Download
securing vehicular communications n.
Skip this Video
Loading SlideShow in 5 Seconds..
Securing Vehicular Communications PowerPoint Presentation
Download Presentation
Securing Vehicular Communications

Securing Vehicular Communications

169 Vues Download Presentation
Télécharger la présentation

Securing Vehicular Communications

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Securing Vehicular Communications Sharaf J. Malebary CSCE 790 Wireless Networking - Spring’08 Presented: April 15, 2008 University of South Carolina

  2. CONTENT: 1. Introduction & background. 2. Goals. 3. Vulnerabilities. 4. Challenges. 5. Attackers. 6. Sec. architecture. 7. Future & related work & CA. 8. Questions & Answers. CSCE 715

  3. 1. DEFINITIONS: VANET – Vehicular Ad-Hoc Network CSCE 715

  4. INTRO TO VANET CSCE 715

  5. INTRO TO VANET CSCE 715

  6. INTRO TO VANET CSCE 715

  7. VANET APPLICATIONS CSCE 715

  8. 3. VANET APPLICATIONS Intersection Collision warning Stop Signal violation warning CSCE 715

  9. VANET APPLICATIONS V2V Hazard Warning CSCE 715

  10. VANET APPLICATIONS V2I Hazard Warning CSCE 715

  11. VANET APPLICATIONS CSCE 715

  12. 3. VANET APPLICATIONS Adaptive Drivetrain Management CSCE 715

  13. 3. VANET APPLICATIONS Electronic toll payment CSCE 715

  14. VANET APPLICATIONS CSCE 715

  15. VANET APPLICATIONS Software update CSCE 715

  16. VANET APPLICATIONS Parking spot locator CSCE 715

  17. VANET APPLICATIONS Instant Messaging (between vehicles) CSCE 715

  18. GOALS • Some Applications (safety, traffic efficincy, driver assist. And infotainment) • VC is a double edged sword? • What is the paper about? CSCE 715

  19. Vulnerabilities: Jamming CSCE 715

  20. Spectrum Jamming CSCE 715

  21. Jamming Attack Scenario: A jammer may remain quiet when there is no activity on the network, and start interference as soon as it detects a transmission. CSCE 715

  22. Vulnerabilities: Forgery CSCE 715

  23. Vulnerabilities: Intransit TT CSCE 715

  24. Vulnerabilities: Impersonation CSCE 715

  25. Vulnerabilities: Privacy Violation CSCE 715

  26. Vulnerabilities: On-board Tampering SLOW DOWN The way is clear Similar attack: stop a highway CSCE 715

  27. Challenges: CSCE 715

  28. Network Volatility Liability VS. Privacy Delay Sensitive app. Network Scale Heterogeneity CSCE 715

  29. ATTACKERS Who are they? CSCE 715

  30. ATTACKERS Who are they? Greedy Drivers CSCE 715

  31. ATTACKERS Who are they? Industrial insiders CSCE 715

  32. ATTACKERS Who are they? Malicious attackers CSCE 715

  33. ATTACKERS Who are they? Pranksters CSCE 715

  34. Security Architecture: Over View CSCE 715

  35. Security Architecture: Authentication Security HW. VPK Infrastr. Cert. Revocation Privacy Security HW. CSCE 715

  36. CSCE 715

  37. CSCE 715

  38. CSCE 715

  39. CSCE 715

  40. Certificates issue: CSCE 715

  41. 7. FUTURE WORK CSCE 715

  42. THANK YOU CSCE 715

  43. Guys if any one has a question please ask, else I am going to ask you about what I just present  CSCE 715

  44. REFERENCES: In this presentation graphical images and schemes were used from the sources as follows: [1] F. Kargl. Vehicular Communications and VANETs [2] M. Weigle. Introduction to Vehicular Networks [3] M. Torrent-Moreno, H. Hartenstein. Current View on VANETs (Safety, Fairness and Fading ) October 14th 2005. [4] Car-to-Car Communication Stephan Eichler, Christoph Schroth, Jörg Eberspächer [5] Google Images [6] the slides were taking from a classmate who present for 727, then they were updated and adjusted by me. CSCE 715