Comparative study of security hardware modules (EDR, TPD and TPM) in VANET - PowerPoint PPT Presentation

About This Presentation
Title:

Comparative study of security hardware modules (EDR, TPD and TPM) in VANET

Description:

Hardware plays more important role to provide a security in vehicular environment. In this paper we do comparative study of three basic security hardware modules (Event Data Recorder, Tamper Proof Device and Trusted Platform Module). There are many parameters for selecting the security modules but cost is the most important one. Automotive industry plays vital role to resolve the cost issue and make it easier for commercial users to adopt a new vehicular technology. – PowerPoint PPT presentation

Number of Views:113

less

Transcript and Presenter's Notes

Title: Comparative study of security hardware modules (EDR, TPD and TPM) in VANET


1
Comparative Study of Security hardware modules
(EDR, TPD and TPM) in VANET
  • Dr I.A.Sumra

2
Introduction
  • Vehicular ad-hoc network is a special kind of
    network in which nodes (Vehicles) can communicate
    with each other on the road and with its
    Infrastructure.

V2I
2
3
VANET Applications
  • Safety Applications
  • Non Safety Applications

Work Zone Warning!!!
Work Zone Warning!!!
Work in Progress Plz! use Alt. route
Shopping MALL ( TESCO )
Parking Slot Available!!!
Parking Slot Available!!!
RSU
3
4
VANET Security Requirements
  • Vehicular network applications require security
    and the objective of these applications is to
    serve users and make their journey secure and
    comfortable.
  • Attackers have their own role in this network and
    we cannot predict the dynamic behavior of the
    attacker. If an attacker works on a safety
    application and changes the content of the safety
    message then it poses a very difficult condition
    on the road and many users will be affected due
    to this kind of attack.
  • Accidents are often the result of an alteration
    of any safety message or the sending of even one
    wrong safety message in a network and many human
    lives are at risk 1.

5
TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
  • Network Behavior

6
TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
  • Attacker Behavior

7
Attacker with security goals (CIA) in VANET
8
All Possible attacks on security goals (CIA) in
VANET
9
Attacks on Confidentiality in VANET
  • Monitoring Attack
  • Traffic Analysis Attack
  • Man in the Middle (MiMA) Attack

10
Attacks on Integrity in VANET
Message Alteration Attack
Message Fabrication Attack
Incorrect Data Injecting Attack
11
Scenario One Attack on the integrity of the data
12
Attacks on Availability in VANET
  • DENIAL OF SERVICE (DOS)
  • In VANET, DOS shall not be allowed to happen,
    where seamless life critical information must
    reach its intended destination securely and
    timely. In summary, there are three ways the
    attackers may achieve DOS attacks.
  • There are three levels of DOS attacks as
    described below.
  • Basic Level Overwhelm the Node Resources
  • Extended Level Jamming the Channel

13
DENIAL OF SERVICE (DOS) ATTACK IN VANET
  • Basic Level Overwhelm the Node Resources

14
DENIAL OF SERVICE (DOS) ATTACK IN VANET
  • Extended Level Jamming the Channel

15
Distributed Denial of service (DDOS) Attack
16
Attacks on Availability in VANET
17
VANET Applications and Security Modules
18
Smart vehicle and Security Hardware Modules
  • ? Tamper Proof Device (TPD)
  • ? Event Data Recorder (EDR)
  • ? Trusted Platform Module (TPM)
  • ? Global Position System (GPS)
  • ? Radar Systems (RSs)
  • ? Communication Facility (CF)
  • ? Computing Platform (CP)
  • ? Human Machine Interface (HMI)

19
VANET Security Hardware Modules
20
Event Data Recorder (EDR)
  • Event Data Recorder 7 is non volatile hardware
    module and provides tamper proof storage.
  • The purpose of this module is to maintain the log
    of any critical events and later to use this
    information. It is similar to black box used in
    airplane.

21
Temper Proof Device (TPD)
  • There are two problems in EDR.
  • 1.) it does not generate any data.
  • 2.) it does not have any ability to encrypt the
    messages. The researchers added one more module
    to meet these two requirements. The next module
    is Temper Proof Device (TPD).

22
Trusted Platform Module (TPM)
  • Trusted Platform Module is a hardware module
    designed for secure computing and can be
    integrated into any device for example in
    notebook.
  • TPM is a piece of hardware and need software to
    communicate with it to protect and store data in
    secure location. It can resist software attacks
    but problem is that it cannot control hardware
    tempering.

23
Analysis of the security modules
24
Conclusion
  • Security is an important issue of VANET as it
    deals with traffic system and human lives
    directly. In near future VANET will be on road
    and their potential applications will be
    providing safety to users.
  • In this slide, we presented security requirements
    and then discussed in detail about security
    hardware modules that are used in smart vehicle.
  • The lower cost of these modules and their right
    functionality in vehicular environment will make
    the implementation of this technology easier.

25
Thank you..
25
26
Conference Paper
  • Please download complete research paper from
    research gate.

26
Write a Comment
User Comments (0)
About PowerShow.com