CSE 713 Kapil Sharma Gaurav Korde Mobile ad hoc network continuously self-configuring, infrastructure-less network of mobile devices connected without wires Types- Vehicular Ad hoc Networks, Smart Phone Ad hoc Networks, iMANETs ctc VANETS created by applying the principles of mobile ad hoc networks (MANETs) - the spontaneous creation of a wireless network for data exchange - to the domain of vehicles key component of intelligent transportation systems VANET(Vehicular Ad Hoc Networks) Applications of VANETS Electronic brake lights Platooning Traffic information systems What VANETs do provide safer and efficient driving conditions allow vehicles to share information about road conditions (e.g., congestion, collision or construction) and provide infotainment services Vehicles regularly broadcast safety-related messages security of safety messages should be guaranteed even in the presence of persistent attackers Entities in VANETs road side units (RSUs) as network nodes inter-vehicle communications (IVC) along with the road side to vehicle communications (RVC) Attacks on VANETs inject a false information in order to mislead the target vehicles or with tampering the on board unit, implement an impersonation attack recording the messages of a target vehicle, track the vehicle’s location and collect private information about the vehicle proposed protocol for VANET should address Message authentication and integrity Message non-repudiation Entity authentication Privacy protection In next slides- an algorithm is proposed for VANET communication SYSTEM OVERVIEW Authorities Identification Tamper Proof Device PROPOSED PROTOCOL Authorities VANET nodes certification authorities (CAs) Local CA root CA Identification Node Registration with local CA Working of local CA’s Tamper Proof Device on board unit (OBU) and their functioning hardware security modules (HSM) and their functioning NOTATIONS used in protocol Certificate Management Node Misbehaving Certificate Revocation Evaluation of the protocol Message authentication and integrity- all messages are signed by the sender, thus receivers are able to check the validity of the sender Message Non- repudiation- every node, in this protocol, sending a message also signs the message with its own private key. This signature is used by the local CA to determine the node’s identity privacy protection- Messages generated by a vehicle should not disclose the sender’s identity in order to keep vehicle anonymous Thank you!