0% found this document useful (0 votes)
29 views

Behavior of Attacker and Some New Possible Attacks in Vehicular Communication

These slides are related to Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
0% found this document useful (0 votes)
29 views

Behavior of Attacker and Some New Possible Attacks in Vehicular Communication

These slides are related to Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
You are on page 1/ 17

VANET Security Research Group (VSRG)

Behavior of Attacker and Some New Possible


Attacks in Vehicular Communication

Dr I.A.Sumra
Introduction

 Vehicular ad-hoc network is a special kind of network in which


nodes (Vehicles) can communicate with each other on the road
and with its Infrastructure.

Road Side Unit (RSU) V2I

V2V V2V

Basic VANET Architecture

2
 Safety Applications
Work Zone Work Zone
Warning:!!! Warning:!!!

Work
in Progress
Plz! use Alt.
route

 Non Safety Applications


Shopping MALL
( TESCO )

Parking Slot
RSU Parking Slot
Available!!! Available!!!

3
 Vehicular network applications require security and the objective of these applications is to
serve users and make their journey secure and comfortable.
 Attackers have their own role in this network and we cannot predict the dynamic behavior of the
attacker. If an attacker works on a safety application and changes the content of the safety
message then it poses a very difficult condition on the road and many users will be affected due
to this kind of attack.
 Accidents are often the result of an alteration of any safety message or the sending of even one
wrong safety message in a network and many human lives are at risk [1].
 Network Behavior
 Attacker Behavior
 Time is a key factor for safety and non safety applications
and users need the right information at the right time.
 This attack is a newly addressed problem in which an attacker
does not disturb the contents of the messages.
 The attacker just adds some time slots into the original
message and creates a delay in the original message; in this
way the user will receive the message after its required time.
 This is a new type of attack; the Internet is one of the key
services that users use during their journey.
 In this attack, an attacker connects with the Internet and
takes control of the user’s vehicle on the highway.
 MiMA is a very well known attack in communication and can be
discussed in a vehicular network where the attacker resides between
two or more vehicles and launches this attack.
 MiMA is active eavesdropping and makes an independent connection
with the victim’s vehicle.
 The traffic analysis attack is a serious level threat to user privacy in vehicular communication.
A traffic analysis attack is against the anonymity of communication between vehicle to vehicle
(V2V) and vehicle to road side unit (V2R).
 In this attack, the attacker defines some goal and achieves the goal through capturing
different types of traffic information packets.
 This includes the location of the user, the vehicle ID, the traveling route of the user or some
other of the user’s traffic information; the attacker needs this information to use for its
attacks.
 In a vehicular network the attacker does not use these techniques
due to the dynamic behavior of vehicles and also users.
 There are some possible cases are considered in social engineering
in a vehicular network.
 An attacker sends spam messages in a network for the purpose of increasing
the transmission latency and consuming the bandwidth of the network.
 With an absence of basic infrastructure and centralized administration, it is
difficult to control this kind of attack.
 The applications of vehicular networks are important and
these applications must be secure; if attackers change the
content of these applications then the users are directly
affected by it. It is very difficult to monitor the behavior of
attackers; attackers change their attacking behavior and they
launch different attacks at different times.
 In this paper, only the behavior of attackers and some of their
possible attacks have been studied. Here, only some of the
new possible attacks have been considered, but the attacker
can launch many types of attacks and create problems for
authentic users of a network.
16
 Complete paper is available on IEEE and
Research gate.
 Please download complete research paper from
research gate.

17

You might also like