introduction to vanet

22
Akanksha Upadhyay M.Tech.

Upload: akanksha-upadhyay

Post on 14-Dec-2014

5.257 views

Category:

Technology


7 download

DESCRIPTION

Introduction to VANET technology. A way ti implement Intelligent Transportation System.

TRANSCRIPT

Page 1: Introduction to VANET

Akanksha UpadhyayM.Tech.

Page 2: Introduction to VANET

Organization of the Presentation

Introduction to VANET technology VANET Security Threats Challenges in VANET Security Requirements

Akanksha Upadhyay 0108CS12MT26

Page 3: Introduction to VANET

Introduction to VANET

Vehicles connected to each others through an ad hoc formation form a wireless network called “Vehicular Ad Hoc Network”.

Vehicular ad hoc networks (VANETs) are a subgroup of mobile ad hoc networks (MANETs).

It includes V2V communications and V2R communications and is important component of ITS.

Nodes are expected to communicate by means of North American DSRC standard that employs the IEEE 802.11p standard for wireless communication.

Akanksha Upadhyay 0108CS12MT26

Page 4: Introduction to VANET

Why VANET

• Increase traveler safety

o10.8 million vehicle crashes from 1990 to 2009

o36,000 fatalities in 2009 only

o 24,000 of these due to collision with other vehicles /

objects.

o Costs more than $100 billion per year

• Boost on-board luxury

Akanksha Upadhyay 0108CS12MT26

Page 5: Introduction to VANET

VANET

Akanksha Upadhyay 0108CS12MT26

Page 6: Introduction to VANET

Road Side Unit (RSU)

V2RV2V

Server (Location Based Service)

Server (Traffic Monitoring)

Architecture

Akanksha Upadhyay 0108CS12MT26

Page 7: Introduction to VANET

Applications

Akanksha Upadhyay 0108CS12MT26

Page 8: Introduction to VANET

Applications

Akanksha Upadhyay 0108CS12MT26

Page 9: Introduction to VANET

Characteristics of VANET

• High mobility of nodes

• Rapidly changing network topology (predictable to some

extent)

• Unbounded network size

• Potential support from infrastructure

• Real-time, time-sensitive data exchange

• Crucial effect of security and privacy

Akanksha Upadhyay 0108CS12MT26

Page 10: Introduction to VANET

Security in VANETs

• When data is compromised, the whole system suffers.• The nature of VANETs could lead to malicious attacks.

o Predictable movement of nodes.o High mobility of victim/attacker.

• Adversaries could break the system.o Data sinkholes (black hole).o Feed false information.o Sybil attacks.o Flood the system.

• Security measures must be taken to avoid malicious attacks on the system.

Akanksha Upadhyay 0108CS12MT26

Page 11: Introduction to VANET

Threats in VANET

Threats to Availability

Threats to Authentication

Threats to driver’s Confidentiality

Akanksha Upadhyay 0108CS12MT26

Page 12: Introduction to VANET

Threats to Availability

Akanksha Upadhyay 0108CS12MT26

Page 13: Introduction to VANET

Threats to Authentication

Akanksha Upadhyay 0108CS12MT26

Page 14: Introduction to VANET

Threats to Confidentiality

Because VANET mobility is higher than MANET, routing with

capability of ensuring security in VANET is more problematic

than Adhoc.

Illegal collection of messages by eavesdropping and gathering of

location information available through the transmission of

broadcast messages.

Location privacy and anonymity are important issues for vehicle

users .

Akanksha Upadhyay 0108CS12MT26

Page 15: Introduction to VANET

Challenges in VANETs

• Mobility• Volatility• Privacy VS Authentication• Privacy VS Liability• Network Scalability

Akanksha Upadhyay 0108CS12MT26

Page 16: Introduction to VANET

Security Requirements

• Message authentication and integrity.• Message non-repudiation.• Node authentication.• Access control.• Message confidentiality.• Availability• Accountability.• Privacy protection.

Akanksha Upadhyay 0108CS12MT26

Page 17: Introduction to VANET

Authentication

• Every message must be authenticated to make sure its origin and to control authorization level of the vehicles

• Vehicles sign messages with their private keys along with digital certificate

• Digital signature causes an overhead. To reduce this overhead ECC (Elliptic Curve Cryptography) can be used

17Akanksha Upadhyay 0108CS12MT26

Page 18: Introduction to VANET

Availability

• Vehicular network must be available all the time, in real-time• A delay in seconds for some applications will make the

message meaningless and maybe the result will be devastating• Attempting to meet real-time demands makes the system

vulnerable to the DoS attack.

18Akanksha Upadhyay 0108CS12MT26

Page 19: Introduction to VANET

Accountability/Non-repudiation

• Non-repudiation will facilitate the ability to identify the attackers even after the attack happens. This prevents cheaters from denying their crimes.

• Accountability is related to the ability to provide necessary evidence to show how each party involves in the communications.

• Any information related to the car, e.g. the trip route, speed, time, any violation will be stored in a tamper-proof OBU, any official side holding authorization can retrieve this data.

19Akanksha Upadhyay 0108CS12MT26

Page 20: Introduction to VANET

Privacy

• Keeping the information of the drivers away from unauthorized observers, this information like real identity, trip path, speed etc…

• The privacy could be achieved by using temporary (one-time) keys. Keys are stored in the tamper-proof OBU. The keys will be reloaded in next time that the vehicle makes an official checkup.

• For preserving the real identity of the driver, an ELP (Electronic License Plate) is used, this license is installed in the factory for every new vehicle, it provides an identification number for the vehicle, to identify the vehicle in anywhere, with the RFID technology to hold the ELP.

• In case when the police or any official wants the real identity, it can take an order from the judge to recover the identity of specific vehicles ELP.

20Akanksha Upadhyay 0108CS12MT26

Page 21: Introduction to VANET

Secure Routing Requirements

• Two major routing categories:o ID based.o Geography based.

• Depending on the needs, each category has its advantages.o ID methods are for sending data to an individual node.o Geography methods are for sending data to a group of

nodes.

21Akanksha Upadhyay 0108CS12MT26

Page 22: Introduction to VANET

Thanks!!