Do s attacks in vanet presentation in vanet

16
Securing vehicular ad hoc network Sirojiddin Jurayev

description

DoS attacks in VANET.

Transcript of Do s attacks in vanet presentation in vanet

Page 1: Do s attacks in vanet presentation in vanet

Securing vehicular ad hoc network

Sirojiddin Jurayev

Page 2: Do s attacks in vanet presentation in vanet

What is a VANET (Vehicular Ad hoc NETwork)?

Roadside base station

Inter-vehicle communications

Vehicle-to-roadside communications

Emergency event

• Communication: typically over the Dedicated Short Range

Communications (DSRC) (5.9 GHz)

• Example of protocol: IEEE 802.11p

Page 3: Do s attacks in vanet presentation in vanet

3

A taxonomy of vehicular communication systems

Page 4: Do s attacks in vanet presentation in vanet

4

A Modern Vehicle

F o r w a r d r a d a r

C o m p u t i n g p l a t f o r m

E v e n t d a t a r e c o r d e r ( E D R )

P o s i t i o n i n g s y s t e m

R e a r r a d a r

C o m m u n i c a t i o n f a c i l i t y

D i s p l a y

(GPS)

Human-Machine Interface

A modern vehicle is a network of sensors/actuators on wheels !A modern vehicle is a network of sensors/actuators on wheels !

Page 5: Do s attacks in vanet presentation in vanet

Attackers Insider or outsider

Insider – valid user Outsider – Intruder, limited attack options

Malicious or rational Malicious – No personal benefit, intends to

harm other users Rational – seeks personal benefits, more

predictable attack Active or passive

Active: Generates packets, participates in the network

Passive: Eavesdrop, track users

Page 6: Do s attacks in vanet presentation in vanet

Security Attacks

Goals ExecutionActions

Congestion Creation/avoidance

Cause accidentsor pile-ups

Track individuals

Denial of service

Insert bogus congestion warnings

Misrepresent Location of

accident

Message suppression

Aggressive insertion of messages/jamming

Single

Single, multiple Entities (Sybil)

Multiple

Independent Colluding

Page 7: Do s attacks in vanet presentation in vanet

Security Requirements Authentication:

React only to legitimate events. Authenticate senders of messages.

Verification of data consistency Legitimate senders can send false data

(attack/unintentional). Can cause immense damage even fatalities.

Availability Network should be available under jamming attacks

Non-repudiation Drivers causing accidents should be reliably identified

Privacy (conflicts with authentication) Privacy of drivers against unauthorized observers.

Real-time constraints High speed means constraints on time

Page 8: Do s attacks in vanet presentation in vanet

8

Attack 1 : Bogus traffic information

Traffic jam

ahead

Attacker: insider, rational, active

Page 9: Do s attacks in vanet presentation in vanet

9

Attack 2 : Generate “Intelligent Collisions”

SLOW DOWN

The way is clear Attacker: insider, malicious, active

Page 10: Do s attacks in vanet presentation in vanet

10

Attack 3: Cheating with identity, speed, or position

Wasn’t me!

Attacker: insider, rational, active

Page 11: Do s attacks in vanet presentation in vanet

11

Attack 4: Jamming

Roadside base station

Jammer

Page 12: Do s attacks in vanet presentation in vanet

12

Attack 5: Tunnel

Physical tunnel or jammed area

Wrong information

Page 13: Do s attacks in vanet presentation in vanet

Proposed solution module for DoS attack

Page 14: Do s attacks in vanet presentation in vanet

Channel switching

Page 15: Do s attacks in vanet presentation in vanet

Using switching technologyStudy case of different position of vehicles according

to GPS position. Ex. In highway we can use WiMax technology, in city we can use Wifi or Bluetooth etc.

If jamming attack detected then node tries to change channel. Attacker power may not be so high in order cover all channels. If so higher power might detect easily by using other methods.

Problem.1. Is it possible for listen different position wireless

networks same time.

Page 16: Do s attacks in vanet presentation in vanet

Expected layered approach for VANET