Title: Trust and Trusted Computing in VANET
1Trust and Trusted Computing in Vehicular ad hoc
network (VANET)
2Introduction
- Today major concern is to provide safety of users
and save their lives from tragic road accidents. - Vehicular Ad hoc Network (VANET) received
significant attention of researchers and
automotive industries due to life saving factor. - Safety and non safety applications running on
VANET must ensure safety of human life on road
and applications must be security, trust and
privacy enhanced to protect road and transport
users. - We determined five different classes of attacks
which need mitigation mechanisms to protect road
and transport users. Research efforts are being
conducted to circumvent these attacks.
3- Vehicular ad-hoc network is a special kind of
network in which nodes (Vehicles) can communicate
with each other on the road and with its
Infrastructure.
V2I
3
4VANET APPLICATIONS
- Safety Applications
- Non Safety Applications
Work Zone Warning!!!
Work Zone Warning!!!
Work in Progress Plz! use Alt. route
Shopping MALL
Parking Slot Available!!!
Parking Slot Available!!!
RSU
4
5Proposed Trust Model
6VANET User Requirement (VUR)
- User is the main entity in vehicular work and
objective of this new technology is to serve
users and safe their lives from road accidents. - Safety and non safety VANET applications meet the
all users requirement during their journey like
send or receive safety message to other vehicles
and use the entertainment services.
7 Properties of Attacker
7
8Levels of Attackers
9First Level of Attackers
- In first level, the attackers are more seriously
performed and intensity of the attacks is higher
as compared to second level.
10Second Level of Attackers
- Second level attackers also have their own
severity level which is lower as compared to the
first level. An attacker in second level is
outsiders and the basic aim of this kind of
attacker is to seek their personal benefits.
11 Proposed Classes of Attacks
Class-E
Class-D
Class-C
Class-B
Class-A
11
12First Class Network Attack
- 1. Denial of Service (DOS) attack
132. Distributed Denial of service (DDOS) attack
First Class Network Attack
143. Sybil attack
First Class Network Attack
15First Class Network Attack
- 4. Node Impersonation Attack
16Second Class Application Attack (AP)
17Third Class Timing Attack
18Forth Class Social Attack
19Fifth Class Monitoring Attack
20Vehicular Trusted Computing (VTC)
- Trusted computing is a relatively new technology
which has gained popularity recently and Trusted
Computing Group (TCG) 25 has been the main
proponent of this technology. - The main aim of TCG is to enhance security in
computer network by using security hardware
module (called Trusted Platform Module).
21Trusted Entities of VANET
- In this section we will explain six basic
entities of trust and when all these entities
work together then will develops a chain of trust
in the vehicular network. - Trusted User (TU)
- Trusted Vehicle (TV)
- Trusted Applications (TA)
- Trusted Routing (TR)
- Trusted Medium (TM)
- Trusted Infrastructure (TIF)
22Relationship between Trust and Attackers
23Attackers and TPM
24Conclusion
- Security of VANET is an important issue to be
addressed by designers of VANET infrastructure
security. - The VANET applications are termed as an important
solution for the security of the users on the
road. Moreover it is believed that the Vehicular
applications must be secured. Because the users
are directly affected in case the attackers
change the content of safety applications.
Attackers change their attacking behavior and
they launch different attacks at different times.
Attackers always try to tamper the information
and create troubles in the network. - Cryptographic functional components are
considered as one of key elements for trust
building and maintaining data integrity in the
past research work done.
25Journal Paper
- This is journal research paper and please
download complete research paper from research
gate.
25
26Thank you..
26