Do s attacks in vanet presentation in vanet
-
Upload
sirojiddin -
Category
Education
-
view
1.594 -
download
2
description
Transcript of Do s attacks in vanet presentation in vanet
Securing vehicular ad hoc network
Sirojiddin Jurayev
What is a VANET (Vehicular Ad hoc NETwork)?
Roadside base station
Inter-vehicle communications
Vehicle-to-roadside communications
Emergency event
• Communication: typically over the Dedicated Short Range
Communications (DSRC) (5.9 GHz)
• Example of protocol: IEEE 802.11p
3
A taxonomy of vehicular communication systems
4
A Modern Vehicle
F o r w a r d r a d a r
C o m p u t i n g p l a t f o r m
E v e n t d a t a r e c o r d e r ( E D R )
P o s i t i o n i n g s y s t e m
R e a r r a d a r
C o m m u n i c a t i o n f a c i l i t y
D i s p l a y
(GPS)
Human-Machine Interface
A modern vehicle is a network of sensors/actuators on wheels !A modern vehicle is a network of sensors/actuators on wheels !
Attackers Insider or outsider
Insider – valid user Outsider – Intruder, limited attack options
Malicious or rational Malicious – No personal benefit, intends to
harm other users Rational – seeks personal benefits, more
predictable attack Active or passive
Active: Generates packets, participates in the network
Passive: Eavesdrop, track users
Security Attacks
Goals ExecutionActions
Congestion Creation/avoidance
Cause accidentsor pile-ups
Track individuals
Denial of service
Insert bogus congestion warnings
Misrepresent Location of
accident
Message suppression
Aggressive insertion of messages/jamming
Single
Single, multiple Entities (Sybil)
Multiple
Independent Colluding
Security Requirements Authentication:
React only to legitimate events. Authenticate senders of messages.
Verification of data consistency Legitimate senders can send false data
(attack/unintentional). Can cause immense damage even fatalities.
Availability Network should be available under jamming attacks
Non-repudiation Drivers causing accidents should be reliably identified
Privacy (conflicts with authentication) Privacy of drivers against unauthorized observers.
Real-time constraints High speed means constraints on time
8
Attack 1 : Bogus traffic information
Traffic jam
ahead
Attacker: insider, rational, active
9
Attack 2 : Generate “Intelligent Collisions”
SLOW DOWN
The way is clear Attacker: insider, malicious, active
10
Attack 3: Cheating with identity, speed, or position
Wasn’t me!
Attacker: insider, rational, active
11
Attack 4: Jamming
Roadside base station
Jammer
12
Attack 5: Tunnel
Physical tunnel or jammed area
Wrong information
Proposed solution module for DoS attack
Channel switching
Using switching technologyStudy case of different position of vehicles according
to GPS position. Ex. In highway we can use WiMax technology, in city we can use Wifi or Bluetooth etc.
If jamming attack detected then node tries to change channel. Attacker power may not be so high in order cover all channels. If so higher power might detect easily by using other methods.
Problem.1. Is it possible for listen different position wireless
networks same time.
Expected layered approach for VANET