SlideShare ist ein Scribd-Unternehmen logo
1 von 52
VANET
Presented by: Ramu G
Outline
 Introduction
 Security Requirements
 System Model
 Communication Model
 Adversary Model
 Design Principles
What is VANET
Vehicular Ad–Hoc Network, or VANET
 a form of Mobile ad-hoc network
 provide communication
- among nearby vehicles
- between vehicles
- nearby fixed equipment
Introduction
 How vehicular communications work
- road-side infrastructure units (RSUs),
named network nodes, are equipped
with on-board processing and wireless
communication modules
How vehicular communications work
(Continue)
- vehicle-to-vehicle (V2V) and vehicle-to-infrastructure
(V2I) communication will be possible
What can VANET provide ?
Warnings!!!
Warnings!!!
traffic and road conditions
traffic and road conditions
What can VANET provide
The VANET can provide
 Safety
 Efficiency
 Traffic and road conditions
 Road signal alarm
 Local information
Related work
Research have been worked
 Outline challenges for VANET
- availablility, mobility
 Describe particular attacks
-DoS, alteration attacks
 Suggest solution towards attacks
This paper provide a basis for the development
of future vehicular security schemes
Security Requirements
SECURITY
Security Requirements
1. Message Authentication and Integrity
2. Message Non-Repudiation
3. Entity Authentication
4. Access Control Authorization
5. Message Confidentiality
6. Privacy and Anonymity
7. Availability
8. Liability Identification
Security Requirements
 Message Authentication and Integrity
- Message must be protected from any
alteration
 Message Non-Repudiation
- The sender of a message cannot deny having sent a
message
 Entity Authentication
- The receiver is ensured that the sender generated a
message
- The receiver has evidence of the liveness of the sender
Security Requirements
 Access Control
-determined locally by policies
- authorization established what each
node is allowed to do in the network
 Message Confidentiality
- the content of a message is kept
secret from those nodes that are not
authorized to access it
Security Requirements
Privacy and Anonymity
- vehicular communication (VC)
systems should not disclose
any personal and private
information of their users
- any observers should not know any future
actions of other nodes
- anonymity may not be a reasonable requirement
for all entities of the vehicular communications
system
Security Requirements
 Availability
- protocols and services should remain
operational even in the presence of
faults, malicious or benign
 Liability Identification
- users of vehicles are liable for their deliberate or
accidental actions that disrupt the operation of other
nodes
System Model
System Model
 Vehicular communications system
- Users
- Network nodes
- Authorities
System Model
Note. From “Securing Vehicular Communications – Assumptions, Requirements, and Principles,” by P. Papadimitratos,
V. Gligor, J-P Hubaux, In Proceedings of the Workshop on Embedded Security in Cars (ESCAR) 2006, November
2006.
System Model
 Users
- user is the owner or the
driver or a passenger
of the vehicle
 Network Nodes
- processes running on computing platforms
capable of wireless communication
- Mounted on vehicles and road-side units
(RSUs)
System Model
 Authorities
- public agencies or
corporations with
administrative powers
- for example, city or state
transportation authorities
System Model
 VC system operational assumptions
1. Authorities
2. Vehicle Identification and Credentials
3. Infrastructure Identification and Credentials
4. User Identification and Credentials
5. User and Vehicle Association
6. Trusted Components
System Model
 Authorities
- trusted entities or nodes
- issuing and manage identities and
credentials for vehicular network
- establish two-way communication with nodes
 Vehicle Identification and Credentials
- unique identity V
- a pair of private and public keys, kv and KV
- certificate CertX{KV, AV} issued by
authority X
- V denotes on-board central
processing and communication
module
System Model
Note. From “Securing Vehicular Communications – Assumptions, Requirements, and Principles,” by P.
Papadimitratos, V. Gligor, J-P Hubaux, In Proceedings of the Workshop on Embedded Security in
Cars (ESCAR) 2006, November 2006.
System Model
Infrastructure Identification and Credentials
- unique identity I
- a pair of private and public key kI and KI
- certificate CertZ{KI, AI} issued by authority Z
- gateway to the authorities
- gateway to the mobile vehicles
- RSUs’ locations are fixed
- public vehicles
-considered trustworthy
-be used to assist security
related operations
What are public vehicles ?
System Model
 User identification and Credentials
- Unique identity, U
- a pair of private and public keys, kU and KU
- Certificate CertY{KU , AU } issued by authority Y
 User and Vehicle Association
- user is the owner or the driver or a
passenger of the vehicle
- assume only one user can operate
a vehicle
- assume the user is the driver
System Model
 Trusted Components (TCs)
- nodes equipped with trusted components, i.e., built-in
hardware and firmware
- TCs enforce a policy on the interaction with
the on-board software
- Access to any information stored in the TCs and
modification of their functionality can be done only
by the interface provided by the TCs.
- perform cryptographic operations with signature
generations and verifications
Communication Model
Communication Model
 Model the wireless communication in
vehicular networks, whose connectivity can
change frequently
 Focus mainly on the data link layer
Communication Model
 Data-link layer primitives and assumption
 SendL(V,m) : transmits message m to node V within
radius R of the transmitting node
 BcastL(m) : broadcasts message m to all nodes
within radius R of the transmitting node
 ReceiveL(m) : receives message m transmitted by a
node within radius R of the receiver
 A link (W,V) exists when two nodes W and
V are able to communicate directly
Communication Model
 Links are either up or down, and their state does not
change faster than the transmission time of a single
packet
The network connectivity, at a particular
instance in time. Modeled as the graph G
the edges of which are all up links.
 Transmissions from W are received by all nodes V such
that (W, Vi) is up during the entire duration of the packet
transmission
Packets are delivered across an up link
within a maximum link delay τ or they are
not delivered at all.
Communication Model
 Communication across the network is
dependent on
 availability of sufficient resources
 bandwidth
- shared medium contend
- bandwidth can fluctuate
- unevenly distributed among neighbors
- links may be congested
Communication Model
 Communication Radius, R
 Vary over time
 Different classes of nodes may operate with different R
 Multi-domain and Highly Volatile
environment
 Nodes are not bound to administrative and geographical
boundaries
 Any two or more nodes communicate independently
Communication Model
 Frequent Broadcast Communication
 Most of the vehicular network traffic is Broadcasted at the
network or application layers
 Message are transmitted either
periodically or triggered by network events
 Transmission period is low
 Time-sensitive Communication
 Message delivery can be constrained by deadlines
- different messages have different delay requirements
Adversary Model
Adversary Model
 Network nodes
- correct or benign
- faulty or adversaries
- external adversaries
- Internal adversaries
- active adversaries
- passive adversaries
faulty is not always malicious!!!
Adversary Model
Internal Active
Adversaries
 Multiple adversarial nodes
- adversaries are
independent
- adversaries can collude
- based on TCs, colluding
adversaries are
prevented from exchanging
cryptographic material and
credentials
Adversary Model
 Internal Active Adversaries (continue)
 non-adaptive adversary  Adversarial nodes are fixed
 adaptive adversary  Adversarial nodes change over time
 Computationally bounded adversary
 adversaries are computationally limited
- limited resources and computational power
- the knowledge of an adversary is limited
- memory finite
Design Principles
 Default Network Access
 Locality and Timeliness as Privileges
 Visibility of Events
 Mandated (non-circumventable) Mediation
 Accountability
 Vehicle Autonomy
 Separation of Privilege
 Non-frameability
 Stage Response to Faulty Behavior
 Reconfigurability
 Privacy Conservation
 Usability
Questions / Comments
 THANK YOU !

Weitere ähnliche Inhalte

Ähnlich wie VANET Security: Authentication, Privacy and Communication

Vehicular adhoc network for communication
Vehicular adhoc network for communicationVehicular adhoc network for communication
Vehicular adhoc network for communicationathirayanpericse
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPTMeghaj Mallick
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18raymurphy9533
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-finASMA HADELI
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET Journal
 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksIRJET Journal
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANETPallavi Agarwal
 
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...IJMER
 
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...IRJET Journal
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography Pallavi Agarwal
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and HashingPallavi Agarwal
 

Ähnlich wie VANET Security: Authentication, Privacy and Communication (20)

Vehicular adhoc network for communication
Vehicular adhoc network for communicationVehicular adhoc network for communication
Vehicular adhoc network for communication
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPT
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-fin
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular Networks
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
VANET
VANETVANET
VANET
 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANET
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
 
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
 
Routing protocols in Vanet
Routing protocols in VanetRouting protocols in Vanet
Routing protocols in Vanet
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 

Kürzlich hochgeladen

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 

Kürzlich hochgeladen (20)

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 

VANET Security: Authentication, Privacy and Communication

  • 2. Outline  Introduction  Security Requirements  System Model  Communication Model  Adversary Model  Design Principles
  • 3.
  • 4. What is VANET Vehicular Ad–Hoc Network, or VANET  a form of Mobile ad-hoc network  provide communication - among nearby vehicles - between vehicles - nearby fixed equipment
  • 5. Introduction  How vehicular communications work - road-side infrastructure units (RSUs), named network nodes, are equipped with on-board processing and wireless communication modules
  • 6. How vehicular communications work (Continue) - vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication will be possible
  • 7.
  • 8. What can VANET provide ?
  • 11. traffic and road conditions
  • 12. traffic and road conditions
  • 13.
  • 14.
  • 15. What can VANET provide The VANET can provide  Safety  Efficiency  Traffic and road conditions  Road signal alarm  Local information
  • 16. Related work Research have been worked  Outline challenges for VANET - availablility, mobility  Describe particular attacks -DoS, alteration attacks  Suggest solution towards attacks This paper provide a basis for the development of future vehicular security schemes
  • 19. Security Requirements 1. Message Authentication and Integrity 2. Message Non-Repudiation 3. Entity Authentication 4. Access Control Authorization 5. Message Confidentiality 6. Privacy and Anonymity 7. Availability 8. Liability Identification
  • 20. Security Requirements  Message Authentication and Integrity - Message must be protected from any alteration  Message Non-Repudiation - The sender of a message cannot deny having sent a message  Entity Authentication - The receiver is ensured that the sender generated a message - The receiver has evidence of the liveness of the sender
  • 21. Security Requirements  Access Control -determined locally by policies - authorization established what each node is allowed to do in the network  Message Confidentiality - the content of a message is kept secret from those nodes that are not authorized to access it
  • 22. Security Requirements Privacy and Anonymity - vehicular communication (VC) systems should not disclose any personal and private information of their users - any observers should not know any future actions of other nodes - anonymity may not be a reasonable requirement for all entities of the vehicular communications system
  • 23. Security Requirements  Availability - protocols and services should remain operational even in the presence of faults, malicious or benign  Liability Identification - users of vehicles are liable for their deliberate or accidental actions that disrupt the operation of other nodes
  • 25. System Model  Vehicular communications system - Users - Network nodes - Authorities
  • 26. System Model Note. From “Securing Vehicular Communications – Assumptions, Requirements, and Principles,” by P. Papadimitratos, V. Gligor, J-P Hubaux, In Proceedings of the Workshop on Embedded Security in Cars (ESCAR) 2006, November 2006.
  • 27.
  • 28. System Model  Users - user is the owner or the driver or a passenger of the vehicle  Network Nodes - processes running on computing platforms capable of wireless communication - Mounted on vehicles and road-side units (RSUs)
  • 29. System Model  Authorities - public agencies or corporations with administrative powers - for example, city or state transportation authorities
  • 30. System Model  VC system operational assumptions 1. Authorities 2. Vehicle Identification and Credentials 3. Infrastructure Identification and Credentials 4. User Identification and Credentials 5. User and Vehicle Association 6. Trusted Components
  • 31. System Model  Authorities - trusted entities or nodes - issuing and manage identities and credentials for vehicular network - establish two-way communication with nodes  Vehicle Identification and Credentials - unique identity V - a pair of private and public keys, kv and KV - certificate CertX{KV, AV} issued by authority X - V denotes on-board central processing and communication module
  • 32. System Model Note. From “Securing Vehicular Communications – Assumptions, Requirements, and Principles,” by P. Papadimitratos, V. Gligor, J-P Hubaux, In Proceedings of the Workshop on Embedded Security in Cars (ESCAR) 2006, November 2006.
  • 33. System Model Infrastructure Identification and Credentials - unique identity I - a pair of private and public key kI and KI - certificate CertZ{KI, AI} issued by authority Z - gateway to the authorities - gateway to the mobile vehicles - RSUs’ locations are fixed - public vehicles -considered trustworthy -be used to assist security related operations
  • 34. What are public vehicles ?
  • 35.
  • 36. System Model  User identification and Credentials - Unique identity, U - a pair of private and public keys, kU and KU - Certificate CertY{KU , AU } issued by authority Y  User and Vehicle Association - user is the owner or the driver or a passenger of the vehicle - assume only one user can operate a vehicle - assume the user is the driver
  • 37. System Model  Trusted Components (TCs) - nodes equipped with trusted components, i.e., built-in hardware and firmware - TCs enforce a policy on the interaction with the on-board software - Access to any information stored in the TCs and modification of their functionality can be done only by the interface provided by the TCs. - perform cryptographic operations with signature generations and verifications
  • 39. Communication Model  Model the wireless communication in vehicular networks, whose connectivity can change frequently  Focus mainly on the data link layer
  • 40. Communication Model  Data-link layer primitives and assumption  SendL(V,m) : transmits message m to node V within radius R of the transmitting node  BcastL(m) : broadcasts message m to all nodes within radius R of the transmitting node  ReceiveL(m) : receives message m transmitted by a node within radius R of the receiver  A link (W,V) exists when two nodes W and V are able to communicate directly
  • 41. Communication Model  Links are either up or down, and their state does not change faster than the transmission time of a single packet The network connectivity, at a particular instance in time. Modeled as the graph G the edges of which are all up links.  Transmissions from W are received by all nodes V such that (W, Vi) is up during the entire duration of the packet transmission Packets are delivered across an up link within a maximum link delay τ or they are not delivered at all.
  • 42. Communication Model  Communication across the network is dependent on  availability of sufficient resources  bandwidth - shared medium contend - bandwidth can fluctuate - unevenly distributed among neighbors - links may be congested
  • 43. Communication Model  Communication Radius, R  Vary over time  Different classes of nodes may operate with different R  Multi-domain and Highly Volatile environment  Nodes are not bound to administrative and geographical boundaries  Any two or more nodes communicate independently
  • 44. Communication Model  Frequent Broadcast Communication  Most of the vehicular network traffic is Broadcasted at the network or application layers  Message are transmitted either periodically or triggered by network events  Transmission period is low  Time-sensitive Communication  Message delivery can be constrained by deadlines - different messages have different delay requirements
  • 46. Adversary Model  Network nodes - correct or benign - faulty or adversaries - external adversaries - Internal adversaries - active adversaries - passive adversaries
  • 47. faulty is not always malicious!!!
  • 48. Adversary Model Internal Active Adversaries  Multiple adversarial nodes - adversaries are independent - adversaries can collude - based on TCs, colluding adversaries are prevented from exchanging cryptographic material and credentials
  • 49. Adversary Model  Internal Active Adversaries (continue)  non-adaptive adversary  Adversarial nodes are fixed  adaptive adversary  Adversarial nodes change over time  Computationally bounded adversary  adversaries are computationally limited - limited resources and computational power - the knowledge of an adversary is limited - memory finite
  • 50. Design Principles  Default Network Access  Locality and Timeliness as Privileges  Visibility of Events  Mandated (non-circumventable) Mediation  Accountability  Vehicle Autonomy  Separation of Privilege  Non-frameability  Stage Response to Faulty Behavior  Reconfigurability  Privacy Conservation  Usability