SlideShare a Scribd company logo
VANET SECURITY AND TRUST Seminar by Rajesh P Barnwal IIT-Kharagpur
PRESENTATION OUTLINE Introduction Technical facts about VANET Security Issues in VANET Security and Trust  Trust Management Trust Establishment Trust Models and Desirable Properties Case Study Conclusion
OUR ROAD’S CONDITIONS
CONSIDER THE SITUATIONS? You are on the way in a car and… wish to know about  traffic jam condition  at next turn or  road condition  ahead wish to have prior alert, if  vehicle  in front of you is applying  breaks wish to have advance info, if any vehicles met with an  accidents  on the road ahead wish to know whether the nearby  parking  area  has vacancy or not wish to  avoid accidents  in ever increasing traffic conditions
THE ANSWER IS? VANET
WHAT IS VANET? Network of moving and Smart Vehicles Term Stands for  Vehicular Ad-hoc Network VANET is a technology that uses moving cars as nodes to create a mobile network  [ Wikipedia ] Futuristic technology  and a Dream in vehicular communications
WHAT IS VANET?  CONTD… (Picture from : http://pcquest.ciol.com/content/technology/2009/109020101.asp)
TYPICAL VANET SCENARIO (Picture from : http://www.cs.nthu.edu.tw/~jungchuk/research.html)
MOTIVATIONS Safety and Excessive Cost of Traffic Collision WHO report 2009 called the  road fatalities  an "epidemic" that will become the world's third biggest killer   by 2020 Traffic Jams is the major concern in  ever increasing road traffic  scenario Shifting interest of vehicle manufacturing giants towards  vehicle safety research Big  business opportunities  for the infotainment industry like traffic advisory service, driving assistance, telematics,  infotainment, advertisements etc.
APPLICATIONS Safety Application (to enhance driving safety) like: EEBL – Emergency Electronic Brake Light (sudden braking) PCN – Post Crash Notification RFN – Road Feature Notification (ex. downhill curve) LCA – Lane Change Assistance CCW – Cooperative Collision Warning Blind Merge Assistant and many more …
APPLICATIONS  CONTD… Convenience Application (for better driving experience) :  Road Congestion Notification Dynamic Route/Travel Time Planning Querying Parking Availability Finding Parking Spots Other Commercial/ Infotainment/ telematics Application:  Remote Vehicle Diagnostics Free flow Tolling Social Networking Multimedia Content Exchange Advertising
MAJOR PLAYERS IN VANET RESEARCH
BOTTLENECKS IN DEPLOYMENT Unavailability of basic road side infrastructure Lack of coordination among manufacturing giants Security, the most challenging part and biggest issue Privacy of the vehicles
MANET VS VANET Both are Collection of networked  highly cooperative  mobile nodes No central administration , wireless communication VANET is  more structured  but having highly  dynamic topology  due to high speed of vehicle Resource, Computation power and memory are  not a constraint  unlike MANET Large number  of networked nodes
COMPONENTS OF VANET Computer controlled devices (On Board Unit) Radio transceivers for message exchange  GPS (Global Positioning System) Other sensors for sensing surrounding environments Road side infrastructure units
COMMUNICATION IN VANET DSRC (Dedicated Short Range Communication) spectrum in the band of 5.850 GHz to 5.925 GHz having line of sight distance  within 1000m Using DSRC/WAVE/802.11p Band: 5.850-5.925 GHz V2V, V2I communication Seven 10MHz wide channels Range 300 mtrs to 1000 mtrs Data Rate: 6-27 Mbps IEEE 1609.1 Upper Layer IEEE 1609.2 (Security Services) IEEE 1609.3 Network Layer IEEE 1609.4 Lower Layer IEEE 802.11p . Physical Medium
SECURITY ISSUES AND CHALLENGES The security is more crucial in VANET due to involvement of critical life threatening situations Handling malicious/ misbehaving  as well as faulty nodes Attacker may be insider, outsider, malicious or rational Handling message attacks viz.  Bogus Information False positioning Privacy (Disclosure of ID) Denial of Service  Masquerading
SECURITY AND TRUST Communication is mainly performed using exchange of messages Security largely depends upon trust worthiness of messages Security can be established by valid communication between trusted vehicle/ nodes
WHAT IS TRUST? Derives from the notion of trust among human beings and is a subject of social sciences.  The degree of subjective belief about the behaviors of a particular entity. Trust is context-dependent, dynamic & non-monotonic.
SIMPLIFIED VANET MODEL (Adopted from: Reference [5])
TRUST MANAGEMENT IN VANET “ Trust Management” was first coined by Blaze et. al 1996 a coherent framework for the study of  security policies ,  security credentials  and  trust relationships .  Two types of models  Certificate-based  Reputation-based (behavior observed directly or indirectly)
CHALLENGES IN TRUST MANAGEMENT  IN VANET Decentralized and open environment  Very high mobility, vehicle speed 60-100 km/hr No long term relationship with other peers  Road Conditions are very dynamic in nature Difficult to differentiate between malicious and genuine neighbor Evaluation is time, location and context dependant
TRUST ESTABLISHMENT IN VANET Classifications of Trust Establishment Approaches Trust Establishment Infrastructure Based Self Organising Centralised Direct Distributed Hybrid Indirect
TRUST MODELS IN VANET Infrastructure models  Based upon use of certificates from central authority   Needs presence of Road Side Units Self Organising models Based on Entity-oriented trust   Based on Data-oriented trust Based on Combined trust models
PROPERTIES OF A GOOD TRUST MODEL Decentralized Trust Establishment Ability to Cope up with Sparsity Event, Location, Time Specific Integrated Confidence Measure Sensitive to Privacy Concerns Scalable and Robust
CASE STUDY From a Research Paper published in September’ 2010 Based on collaborative project of Carnegie Mellon University and General Motors Goal to propose a model that enables OBUs to accurately label VANET messages as legitimate or spurious
CASE STUDY   CONTD… Problem Statement: Given a road with a small but non-negligible fraction of vehicles  Vehicles that transmit spurious messages which contain false information  False information transmission either intentionally or accidentally due to malfunctioning units Need to ensure that legitimate vehicles can filter out such spurious messages with high probability.
CASE STUDY   CONTD… Six sources of information as basis of trust establishment: Cryptographic Authentication Source Location Local Sensors Other Vehicles’ Messages Infrastructure Validation Sender’s Reputation
CASE STUDY   CONTD… (BASIC ASSUMPTIONS) Vehicle communicates using DSRC spectrum Vehicle adhere to the IEEE 1609 standards Vehicles are equipped with minimal local sensors, e.g., thermometer, GPS, accelerometer, etc. A limited percentage of vehicles are equipped with advanced sensing equipment The majority of vehicles are honest And sparse presence of RSUs
CASE STUDY   CONTD… Attacker’s model: active attackers are those node who violate the integrity of messages (i.e., attackers create bogus alerts) Attackers may also suppress legitimate alerts of critical safety information from further propagation by simply dropping packets Nodes that have compromised other vehicles, and/or inject malicious messages from outside the area of relevance
CASE STUDY   CONTD… Misbehaviour detection model: based on a multi-source filtering model  (6 complementary sources of information) the OBU of a vehicle investigates a received message by aggregating the results from all applicable sources Only when the aggregated result indicates that the message is valid the OBU confirms that the received message is announcing some real safety condition and warns the driver.
CASE STUDY   CONTD… Data Flow Diagram for endorsing an Alert and updating trust value of a node Vehicle A receives a new alert from Vehicle B Are RSU broadcasting the same alert? Is the Location Claim valid? Is the alert cryptographically correct? Do local sensors’ output match the alert Do other vehicle report relevant alert? Is CoE > threshold? Notify Driver Drop the Alert Drop the Alert Update CoE Wait for other Alerts No Yes No Yes No Yes Yes No Pass vehicle B’s trust level Reporting vehicle trustworthiness Update CoE Yes No No Decrease vehicle B’s trust level Was the Alert true? Increase vehicle B’s trust level Yes Notify  the Driver Yes No
CASE STUDY   CONTD… CoE vs Threshold Curve
A STEP TOWARDS REALITY… News of  www.deccanherald.com  through PTI dated 4 th  March 2011 “ First Internet Car Unveiled at Geneva Motor Show”
CONCLUSION VANET technology has a great potential in facilitating  road transport safety and other vehicular communication applications in real scenario Security is one of the major concern in deployment of VANET Trust may be one of the tool to solve the security related issues Substantial research in the area of security is required to make the VANET deployment possible in near future
ANY QUESTIONS?
THANK YOU! With the hope to see  VANET  in real deployment…
REFERENCES Vehicular ad-hoc network. http://en.wikipedia.org/wiki/Vehicular_ad-hoc_network [Online accessed on 03rd March 2011]. Intelligent Transportation using VANET. http://pcquest.ciol.com/content/ technology/ 2009/109020101.asp [Online accessed on 03rd March 2011]. Sherali Zeadally, Ray Hunt, Yuh-Shyan Chen, Angela Irwin and Aamir Hassan.  “Vehicular Ad Hoc Networks (VANETS): Status, Results, and Challenges” , Journal of Telecommunication Systems (9 December 2010), pp. 1-25. Raya, Maxim and Hubaux, Jean-Pierre. “ Securing vehicular ad hoc networks”,  Journal of Computer Security, vol. 15, Jan. 2007, pp 39-68. Fuentes, J. M. D., & González-Tablas, A. I. (2010). “ Overview of security issues in Vehicular Ad-hoc Networks ”, Handbook of research in mobility and computing. IGI Global. Retrieved from http://hdl.handle.net/10016/9395  M. Blaze, J. Feigenbaum, and J. Lacy. “ Decentralized Trust Management”,  Proc. IEEE Symposium on Security and Privacy, 6-8 May, 1996, pp. 164 – 173. Philipp Wex, Jochen Breuer, Albert Held, Tim Leinm¨uller and Luca Delgrossi. “ Trust Issues for Vehicular Ad Hoc Networks” , 67th IEEE Vehicular Technology Conference (VTC2008-Spring). Jie Zhang. " A Survey on Trust Management for VANETs ", In Proceedings of the 25th International Conference on Advanced Information Networking and Applications (AINA), 2011. Tiffany Hyun-Jin Kim, Ahren Studer, Rituik Dubey, Xin Zhang, Adrian Perrig, Fan Bai, Bhargav Bellur, and Aravind Iyer. “ VANET alert endorsement using multi-source filters”,  Proceedings of the seventh ACM international workshop on VehiculAr InterNETworking (VANET '10). ACM, New York, NY, USA, pp 51-60.

More Related Content

PPTX
Vehicle to vehicle communication
PPTX
Vanet ppt
PPTX
Architecture and security in Vanet PPT
PPTX
Vanet Presentation
PPTX
V2V tech
PPTX
Introduction to VANET
PPTX
V2V communications
PDF
5G and Automative : Cellular V2X (vehicle-to-everything)
 
Vehicle to vehicle communication
Vanet ppt
Architecture and security in Vanet PPT
Vanet Presentation
V2V tech
Introduction to VANET
V2V communications
5G and Automative : Cellular V2X (vehicle-to-everything)
 

What's hot (20)

PPTX
Introduction of VANET
PPT
Inter vehicle communication
PDF
V2X Communications: Getting our Cars Talking
PDF
Cellular V2X
PPTX
PPTX
Vehicle to vehicle communication
PPTX
Introduction to mobile ad hoc network
PPTX
Routing in vanet
PPTX
Internet of Vehicles (IoV)
PPTX
Routing protocols for ad hoc wireless networks
PDF
The Future of Connected Car - V2X is an enabling technology for Autonomous Cars
PPTX
Vehicular ad hoc network - VANET
PPTX
GSM Location area update
PPTX
Vehicle to vehicle communication
PPTX
inter vehicle communication
PPTX
Vehicle to vehicle communication
PDF
V2V- Vehicle to Vehicle Communication
PPTX
Best School Bus Tracking System
PDF
Traffic Control and Vehicle-to-Everything (V2X) Communications
PPTX
ppt on 4g
Introduction of VANET
Inter vehicle communication
V2X Communications: Getting our Cars Talking
Cellular V2X
Vehicle to vehicle communication
Introduction to mobile ad hoc network
Routing in vanet
Internet of Vehicles (IoV)
Routing protocols for ad hoc wireless networks
The Future of Connected Car - V2X is an enabling technology for Autonomous Cars
Vehicular ad hoc network - VANET
GSM Location area update
Vehicle to vehicle communication
inter vehicle communication
Vehicle to vehicle communication
V2V- Vehicle to Vehicle Communication
Best School Bus Tracking System
Traffic Control and Vehicle-to-Everything (V2X) Communications
ppt on 4g
Ad

Viewers also liked (10)

PDF
Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTS
PPT
Packet Switching and X.25 Protocol
PPTX
ppt on GSM architechture
PPT
Presentation on GSM(2G & GPRS)
PPT
Mobile IP 1
PPTX
Do s attacks in vanet presentation in vanet
PPTX
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
PDF
Vehicle To Vehicle Communication System
PPT
GSM ARCHITECTURE
Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTS
Packet Switching and X.25 Protocol
ppt on GSM architechture
Presentation on GSM(2G & GPRS)
Mobile IP 1
Do s attacks in vanet presentation in vanet
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
Vehicle To Vehicle Communication System
GSM ARCHITECTURE
Ad

Similar to VANET, Security and Trust (20)

PPT
Final Presentation PPT for final years project
PPT
Forming Vehicular Web of Trust in VANET
PDF
Base paper
PPT
Trust and Trusted Computing in VANET
PDF
A secure alert messaging for vehicular ad hoc networks
PDF
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
PDF
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
PDF
A Trust Management Framework for Vehicular Ad Hoc Networks
PDF
A TRUST MANAGEMENT FRAMEWORK FOR VEHICULAR AD HOC NETWORKS
PPT
User Requirements Model for VANET Applications
PDF
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
PDF
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
PDF
VANET SECURITY AND PRIVACY – AN OVERVIEW
PDF
VANET SECURITY AND PRIVACY – AN OVERVIEW
PDF
VANET SECURITY AND PRIVACY – AN OVERVIEW
PPTX
Basic Concept of VANET-Security-Challenges-and-Solutions
PPT
VANET Applications and User Requirement
PPTX
VANETs Presentation
PDF
vanets presentation-.pdf
PPT
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Final Presentation PPT for final years project
Forming Vehicular Web of Trust in VANET
Base paper
Trust and Trusted Computing in VANET
A secure alert messaging for vehicular ad hoc networks
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
A Trust Management Framework for Vehicular Ad Hoc Networks
A TRUST MANAGEMENT FRAMEWORK FOR VEHICULAR AD HOC NETWORKS
User Requirements Model for VANET Applications
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
VANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEW
Basic Concept of VANET-Security-Challenges-and-Solutions
VANET Applications and User Requirement
VANETs Presentation
vanets presentation-.pdf
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...

More from Dr. Rajesh P Barnwal (11)

PDF
wekapresentation-130107115704-phpapp02.pdf
PPTX
Signage Format.pptx
PPTX
Cloud security: Industry Trends and Research Challenges
PPTX
Machine-to-Machine Communications
PPT
Application of Ground Penetrating Radar in Subsurface mapping
PPT
10 lovely words
PPT
Introduction to Computer
PPT
Good e mail practices
PPT
Mine fire gallery modelling
PPT
Microprocessor based autonomous control system
PPT
Multimodal man machine interaction
wekapresentation-130107115704-phpapp02.pdf
Signage Format.pptx
Cloud security: Industry Trends and Research Challenges
Machine-to-Machine Communications
Application of Ground Penetrating Radar in Subsurface mapping
10 lovely words
Introduction to Computer
Good e mail practices
Mine fire gallery modelling
Microprocessor based autonomous control system
Multimodal man machine interaction

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Big Data Technologies - Introduction.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Approach and Philosophy of On baking technology
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
KodekX | Application Modernization Development
PDF
Advanced Soft Computing BINUS July 2025.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Unlocking AI with Model Context Protocol (MCP)
MYSQL Presentation for SQL database connectivity
The Rise and Fall of 3GPP – Time for a Sabbatical?
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Electronic commerce courselecture one. Pdf
Spectral efficient network and resource selection model in 5G networks
Big Data Technologies - Introduction.pptx
Network Security Unit 5.pdf for BCA BBA.
Approach and Philosophy of On baking technology
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
KodekX | Application Modernization Development
Advanced Soft Computing BINUS July 2025.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Unlocking AI with Model Context Protocol (MCP)

VANET, Security and Trust

  • 1. VANET SECURITY AND TRUST Seminar by Rajesh P Barnwal IIT-Kharagpur
  • 2. PRESENTATION OUTLINE Introduction Technical facts about VANET Security Issues in VANET Security and Trust Trust Management Trust Establishment Trust Models and Desirable Properties Case Study Conclusion
  • 4. CONSIDER THE SITUATIONS? You are on the way in a car and… wish to know about traffic jam condition at next turn or road condition ahead wish to have prior alert, if vehicle in front of you is applying breaks wish to have advance info, if any vehicles met with an accidents on the road ahead wish to know whether the nearby parking area has vacancy or not wish to avoid accidents in ever increasing traffic conditions
  • 6. WHAT IS VANET? Network of moving and Smart Vehicles Term Stands for Vehicular Ad-hoc Network VANET is a technology that uses moving cars as nodes to create a mobile network [ Wikipedia ] Futuristic technology and a Dream in vehicular communications
  • 7. WHAT IS VANET? CONTD… (Picture from : http://pcquest.ciol.com/content/technology/2009/109020101.asp)
  • 8. TYPICAL VANET SCENARIO (Picture from : http://www.cs.nthu.edu.tw/~jungchuk/research.html)
  • 9. MOTIVATIONS Safety and Excessive Cost of Traffic Collision WHO report 2009 called the road fatalities an "epidemic" that will become the world's third biggest killer by 2020 Traffic Jams is the major concern in ever increasing road traffic scenario Shifting interest of vehicle manufacturing giants towards vehicle safety research Big business opportunities for the infotainment industry like traffic advisory service, driving assistance, telematics, infotainment, advertisements etc.
  • 10. APPLICATIONS Safety Application (to enhance driving safety) like: EEBL – Emergency Electronic Brake Light (sudden braking) PCN – Post Crash Notification RFN – Road Feature Notification (ex. downhill curve) LCA – Lane Change Assistance CCW – Cooperative Collision Warning Blind Merge Assistant and many more …
  • 11. APPLICATIONS CONTD… Convenience Application (for better driving experience) : Road Congestion Notification Dynamic Route/Travel Time Planning Querying Parking Availability Finding Parking Spots Other Commercial/ Infotainment/ telematics Application: Remote Vehicle Diagnostics Free flow Tolling Social Networking Multimedia Content Exchange Advertising
  • 12. MAJOR PLAYERS IN VANET RESEARCH
  • 13. BOTTLENECKS IN DEPLOYMENT Unavailability of basic road side infrastructure Lack of coordination among manufacturing giants Security, the most challenging part and biggest issue Privacy of the vehicles
  • 14. MANET VS VANET Both are Collection of networked highly cooperative mobile nodes No central administration , wireless communication VANET is more structured but having highly dynamic topology due to high speed of vehicle Resource, Computation power and memory are not a constraint unlike MANET Large number of networked nodes
  • 15. COMPONENTS OF VANET Computer controlled devices (On Board Unit) Radio transceivers for message exchange GPS (Global Positioning System) Other sensors for sensing surrounding environments Road side infrastructure units
  • 16. COMMUNICATION IN VANET DSRC (Dedicated Short Range Communication) spectrum in the band of 5.850 GHz to 5.925 GHz having line of sight distance within 1000m Using DSRC/WAVE/802.11p Band: 5.850-5.925 GHz V2V, V2I communication Seven 10MHz wide channels Range 300 mtrs to 1000 mtrs Data Rate: 6-27 Mbps IEEE 1609.1 Upper Layer IEEE 1609.2 (Security Services) IEEE 1609.3 Network Layer IEEE 1609.4 Lower Layer IEEE 802.11p . Physical Medium
  • 17. SECURITY ISSUES AND CHALLENGES The security is more crucial in VANET due to involvement of critical life threatening situations Handling malicious/ misbehaving as well as faulty nodes Attacker may be insider, outsider, malicious or rational Handling message attacks viz. Bogus Information False positioning Privacy (Disclosure of ID) Denial of Service Masquerading
  • 18. SECURITY AND TRUST Communication is mainly performed using exchange of messages Security largely depends upon trust worthiness of messages Security can be established by valid communication between trusted vehicle/ nodes
  • 19. WHAT IS TRUST? Derives from the notion of trust among human beings and is a subject of social sciences. The degree of subjective belief about the behaviors of a particular entity. Trust is context-dependent, dynamic & non-monotonic.
  • 20. SIMPLIFIED VANET MODEL (Adopted from: Reference [5])
  • 21. TRUST MANAGEMENT IN VANET “ Trust Management” was first coined by Blaze et. al 1996 a coherent framework for the study of security policies , security credentials and trust relationships . Two types of models Certificate-based Reputation-based (behavior observed directly or indirectly)
  • 22. CHALLENGES IN TRUST MANAGEMENT IN VANET Decentralized and open environment Very high mobility, vehicle speed 60-100 km/hr No long term relationship with other peers Road Conditions are very dynamic in nature Difficult to differentiate between malicious and genuine neighbor Evaluation is time, location and context dependant
  • 23. TRUST ESTABLISHMENT IN VANET Classifications of Trust Establishment Approaches Trust Establishment Infrastructure Based Self Organising Centralised Direct Distributed Hybrid Indirect
  • 24. TRUST MODELS IN VANET Infrastructure models Based upon use of certificates from central authority Needs presence of Road Side Units Self Organising models Based on Entity-oriented trust Based on Data-oriented trust Based on Combined trust models
  • 25. PROPERTIES OF A GOOD TRUST MODEL Decentralized Trust Establishment Ability to Cope up with Sparsity Event, Location, Time Specific Integrated Confidence Measure Sensitive to Privacy Concerns Scalable and Robust
  • 26. CASE STUDY From a Research Paper published in September’ 2010 Based on collaborative project of Carnegie Mellon University and General Motors Goal to propose a model that enables OBUs to accurately label VANET messages as legitimate or spurious
  • 27. CASE STUDY CONTD… Problem Statement: Given a road with a small but non-negligible fraction of vehicles Vehicles that transmit spurious messages which contain false information False information transmission either intentionally or accidentally due to malfunctioning units Need to ensure that legitimate vehicles can filter out such spurious messages with high probability.
  • 28. CASE STUDY CONTD… Six sources of information as basis of trust establishment: Cryptographic Authentication Source Location Local Sensors Other Vehicles’ Messages Infrastructure Validation Sender’s Reputation
  • 29. CASE STUDY CONTD… (BASIC ASSUMPTIONS) Vehicle communicates using DSRC spectrum Vehicle adhere to the IEEE 1609 standards Vehicles are equipped with minimal local sensors, e.g., thermometer, GPS, accelerometer, etc. A limited percentage of vehicles are equipped with advanced sensing equipment The majority of vehicles are honest And sparse presence of RSUs
  • 30. CASE STUDY CONTD… Attacker’s model: active attackers are those node who violate the integrity of messages (i.e., attackers create bogus alerts) Attackers may also suppress legitimate alerts of critical safety information from further propagation by simply dropping packets Nodes that have compromised other vehicles, and/or inject malicious messages from outside the area of relevance
  • 31. CASE STUDY CONTD… Misbehaviour detection model: based on a multi-source filtering model (6 complementary sources of information) the OBU of a vehicle investigates a received message by aggregating the results from all applicable sources Only when the aggregated result indicates that the message is valid the OBU confirms that the received message is announcing some real safety condition and warns the driver.
  • 32. CASE STUDY CONTD… Data Flow Diagram for endorsing an Alert and updating trust value of a node Vehicle A receives a new alert from Vehicle B Are RSU broadcasting the same alert? Is the Location Claim valid? Is the alert cryptographically correct? Do local sensors’ output match the alert Do other vehicle report relevant alert? Is CoE > threshold? Notify Driver Drop the Alert Drop the Alert Update CoE Wait for other Alerts No Yes No Yes No Yes Yes No Pass vehicle B’s trust level Reporting vehicle trustworthiness Update CoE Yes No No Decrease vehicle B’s trust level Was the Alert true? Increase vehicle B’s trust level Yes Notify the Driver Yes No
  • 33. CASE STUDY CONTD… CoE vs Threshold Curve
  • 34. A STEP TOWARDS REALITY… News of www.deccanherald.com through PTI dated 4 th March 2011 “ First Internet Car Unveiled at Geneva Motor Show”
  • 35. CONCLUSION VANET technology has a great potential in facilitating road transport safety and other vehicular communication applications in real scenario Security is one of the major concern in deployment of VANET Trust may be one of the tool to solve the security related issues Substantial research in the area of security is required to make the VANET deployment possible in near future
  • 37. THANK YOU! With the hope to see VANET in real deployment…
  • 38. REFERENCES Vehicular ad-hoc network. http://en.wikipedia.org/wiki/Vehicular_ad-hoc_network [Online accessed on 03rd March 2011]. Intelligent Transportation using VANET. http://pcquest.ciol.com/content/ technology/ 2009/109020101.asp [Online accessed on 03rd March 2011]. Sherali Zeadally, Ray Hunt, Yuh-Shyan Chen, Angela Irwin and Aamir Hassan. “Vehicular Ad Hoc Networks (VANETS): Status, Results, and Challenges” , Journal of Telecommunication Systems (9 December 2010), pp. 1-25. Raya, Maxim and Hubaux, Jean-Pierre. “ Securing vehicular ad hoc networks”, Journal of Computer Security, vol. 15, Jan. 2007, pp 39-68. Fuentes, J. M. D., & González-Tablas, A. I. (2010). “ Overview of security issues in Vehicular Ad-hoc Networks ”, Handbook of research in mobility and computing. IGI Global. Retrieved from http://hdl.handle.net/10016/9395 M. Blaze, J. Feigenbaum, and J. Lacy. “ Decentralized Trust Management”, Proc. IEEE Symposium on Security and Privacy, 6-8 May, 1996, pp. 164 – 173. Philipp Wex, Jochen Breuer, Albert Held, Tim Leinm¨uller and Luca Delgrossi. “ Trust Issues for Vehicular Ad Hoc Networks” , 67th IEEE Vehicular Technology Conference (VTC2008-Spring). Jie Zhang. " A Survey on Trust Management for VANETs ", In Proceedings of the 25th International Conference on Advanced Information Networking and Applications (AINA), 2011. Tiffany Hyun-Jin Kim, Ahren Studer, Rituik Dubey, Xin Zhang, Adrian Perrig, Fan Bai, Bhargav Bellur, and Aravind Iyer. “ VANET alert endorsement using multi-source filters”, Proceedings of the seventh ACM international workshop on VehiculAr InterNETworking (VANET '10). ACM, New York, NY, USA, pp 51-60.