Behavior of Attacker and Some New Possible Attacks in Vehicular Communication - PowerPoint PPT Presentation

About This Presentation
Title:

Behavior of Attacker and Some New Possible Attacks in Vehicular Communication

Description:

The behavior of the attacker is unexpected due to different kinds of attacks. High speed vehicles, the dynamic topology of the network and a high number of vehicles are the key factors which are involved and make it difficult to predict the behavior of attackers. In this paper, we have studied the behavior of attackers and also assigned two states for the attackers; these states explain the behavior of attackers. – PowerPoint PPT presentation

Number of Views:33
Slides: 18
Provided by: I.A.Sumra
Tags:

less

Transcript and Presenter's Notes

Title: Behavior of Attacker and Some New Possible Attacks in Vehicular Communication


1
Behavior of Attacker and Some New Possible
Attacks in Vehicular Communication
Dr I.A.Sumra
2
Introduction
  • Vehicular ad-hoc network is a special kind of
    network in which nodes (Vehicles) can communicate
    with each other on the road and with its
    Infrastructure.

V2I
2
3
VANET Applications
  • Safety Applications
  • Non Safety Applications

Work Zone Warning!!!
Work Zone Warning!!!
Work in Progress Plz! use Alt. route
Shopping MALL ( TESCO )
Parking Slot Available!!!
Parking Slot Available!!!
RSU
3
4
VANET Security Requirements
  • Vehicular network applications require security
    and the objective of these applications is to
    serve users and make their journey secure and
    comfortable.
  • Attackers have their own role in this network and
    we cannot predict the dynamic behavior of the
    attacker. If an attacker works on a safety
    application and changes the content of the safety
    message then it poses a very difficult condition
    on the road and many users will be affected due
    to this kind of attack.
  • Accidents are often the result of an alteration
    of any safety message or the sending of even one
    wrong safety message in a network and many human
    lives are at risk 1.

5
TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
  • Network Behavior

6
TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
  • Attacker Behavior

7
SOME NEW POSSIBLE ATTACKS IN VANET
8
1. Distributed Denial of service (DDOS) Attack
9
2. Timing Attack in VANET
  • Time is a key factor for safety and non safety
    applications
  • and users need the right information at the
    right time.
  • This attack is a newly addressed problem in which
    an attacker does not disturb the contents of the
    messages.
  • The attacker just adds some time slots into the
    original message and creates a delay in the
    original message in this way the user will
    receive the message after its required time.

10
3. Home Attack
  • This is a new type of attack the Internet is one
    of the key
  • services that users use during their journey.
  • In this attack, an attacker connects with the
    Internet and takes control of the users vehicle
    on the highway.

11
4. Man in the Middle Attack (MiMA)
  • MiMA is a very well known attack in communication
    and can be discussed in a vehicular network where
    the attacker resides between two or more vehicles
    and launches this attack.
  • MiMA is active eavesdropping and makes an
    independent connection with the victims vehicle.

12
5. Traffic Analysis Attack
  • The traffic analysis attack is a serious level
    threat to user privacy in vehicular
    communication. A traffic analysis attack is
    against the anonymity of communication between
    vehicle to vehicle (V2V) and vehicle to road side
    unit (V2R).
  • In this attack, the attacker defines some goal
    and achieves the goal through capturing different
    types of traffic information packets.
  • This includes the location of the user, the
    vehicle ID, the traveling route of the user or
    some other of the users traffic information the
    attacker needs this information to use for its
    attacks.

13
6. Social Engineering Attack
  • In a vehicular network the attacker does not use
    these techniques due to the dynamic behavior of
    vehicles and also users.
  • There are some possible cases are considered in
    social engineering in a vehicular network.

14
7. Spamming Attack
  • An attacker sends spam messages in a network for
    the purpose of increasing the transmission
    latency and consuming the bandwidth of the
    network.
  • With an absence of basic infrastructure and
    centralized administration, it is difficult to
    control this kind of attack.

15
Conclusion
  • The applications of vehicular networks are
    important and
  • these applications must be secure if attackers
    change the
  • content of these applications then the users are
    directly affected by it. It is very difficult to
    monitor the behavior of attackers attackers
    change their attacking behavior and they launch
    different attacks at different times.
  • In this paper, only the behavior of attackers and
    some of their possible attacks have been studied.
    Here, only some of the new possible attacks have
    been considered, but the attacker can launch many
    types of attacks and create problems for
    authentic users of a network.

16
Thank you..
16
17
Conference Paper
  • Complete paper is available on IEEE and Research
    gate.
  • Please download complete research paper from
    research gate.

17
Write a Comment
User Comments (0)
About PowerShow.com