Sie sind auf Seite 1von 26

Providing VANET Security through Position Verification

SEMINAR Presentation

By: ABHIJIT KUMAR SGVU081020409

Outline
What is VANET?

Motivation
Goal of project Approach Evaluation Summary and Future work

What is VANET?
Vehicular Ad-Hoc Network (VANET) is used to

provide communication between nearby vehicles and between vehicles and nearby infrastructure

Source: http://events.ccc.de/congress/2006/Fahrplan/attachments/1216-vanet.pdf

Motivation

Source: http://events.ccc.de/congress/2006/Fahrplan/attachments/1216-vanet.pdf

Security
Two types: Position based and non-position

based Position based attack in VANET

Why Position Security?


An attacker can Modify or insert a bogus packet create the illusion of a traffic jam before selecting an alternate route to his advantage Replay packets pretend to be at a fake position to create the illusion of a bona-fide vehicle Launch a Sybil attack pretend to be several different user at different positions Why not use PKI? Complexity in key certification management

Goal of the project

Enhance position security by allowing vehicles to verify received GPS coordinates

Approach
Novel approach to enhancing position security by

using radar.
Local position security detect neighboring vehicles using on-board radar confirm announced coordinates Global position security exchange locally secure data compute similarity among the data create a history of vehicle movement check the consistency of positions to achieve global security

System Model
Vehicle Contains: A GPS navigation system Microwave radar that can detect objects at distance as far as 200m A computer center, which will provide data processing, computing and storage A wireless transceiver, which provides standard communication for VANET A unique ID, such as an electronic license plate

System Model

Network Model
Preset maps Cell leader Cell router Local security

Corroboration using radar to get the relative velocity, angle and position to the target Receive GPS coordinates from neighbors Combine local security to get global security

Steps involved in the system


Preset cells with a radius of 100m and overlap region

of 30m. Each vehicle in the cell sends its position and radarverified position of neighbors periodically to cell leader Determine cell leader and cell router in each direction. Next determination would depend on average speed of cell and cell leaders speed A new vehicle waits for 200ms after entering the system to know the cell leader Vehicles generate traffic view within the cell

Steps involved in the system


Each vehicle aggregates the information

about its cell with received reports from other cell leaders and member vehicles Cell leader broadcasts the aggregated information every 100ms Silence of other vehicles confirms authentic message

Position verification by radar


Radar tolerance

GPS tolerance

( x xgps )2 ( y ygps )2 ( )2
Intersection area

Building history table


Analyze locally radar-detected data,

oncoming traffic's radar detected data, and trusted neighbors' data. Build a history of known vehicles movements A vehicle without position history cannot be trusted Inconsistency in data would trigger verification process

Global Security
Vehicle A wants to

challenge I A initiates a verification request Request travels through traffic in both opposite and same directions Vehicle b can detect I using radar and sends ACK back to A

Possible Attack

Simulation snapshot
Extended a microscopic traffic simulator from

the Dresden University of Technology

Simulation parameters
Total road length: 3 Km

Cell radius: 100 m


Number of lanes: 2 per direction Number of directions: 2 Traffic arrival rate: 3600 vehicles/hour

Comparing flooding and our algorithm

Average time to detect malicious vehicles


Transmission range for
100m transmission range 90 80 70 500m transmission range

broadcast is 500 meters Transmission range for intra cell communication is 100 meters No cell routers needed

Time in msec

60 50 40 30 20 10 0 500 1000 1500 2000 2500 3000 Distance in meters

Limitations
Radar cannot detect vehicles that are not in direct

line of sight. Both GPS and radar have a tolerance that needs to be considered. Increased transmission range would increase probability of packet collision.

Full network model is needed to evaluate the loss.

System becomes weak in cases where there is only

one way traffic or less traffic density. Since a unique ID is used for each vehicle, privacy is at risk

Summary
Goal: Enhance position security by allowing vehicles

to verify received GPS coordinates Theme: Trust what you see, verify what you hear Achievements:

Reduces security threats Reduces bandwidth consumption Isolates malicious vehicles Technologically feasible G. Yan, G. Choudhary, M.C. Weigle, and S. Olariu, Providing VANET Security through Active Position Detection (poster), Proceedings of ACM VANET, Montreal, Canada, September 2007, pp. 73-74

Future Work
Implement in a simulator with full network

model Determine the optimal cell radius Determine the optimal transmission range for inter cell communication and intra cell communication Incorporate aggregation techniques to get higher visibility

References
[1] http://events.ccc.de/congress/2006/Fahrplan /attachments/1216-vanet.pdf [2] B. Parno and A. Perrig, Challenges in Securing Vehicular Networks, Proceedings of HotNets-IV, 2005.

[3]

John R. Douceur, The Sybil Attack, Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS), March 2002.
M. Treiber, Microsimulation of Road Traffic, http://www.traffic-simulation.de/, July 2005.

[4]

Das könnte Ihnen auch gefallen