign Alternative for Parallel Systems
Design Alternative for Parallel Systems
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
 
Master Teset Specification SRCP
Master Teset Specification SRCPMaster Teset Specification SRCP
Master Teset Specification SRCP
 
MicazXpl Intelligent Sensors Network Project Presentation
MicazXpl Intelligent Sensors Network Project PresentationMicazXpl Intelligent Sensors Network Project Presentation
MicazXpl Intelligent Sensors Network Project Presentation
 
Micazxpl - Intelligent Sensors Network project report
Micazxpl - Intelligent Sensors Network project reportMicazxpl - Intelligent Sensors Network project report
Micazxpl - Intelligent Sensors Network project report
 
DO-178B/ED-12B Presentation
DO-178B/ED-12B PresentationDO-178B/ED-12B Presentation
DO-178B/ED-12B Presentation
 
Toilet etiquettes
Toilet etiquettesToilet etiquettes
Toilet etiquettes
 
Indian German Unity
Indian German UnityIndian German Unity
Indian German Unity
 
TINYOS Oscilloscope Application
TINYOS Oscilloscope ApplicationTINYOS Oscilloscope Application
TINYOS Oscilloscope Application
 
Mote Mote Radio Communication
Mote Mote Radio CommunicationMote Mote Radio Communication
Mote Mote Radio Communication
 
TinyOS installation Guide And Manual
TinyOS installation Guide And ManualTinyOS installation Guide And Manual
TinyOS installation Guide And Manual
 
Simple Railroad Command Protocol
Simple Railroad Command ProtocolSimple Railroad Command Protocol
Simple Railroad Command Protocol
 
Dane presentation
Dane presentationDane presentation
Dane presentation
 
Anti Collision Railways System
Anti Collision Railways SystemAnti Collision Railways System
Anti Collision Railways System
 
Software Fault Tolerance
Software Fault ToleranceSoftware Fault Tolerance
Software Fault Tolerance
 

Kürzlich hochgeladen

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Kürzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

The Security and Privacy Requirements in VANET

  • 1. Introduction to VANET Scenarios Security Requirements Privacy Requirements Bibliography The Security and Privacy Requirements in VANET Ankit Singh mailto:ankit.singh@sit.fraunhofer.de June 24, 2011 Ankit Singh The Security and Privacy Requirements in VANET
  • 2. Introduction to VANET Scenarios Security Requirements Privacy Requirements Bibliography 1 Introduction to VANET History Overview Overview of Basic Components in VANETs 2 Scenarios Vehicle to Vehicle Communication Vehicle to Infrastructure Communication 3 Security Requirements 4 Privacy Requirements 5 Bibliography Ankit Singh The Security and Privacy Requirements in VANET
  • 3. Introduction to VANET Scenarios History Security Requirements Overview Privacy Requirements Overview of Basic Components in VANETs Bibliography History of Vehicles I Figure: Cars were Pure Mechanical Devices Ankit Singh The Security and Privacy Requirements in VANET
  • 4. Introduction to VANET Scenarios History Security Requirements Overview Privacy Requirements Overview of Basic Components in VANETs Bibliography History of Vehicles II Figure: Todays cars with almost fully controlled Software devices Ankit Singh The Security and Privacy Requirements in VANET
  • 5. Introduction to VANET Scenarios History Security Requirements Overview Privacy Requirements Overview of Basic Components in VANETs Bibliography History of Vehicles III Figure: Future smart cars fully controlled by softwares (Concept model of Audi A9 will repairs itself) Ankit Singh The Security and Privacy Requirements in VANET
  • 6. Introduction to VANET Scenarios History Security Requirements Overview Privacy Requirements Overview of Basic Components in VANETs Bibliography What is VANET? I Vehicles Transformed into “Computers on the Wheels” or “Networks on the Wheel” Vehicular Communication System (VCS):- Two main type of communications Vehicle to Vehicle (V2V) Communication:- Vehicle to Infrastructure (V2I) communication:- Advantage and Usage of VCS:- Information sharing Co-operative driving Other value added services like Navigation, internet access etc. Communication between C2C adn C2I are “ad-hoc” in nature. This special kind of communication network is known as “Vehicular Ad-hoc Network (VANET)” Ankit Singh The Security and Privacy Requirements in VANET
  • 7. Introduction to VANET Scenarios History Security Requirements Overview Privacy Requirements Overview of Basic Components in VANETs Bibliography What is VANET? II VANET will become Worlds largest ad-hoc network Ankit Singh The Security and Privacy Requirements in VANET
  • 8. Introduction to VANET Scenarios History Security Requirements Overview Privacy Requirements Overview of Basic Components in VANETs Bibliography Why we need VANET? I Ankit Singh The Security and Privacy Requirements in VANET
  • 9. Introduction to VANET Scenarios History Security Requirements Overview Privacy Requirements Overview of Basic Components in VANETs Bibliography Overview of Basic Components in VANETs I Figure: Basic Component of VANET Ankit Singh The Security and Privacy Requirements in VANET
  • 10. Introduction to VANET Scenarios History Security Requirements Overview Privacy Requirements Overview of Basic Components in VANETs Bibliography Overview of Basic Components in VANETs II Communication:- Wireless Access in Vehicular Environment (WAVE): IEEE 1609.2 Standard also Known DSRC 802.11p . Supports Multi-Hop communication for vehicles out of range (Max. Range DSRC is 1000m) On-Board Unit (OBU):- A device which is inside the vehicle which - processes the data collected from various sensors fitted inside the cars and gives conditions of the vehicles is responsible for communication with outside network i.e with other vehicles and infrastructure. Road Side Unit (RSU): Infrastructure for communication between the cars for sharing and information from various vehicles. Ankit Singh The Security and Privacy Requirements in VANET
  • 11. Introduction to VANET Scenarios Vehicle to Vehicle Communication Security Requirements Vehicle to Infrastructure Communication Privacy Requirements Bibliography Vehicle to Vehicle Communication I Figure: Scenarios in V2V Possible Threat Scenarios in V2V above:- Pre-crash warning:- trust on the warning message, Denial of Service, Jamming Traffic condition warning:- Linkablity of Private Credentials (Tracking/profiling), Message fabrication/tamper Ankit Singh The Security and Privacy Requirements in VANET
  • 12. Introduction to VANET Scenarios Vehicle to Vehicle Communication Security Requirements Vehicle to Infrastructure Communication Privacy Requirements Bibliography Vehicle to Vehicle Communication II Vehicle Status Warning:- Drops/Tamper Message Ankit Singh The Security and Privacy Requirements in VANET
  • 13. Introduction to VANET Scenarios Vehicle to Vehicle Communication Security Requirements Vehicle to Infrastructure Communication Privacy Requirements Bibliography Vehicle to Infrastructure Communication I Figure: Scenarios in V2I Ankit Singh The Security and Privacy Requirements in VANET
  • 14. Introduction to VANET Scenarios Vehicle to Vehicle Communication Security Requirements Vehicle to Infrastructure Communication Privacy Requirements Bibliography Vehicle to Infrastructure Communication II Possible Threat in Scenarios of V2I above:- Electronic Toll collection/Automatic access control/parking access:- Privacy Violation, Impersonation, Infotainment:- Penetration attack, Privacy violation Remote Fleet Management:- Tracking/Profiling Tax payment: The authority can link or indentify using previous transaction or other vehicle can hack transaction information and reveal the identity of the sender. Ankit Singh The Security and Privacy Requirements in VANET
  • 15. Introduction to VANET Scenarios Security Requirements Privacy Requirements Bibliography Security Requirements I Various Security Requirements for VANET’s:- Authentication Accountability Verification of Data Consistency Availability Non-Repudiation Credential revocation Ankit Singh The Security and Privacy Requirements in VANET
  • 16. Introduction to VANET Scenarios Security Requirements Privacy Requirements Bibliography Privacy Requirements I Various Privacy Requirements for VANET’s:- Anonymity Unlinkablility Restricted credential usage Perfect forward Privacy Ankit Singh The Security and Privacy Requirements in VANET
  • 17. Introduction to VANET Scenarios Security Requirements Privacy Requirements Bibliography Bibliography I Security Engineering for Vehicular IT Systems, Improving the Trustworthiness and Dependability of Automotive IT Applications, Marko Wolf How much does software add to the cost of today’s vehicles? How about tomorrow’s electric cars? by Sebastian Blanco on Jun 8th 2010, at Auto Blog Green: autobloggreen.com Design of 5.9GHz DSRC-based Vehicular Safety Communication, Daniel Jiang1 , Vikas Taliwal1 , Andreas Meier1 , Wieland Holfelder1 , Ralf Herrtwich2 , 1 DaimlerChrysler Research and Technology North America, Inc., 2 DaimlerChrysler AG, Vehicle IT and Services Research and Advanced Engineering DSRC range comparison with FM Radio, cellular Phone, Satellite, Check FAQs Security in Vehicular Ad Hoc Networks, Xiaodong Lin, Rongxing Lu, Chenxi Zhang, Haojin Zhu, Pin-Han Ho, and Xuemin (Sherman) Shen, University of Waterloo Privacy Requirements in Vehicular Communications Systems, Florian Schaub, Zhendong Ma, and Frank Kargl, Institute of Media Informatics, Ulm University, Germany The Security of Vehicular Ad Hoc Networks, Maxim Raya and Jean-Pierre Hubaux, Laboratory of computer Communications and Applications (LCA), School of Computer and Communication Sciences, EPFL, Switzerland Ankit Singh The Security and Privacy Requirements in VANET
  • 18. Introduction to VANET Scenarios Security Requirements Privacy Requirements Bibliography Bibliography II Securing Vehicular Communications, Maxim Raya, Panos Papadimitratos, Jean-Pierre Hubaux, Laboratory of computer Communications and Applications (LCA), School of Computer and Communication Sciences, EPFL, Switzerland Security Engineering for VANETs, Frank Kargl, Zhendong Ma, and Elmar Schoch, Ulm University, Institute of Media Informatics Privacy in VANETs using Changing Pseudonyms - Ideal and Real, Matthias Gerlach and Felix G¨ttler u Adaptive Privacy-Preserving Authentication in Vehicular Networks (Invited Paper) Kewi Sha1 , Yong Xi1 , Weisong Shi1 , Loren Schwiebert1 , and Tao Zhang2 , 1 Department of computer Science, Wayne state University, 2 Telcordia Technologies, Inc. Strong and Affordable Location Privacy in VANETs: Identity Diffusion Using Time-Slots and Swapping, David Eckhoff , Christoph Sommer , Tobias Gansen† , Reinhard German and Falko Dressler∗ , ∗ Computer Networks and Communication Systems, Dept. of Computer Science, University of Erlangen, Germany, † Audi Electronics Venture GmbH, Gaimersheim, Germany Current Trends in Vehicular Ad Hoc Networks, Ghassan M. T. Abdalla∗ , Mosa Ali Abu-Rgheff∗ and Sidi Mohammad Senouci∗∗ , ∗ University of Plymouth - School of Computing, Communications & Electronics, UK, ∗∗ France T´l´com - Recherche et D´veloppment CORE, France ee e Ankit Singh The Security and Privacy Requirements in VANET