Boost PC performance: How more available memory can improve productivity
The Security and Privacy Requirements in VANET
1. Introduction to VANET
Scenarios
Security Requirements
Privacy Requirements
Bibliography
The Security and Privacy
Requirements in VANET
Ankit Singh
mailto:ankit.singh@sit.fraunhofer.de
June 24, 2011
Ankit Singh The Security and Privacy Requirements in VANET
2. Introduction to VANET
Scenarios
Security Requirements
Privacy Requirements
Bibliography
1 Introduction to VANET
History
Overview
Overview of Basic Components in VANETs
2 Scenarios
Vehicle to Vehicle Communication
Vehicle to Infrastructure Communication
3 Security Requirements
4 Privacy Requirements
5 Bibliography
Ankit Singh The Security and Privacy Requirements in VANET
3. Introduction to VANET
Scenarios History
Security Requirements Overview
Privacy Requirements Overview of Basic Components in VANETs
Bibliography
History of Vehicles I
Figure: Cars were Pure Mechanical Devices
Ankit Singh The Security and Privacy Requirements in VANET
4. Introduction to VANET
Scenarios History
Security Requirements Overview
Privacy Requirements Overview of Basic Components in VANETs
Bibliography
History of Vehicles II
Figure: Todays cars with almost fully controlled Software devices
Ankit Singh The Security and Privacy Requirements in VANET
5. Introduction to VANET
Scenarios History
Security Requirements Overview
Privacy Requirements Overview of Basic Components in VANETs
Bibliography
History of Vehicles III
Figure: Future smart cars fully controlled by softwares (Concept model of
Audi A9 will repairs itself)
Ankit Singh The Security and Privacy Requirements in VANET
6. Introduction to VANET
Scenarios History
Security Requirements Overview
Privacy Requirements Overview of Basic Components in VANETs
Bibliography
What is VANET? I
Vehicles Transformed into “Computers on the Wheels” or
“Networks on the Wheel”
Vehicular Communication System (VCS):- Two main type of
communications
Vehicle to Vehicle (V2V) Communication:-
Vehicle to Infrastructure (V2I) communication:-
Advantage and Usage of VCS:-
Information sharing
Co-operative driving
Other value added services like Navigation, internet access etc.
Communication between C2C adn C2I are “ad-hoc” in nature.
This special kind of communication network is known as
“Vehicular Ad-hoc Network (VANET)”
Ankit Singh The Security and Privacy Requirements in VANET
7. Introduction to VANET
Scenarios History
Security Requirements Overview
Privacy Requirements Overview of Basic Components in VANETs
Bibliography
What is VANET? II
VANET will become Worlds largest ad-hoc network
Ankit Singh The Security and Privacy Requirements in VANET
8. Introduction to VANET
Scenarios History
Security Requirements Overview
Privacy Requirements Overview of Basic Components in VANETs
Bibliography
Why we need VANET? I
Ankit Singh The Security and Privacy Requirements in VANET
9. Introduction to VANET
Scenarios History
Security Requirements Overview
Privacy Requirements Overview of Basic Components in VANETs
Bibliography
Overview of Basic Components in VANETs I
Figure: Basic Component of VANET
Ankit Singh The Security and Privacy Requirements in VANET
10. Introduction to VANET
Scenarios History
Security Requirements Overview
Privacy Requirements Overview of Basic Components in VANETs
Bibliography
Overview of Basic Components in VANETs II
Communication:- Wireless Access in Vehicular Environment
(WAVE): IEEE 1609.2 Standard also Known DSRC 802.11p .
Supports Multi-Hop communication for vehicles out of range
(Max. Range DSRC is 1000m)
On-Board Unit (OBU):- A device which is inside the vehicle
which -
processes the data collected from various sensors fitted inside
the cars and gives conditions of the vehicles
is responsible for communication with outside network i.e with
other vehicles and infrastructure.
Road Side Unit (RSU): Infrastructure for communication
between the cars for sharing and information from various
vehicles.
Ankit Singh The Security and Privacy Requirements in VANET
11. Introduction to VANET
Scenarios
Vehicle to Vehicle Communication
Security Requirements
Vehicle to Infrastructure Communication
Privacy Requirements
Bibliography
Vehicle to Vehicle Communication I
Figure: Scenarios in V2V
Possible Threat Scenarios in V2V above:-
Pre-crash warning:- trust on the warning message, Denial of
Service, Jamming
Traffic condition warning:- Linkablity of Private Credentials
(Tracking/profiling), Message fabrication/tamper
Ankit Singh The Security and Privacy Requirements in VANET
12. Introduction to VANET
Scenarios
Vehicle to Vehicle Communication
Security Requirements
Vehicle to Infrastructure Communication
Privacy Requirements
Bibliography
Vehicle to Vehicle Communication II
Vehicle Status Warning:- Drops/Tamper Message
Ankit Singh The Security and Privacy Requirements in VANET
13. Introduction to VANET
Scenarios
Vehicle to Vehicle Communication
Security Requirements
Vehicle to Infrastructure Communication
Privacy Requirements
Bibliography
Vehicle to Infrastructure Communication I
Figure: Scenarios in V2I
Ankit Singh The Security and Privacy Requirements in VANET
14. Introduction to VANET
Scenarios
Vehicle to Vehicle Communication
Security Requirements
Vehicle to Infrastructure Communication
Privacy Requirements
Bibliography
Vehicle to Infrastructure Communication II
Possible Threat in Scenarios of V2I above:-
Electronic Toll collection/Automatic access control/parking
access:- Privacy Violation, Impersonation,
Infotainment:- Penetration attack, Privacy violation
Remote Fleet Management:- Tracking/Profiling
Tax payment: The authority can link or indentify using
previous transaction or other vehicle can hack transaction
information and reveal the identity of the sender.
Ankit Singh The Security and Privacy Requirements in VANET
15. Introduction to VANET
Scenarios
Security Requirements
Privacy Requirements
Bibliography
Security Requirements I
Various Security Requirements for VANET’s:-
Authentication
Accountability
Verification of Data Consistency
Availability
Non-Repudiation
Credential revocation
Ankit Singh The Security and Privacy Requirements in VANET
16. Introduction to VANET
Scenarios
Security Requirements
Privacy Requirements
Bibliography
Privacy Requirements I
Various Privacy Requirements for VANET’s:-
Anonymity
Unlinkablility
Restricted credential usage
Perfect forward Privacy
Ankit Singh The Security and Privacy Requirements in VANET
17. Introduction to VANET
Scenarios
Security Requirements
Privacy Requirements
Bibliography
Bibliography I
Security Engineering for Vehicular IT Systems, Improving the Trustworthiness and Dependability of
Automotive IT Applications, Marko Wolf
How much does software add to the cost of today’s vehicles? How about tomorrow’s electric cars? by
Sebastian Blanco on Jun 8th 2010, at Auto Blog Green: autobloggreen.com
Design of 5.9GHz DSRC-based Vehicular Safety Communication, Daniel Jiang1 , Vikas Taliwal1 , Andreas
Meier1 , Wieland Holfelder1 , Ralf Herrtwich2 , 1 DaimlerChrysler Research and Technology North America,
Inc., 2 DaimlerChrysler AG, Vehicle IT and Services Research and Advanced Engineering
DSRC range comparison with FM Radio, cellular Phone, Satellite, Check FAQs
Security in Vehicular Ad Hoc Networks, Xiaodong Lin, Rongxing Lu, Chenxi Zhang, Haojin Zhu, Pin-Han
Ho, and Xuemin (Sherman) Shen, University of Waterloo
Privacy Requirements in Vehicular Communications Systems, Florian Schaub, Zhendong Ma, and Frank
Kargl, Institute of Media Informatics, Ulm University, Germany
The Security of Vehicular Ad Hoc Networks, Maxim Raya and Jean-Pierre Hubaux, Laboratory of computer
Communications and Applications (LCA), School of Computer and Communication Sciences, EPFL,
Switzerland
Ankit Singh The Security and Privacy Requirements in VANET
18. Introduction to VANET
Scenarios
Security Requirements
Privacy Requirements
Bibliography
Bibliography II
Securing Vehicular Communications, Maxim Raya, Panos Papadimitratos, Jean-Pierre Hubaux, Laboratory
of computer Communications and Applications (LCA), School of Computer and Communication Sciences,
EPFL, Switzerland
Security Engineering for VANETs, Frank Kargl, Zhendong Ma, and Elmar Schoch, Ulm University, Institute
of Media Informatics
Privacy in VANETs using Changing Pseudonyms - Ideal and Real, Matthias Gerlach and Felix G¨ttler
u
Adaptive Privacy-Preserving Authentication in Vehicular Networks (Invited Paper) Kewi Sha1 , Yong Xi1 ,
Weisong Shi1 , Loren Schwiebert1 , and Tao Zhang2 , 1 Department of computer Science, Wayne state
University, 2 Telcordia Technologies, Inc.
Strong and Affordable Location Privacy in VANETs: Identity Diffusion Using Time-Slots and Swapping,
David Eckhoff , Christoph Sommer , Tobias Gansen† , Reinhard German and Falko Dressler∗ ,
∗
Computer Networks and Communication Systems, Dept. of Computer Science, University of Erlangen,
Germany, † Audi Electronics Venture GmbH, Gaimersheim, Germany
Current Trends in Vehicular Ad Hoc Networks, Ghassan M. T. Abdalla∗ , Mosa Ali Abu-Rgheff∗ and Sidi
Mohammad Senouci∗∗ , ∗ University of Plymouth - School of Computing, Communications & Electronics,
UK, ∗∗ France T´l´com - Recherche et D´veloppment CORE, France
ee e
Ankit Singh The Security and Privacy Requirements in VANET