Trust and Trusted Computing in VANET - PowerPoint PPT Presentation

About This Presentation
Title:

Trust and Trusted Computing in VANET

Description:

The life saving factor is the key issue in this regard. Trust is key part of security and it is undoubtedly a necessity to develop trust in vehicular network. The main aim of this paper is to propose a trust model for vehicular environment. The proposed model contains two different modules. – PowerPoint PPT presentation

Number of Views:174

less

Transcript and Presenter's Notes

Title: Trust and Trusted Computing in VANET


1
Trust and Trusted Computing in Vehicular ad hoc
network (VANET)
  • Dr I.A.Sumra

2
Introduction
  • Today major concern is to provide safety of users
    and save their lives from tragic road accidents.
  • Vehicular Ad hoc Network (VANET) received
    significant attention of researchers and
    automotive industries due to life saving factor.
  • Safety and non safety applications running on
    VANET must ensure safety of human life on road
    and applications must be security, trust and
    privacy enhanced to protect road and transport
    users.
  • We determined five different classes of attacks
    which need mitigation mechanisms to protect road
    and transport users. Research efforts are being
    conducted to circumvent these attacks.

3
  • Vehicular ad-hoc network is a special kind of
    network in which nodes (Vehicles) can communicate
    with each other on the road and with its
    Infrastructure.

V2I
3
4
VANET APPLICATIONS
  • Safety Applications
  • Non Safety Applications

Work Zone Warning!!!
Work Zone Warning!!!
Work in Progress Plz! use Alt. route
Shopping MALL
Parking Slot Available!!!
Parking Slot Available!!!
RSU
4
5
Proposed Trust Model
6
VANET User Requirement (VUR)
  • User is the main entity in vehicular work and
    objective of this new technology is to serve
    users and safe their lives from road accidents.
  • Safety and non safety VANET applications meet the
    all users requirement during their journey like
    send or receive safety message to other vehicles
    and use the entertainment services.

7
Properties of Attacker
7
8
Levels of Attackers
9
First Level of Attackers
  • In first level, the attackers are more seriously
    performed and intensity of the attacks is higher
    as compared to second level.

10
Second Level of Attackers
  • Second level attackers also have their own
    severity level which is lower as compared to the
    first level. An attacker in second level is
    outsiders and the basic aim of this kind of
    attacker is to seek their personal benefits.

11
Proposed Classes of Attacks
Class-E
Class-D
Class-C
Class-B
Class-A
11
12
First Class Network Attack
  • 1. Denial of Service (DOS) attack

13
2. Distributed Denial of service (DDOS) attack
First Class Network Attack
14
3. Sybil attack
First Class Network Attack
15
First Class Network Attack
  • 4. Node Impersonation Attack

16
Second Class Application Attack (AP)
17
Third Class Timing Attack
18
Forth Class Social Attack
19
Fifth Class Monitoring Attack
20
Vehicular Trusted Computing (VTC)
  • Trusted computing is a relatively new technology
    which has gained popularity recently and Trusted
    Computing Group (TCG) 25 has been the main
    proponent of this technology.
  • The main aim of TCG is to enhance security in
    computer network by using security hardware
    module (called Trusted Platform Module).

21
Trusted Entities of VANET
  • In this section we will explain six basic
    entities of trust and when all these entities
    work together then will develops a chain of trust
    in the vehicular network.
  • Trusted User (TU)
  • Trusted Vehicle (TV)
  • Trusted Applications (TA)
  • Trusted Routing (TR)
  • Trusted Medium (TM)
  • Trusted Infrastructure (TIF)

22
Relationship between Trust and Attackers
23
Attackers and TPM
24
Conclusion
  • Security of VANET is an important issue to be
    addressed by designers of VANET infrastructure
    security.
  • The VANET applications are termed as an important
    solution for the security of the users on the
    road. Moreover it is believed that the Vehicular
    applications must be secured. Because the users
    are directly affected in case the attackers
    change the content of safety applications.
    Attackers change their attacking behavior and
    they launch different attacks at different times.
    Attackers always try to tamper the information
    and create troubles in the network.
  • Cryptographic functional components are
    considered as one of key elements for trust
    building and maintaining data integrity in the
    past research work done.

25
Journal Paper
  • This is journal research paper and please
    download complete research paper from research
    gate.

25
26
Thank you..
26
Write a Comment
User Comments (0)
About PowerShow.com