Mozilla Firefox Security

Document Sample
Mozilla Firefox Security Powered By Docstoc
					                        Securing Vehicular
                         Communications
Sharaf J. Malebary




CSCE 790 Wireless Networking - Spring’08
Presented: April 15, 2008
University of South Carolina
CONTENT:

     1. Introduction & background.
     2. Goals.
     3. Vulnerabilities.
     4. Challenges.
     5. Attackers.
     6. Sec. architecture.
     7. Future & related work & CA.
     8. Questions & Answers.

9/12/2012               CSCE 715      2
1. DEFINITIONS:
     VANET – Vehicular Ad-Hoc Network




9/12/2012                   CSCE 715    3
INTRO TO VANET




9/12/2012    CSCE 715   4
INTRO TO VANET




9/12/2012    CSCE 715   5
INTRO TO VANET




9/12/2012    CSCE 715   6
VANET APPLICATIONS




9/12/2012    CSCE 715   7
3. VANET APPLICATIONS
                        Intersection Collision warning
                        Stop Signal violation warning




9/12/2012    CSCE 715                                    8
VANET APPLICATIONS
                        V2V Hazard Warning




9/12/2012    CSCE 715                        9
VANET APPLICATIONS
                        V2I Hazard Warning




9/12/2012    CSCE 715                        10
VANET APPLICATIONS




9/12/2012    CSCE 715   11
3. VANET APPLICATIONS
       Adaptive Drivetrain Management




9/12/2012                        CSCE 715   12
3. VANET APPLICATIONS
       Electronic toll payment




9/12/2012                        CSCE 715   13
  VANET APPLICATIONS




9/12/2012     CSCE 715   14
  VANET APPLICATIONS
    Software update




9/12/2012             CSCE 715   15
  VANET APPLICATIONS

                         Parking spot locator




9/12/2012     CSCE 715                          16
  VANET APPLICATIONS
    Instant Messaging (between vehicles)




9/12/2012                       CSCE 715   17
GOALS
• Some Applications (safety, traffic efficincy,
  driver assist. And infotainment)
• VC is a double edged sword?
• What is the paper about?




9/12/2012               CSCE 715                  18
Vulnerabilities:


                              Jamming




9/12/2012          CSCE 715             19
            Spectrum Jamming




9/12/2012                 CSCE 715   20
      Jamming Attack Scenario:
                                  A jammer may
                                  remain quiet
                                  when there is no
                                  activity on the
                                  network, and
                                  start interference
                                  as soon as it
                                  detects a
                                  transmission.




9/12/2012              CSCE 715                        21
Vulnerabilities:


                              Forgery




9/12/2012          CSCE 715             22
Vulnerabilities:


                              Intransit TT




9/12/2012          CSCE 715                  23
Vulnerabilities:


                              Impersonation




9/12/2012          CSCE 715                   24
Vulnerabilities:


                              Privacy Violation




9/12/2012          CSCE 715                       25
Vulnerabilities:


                                                On-board Tampering

                                         SLOW
                                         DOWN




            The way
            is clear
                       Similar attack: stop a highway




9/12/2012                     CSCE 715                               26
Challenges:




9/12/2012     CSCE 715   27
       Network Volatility
       Liability VS. Privacy

       Delay Sensitive app.

       Network Scale
       Heterogeneity

9/12/2012               CSCE 715   28
ATTACKERS

            Who are they?




9/12/2012         CSCE 715   29
  ATTACKERS

            Who are they?

                             Greedy Drivers




9/12/2012         CSCE 715                    30
ATTACKERS

            Who are they?

                     Industrial insiders




9/12/2012         CSCE 715                 31
ATTACKERS

            Who are they?

                  Malicious attackers




9/12/2012         CSCE 715              32
ATTACKERS

              Who are they?

            Pranksters




9/12/2012                CSCE 715   33
Security Architecture:


                           Over View




9/12/2012       CSCE 715               34
Security Architecture:

 Security HW.             Privacy

 VPK Infrastr.

Authentication Security HW.

 Cert. Revocation



9/12/2012           CSCE 715        35
9/12/2012   CSCE 715   36
9/12/2012   CSCE 715   37
9/12/2012   CSCE 715   38
9/12/2012   CSCE 715   39
Certificates issue:




9/12/2012      CSCE 715   40
7. FUTURE WORK




9/12/2012    CSCE 715   41
            THANK YOU




9/12/2012      CSCE 715   42
• Guys if any one has a question please
  ask, else I am going to ask you about
           what I just present 




9/12/2012         CSCE 715            43
REFERENCES:
In this presentation graphical images and schemes were used from the sources as follows:

[1] F. Kargl. Vehicular Communications and VANETs


[2] M. Weigle. Introduction to Vehicular Networks


[3] M. Torrent-Moreno, H. Hartenstein. Current View on VANETs (Safety, Fairness and Fading ) October 14th
     2005.

[4] Car-to-Car Communication Stephan Eichler, Christoph Schroth, Jörg Eberspächer

[5] Google Images

[6] the slides were taking from a classmate who present for 727, then they were updated and adjusted by me.




9/12/2012                                           CSCE 715                                                  44

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:7
posted:9/12/2012
language:English
pages:44