SlideShare a Scribd company logo
Using TPM to Ensure Security, Trust and
Privacy (STP) in VANET
VANET Security Research Group
(VSRG)
Dr I.A.Sumra
 Vehicular ad-hoc network is a special kind of network in which
nodes (Vehicles) can communicate with each other on the road
and with its Infrastructure.
Road Side Unit (RSU)
V2V
V2V
Basic VANET Architecture
2
V2I
Introduction
 Safety Applications
 Non Safety Applications
Work
in Progress
Plz! use Alt.
route
Work Zone
Warning:!!!
Work Zone
Warning:!!!
Shopping MALL
( TESCO )
Parking Slot
Available!!!
RSU Parking Slot
Available!!!
3
 Vehicular network applications require security and the objective of these applications is to
serve users and make their journey secure and comfortable.
 Attackers have their own role in this network and we cannot predict the dynamic behavior of the
attacker. If an attacker works on a safety application and changes the content of the safety
message then it poses a very difficult condition on the road and many users will be affected due
to this kind of attack.
 Accidents are often the result of an alteration of any safety message or the sending of even one
wrong safety message in a network and many human lives are at risk [1].
 Network Behavior
 Attacker Behavior
STP in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
 In trusted vehicular networks, trust and security are two key
requirements for users. While privacy is a basic necessary
requirement for security in life saving vehicular networks, a
guarantee that not only the vehicle platform but also the
infrastructure can be trusted is also vital.
 When users receive any safety message in vehicular
communications, it is important that the message is authentic
and that the source making the request is legitimate. A new
and practical cardbased scheme has been proposed in this
paper to make possible the trusted authentication of users
while enabling various transactions with a Vehicle Service
Provider (VSP).
14
 Please download complete paper from
◦ IEEEE website
◦ ResearchGate
15

More Related Content

PPT
Using the grades mechanism to differentiate the users in VANET
PPT
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
PPT
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
PPT
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
PDF
VANET SECURITY AND PRIVACY – AN OVERVIEW
PDF
VANET SECURITY AND PRIVACY – AN OVERVIEW
PPT
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
PPT
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Using the grades mechanism to differentiate the users in VANET
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
VANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEW
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...

What's hot (7)

PPTX
V2V Training, Vehicle to-vehicle (v2v) communications training
PDF
Security attacks and solutions in vehicular ad hoc networks a survey
PPTX
Introduction to VANET
PPT
[Ppt] Survey Of Vehicular Network Security
PDF
Technical Review on Different Applications, Challenges and Security in VANET
PDF
SURVEY ON SECURE ROUTING IN VANETS
PDF
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
V2V Training, Vehicle to-vehicle (v2v) communications training
Security attacks and solutions in vehicular ad hoc networks a survey
Introduction to VANET
[Ppt] Survey Of Vehicular Network Security
Technical Review on Different Applications, Challenges and Security in VANET
SURVEY ON SECURE ROUTING IN VANETS
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Ad

Similar to Using tpm to ensure Security,Trust and Privacy (STP) in VANET (20)

PPT
VANET Security and Trust
PPT
Forming Vehicular Web of Trust in VANET
PPT
Trusted Computing in VANET
PPT
Trust and Trusted Computing in VANET
PPT
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
PPT
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
PDF
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
PDF
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
PDF
A review on various security attacks in vehicular ad hoc networks
PPT
Final Presentation PPT for final years project
PDF
MS_Thesis_AOB
PDF
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
PPT
VANET, Security and Trust
PDF
A Trust Management Framework for Vehicular Ad Hoc Networks
PDF
A TRUST MANAGEMENT FRAMEWORK FOR VEHICULAR AD HOC NETWORKS
PDF
SOTM: A SELF ORGANIZED TRUST MANAGEMENT SYSTEM FOR VANET
PDF
SOTM : A Self Organized Trust Management System for VANET
PPT
VANET Applications and User Requirement
PDF
A Secure Intrusion Prevention Protocol for VANET to Enhance Security
PDF
Privacy in vanet communications
VANET Security and Trust
Forming Vehicular Web of Trust in VANET
Trusted Computing in VANET
Trust and Trusted Computing in VANET
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
A review on various security attacks in vehicular ad hoc networks
Final Presentation PPT for final years project
MS_Thesis_AOB
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
VANET, Security and Trust
A Trust Management Framework for Vehicular Ad Hoc Networks
A TRUST MANAGEMENT FRAMEWORK FOR VEHICULAR AD HOC NETWORKS
SOTM: A SELF ORGANIZED TRUST MANAGEMENT SYSTEM FOR VANET
SOTM : A Self Organized Trust Management System for VANET
VANET Applications and User Requirement
A Secure Intrusion Prevention Protocol for VANET to Enhance Security
Privacy in vanet communications
Ad

More from Dr.Irshad Ahmed Sumra (20)

PPTX
Basic Concept of Smart Healthcare System
PPTX
Introduction to Smart Vehicles and its Working
PPTX
Introduction to Artificial Intelligence (AI)(AI) and its Applications
PPTX
Basic concept of Digital Logic Design and its working
PPTX
Basic concept of Data-Science and its Applications
PPTX
Basic concept of Data-Mining and it Applications
PPTX
The Transformative Power of AI in Biomedical Science
PPTX
AI-in-Public-Health-A-New-Era-of-Precision-and-Equity
PPTX
Artificial Intelligence(AI) in Petroleum-Engineering.pptx
PPTX
Artificial Intelligence(AI) in Nuclear-Engineering.pptx
PPTX
Artificial Intelligence(AI) in Molecular-Life-Science
PPTX
Role of Artificial Intelligence(AI) in Mechanical Engineering
PPTX
AI Applications:AI-in-Electrical-Engineering
PPTX
AI application: AI in Earth Science and Future Trends
PPTX
AI in Civil Engineering and Future Trends
PPTX
AI in Aerospace Engineering science and AI future Trends
PPTX
Basic concept of Virtual-Reality and its Applications
PPTX
Basic Concept of VANET-Security-Challenges-and-Solutions
PPTX
Basic concept of Outcome-Based-Education-OBE and Key Features
PPTX
Basic Concept of Image-Processing and its Applications
Basic Concept of Smart Healthcare System
Introduction to Smart Vehicles and its Working
Introduction to Artificial Intelligence (AI)(AI) and its Applications
Basic concept of Digital Logic Design and its working
Basic concept of Data-Science and its Applications
Basic concept of Data-Mining and it Applications
The Transformative Power of AI in Biomedical Science
AI-in-Public-Health-A-New-Era-of-Precision-and-Equity
Artificial Intelligence(AI) in Petroleum-Engineering.pptx
Artificial Intelligence(AI) in Nuclear-Engineering.pptx
Artificial Intelligence(AI) in Molecular-Life-Science
Role of Artificial Intelligence(AI) in Mechanical Engineering
AI Applications:AI-in-Electrical-Engineering
AI application: AI in Earth Science and Future Trends
AI in Civil Engineering and Future Trends
AI in Aerospace Engineering science and AI future Trends
Basic concept of Virtual-Reality and its Applications
Basic Concept of VANET-Security-Challenges-and-Solutions
Basic concept of Outcome-Based-Education-OBE and Key Features
Basic Concept of Image-Processing and its Applications

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Cloud computing and distributed systems.
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
Electronic commerce courselecture one. Pdf
The AUB Centre for AI in Media Proposal.docx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
“AI and Expert System Decision Support & Business Intelligence Systems”
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Chapter 3 Spatial Domain Image Processing.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Cloud computing and distributed systems.
NewMind AI Monthly Chronicles - July 2025
NewMind AI Weekly Chronicles - August'25 Week I
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Understanding_Digital_Forensics_Presentation.pptx

Using tpm to ensure Security,Trust and Privacy (STP) in VANET

  • 1. Using TPM to Ensure Security, Trust and Privacy (STP) in VANET VANET Security Research Group (VSRG) Dr I.A.Sumra
  • 2.  Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. Road Side Unit (RSU) V2V V2V Basic VANET Architecture 2 V2I Introduction
  • 3.  Safety Applications  Non Safety Applications Work in Progress Plz! use Alt. route Work Zone Warning:!!! Work Zone Warning:!!! Shopping MALL ( TESCO ) Parking Slot Available!!! RSU Parking Slot Available!!! 3
  • 4.  Vehicular network applications require security and the objective of these applications is to serve users and make their journey secure and comfortable.  Attackers have their own role in this network and we cannot predict the dynamic behavior of the attacker. If an attacker works on a safety application and changes the content of the safety message then it poses a very difficult condition on the road and many users will be affected due to this kind of attack.  Accidents are often the result of an alteration of any safety message or the sending of even one wrong safety message in a network and many human lives are at risk [1].
  • 13.  In trusted vehicular networks, trust and security are two key requirements for users. While privacy is a basic necessary requirement for security in life saving vehicular networks, a guarantee that not only the vehicle platform but also the infrastructure can be trusted is also vital.  When users receive any safety message in vehicular communications, it is important that the message is authentic and that the source making the request is legitimate. A new and practical cardbased scheme has been proposed in this paper to make possible the trusted authentication of users while enabling various transactions with a Vehicle Service Provider (VSP).
  • 14. 14  Please download complete paper from ◦ IEEEE website ◦ ResearchGate
  • 15. 15