Security in VANET
Security in VANET
Security in VANET
Nandini Vineeth
Assistant Professor
Department of Computer Science & Engineering
BMS College of Engineering
1
Table of Contents
Introduction
Classification of Attacks
Literacy survey
Problem statement
System requirements
Models
Related work
reference
INTRODUCTION
O What is VANET?
It is special form of MANET and it provides
• Vehicle-to-vehicle communications
• Vehicle-to-infrastructure communications
Secure positioning
Authenticated
message
Tamper-
proof device
≈ 100 bytes ≈ 140 bytes
Safety Cryptographic
message material
Event data
recorder
{Position, speed, {Signer’s digital signature,
acceleration, direction, Signer’s public key PK,
time, safety events} CA’s certificate of PK}
Data verification
Attackers
O Insider or outsider
O Insider – valid user
O Outsider – Intruder, limited attack options
O Malicious or rational
O Malicious – No personal benefit, intends to
harm other users
O Rational – seeks personal benefits, more
predictable attack
O Active or passive
O Active: Generates packets, participates in
the network
O Passive: Eavesdrop, track users
Attacks
Classification of attacks
Description Attacks Involved
1 Network attack Denial of service Attack, Node Impersonation Attack.
Black hole attack, Sybil attack, Masquerading attack.
Brute force attack, Distributed Denial of service Attack
GPS spoofing attack, Worm hole attack
Merged technique to prevent Salman Ali Syed IEEE-2019 Merging the two methods had given a great
result and prevents the data and fake
SYBIL Attacks in VANETs. information from the attackers. Still there is
much research need to be done for future.
Xiao Dong IEEE– 2018 The architecture includes three layers, namely
A Security Architecture of Zhang perception layer, edge computing layer and
Vanet Based on service layer. The perception layer ensures the
security of VANET data in the transmission
Blockchain and mobile process through the blockchain. The edge
Edge Computing. computing layer provides computing resources
and edge cloud services for the perception
layer. The service layer uses the combination of
traditional cloud storage and blockchain to
ensure the security of data.
Severity-Based Prioritized Ala Al-Fuqaha, 2019 IEEE The problems is formulated as a PMKP, which
Senior Member, is proved to be NP-Hard. Due to the complexity
Processing of Packets with of the PMKP, a polynomial time algorithm based
Application in VANETs. on a relaxed version of the PMKP formulation is
proposed to perform the desired prioritization in
real-time. The proposed heuristic is tested
against the PMKP solution and a baseline non-
prioritized processing approach.
Year of
Journal Name Author Name Publicatio Extraction
n
Verification Based A. Asline Celes (IEEE –2018) Simulation is done and the obtained results
and N. Edna show that this type of verification system
Authentication Scheme for Elizabeth effectively reveals the nodes spreading false
Bogus Attacks in VANETs information and thus reduce spreading of
for Secure Communication. false information about their position. This
technique will not entirely prevent the bogus
attack but will reduces the spreading of false
position information.
A Novel Sybil Attack Marwane Ayaida (IEEE –2019) they presented an algorithm that detects the
Sybil attack using the CAM messages
Detection Mechanism for C- provided by neighbors. This algorithm allows
ITS. to estimate the speed of the vehicle using the
fundamental diagram of the road’s segment.
Realistic Scenario Taskeen Zaidi*, 2018 IEEE Working of SUMO simulator and analysis
Shubhang Giri, using NS3.
Based VANET Analysis 11
through Sumo and NS3,
Problem Statement
O An innovative Sybil attack detection technique is presented in this project
for the protection of anonymity and location privacy through the exploitation
of trajectories for the identification of vehicle. For the identification purpose,
vehicles obtain authorized message from RSU. Simple usage of authorized
message affects the privacy. Hence proposed technique involves signer
ambiguous signature scheme which results in location-hidden authorized
message. Using the authorized messages from multiple RSUs proposed
technique forms trajectory of the vehicle. Footprint mechanism detects the
Sybil trajectories through the similarity definition of two trajectories. A
protection scheme is proposed against corrupted RSUs.
O To Prevent this Sybil attacks, creating a dynamic tables in
cloud-computing which stores recent communicated
information and location, and which is used to estimate the
distance from current location.
O Attack is accurately detected by the location and speed
information provided by the vehicle.
O Simulation is conducted using Network Simulator (ns-2) for the
evaluation of the efficiency of the proposed technique.
Problem Statement
O The proposed system is an efficient broadcast authentication scheme called
Prediction-based Authentication (PBA) to not only defend against computation-
based DoS attacks, but also resist packet losses caused by high mobility of vehicles.
Certain vehicular applications may require receivers to verify urgent messages
immediately. To support instant verification, it exploits the property of predictability
of a future beacon, constructing a Merkle Hash Tree (MHT) to generate a common
public key or predication outcome for the vehicle movements. With the prediction
outcome known in advance, receivers can instantly verify the incoming beacon. If the
mechanism brings a large storage burden, an attacker would initiate memory-based
DoS attacks where an On-Board Units (OBUs) is overwhelmed by storing a large
number of unverified signatures. To defend against such attacks, PBA records
shortened rekeyed Message Authentication Codes (MACs) instead of storing all the
received signatures.
O An attacker can easily disrupt the normal function of VANETs by injecting bogus
messages. Therefore, vehicles should broadcast each message with a digital
signature. However, the current VANET signature standard using Elliptic Curve
Digital Signature Algorithm (ECDSA) would cause high computational overhead on
the standard OBU hardware, which has limited resources for cost constraints. PBA
aims at improving the efficiency of authentication.
MODULES
O Network Module : Infrastructure Construction
O Sybil Attack.
O Generating Location hidden Trajectory.
O Cloud-computing
O Online Sybil attack Detection.
O IP2DAP-Sybil Attack Detection: Distance based
Detection
O Performance Evolution.
Software Requirements
O OS : Ubuntu 12.04 LTS 64 bit.
O Simulator : NS 2.35.
Assistance
• Navigation O Weather information
• Cooperative collision
avoidance
• Lane-changing O Instant messaging
Information
• Speed limit O Online games
• Work zone info
Warning O Internet access
• Post-crash
• Obstacle
• Road condition warnings O Advertisement
VANET Applications
O Insider or outsider
O Insider – valid user
O Outsider – Intruder, limited attack options
O Malicious or rational
O Malicious – No personal benefit, intends to harm other users
O Rational – seeks personal benefits, more predictable attack
O Active or passive
O Active: Generates packets, participates in the network
O Passive: Eavesdrop, track users
O Local or Extended
O Local: Control several entities (vehicles and base stations) in a confined
area.
O Extended: Control several entities scattered across the network.
References
• [ 1 ]. R. Oliveira, C. Montez, A. Boukerche, and M.S. Wangham, “Reliable data dissemination protocol
for VANET traffic safety applications,” Ad Hoc Networks, Vol 63, 30 – 44, 2017.
• [ 2 ]. Rajdeep Kaur, Tejinder Pal Singh, Vinayak Khajuria,” Security Issues in Vehicular Ad- hoc
Network (VANET)” (ICOEI 2018) IEEE Conference Record: # 42666; IEEE Xplore ISBN:978-1-5386-
3570-4.
• [ 4 ]. Kiho Lim, Kastuv M. Tuladhar, Hyunbum Kim, “Detecting Location Spoofing using ADAS
sensors in VANETs” (CCNC – 2019).
• [ 5 ]. Sushil Kumar, Kulwinder Singh Mann, Prevention of DoS Attacks by Detection of Multiple
Malicious Nodes in VANETs, (ICACTM – 2019).
• [ 6 ]. Yutong Liu, Kai Shi, Guangping Xu, Sheng Lin and Shuangxi Li, “Analysis of Packet Loss
Characteristics in VANET” (©2018 IEEE).
• [ 7 ]. Roshini T V, Greeshma T P, Dr kamlaraj Subramnian.” An Efficient Privacy Preserving scheduling In
VANET using NS-2,” ((ICETIETR-2018)
• [ 8 ]. D. Kiruba Sandou1, N. Jothy2, and K. Jayanthi3,” Secured Routing in VANETs Using Lightweight
Authentication and Key Agreement Protocol” (©2018 IEEE).
• [ 9 ]. Salman Ali Syed , B.V.V.S Prasad “Merged technique to prevent SYBIL Attacks in
VANETs” (IEEE – 2019)
• [ 10 ]. A Security Architecture of Vanet Based on Blockchain and mobile Edge Computing ,XiaoDong Zhang
(IEEE- 2018)
• [ 11 ]. Severity-Based Prioritized Processing of Packets with Application in VANETs, Ala Al-Fuqaha, Senior
Member, IEEE(IEEE-2019)
• [ 12 ]. Verification Based Authentication Scheme for Bogus Attacks in VANETs for Secure Communication, A.
Asline Celes and N. Edna Elizabeth (IEEE – 2018)
• [ 13 ] . Realistic Scenario Based VANET Analysis through Sumo and NS3 Taskeen Zaidi*, Shubhang Giri, Kavita ,
Srivastava and Shivam Chaurasia (IEEE – 2018)
• [ 14 ]. Tsvetan Marinov, Maria Nenova and Georgi Iliev, “Message Transmission Protocol in VANET” Proc. X
National Conference with International Participation "Electronica 2019", May 16 - 17, 2019, Sofia, Bulgaria
• [ 15 ]. Esmaeil Amiri, Reza Hooshmand “Improving AODV with TOPSIS Algorithm and Fuzzy
Logic in VANETs”, 27th Iranian Conference on Electrical Engineering (ICEE2019)
• [ 16 ]. Cherifa Boucetta, Oumaya Baala†, Kahina Ait Ali‡ and Alexandre Caminada,
Performance of topology-based data routing with regard to radio connectivity in
VANET”, (©2019 IEEE)
• [ 18 ]. Yutong Li, Yutong Liu, Kai Shi,” Performance Study of AODV Protocol with Ant
Colony Algorithm in VANETs”, (©2019 IEEE)
• [ 19 ]. Zannatul Naim, Md. Imran Hossain, “Performance Analysis of AODV, DSDV And
DSR in Vehicular Adhoc Network(VANET)”, (©2019 IEEE)
22