Title: Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
1Behavior of Attacker and Some New Possible
Attacks in Vehicular Communication
Dr I.A.Sumra
2Introduction
- Vehicular ad-hoc network is a special kind of
network in which nodes (Vehicles) can communicate
with each other on the road and with its
Infrastructure.
V2I
2
3VANET Applications
- Safety Applications
- Non Safety Applications
Work Zone Warning!!!
Work Zone Warning!!!
Work in Progress Plz! use Alt. route
Shopping MALL ( TESCO )
Parking Slot Available!!!
Parking Slot Available!!!
RSU
3
4VANET Security Requirements
- Vehicular network applications require security
and the objective of these applications is to
serve users and make their journey secure and
comfortable. - Attackers have their own role in this network and
we cannot predict the dynamic behavior of the
attacker. If an attacker works on a safety
application and changes the content of the safety
message then it poses a very difficult condition
on the road and many users will be affected due
to this kind of attack. - Accidents are often the result of an alteration
of any safety message or the sending of even one
wrong safety message in a network and many human
lives are at risk 1.
5TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
6TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
7SOME NEW POSSIBLE ATTACKS IN VANET
81. Distributed Denial of service (DDOS) Attack
92. Timing Attack in VANET
- Time is a key factor for safety and non safety
applications - and users need the right information at the
right time. - This attack is a newly addressed problem in which
an attacker does not disturb the contents of the
messages. - The attacker just adds some time slots into the
original message and creates a delay in the
original message in this way the user will
receive the message after its required time.
103. Home Attack
- This is a new type of attack the Internet is one
of the key - services that users use during their journey.
- In this attack, an attacker connects with the
Internet and takes control of the users vehicle
on the highway.
114. Man in the Middle Attack (MiMA)
- MiMA is a very well known attack in communication
and can be discussed in a vehicular network where
the attacker resides between two or more vehicles
and launches this attack. - MiMA is active eavesdropping and makes an
independent connection with the victims vehicle.
125. Traffic Analysis Attack
- The traffic analysis attack is a serious level
threat to user privacy in vehicular
communication. A traffic analysis attack is
against the anonymity of communication between
vehicle to vehicle (V2V) and vehicle to road side
unit (V2R). - In this attack, the attacker defines some goal
and achieves the goal through capturing different
types of traffic information packets. - This includes the location of the user, the
vehicle ID, the traveling route of the user or
some other of the users traffic information the
attacker needs this information to use for its
attacks.
136. Social Engineering Attack
- In a vehicular network the attacker does not use
these techniques due to the dynamic behavior of
vehicles and also users. - There are some possible cases are considered in
social engineering in a vehicular network.
147. Spamming Attack
- An attacker sends spam messages in a network for
the purpose of increasing the transmission
latency and consuming the bandwidth of the
network. - With an absence of basic infrastructure and
centralized administration, it is difficult to
control this kind of attack.
15Conclusion
- The applications of vehicular networks are
important and - these applications must be secure if attackers
change the - content of these applications then the users are
directly affected by it. It is very difficult to
monitor the behavior of attackers attackers
change their attacking behavior and they launch
different attacks at different times. - In this paper, only the behavior of attackers and
some of their possible attacks have been studied.
Here, only some of the new possible attacks have
been considered, but the attacker can launch many
types of attacks and create problems for
authentic users of a network.
16Thank you..
16
17Conference Paper
- Complete paper is available on IEEE and Research
gate. - Please download complete research paper from
research gate.
17