SlideShare a Scribd company logo
Dr I.A.Sumra
 Vehicular ad-hoc network is a special kind of network in which
nodes (Vehicles) can communicate with each other on the road
and with its Infrastructure.
Road Side Unit (RSU)
V2V
V2V
Basic VANET Architecture
2
V2I
Introduction
 Safety Applications
 Non Safety Applications
Work
in Progress
Plz! use Alt.
route
Work Zone
Warning:!!!
Work Zone
Warning:!!!
Shopping MALL
( TESCO )
Parking Slot
Available!!!
RSU Parking Slot
Available!!!
3
 Vehicular network applications require security and the objective of these applications is to
serve users and make their journey secure and comfortable.
 Attackers have their own role in this network and we cannot predict the dynamic behavior of the
attacker. If an attacker works on a safety application and changes the content of the safety
message then it poses a very difficult condition on the road and many users will be affected due
to this kind of attack.
 Accidents are often the result of an alteration of any safety message or the sending of even one
wrong safety message in a network and many human lives are at risk [1].
 Network Behavior
 Attacker Behavior
 In VANET, DOS shall not be allowed to happen, where
seamless life critical information must reach its
intended destination securely and timely. In summary,
there are three ways the attackers may achieve DOS
attacks.
 There are three levels of DOS attacks as described
below.
1. Basic Level: Overwhelm the Node Resources
2. Extended Level: Jamming the Channel
 Basic Level: Overwhelm the Node Resources
 Extended Level: Jamming the Channel
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
 To achieve secure communication and network availability
must be obtained in the VANET set up. In this paper we have
discussed the different types of attacks that may be
applicable to VANET.
 We have proposed a model to provide solution to DOS and
 DDOS attacks, which the intention is to ensure network
availability for secure communication between the nodes.
 It found that network availability has been directly affected in
the case of DOS and DDOS attacks, where the attacks has led
to most severe impact by causing the network to break down.
15
 Please download complete research paper from
research gate.
16

More Related Content

PPT
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
PPT
Using the grades mechanism to differentiate the users in VANET
PPT
Using Computing Methods to Secure VANET
PDF
Security attacks and solutions in vehicular ad hoc networks a survey
PPT
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
PPT
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
PDF
VANET SECURITY AND PRIVACY – AN OVERVIEW
PDF
VANET SECURITY AND PRIVACY – AN OVERVIEW
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
Using the grades mechanism to differentiate the users in VANET
Using Computing Methods to Secure VANET
Security attacks and solutions in vehicular ad hoc networks a survey
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
VANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEW

What's hot (18)

PDF
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
PDF
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
PPT
Security issues and challenges in MANET,VANET and FANET: A Survey
PDF
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
PDF
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
PDF
SURVEY ON SECURE ROUTING IN VANETS
PDF
Ktr an efficient key management scheme for secure data access control in wire...
PDF
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
PDF
Cyber DoS attack-based security simulator for VANET
PDF
A Survey on Vehicle to Infrastructure Communication System
PDF
Security issues and solutions in vehicular adhoc network a review approach
PDF
F0332838
PPTX
1102060,1102073,1102083
PDF
A review on various security attacks in vehicular ad hoc networks
PPT
[Ppt] Survey Of Vehicular Network Security
PDF
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
PDF
K1803046067
PDF
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
Security issues and challenges in MANET,VANET and FANET: A Survey
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
SURVEY ON SECURE ROUTING IN VANETS
Ktr an efficient key management scheme for secure data access control in wire...
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
Cyber DoS attack-based security simulator for VANET
A Survey on Vehicle to Infrastructure Communication System
Security issues and solutions in vehicular adhoc network a review approach
F0332838
1102060,1102073,1102083
A review on various security attacks in vehicular ad hoc networks
[Ppt] Survey Of Vehicular Network Security
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
K1803046067
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Ad

Similar to Denial of Service (DOS) Attack and Its Possible Solutions in VANET (20)

PPT
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
PDF
MALICIOUS NODE DETECTION THROUGH AODV IN VANET
PDF
B130912
PDF
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
PDF
B017130508
PDF
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...
PDF
T04506110115
PDF
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
PPT
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
PDF
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
PDF
An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET
PDF
An ids scheme against black hole attack to secure aomdv routing in manet
PDF
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
PDF
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
PDF
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
PDF
Security Attacks and Solutions in Vehicular Ad Hoc Networks: A Survey
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Analysis of denial of service (dos) attacks in wireless sensor networks
PPT
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
PDF
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
MALICIOUS NODE DETECTION THROUGH AODV IN VANET
B130912
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
B017130508
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...
T04506110115
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET
An ids scheme against black hole attack to secure aomdv routing in manet
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
Security Attacks and Solutions in Vehicular Ad Hoc Networks: A Survey
International Journal of Computational Engineering Research(IJCER)
Analysis of denial of service (dos) attacks in wireless sensor networks
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Ad

More from Dr.Irshad Ahmed Sumra (20)

PPTX
Basic Concept of Smart Healthcare System
PPTX
Introduction to Smart Vehicles and its Working
PPTX
Introduction to Artificial Intelligence (AI)(AI) and its Applications
PPTX
Basic concept of Digital Logic Design and its working
PPTX
Basic concept of Data-Science and its Applications
PPTX
Basic concept of Data-Mining and it Applications
PPTX
The Transformative Power of AI in Biomedical Science
PPTX
AI-in-Public-Health-A-New-Era-of-Precision-and-Equity
PPTX
Artificial Intelligence(AI) in Petroleum-Engineering.pptx
PPTX
Artificial Intelligence(AI) in Nuclear-Engineering.pptx
PPTX
Artificial Intelligence(AI) in Molecular-Life-Science
PPTX
Role of Artificial Intelligence(AI) in Mechanical Engineering
PPTX
AI Applications:AI-in-Electrical-Engineering
PPTX
AI application: AI in Earth Science and Future Trends
PPTX
AI in Civil Engineering and Future Trends
PPTX
AI in Aerospace Engineering science and AI future Trends
PPTX
Basic concept of Virtual-Reality and its Applications
PPTX
Basic Concept of VANET-Security-Challenges-and-Solutions
PPTX
Basic concept of Outcome-Based-Education-OBE and Key Features
PPTX
Basic Concept of Image-Processing and its Applications
Basic Concept of Smart Healthcare System
Introduction to Smart Vehicles and its Working
Introduction to Artificial Intelligence (AI)(AI) and its Applications
Basic concept of Digital Logic Design and its working
Basic concept of Data-Science and its Applications
Basic concept of Data-Mining and it Applications
The Transformative Power of AI in Biomedical Science
AI-in-Public-Health-A-New-Era-of-Precision-and-Equity
Artificial Intelligence(AI) in Petroleum-Engineering.pptx
Artificial Intelligence(AI) in Nuclear-Engineering.pptx
Artificial Intelligence(AI) in Molecular-Life-Science
Role of Artificial Intelligence(AI) in Mechanical Engineering
AI Applications:AI-in-Electrical-Engineering
AI application: AI in Earth Science and Future Trends
AI in Civil Engineering and Future Trends
AI in Aerospace Engineering science and AI future Trends
Basic concept of Virtual-Reality and its Applications
Basic Concept of VANET-Security-Challenges-and-Solutions
Basic concept of Outcome-Based-Education-OBE and Key Features
Basic Concept of Image-Processing and its Applications

Recently uploaded (20)

PDF
Mushroom cultivation and it's methods.pdf
PDF
Getting Started with Data Integration: FME Form 101
PPTX
A Presentation on Touch Screen Technology
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
August Patch Tuesday
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
MIND Revenue Release Quarter 2 2025 Press Release
Mushroom cultivation and it's methods.pdf
Getting Started with Data Integration: FME Form 101
A Presentation on Touch Screen Technology
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
August Patch Tuesday
Programs and apps: productivity, graphics, security and other tools
TLE Review Electricity (Electricity).pptx
Group 1 Presentation -Planning and Decision Making .pptx
Web App vs Mobile App What Should You Build First.pdf
A Presentation on Artificial Intelligence
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
cloud_computing_Infrastucture_as_cloud_p
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
1. Introduction to Computer Programming.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Hindi spoken digit analysis for native and non-native speakers
Assigned Numbers - 2025 - Bluetooth® Document
WOOl fibre morphology and structure.pdf for textiles
MIND Revenue Release Quarter 2 2025 Press Release

Denial of Service (DOS) Attack and Its Possible Solutions in VANET

  • 2.  Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. Road Side Unit (RSU) V2V V2V Basic VANET Architecture 2 V2I Introduction
  • 3.  Safety Applications  Non Safety Applications Work in Progress Plz! use Alt. route Work Zone Warning:!!! Work Zone Warning:!!! Shopping MALL ( TESCO ) Parking Slot Available!!! RSU Parking Slot Available!!! 3
  • 4.  Vehicular network applications require security and the objective of these applications is to serve users and make their journey secure and comfortable.  Attackers have their own role in this network and we cannot predict the dynamic behavior of the attacker. If an attacker works on a safety application and changes the content of the safety message then it poses a very difficult condition on the road and many users will be affected due to this kind of attack.  Accidents are often the result of an alteration of any safety message or the sending of even one wrong safety message in a network and many human lives are at risk [1].
  • 7.  In VANET, DOS shall not be allowed to happen, where seamless life critical information must reach its intended destination securely and timely. In summary, there are three ways the attackers may achieve DOS attacks.  There are three levels of DOS attacks as described below. 1. Basic Level: Overwhelm the Node Resources 2. Extended Level: Jamming the Channel
  • 8.  Basic Level: Overwhelm the Node Resources
  • 9.  Extended Level: Jamming the Channel
  • 14.  To achieve secure communication and network availability must be obtained in the VANET set up. In this paper we have discussed the different types of attacks that may be applicable to VANET.  We have proposed a model to provide solution to DOS and  DDOS attacks, which the intention is to ensure network availability for secure communication between the nodes.  It found that network availability has been directly affected in the case of DOS and DDOS attacks, where the attacks has led to most severe impact by causing the network to break down.
  • 15. 15
  • 16.  Please download complete research paper from research gate. 16