Title: Comparative study of security hardware modules (EDR, TPD and TPM) in VANET
1Comparative Study of Security hardware modules
(EDR, TPD and TPM) in VANET
2Introduction
- Vehicular ad-hoc network is a special kind of
network in which nodes (Vehicles) can communicate
with each other on the road and with its
Infrastructure.
V2I
2
3VANET Applications
- Safety Applications
- Non Safety Applications
Work Zone Warning!!!
Work Zone Warning!!!
Work in Progress Plz! use Alt. route
Shopping MALL ( TESCO )
Parking Slot Available!!!
Parking Slot Available!!!
RSU
3
4VANET Security Requirements
- Vehicular network applications require security
and the objective of these applications is to
serve users and make their journey secure and
comfortable. - Attackers have their own role in this network and
we cannot predict the dynamic behavior of the
attacker. If an attacker works on a safety
application and changes the content of the safety
message then it poses a very difficult condition
on the road and many users will be affected due
to this kind of attack. - Accidents are often the result of an alteration
of any safety message or the sending of even one
wrong safety message in a network and many human
lives are at risk 1.
5TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
6TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
7Attacker with security goals (CIA) in VANET
8All Possible attacks on security goals (CIA) in
VANET
9Attacks on Confidentiality in VANET
- Man in the Middle (MiMA) Attack
10Attacks on Integrity in VANET
Message Alteration Attack
Message Fabrication Attack
Incorrect Data Injecting Attack
11Scenario One Attack on the integrity of the data
12Attacks on Availability in VANET
- DENIAL OF SERVICE (DOS)
- In VANET, DOS shall not be allowed to happen,
where seamless life critical information must
reach its intended destination securely and
timely. In summary, there are three ways the
attackers may achieve DOS attacks. - There are three levels of DOS attacks as
described below. - Basic Level Overwhelm the Node Resources
- Extended Level Jamming the Channel
13DENIAL OF SERVICE (DOS) ATTACK IN VANET
- Basic Level Overwhelm the Node Resources
14DENIAL OF SERVICE (DOS) ATTACK IN VANET
- Extended Level Jamming the Channel
15Distributed Denial of service (DDOS) Attack
16Attacks on Availability in VANET
17VANET Applications and Security Modules
18Smart vehicle and Security Hardware Modules
- ? Tamper Proof Device (TPD)
- ? Event Data Recorder (EDR)
- ? Trusted Platform Module (TPM)
- ? Global Position System (GPS)
- ? Radar Systems (RSs)
- ? Communication Facility (CF)
- ? Computing Platform (CP)
- ? Human Machine Interface (HMI)
19VANET Security Hardware Modules
20Event Data Recorder (EDR)
- Event Data Recorder 7 is non volatile hardware
module and provides tamper proof storage. - The purpose of this module is to maintain the log
of any critical events and later to use this
information. It is similar to black box used in
airplane.
21Temper Proof Device (TPD)
- There are two problems in EDR.
- 1.) it does not generate any data.
- 2.) it does not have any ability to encrypt the
messages. The researchers added one more module
to meet these two requirements. The next module
is Temper Proof Device (TPD).
22Trusted Platform Module (TPM)
- Trusted Platform Module is a hardware module
designed for secure computing and can be
integrated into any device for example in
notebook. - TPM is a piece of hardware and need software to
communicate with it to protect and store data in
secure location. It can resist software attacks
but problem is that it cannot control hardware
tempering.
23Analysis of the security modules
24Conclusion
- Security is an important issue of VANET as it
deals with traffic system and human lives
directly. In near future VANET will be on road
and their potential applications will be
providing safety to users. - In this slide, we presented security requirements
and then discussed in detail about security
hardware modules that are used in smart vehicle. - The lower cost of these modules and their right
functionality in vehicular environment will make
the implementation of this technology easier.
25Thank you..
25
26Conference Paper
- Please download complete research paper from
research gate.
26