Classification of Security attack in Vehicular Adhoc network: A survey

Size: px
Start display at page:

Download "Classification of Security attack in Vehicular Adhoc network: A survey"

Transcription

1 Classification of Security attack in Vehicular Adhoc network: A survey Swapnil G. Deshpande Arts, Commerce, Science College, Kiran Nagar, Amravati, Maharashtra, India Abstract: Vehicular ad hoc networks (VANETs) have attracted a lot of attention over the last few years. VANETs are being used to improve road safety and enable a wide variety of value-added services. Here we discuss some of the main security threats and attacks that can be exploited in VANETs and present the corresponding security solutions that can be implemented to prevent those attacks. In this work, we have done a survey of existing approaches to solve the problems associated with vehicular networks. The main contribution of this paper is to classify and identify different types of attacks in VANET. For the implementation of VANET, security is an important constraint. Most of the research concerted efforts in academics and industry are focused to provide efficient security architecture for VANET; to protect the network from adversary nodes and attacks. This paper focuses on the security challenges in VANET, especially for achieving privacy and their possible solutions. Keywords - Vehicular Ad hoc Network (VANET), attackers, attacks, Security 1. Introduction Security, however, has always been an issue in vehicular networks which must be seriously considered and a security infrastructure has to be designed and implemented in such networks. An attacker can inject false and invalid traffic messages into the network to distract drivers from choosing a specific route, or can use the network to determine a driver s location or identity. On the other hand, by gaining unauthorized access in network, an attacker can gain the control of critical components of a vehicle and cause irreparable damage to the vehicle or its passengers. One of the main challenges in VANET is to route the data efficiently from source to destination. Designing an efficient routing protocol for VANET is tedious task. Also because of wireless medium it is vulnerable to several attacks. Since attacks mislead the network operations, security is mandatory for successful deployment of such technology. This survey paper has been made to identify major security issues and challenges. There are several applications of vehicular networks which are discussed by manufacturers and also academics which will be both time and money saving. There have been numerous solutions and methods in order to improve the efficiency, privacy and security of such networks. Security, however, has always been an issue in vehicular networks which must be seriously considered and a security infrastructure has to be designed and implemented in such networks. In our work, we found that vehicular networks in general have several vulnerabilities and are exposed to different cyber attacks. Last few years, vehicular network has been taken more attention of researchers and automotive industries due to life saving factor. Vehicular Ad hoc Network (VANET) needs security to implement the wireless environment and serves users with safety and non safety applications. ers generate different attacks in this life saving vehicular network. VANETs are wireless ad-hoc networks where the nodes, be it vehicles or RSU, can communicate and exchange data for purposes of information inquiry or distribution. The ultimate goal of VANETs is to enhance the driving experience and increase the level of safety for drivers. This can be achieved by allowing nodes within certain ranges (typically 5-10 Km) to connect with each other in order to exchange information (Raya et.al., 2006; Nadeem et.al. 2005; Dornbush & Joshi, 2007; Schoch, 2008). Figure shows a general view of VANETs structure. Figure 1 The basic structure of VANET One transportation system that has recently attracted a lot of attention from both academia and industry is vehicular ad hoc networks (VANETs). They constitute the basis of ITS. They enable vehicles to actively communicate with each other and to better perceive the traffic situation (such as accidents and traffic jams) in their vicinity. VANETs enable vehicles to avoid problems either by taking desired actions or by alerting other drivers. Besides road safety enhancements, the advent of VANET also opens up opportunities for many VANET-related applications (such as internet access from a car) that have great potential in enhancing our travelling comfort. VANETs Volume 2, Issue 2 March April 2013 Page 371

2 do not depend on fixed infrastructures and their nodes (known as mobile nodes) and may form networks on the fly for a variety of environments. Owing to the nature of these kinds of mobile nodes, VANETs can be challenged with frequent topology changes as well as physical threats (that create potential vulnerabilities for potential attackers). A successful attack on VANETs can have catastrophic results (such as the loss of lives) or may lead to financial losses (for payment services). Therefore securing VANETs is crucial to the design, implementation and operation of these networks [1]. Nowadays, transportation systems play an important part in our daily activities. Today major concern is to provide safety of users and safe their lives in road accidents. Safety and non safety potential applications of VANET are to ensure the safety of human life on the road. Security is the main concern of these applications where a wrong message (due to insecure environment) may directly affect the human lives. Safety and non safety messages are forwarded between the Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) on this communication medium. Maxim Raya et.al [2] described the attacker model. Insider, malicious, active, and local is some example of serious level attacks. Types of attacks can be different depending on the behaviour of attackers. Our focus point is too safe the communication medium by controlling attackers. Active and passive safety applications [3] are used to provide safety to users. The role of active safety is high and it sends warning messages to other vehicles. If attackers change these messages then accidents become a part of the network and users life can be on risk. Each vehicle comprises of hardware unit for determining correct location information using GPS. Roadside Units (RSUs) are placed across the road for infrastructure communication. The number of RSU to be used depends upon the communication protocol. Several factors like the type of the road, daytime, weather, traffic density and even the driver himself affect the movements of vehicles on a road. Hence, the network topology change frequently, and the routing protocol used has to adapt itself to these instantaneous changes continuously Scope The scope of this work is to study different types of vehicular network security issues and their countermeasures. The purpose of this paper is to find and study these vulnerabilities thoroughly and to present a solution to securing vehicular networks from unauthorized and malicious access. 2. Vehicular Ad Hoc Networks (VANET) The main idea behind VANET is providing communication among vehicles and also among vehicles and a number of fixed equipment located on the road. The main intention with VANET s is to enhance vehicles passengers safety and comfort by distributing traffic, speed control, road and weather conditions among nearby vehicles. Among its applications collision warnings, road sign alarms and automatic toll/parking payment can be mentioned. VANETs consist of a number of On-Board Units (OBU) which are located inside the vehicles and a number of Road-Side Units (RSU) which form the infrastructure of the network. OBU is a wireless gateway which can be connected to other OBUs and RSUs. Each vehicle equipped with the OBU can become a part of the network and will be able to send, relay and receive messages throughout the network. Due to its ad hoc nature, there won t be any centralized servers and vehicles are in charge of network management themselves [1]. Besides safety applications VANET also provide comfort applications to the road users. Communication in VANET is divided into two different categories: Vehicle-to-Vehicle (V2V) Communication, were the nearby vehicles will communicate traffic and road conditions to one another Vehicle-to-Infrastructure (V2I) Communication, were vehicles communicate their gathered information to the nearest RSU in order to distribute the information faster and more effectively. 2.1 Security Requirements Of VANET In order to have a secure and dependable vehicular network, a number of security requirements must be considered. Some of these security requirements are the same for all networks but some are valid and specific to vehicular networks only. With respect to the mentioned attacks and vulnerabilities securing vehicular communications in all aspects is a must. Here we provide a list of some general security requirements that must be taken into consideration in order to mitigate vulnerabilities and attacks against VANETs. As far as security requirements are concerned the applications of VANET are focused on safety messaging, cooperative driving, toll application etc. Therefore the integrity, liability of message, liability of the user has to be ensured and at the same time privacy has to be looked upon. A secure VANET system should satisfy following requirements: Authentication Despite the lack of need for confidentiality, network nodes must be authenticated in order to be able to send messages through the network. Before reacting to messages and events a vehicle must verify the legitimacy of the message and its sender, therefore there is a need for authentication. Without authentication, illegitimate and malicious users can inject false messages into the network and confuse other vehicles by distributing false Volume 2, Issue 2 March April 2013 Page 372

3 information. With authentication, vehicles can simply drop messages from unauthenticated users Authorization Authorization is on a higher level implemented by access control which itself is defined by network policies. Authorization defines the role of a node in the network which includes the types of messages a node can read or write on the network, actions it is allowed to take and generally the protocols that it can execute Data Consistency In addition to authenticating the sender, the consistency of messages with similar ones regarding time and location must also be considered, because false messages from legitimate senders are not impossible. It is extremely important for warning messages to meet the time and location constraints. A warning message must be shown to the driver before it is too late to react and also before passing the corresponding geographic location of the warning Confidentiality Since security in vehicular networks is related to safety, all network users should normally have full access to network data, i.e. traffic information, road conditions, etc. in order to make informed decisions. Since messages in VANETs don't contain any sensitive information and are not confidential, there is no need for encryption and confidentiality is not an important issue. Therefore, vehicular networks do not have to be protected against eavesdropping. However, network data should be sent from authenticated sources and this can be done by source authentication Integrity All messages which are sent and received on the network should be protected against alteration attacks. A secure vehicular network should provide protection against message alteration. A message can be altered in several ways during its transit from source to destinations and all possible attacks must be considered. When it comes to integrity there are three main threats directly related to message contents. System threats regarding integrity include (1) wrong or forged messages, (2) messages which are modified during transmission and (3) replayed messages Availability Since vehicular networks require real-time responses, they are vulnerable to DoS attacks. In order to remain operational, protocols and services must be resilient against denial of service attacks. The communication channel must be available at all times, it must also be reliable otherwise attackers can launch DoS attacks. Such attacks can disrupt the entire network which will lead to failure in delivering network messages to other vehicles in range. Therefore they must be securely designed and be fault-tolerant in order to work under faulty conditions. There are a couple of security measures such as channel monitoring which is a means to increase channel availability. Besides, new technologies are always under development which will try to increase availability in communication channels. Although availability can never be completely guaranteed, yet there are still a couple of security measures such as channel monitoring which is a means to increase channel availability. Besides, channel switching and using different communication technologies in case of jamming attacks can be helpful Non Repudiation When a node sends out a message, it shouldn t be able to later deny sending that message. In case of accidents or investigations, problem-causing drivers should be reliably identified, to correctly address the sequence and contents of exchanged messages. This can be done by signing outgoing messages with an anonymous key exclusively related to the sender and also a time- stamp associated to the message preventing the user to claim that a particular message has been replayed. In case of using digital signatures, each message is signed with its private but anonymous key. Therefore the vehicle owner cannot claim that he hasn't sent the message Privacy Driver privacy is an important issue in vehicular communications. Drivers don t want their personal and private information to be accessible by others. Since the vehicle information such as location, speed, time and other car data are transmitted via wireless communication, there should not be possible to infer the driver's identity from this information. Among this information, driver's location and tracing vehicle movements are more sensitive and must be taken into consideration carefully. Regarding this issue we come to another requirement called anonymity which is discussed below Anonymity Anonymity defines the requirement that network nodes must not be able to infer if a node performed or will perform some specific action in future. In order to prevent such inferences, there must be an equal probability of doing a specific action by all nodes, or have strong probabilistic anonymity, with the probabilities being equal for all nodes. By not requiring a vehicle to authenticate with its exact identity to other vehicles to which it sends information Real-time Constraints In order to have vehicular networks secured, specific measures and techniques have been suggested. Although these techniques seem applicable and useful, there is one important issue that must be taken into account, real-time Volume 2, Issue 2 March April 2013 Page 373

4 constraints. Out-dated messages, e.g. out-dated traffic or road/weather conditions, are of no use in vehicular networks and must be eliminated in order to let the newly generated messages get to their destinations on time. On the other hand, solutions such as digital signatures and certificates must be designed specifically for vehicular networks in order to fulfill real-time constraints of such networks. 3. Security challenges in VANETs Despite the various benefits offered by VANETs, they introduce several security challenges to the research community. These security challenges are mostly concerned with the trade-off between authentication and nonrepudiation versus privacy during communication within VANET environments. Another security challenge is delay sensitivity because significant delays prohibit the use of security protocols that have high overheads or rely on multiple stages of full-duplex communication between nodes [4,5]. The use of traditional authentication mechanisms to address some security threats (such as illusion attacks) without affecting privacy in VANETs poses a new challenge for those VANET applications that need to authenticate nodes in VANETs [6,7]. The other challenge is the restriction introduced by the transitory nature of interactions in a VN to use reputation-based schemes [8]. Another VANET security challenge is the forwarding of event-related messages on very large ad hoc networks of highly mobile nodes in such a way that the information can be trusted by receiving nodes because by doing so we improve traffic safety and mobility [9]. All these challenges need to be addressed to provide a secure VANET infrastructure where nodes (vehicles) can communicate securely with each other and infrastructure units. Table 1 Summary of security attacks in VANETs 11 This survey paper identify major security issues and challenges associated with different routing protocols. Third Type: Timing Forth Type: Social Fifth Type: Monitoring First Type: s on availability 1.Black Hole 2.Malware 3.Broadcast Tampering 4.Spamming 5.Greedy Drivers 6.Denial of Service Second Type: s on Authentication/ identification 1.Masquerading 2.Replay 3.Global Positioning System (GPS)Spoofing 4.Tunneling 5.Sybil Ref. Objective No. 10 In this paper, we propose five different classes of attacks and every class is expected to provide better perspective for the VANET security. The main contribution of this paper is the proposed solution for classification and identification of different attacks in VANET. Types of First Type: Network 1. Denial of service (DOS) 2.Distributed Denial of service (DDOS) 3.Sybil 4.Node Impersonation Second Type: Application (AP) 12 This paper aims to describe and analyze the most representative 6.Message Tampering 7.ID Disclosure Third Type: s on confidentiality Fourth Type: s on privacy Fifth Type: s on non-repudiation Sixth Type: s on data trust First Type : s on identification and authentication Volume 2, Issue 2 March April 2013 Page 374

5 VANET security developments 1.Impersonation. 1.1False attribute possession. 2. Sybil. Second Type: s on privacy 1.Identity revealing. 2. Location tracking. Third Type: s on non-repudiation Fourth Type: s on confidentiality Fifth Type: s on availability 1.Network Denial of Service (DoS) 1.1Routing anomalies. 13 In this paper, we have classified different security attacks and logically organized/represente d in a more lucid manner based on the level of effect of a particular security attack on intelligent vehicular traffic. 1.Malicious nodes 2.Illusion attack Fifth Type: Location 1.Forging positions and Sybil attacks 2.Position cheating and false position disseminating First Type: Network s 1.Denial of service (DOS) 2.Distributed Denial of service 3.Sybil 4.Node Impersonation Second Type: Application 2.Computation DoS. Third Type: Timing 1 This paper discusses some of the main security threats and attacks that can be exploited in VANETs and present the corresponding security solutions that can be implemented to thwart those attacks. Sixth Type: s on data trust First Type: Anonymity 1.Malicious Vehicle Second Type: Key management 1.Brute force attack: 2. Misbehaving and faulty nodes Third Type: Privacy 1.Malicious user 2.Traffic analysis attacks Fourth Type : Reputation 14 Finally, we outline some of the VANET research challenges that still need to be addressed to enable the ubiquitous deployment and wide spread adoption of scalable, reliable, robust, and secure VANET architectures, protocols, technologies, and services. Fourth Type: Social Fifth Type: Monitoring First Type: Threats to availability 1.Denial of Service 2.Broadcast Tampering 3.Malware 4.Spamming 5.Black Hole Second Type: Threats to authenticity 1.Masquerading Volume 2, Issue 2 March April 2013 Page 375

6 2.Replay 3.Global Positioning System (GPS) Spoofing 4.Tunneling 5.Position Faking 6.Message Tampering 7.Message Suppression/ Fabrication/ Alteration 8.Key and/or Certificate Replication 9.Sybil Third Type: Threats to confidentiality 4. PROPERTIES OF ATTACKERS er create problem in the network by getting full access of communication medium DSRC. Here we are discussing some properties and capability of the attackers which has been mentioned in studies. Insider This type of attackers who is an authentic user of the network and have detail knowledge of network. Insider attacker might have access to insider knowledge and this knowledge will be used for understanding the design and configuration of network. When they have all information about the configuration then it s easy for them to launch attacks and create more problem as compare to outsider attacker. It can create problem in the network by changing the certificate keys. We can simply say that insider attacker is the right man doing the wrong job in the network. Outsider The outsider attacker is considered as an authentic user of the network. It is a kind of intruder which aims to misuse the protocols of the network and the range of such attacks are limited. Outsider attacker also has a limited diversity for launching different kind of attacks as compare to insider attacker. Coverage area Coverage area is the main property of attacker when they launch any kind of attacks. er could cover the main area of road, and it depends on the nature of the attacks. Basic level attacker has controlled one DSRC channels and covers the range of at most 1000 meters but the extended level attackers are more organized and cover more area using of hundred DSRC channels. Technical Expertise Technical expertise of the attacker makes them stronger for creating attacks in the network. It is difficult for attacker to mount attacks on cryptographic algorithms. Chance is low for attacker to compromise the infrastructure network and data capture from restricted area of network. er having ability to extracts the program code and secret keys of the computing platform of OBU and RSU by launching physical attacks. Resources Budget, manpower and tools are the three main key resources and attackers depend on it to achieve their goals. Need budget to borrow technical expert and spend time to understand the configuration of specific network and then disturb network with launching of different kind of attacks. er can use different kind of tools for launching attacks. These software tools can develop by own self or buy from the market. Many business parties make setup their business nears the road and provide non safety application services (Internet, entertainment services). One business party can be used their own maximum resources to create problems for other parties and destroy their business with different kind of attacks. 5. Conclusion and Future work In this paper various attacks in VANET have been classified. It has been observed that the classification helps to deal with different types of attack on VANET. Due to recent improvements in connecting vehicles to external networks, proper security mechanisms must be developed in parallel to reduce the risk of malicious and unauthorized behavior in the vehicular network domain. Users require safety on road in future vehicular network and it could be possible by implementing VANET applications. We expect that the proposed attacks classes may helpful to identify attacks and understand attackers. It is difficult to control attackers but in future work we will develop such system to identify attacks in network with respect to some specific type of attack. Implementation could be easy of this future human life saving network if we control attackers and their attacks. In this work, we have analyzed the attacks that VANETs can be subjected to. Table provides a summary of the security attacks we have identified that may be launched on VANETs and the corresponding security solutions to mitigate those attacks. I hope that this survey will enable VANET designers and developers to build more secure and robust VANET architectures, protocols and applications in the future. Volume 2, Issue 2 March April 2013 Page 376

7 REFERENCES [1] J.T. Isaac S. Zeadally J.S. Ca mara Security attacks and solutions for vehicular ad hoc networks IET Communications [2] M. Raya, J. Pierre, Hubaux, Securing vehicular ad hoc Networks Journal of Computer Security,vol.15, january 2007, pp: [3] A.Weimerskirch,J.J Haas,Y.C.Hu,K.P.Laberteaux, Data security in vehicular communication networks,chapter no.09, pp [4] BURMESTER M., MAGKOS E., CHRISSIKOPOULOS V.: Strengthening Privacy protection in VANETs. IEEE Int. Conf. on Wireless & Mobile Computing, Networking & Communication (WIMOB 2008), 2008, pp [5] JAKUBIAK J., KOUCHERYAV Y.: State of the art and research challenges for VANETs. Fifth IEEE Consumer Communications and Networking Conf. (CCNC 2008), 2008, pp [6] XI Y., SHA K., SHI W., SCHWIEBERT L., ZHANG T.: Enforcing privacy using symmetric random keyset in vehicular networks. Eighth Int. Symp. on Autonomous Decentralized Systems (ISADS 2007), 2007, pp [7] LO N., TSA H.: Illusion attack on VANET applications a message plausibility problem. IEEE Globecom Workshops, 2007, pp. 1 8 [8] PARNO B., PERRIG A.: Challenges in securing vehicular networks. Fourth Workshop on Hot Topics in Networks (HotNets-IV), 2005 [9] FLORIAN D., LARS F., PRZEMYSLAW M.: VARS: a vehicle ad hoc network reputation system. Int. Conf. on a World of Wireless, Mobile and Multimedia Networks (WOWMOM 2005), 2005, pp [10] Irshad Ahmed Sumra,Iftikhar Ahmad, Halabi Hasbullah Classes of s in VANET [11] Anup Dhamgaye, Nekita Chavhan Survey on security challenges in VANET IJCSN International Journal of Computer Science and Network, Vol 2, Issue 1, [12] José María de Fuentes, Ana Isabel González-Tablas, Arturo Ribagorda Overview of security issues in Vehicular Ad-hoc Networks [13] Adil Mudasir Malla Ravi Kant Sahu Security s with an Effective Solution for DOS s in VANET International Journal of Computer Applications ( ) Volume 66 No.22, March 2013 [14] Sherali Zeadally Ray Hunt Yuh-Shyan Chen Angela Irwin Aamir Hassan Vehicular ad hoc networks (VANETS): status, results, and challenges Springer Science+Business Media, LLC 2010 Volume 2, Issue 2 March April 2013 Page 377

Overview of Challenges in VANET

Overview of Challenges in VANET Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because

More information

Introduction to VANET

Introduction to VANET VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of

More information

OVERVIEW OF SECURITY ISSUES IN VANET (VEHICULAR ADHOC NETWORK)

OVERVIEW OF SECURITY ISSUES IN VANET (VEHICULAR ADHOC NETWORK) OVERVIEW OF SECURITY ISSUES IN VANET (VEHICULAR ADHOC NETWORK) (MTech 2 nd year) Computer Science & Engineering Integral University, Lucknow 60 ABSTRACT Vehicular Ad Hoc Network is a kind of special wireless

More information

Protection Against DDOS Using Secure Code Propagation In The VANETs

Protection Against DDOS Using Secure Code Propagation In The VANETs Protection Against DDOS Using Secure Code Propagation In The VANETs Mandeep Kaur, Manish Mahajan Mandeepcheema6@gmail.com,cgccoe.hodcse@gmail.com ABSTRACT--VANETs are the vehicular networks used to connect

More information

Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks

Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Nizar Alsharif, Albert Wasef, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University

More information

Sybil Attack Detection and Prevention Using AODV in VANET

Sybil Attack Detection and Prevention Using AODV in VANET Sybil Attack Detection and Prevention Using in VANET Navneet 1, Rakesh Gill 2 1 M. Tech. Student, GITM, Bilaspur-Tauru Road, Gurgaon (Haryana) navneet_tehlan@yahoo.com 2 Asst. Prof., GITM, Bilaspur-Tauru

More information

ICMP and Monitoring to Detect and Isolate Sybil Attack in VANET

ICMP and Monitoring to Detect and Isolate Sybil Attack in VANET ICMP and Monitoring to Detect and Isolate Sybil Attack in VANET Jaydeep P. Kateshiya 1, Anup Parkash Singh 2 P.G. Student, Department of Computer Engineering, Lovely Professional University, Punjab, India

More information

SURVEY: Reputation and Trust Management in VANETs

SURVEY: Reputation and Trust Management in VANETs , pp. 301-306 http://dx.doi.org/10.14257/ijgdc.2015.8.4.29 SURVEY: Reputation and Trust Management in VANETs Jitendra Singh Sengar BVM College of Technology & Management, Gwalior, MP, India jitendrasinghsengar@gmail.com

More information

Enhancement of VANET Communication Range using WiMAX and Wi-Fi: A Survey

Enhancement of VANET Communication Range using WiMAX and Wi-Fi: A Survey International Journal of Urban Design for Ubiquitous Computing Vol.1, No.1, (2013), pp. 9-16 http://dx.doi.org/10.21742/ijuduc.2013.1.1.02 Enhancement of VANET Communication Range using WiMAX and Wi-Fi:

More information

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Security in Mobile Ad-hoc Networks. Wormhole Attacks Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.

More information

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

Security of Mobile Ad Hoc and Wireless Sensor Networks

Security of Mobile Ad Hoc and Wireless Sensor Networks Security of Mobile Ad Hoc and Wireless Sensor Networks July, 2013 Edward Bonver LA Board Member Symantec Corporation edward@owasp.org Copyright The Foundation Permission is granted to copy, distribute

More information

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks D.Balamahalakshmi Department of Computer Science and Engineering, V.S.B Engineering College, Karur, Tamilnadu, India 1

More information

CHAPTER I INTRODUCTION TO VANETS

CHAPTER I INTRODUCTION TO VANETS CHAPTER I INTRODUCTION TO VANETS 1.1 PERVASIVE NETWORK Pervasive Networking is perceived as the ability to communicate and access the same types of services-anytime, anywhere. This is regardless of the

More information

Wireless Sensor Networks: Security Issues, Challenges and Solutions

Wireless Sensor Networks: Security Issues, Challenges and Solutions International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 8 (2014), pp. 859-868 International Research Publications House http://www. irphouse.com Wireless Sensor Networks:

More information

Sybil Attack Detection in Mobile Adhoc Network

Sybil Attack Detection in Mobile Adhoc Network Sybil Attack Detection in Mobile Adhoc Network 469 1 Yamini D. Malkhede, 2 Purnima Selokar 1 Department of CSE, G. H. Raisoni Institute of Engineering &Technology for Women, Nagpur, Maharashtra, India

More information

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Threat Modeling. Bart De Win Secure Application Development Course, Credits to Threat Modeling Bart De Win bart.dewin@ascure.com Secure Application Development Course, 2009 Credits to Frank Piessens (KUL) for the slides 2 1 Overview Introduction Key Concepts Threats, Vulnerabilities,

More information

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET Ms.T.R.Panke * M.B.E.S.College of

More information

Short-term Linkable Group Signatures with Categorized Batch Verification

Short-term Linkable Group Signatures with Categorized Batch Verification Short-term Linkable Group Signatures with Categorized Batch Verification Lukas Malina 1, Jordi Castella-Rocà 2, Arnau Vives-Guasch 2, Jan Hajny 1 1 Department of Telecommunications Faculty of Electrical

More information

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Deivanai.P 1, K.Sudha 2, K.Radha 3 Department of CSE, Muthayammal Engineering College, Rasipuram, India 1 Assistant Professor,

More information

Using Trusted Platform Module (TPM) to Secure Business Communciation (SBC) in Vehicular Ad hoc Network (VANET)

Using Trusted Platform Module (TPM) to Secure Business Communciation (SBC) in Vehicular Ad hoc Network (VANET) International Conference on Recent Advances in Computer Systems (RACS 2015) Using Trusted Platform Module (TPM) to Secure Business Communciation (SBC) in Vehicular Ad hoc Network (VANET) Irshad Ahmed Sumra,

More information

OVERVIEW OF VANET WITH ITS FEATURES AND SECURITY ATTACKS

OVERVIEW OF VANET WITH ITS FEATURES AND SECURITY ATTACKS OVERVIEW OF VANET WITH ITS FEATURES AND SECURITY ATTACKS M.Newlin Rajkumar 1, M.Nithya 2,P.HemaLatha 3 1Assistant Professor, Department of Computer Science, Anna University Regional Centre Coimbatore 2P.G

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #16 Network Privacy & Anonymity 2014 Patrick Tague 1 Network Privacy Issues Network layer interactions in wireless networks often expose

More information

Detection of Sybil Attack in VANETs by Trust Establishment in Clusters

Detection of Sybil Attack in VANETs by Trust Establishment in Clusters International Journal of Computer Engineering and Applications, Volume VII, Issue I, July 14 www.ijcea.com ISSN 2321-3469 Detection of Sybil Attack in VANETs by Trust Establishment in Clusters Shivani

More information

Security Issues In Mobile Ad hoc Network Routing Protocols

Security Issues In Mobile Ad hoc Network Routing Protocols Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be

More information

Mobile ad hoc networks Various problems and some solutions

Mobile ad hoc networks Various problems and some solutions Mobile ad hoc networks Various problems and some solutions Humayun Bakht School of Computingand Mathematical Sciences Liverpool John Mores University Email:humayunbakht@yahoo.co.uk Main Focus Problems

More information

Survey of Vehicular Ad-hoc Networks (VANETs) With Security Requirements

Survey of Vehicular Ad-hoc Networks (VANETs) With Security Requirements Survey of Vehicular Ad-hoc Networks (VANETs) With Security Requirements A.Prabhaharan 1 M.Phil Research Scholar, Department of Computer Science NGM College Pollachi, Bharathiar University, Coimbatore,

More information

Application Distribution Model and Related Security Attacks in VANET

Application Distribution Model and Related Security Attacks in VANET Application Distribution Model and Related Security Attacks in VANET Navid Nikaein, Soumya Kanti Datta, Irshad Marecar, Christian Bonnet EURECOM, Sophia Antipolis, France {navid.nikaein, soumya-kanti.datta,

More information

Privacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH

Privacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH Privacy in Vehicular Ad-hoc Networks Nikolaos Alexiou, LCN, EE KTH alexiou@kth.se 2/10/2012 Outline Introduction VANETs: an overview VANET privacy - Anonymity - Location Privacy - VPKI Privacy Attacks

More information

Define information security Define security as process, not point product.

Define information security Define security as process, not point product. CSA 223 Network and Web Security Chapter One What is information security. Look at: Define information security Define security as process, not point product. Define information security Information is

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Various Issues in Vehicular Ad hoc Networks : A Survey

Various Issues in Vehicular Ad hoc Networks : A Survey International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 399-403 Various Issues in Vehicular Ad hoc Networks : A Survey Shinde S. S. 1 & Patil S. P 2 1,2 Annasaheb

More information

Security in Ad Hoc Networks Attacks

Security in Ad Hoc Networks Attacks Security in Ad Hoc Networks Attacks Nie Pin niepin(at)cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks 2007-3-28 NiePin/HUT/CS/TML 1 Agenda Objectives of attacks Target selection

More information

I-PRE: Improved Proxy Re-Encryption Scheme for VANET

I-PRE: Improved Proxy Re-Encryption Scheme for VANET www.ijcsi.org 8 I-PRE: Improved Proxy Re-Encryption Scheme for VANET Arun Malik, Dr. Sanjeev Rana and Dr. Rajneesh Gujral Asian Institute of Management and Technology, Yamunagar, Haryana, India M. M. University,

More information

COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS

COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS Deepa B 1 and Dr. S A Kulkarni 2 1 IV Sem M. Tech, Dept of CSE, KLS Gogte Institute of Technology, Belagavi deepa.bangarshetru@gmail.com

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity

More information

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications Enabling and Securing Digital Business in Economy Protect s Serving Business Critical Applications 40 percent of the world s web applications will use an interface Most enterprises today rely on customers

More information

Introduction to Vehicular Networks

Introduction to Vehicular Networks CS 795/895 Vehicular Networks Introduction to Vehicular Networks Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/courses/cs795-s07/

More information

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS INTRODUCTION 1. With the advancement in radio technologies like Bluetooth, IEEE 802.11or Hiperlan, a new concept of networking has emerged, known as ad hoc networks,

More information

EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION

EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION Shaiba Wahab Dept. Of Computer Science and Engineering M.E.A. Engineering College Perinthalmanna, Kerala Jemsheer Ahmed P Dept.

More information

A Survey of BGP Security Review

A Survey of BGP Security Review A Survey of BGP Security Review Network Security Instructor:Dr. Shishir Nagaraja Submitted By: Jyoti Leeka November 16, 2011 1 Introduction to the topic and the reason for the topic being interesting Border

More information

Automotive Cyber Security

Automotive Cyber Security Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18

More information

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc

More information

Enhancing Security on Vehicular Adhoc Networks using EMAP-HMAC

Enhancing Security on Vehicular Adhoc Networks using EMAP-HMAC www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 Page No.: 704-711 Volume-5, Issue-2, April-2015 International Journal of Engineering and Management Research Enhancing Security on Vehicular

More information

Pseudonym Based Security Architecture for Wireless Mesh Network

Pseudonym Based Security Architecture for Wireless Mesh Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network

More information

Research Issues on Vehicular Ad hoc Network

Research Issues on Vehicular Ad hoc Network Research Issues on Vehicular Ad hoc Network Md. Humayun Kabir Department of Computer Science & Engineering University of Rajshahi, Rajshahi, Bangladesh. Abstract Vehicular Ad Hoc Network (VANET) is a kind

More information

Network Security Issues and Cryptography

Network Security Issues and Cryptography Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi

More information

Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)

Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET) Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET) S.Nithya 1, S.Prema 2, G.Sindhu 3 1 Asst.Professor, Department of ECE, KPR Institute of Engineering & Technology, Tamil Nadu,

More information

SECURING DEVICES IN THE INTERNET OF THINGS

SECURING DEVICES IN THE INTERNET OF THINGS SECURING DEVICES IN THE INTERNET OF THINGS WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including

More information

An Efficient Data Transmission in VANET Using Clustering Method

An Efficient Data Transmission in VANET Using Clustering Method INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 309-313 Manuscript received April 29, 2016; revised July, 2017. DOI: 10.1515/eletel-2017-0045 An Efficient Data Transmission

More information

A Surveying on Road Safety Using Vehicular Communication Networks

A Surveying on Road Safety Using Vehicular Communication Networks Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-4, February 10, 2012 A Surveying on Road Safety Using Vehicular Communication Networks Padmavathi K Asst. Professor, Department

More information

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS Pinki Tanwar * Shweta** ABSTRACT A mobile adhoc network is a collection of mobile nodes which form a network which is not fixed. The nodes in the network dynamically

More information

Cryptography and Network Security

Cryptography and Network Security Security Sixth Edition Chapter 1 Introduction Dr. Ahmed Y. Mahmoud Background Information Security requirements have changed in recent times traditionally provided by physical and administrative mechanisms

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

New Lightweight Security Protocol for VANET by Using Registration Identity and Group Certificate

New Lightweight Security Protocol for VANET by Using Registration Identity and Group Certificate New Lightweight Security Protocol for VANET by Using Registration Identity and Group Certificate Aditi Garg 1, Ankita Agrawal 2, Niharika Chaudhary 3, Shivanshu Gupta 4, Devesh Pandey 5, Tumpa Roy 6 G.L.N.A

More information

When the Lights go out. Hacking Cisco EnergyWise. Version: 1.0. Date: 7/1/14. Classification: Ayhan Koca, Matthias Luft

When the Lights go out. Hacking Cisco EnergyWise. Version: 1.0. Date: 7/1/14. Classification: Ayhan Koca, Matthias Luft When the Lights go out Hacking Cisco EnergyWise Version: 1.0 Date: 7/1/14 Classification: Author(s): Public Ayhan Koca, Matthias Luft TABLE OF CONTENT 1 HANDLING... 5 1.1 DOCUMENT STATUS AND OWNER... 5

More information

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini

More information

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department

More information

Mobile Security Fall 2011

Mobile Security Fall 2011 Mobile Security 14-829 Fall 2011 Patrick Tague Class #17 Location Security and Privacy HW #3 is due today Announcements Exam is in-class on Nov 9 Agenda Location security Location privacy Location, Location,

More information

Proxy Signature-based RSU Message Broadcasting in VANETs

Proxy Signature-based RSU Message Broadcasting in VANETs Proxy Signature-based RSU Message Broadcasting in VANETs Subir Biswas Dept. of Computer Science University of Manitoba Winnipeg MB, Canada R3T 2N2 Email: bigstan@cs.umanitoba.ca Jelena Mišić Dept. of Computer

More information

A Review Paper on Network Security Attacks and Defences

A Review Paper on Network Security Attacks and Defences EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY

More information

A Review on Security in Vehicular Ad-hoc Networks

A Review on Security in Vehicular Ad-hoc Networks A Review on Security in Vehicular Ad-hoc Networks Ramandeep Kaur 1, Er. Rupinderpal Singh 2 1M.Tech Scholar Computer Science & Engineering Department 2Asst. Prof. in Computer Science & Engineering Department

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 3.134 ISSN (Online): 2348-4470 ISSN (Print) : 2348-6406 International Journal of Advance Engineering and Research Development Volume 1, Issue 11, November -2014

More information

BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY

BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY Sunil Goyal1 M.Tech Student, Deptt. of CSE GKU TalwandiSabo,India Vinod sharma2 Assistant Professor, Deptt. of CSE GKU TalwandiSabo,India Abstract-The

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Enhanced Management of Certificate Caching and Revocation Lists in VANET

Enhanced Management of Certificate Caching and Revocation Lists in VANET Enhanced Management of Certificate Caching and Revocation Lists in VANET Sadiq H. Abdulhussain Computer Engineering Department College of Engineering University of Baghdad ABSTRACT Vehicular network security

More information

Network Security and Cryptography. December Sample Exam Marking Scheme

Network Security and Cryptography. December Sample Exam Marking Scheme Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers

More information

Most Common Security Threats (cont.)

Most Common Security Threats (cont.) Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?

More information

Security of vehicular communications. Vehicular communication (VC) systems

Security of vehicular communications. Vehicular communication (VC) systems Security of vehicular communications vehicular safety communications design constraints attacker classes desired security services a security architecture Vehicular communication (VC) systems motivations:

More information

SECURING DEVICES IN THE INTERNET OF THINGS

SECURING DEVICES IN THE INTERNET OF THINGS SECURING DEVICES IN THE INTERNET OF THINGS EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including steep financial losses, damage

More information

1-7 Attacks on Cryptosystems

1-7 Attacks on Cryptosystems 1-7 Attacks on Cryptosystems In the present era, not only business but almost all the aspects of human life are driven by information. Hence, it has become imperative to protect useful information from

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No

More information

On Reputation and Data-centric Misbehavior Detection Mechanisms for VANET

On Reputation and Data-centric Misbehavior Detection Mechanisms for VANET On Reputation and Data-centric Misbehavior Detection Mechanisms for VANET by Zhen Huang Thesis submitted to the Faculty of Graduate and Postgraduate Studies In partial fulfillment of the requirements For

More information

Study on Computer Network Technology of Digital Library

Study on Computer Network Technology of Digital Library International Symposium on Computers & Informatics (ISCI 2015) Study on Computer Network Technology of Digital Library Yanming Sui LinYi University, Linyi, China suiyanming@lyu.edu.cn Abstract With the

More information

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS. Security issues: Threats Methods of attack Encryption algorithms Secret-key Public-key Hybrid protocols Lecture 15 Page 2 1965-75 1975-89 1990-99 Current Platforms Multi-user timesharing computers Distributed

More information

Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs)

Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs) Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs) Gilles Guette 1 and Ciarán Bryce 2 IRISA Campus de Beaulieu, 35042 Rennes CEDEX, France gilles.guette@univ-rennes1.fr, Ciaran.Bryce@inria.fr Abstract.

More information

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS 1 Sunil Kumar, 2 Er.Vinod Kumar Sharma Abstract-The wireless mesh networks consist of number of number that is connected to

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

Securing the future of mobility

Securing the future of mobility Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

Security Using Digital Signatures & Encryption

Security Using Digital Signatures & Encryption Email Security Using Digital Signatures & Encryption CONTENTS. Introduction The Need for Email Security Digital Signatures & Encryption 101 Digital Signatures & Encryption in Action Selecting the Right

More information

Authentication with Privacy for Connected Cars - A research perspective -

Authentication with Privacy for Connected Cars - A research perspective - Authentication with Privacy for Connected Cars - A research perspective - Mark Manulis Surrey Centre for Cyber Security, Deputy-Director Department of Computer Science University of Surrey sccs.surrey.ac.uk

More information

Protecting Information Assets - Week 3 - Data Classification Processes and Models. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 3 - Data Classification Processes and Models. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 3 - Data Classification Processes and Models Readings In the News MIS5206 Week 3 Data Classification Processes and Models Test Taking Tip Quiz Readings Vacca Chapter

More information

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Savithru Lokanath 1, Aravind Thayur 2 1 Department of Electronics & Communication Engineering, DayanandaSagar College of Engineering,

More information

A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET. Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu

A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET. Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu Outline Introduction to Vehicular Networks Motivation

More information

KALASALINGAM UNIVERSITY

KALASALINGAM UNIVERSITY KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE

More information

A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS

A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS NEC Technical Report NLE-PR-2006-19, NEC Network Laboratories, March 2006, 28 pages. A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1.1 June 2, 2006

More information

An Effective Strategy for Trusted Information Scheme for Location Privacy in VANETs

An Effective Strategy for Trusted Information Scheme for Location Privacy in VANETs An Effective Strategy for Trusted Information Scheme for Location Privacy in VANETs Rakesh Kumar ER Asst. Prof. & Head (CSE), SAMS College of Engineering and Technology, Chennai rakeshkumarer@gmail.com,

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

e-commerce Study Guide Test 2. Security Chapter 10

e-commerce Study Guide Test 2. Security Chapter 10 e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the

More information

Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol

Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol IJSRD - International Journal for Scientific Research & Development Vol. 1, Issue 7, 2013 ISSN (online): 2321-0613 Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol Stavan Karia

More information

D.David Neels Ponkumar 1, Janeshwari.S 2, Gomathi Sankari.A 3

D.David Neels Ponkumar 1, Janeshwari.S 2, Gomathi Sankari.A 3 Fast and Secure Countermand Verification Process Using MAP in VANET D.David Neels Ponkumar 1, Janeshwari.S 2, Gomathi Sankari.A 3 1 Profeesor, Einstein College of Engineering, david26571@gmail.com 2 PG

More information

Boston University College of Engineering Department of Electrical and Computer Engineering. Secure Cooperative Accident Avoidance for Vehicles

Boston University College of Engineering Department of Electrical and Computer Engineering. Secure Cooperative Accident Avoidance for Vehicles Boston University College of Engineering Department of Electrical and Computer Engineering Secure Cooperative Accident Avoidance for Vehicles MS Project Jimmy C. Chau Advisor: Thomas Little May 7, 2011

More information

Securing Devices in the Internet of Things

Securing Devices in the Internet of Things AN INTEL COMPANY Securing Devices in the Internet of Things WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe

More information

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Reliable Broadcast Message Authentication in Wireless Sensor Networks Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric

More information

LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT

LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT André Weimerskirch, Scott Bogard, Debby Bezzina University of Michigan Transportation Research Institute 2901 Baxter Road Ann Arbor,

More information

A Review on Black Hole Attack in MANET

A Review on Black Hole Attack in MANET A Review on Black Hole Attack in MANET Gourav Ahuja 1, Mrs. Sugandha 2 1 Department of Computer Science and Engineering, VCE, Rohtak, Haryana (India) 2 Asst. Prof., Department of Computer Science and Engineering,

More information

Wireless Network Security Fundamentals and Technologies

Wireless Network Security Fundamentals and Technologies Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology

More information