Title: Using TPM to Ensure Security,Trust and Privacy (STP) in VANET
1VANET Security Research Group (VSRG)
Using TPM to Ensure Security, Trust and Privacy
(STP) in VANET
2Introduction
- Vehicular ad-hoc network is a special kind of
network in which nodes (Vehicles) can communicate
with each other on the road and with its
Infrastructure.
V2I
2
3VANET Applications
- Safety Applications
- Non Safety Applications
Work Zone Warning!!!
Work Zone Warning!!!
Work in Progress Plz! use Alt. route
Shopping MALL ( TESCO )
Parking Slot Available!!!
Parking Slot Available!!!
RSU
3
4VANET Security Requirements
- Vehicular network applications require security
and the objective of these applications is to
serve users and make their journey secure and
comfortable. - Attackers have their own role in this network and
we cannot predict the dynamic behavior of the
attacker. If an attacker works on a safety
application and changes the content of the safety
message then it poses a very difficult condition
on the road and many users will be affected due
to this kind of attack. - Accidents are often the result of an alteration
of any safety message or the sending of even one
wrong safety message in a network and many human
lives are at risk 1.
5TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
6TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
7STP in VANET
STP in VANET
8Vehicular TRUST
9TRUSTED PLATFORM MODULE (TPM) AND STP
10Attacker and attack with TPM
11TPM with Root of Trust modules
12PROPOSED SCHEME FOR SECURITY,TRUST ANDPRIVACY
(STP)
13Conclusion
- In trusted vehicular networks, trust and security
are two key - requirements for users. While privacy is a basic
necessary - requirement for security in life saving vehicular
networks, a - guarantee that not only the vehicle platform but
also the - infrastructure can be trusted is also vital.
- When users receive any safety message in
vehicular communications, it is important that
the message is authentic and that the source
making the request is legitimate. A new and
practical cardbased scheme has been proposed in
this paper to make possible the trusted
authentication of users while enabling various
transactions with a Vehicle Service Provider
(VSP).
14- Please download complete paper from
- IEEEE website
- ResearchGate
14
1515