CSE 713 Kapil Sharma Gaurav Korde

advertisement
CSE 713
Kapil Sharma
Gaurav Korde
Mobile ad hoc network

continuously self-configuring, infrastructure-less
network of mobile devices connected without
wires

Types- Vehicular Ad hoc Networks, Smart Phone Ad
hoc Networks, iMANETs ctc
VANETS

created by applying the principles of mobile ad
hoc networks (MANETs) - the spontaneous creation
of a wireless network for data exchange - to the
domain of vehicles

key component of intelligent transportation
systems
VANET(Vehicular Ad Hoc Networks)
Applications of VANETS

Electronic brake lights

Platooning

Traffic information systems
What VANETs do

provide safer and efficient driving conditions

allow vehicles to share information about road conditions (e.g.,
congestion,

collision or construction) and provide infotainment services

Vehicles regularly broadcast safety-related messages

security of safety messages should be guaranteed even in the
presence of persistent attackers
Entities in VANETs

road side units (RSUs) as network nodes

inter-vehicle communications (IVC) along with the road
side to vehicle communications (RVC)
Attacks on VANETs

inject a false information in order to mislead the target
vehicles or with tampering the on board unit, implement
an impersonation attack

recording the messages of a target vehicle, track the
vehicle’s location and collect private information about
the vehicle
proposed protocol for VANET should
address

Message authentication and integrity

Message non-repudiation

Entity authentication

Privacy protection

In next slides- an algorithm is proposed for VANET
communication
SYSTEM OVERVIEW

Authorities

Identification

Tamper Proof Device

PROPOSED PROTOCOL
Authorities

VANET nodes

certification authorities (CAs)

Local CA

root CA
Identification

Node Registration with local CA

Working of local CA’s
Tamper Proof Device

on board unit (OBU) and their functioning

hardware security modules (HSM) and their functioning
NOTATIONS used in protocol
Certificate Management
Node Misbehaving
Certificate Revocation
Evaluation of the protocol

Message authentication and integrity- all messages are signed by the sender,
thus receivers are able to check the validity of the sender

Message Non- repudiation- every node, in this protocol, sending a message
also signs the message with its own private key. This signature is used by the
local CA to determine the node’s identity

privacy protection- Messages generated by a vehicle should not disclose the
sender’s identity in order to keep vehicle anonymous
Thank you!
Download