8thsem 3rd defence

Upload: ayush-singhal

Post on 06-Jul-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/16/2019 8thsem 3rd Defence

    1/7

    ABSTRACT

    Since the last few years VANET have received increased attention as the potential technology to enhance

    active and preventive safety on the road, as well as travel comfort. Security and privacy are indispensable

    in vehicular communications for successful acceptance and deployment of such a technology. Generally,

    attacs cause anomalies to the networ functionality. A secure VANET system, while e!changing

    information should protect the system against unauthori"ed message in#ection, message alteration,

    eavesdropping.

    Figure 1 : Threat Levels

    INTRODUCTION

    Vehicular ad hoc networ $VANET% can offer various services and bene&ts to VANET users and

    thus deserves deployment effort. VANETs with interconnected vehicles and numerous services

     promise superb integration of digital infrastructure into many aspects of our lives, from vehicle'

    to'vehicle, roadside devices, base stations, tra c lights, and so forth. A networ of a hugeffi

    number of mobile and high'speed vehicles through wireless communication connections has

     become electronically and technically feasible and been developed for e!tending traditional

    tra c controls to brand new tra c services that o er large tra c'related applicationsffi ffi ff ffi .

    VANET SECURITY NECESSITIES

    The security design of VANET should guarantee following(

  • 8/16/2019 8thsem 3rd Defence

    2/7

    ). *essage Authentication, i.e. the message must be protected from any alteration.

    +. ata integrity does not necessarily imply identification of the sender.

    -. Entity Authentication, so that the receiver is not only ensured that sender generated a message,

    in addition has evidence of the liveness of the sender.

    . /onditional 0rivacy must be achieved in the sense that the user related information, including

    the driver1s name, the license plate, speed, and position and traveling routes.

    2. 3n some speci&c application scenarios, /on&dentiality, to protect the networ against

    unauthori"ed message in#ection, message alteration, and eavesdropping, respectively.

    FIGURE : RSA ! RIVEST S"A#IR ADLE#AN$ Cr%&t's%ste(

    SECURITY AS)ECTS RESTRICTED TO VANET

  • 8/16/2019 8thsem 3rd Defence

    3/7

     ). 0osition veri&cation techni4ues to thwart position spoo&ng attacs.

      +. Traceability by trusted networ authorities $e.g., networ administrator% for privilege

    revocation once misbehavior is detected.

    -. 3dentity and location privacy preserving mechanisms against unlawful tracing and user 

     pro&ling.

    . Non'frameability of an honest user who cannot be falsely accused of having misbehaved,

     2. etecting and correcting malicious data to ensure data consistency.

    5. The system must have light overheads in terms of computational costs and high e ciency.ffi

    6. 0reventing impersonation attacs, that is, no one can impersonate another authori"ed member 

    to cause service abuse problems and to damage the security of VANETs.

    7. 0reventing eavesdropping, in other words, an intruder cannot discover some valuable

    information from communications between members in VANETs.

      FIGURE *: Ge+eral authe+ti,ati'+ &r',ess

    #ET"ODOLOGY

    The scenario for VANET communication we consider in this pro#ect includes communicating

    entities of the service providers $S0%, the cars, and the access points $A0% operated on behalf of 

    service providers. The S0s and the A0s can communicate with each other by some application'

    layer proprietary protocols via 3nternet. The A0s are deployed along the roadside with reasonable

    wireless coverage to facilitate communication. A car typically belongs to one wireless networ 

  • 8/16/2019 8thsem 3rd Defence

    4/7

    service provider, and communicates with the A0s for accessing the internet along the road it

    travels through. 8hen it travels, it also roams into wireless coverage that provide by other 

    authorities.

    To mae the authentication process time'efficient, traditional solutions using centrali"ed

    authentication server $AS% is not preferable because of the large amount of messages e!changedamong the car, the A0s and the ASes. 3f the overlay networ interconnecting the A0s and the

    ASes is based on 3nternet, the delay for e!changing authentication messages could be prohibitive

    given the shortness of communication duration between the fast moving car and an individual

    A0. Thus the authentication protocols are devised such that after the car initiates communication

    re4uests until the communication session is established, the protocol should involve as less

     parties as possible besides the car and the A0, and as less on demand communication over 

    3nternet as possible besides the wireless lin between the communicating two parties. 3n

    addition, the number of messages e!changed in order for authentication should be controlled. 3n

    our design, the user authentication will be performed at the A0s, i.e., the user will prove to the

    A0 that it is a legitimate one. A more strict security will re4uire the A0 to prove it is a legitimate

    one as well, so to have mutual authentication.

    F

    IGURE - :)a,.ets e/,ha+ge 0uri+g i0e+tii,ati'+

  • 8/16/2019 8thsem 3rd Defence

    5/7

    LI#ITATIONS

    The security of VANETs is one of the most critical issues because their information transmission

    is propagated in open access environments. 3t is necessary that all transmitted data cannot bein#ected or changed by users who have malicious goals.

    TOOLS USED

    Asymmetric cryptography or public'ey cryptography is cryptography in which a pair of eys is

    used to encrypt and decrypt a message so that it arrives securely. 3nitially, a networ user 

    receives a public and private ey pair from a certificate authority. Any other user who wants to

    send an encrypted message can get the intended recipient9s public ey from a public directory.

    They use this ey to encrypt the message, and they send it to the recipient. 8hen the recipient

    gets the message, they decrypt it with their private ey, which no one else should have access to.

    OUT)UT

    Figure 2 : Out&ut

    CODE SNI))ET

     pacage vanet:

  • 8/16/2019 8thsem 3rd Defence

    6/7

    ;

      /lass.forName$Dcom.mys4l.#dbc.riverD%:  System.out.println$D/onnecting to database...D%:

      conn C river*anager.get/onnection$@BF, SEB, 0ASS%:

      stmt C conn.createStatement$%:  String 4uery C DSE VANETD:

      stmt.e!ecutepdate$4uery%:

      System.out.println$Database selected VANETD%:

      K  catch$SLFE!ception se%>

      System.out.println$Dnable To /onnect to atabaseMMD%:

      K  catch$E!ception e%>

      System.out.println$D?@/ B3VEBS not initiali"edD%:

      K  System.out.println $D*END

      DOn).New Vehicle BegistrationD

      DOn+.BS AuthenticationD

      DOn-.V3 N*@EB En4uiryD  DOn.EP3TD

      DOn2.Enter Qour /hoiceD%:

      Scanner in C new Scanner$System.in%:  int a:

      a C in.ne!t3nt$%:

    try>

      if$stmtMCnull%

      stmt.close$%:

      K

  • 8/16/2019 8thsem 3rd Defence

    7/7

    catch$SLFE!ception se+%>

      K;; nothing we can do

      try>  if$connMCnull%

      conn.close$%:

      Kcatch$SLFE!ception se%>  System.out.println$Database is in nsafe state 0lease close the databaseD%:

      K

      K 

    K

    BIBLIOGRA)"Y

    ). http(;;airccse.org;#ournal;nsa;22)-nsaH7.pdf   ' SE/B3TQ /RAFFENGES, 3SSES AN

    TRE3B SFT3NS B VANET Bam Shringar Baw , *anish Uumar , Nanhay Singh

    +. https(;;ar!iv.org;ftp;ar!iv;papers;)+H5;)+H5.)--6.pdf   ' Security Analysis of Vehicular Ad Roc Networs $VANET% Ghassan Samara, 8afaa A.R. Al'Salihy, B. Sures

    -. http(;;www.cse.wustl.edu;#ain;cse26)');ftp;vanetsecurity;inde!.html  ' Security in VANETs

    *ohan Fi mohan.li $at% wustl.edu $A paper written under the guidance of  0rof. Ba# ?ain

    http://airccse.org/journal/nsa/5513nsa08.pdfhttps://arxiv.org/ftp/arxiv/papers/1206/1206.1337.pdfhttp://www.cse.wustl.edu/~jain/cse571-14/ftp/vanet_security/index.htmlhttp://www.cse.wustl.edu/~jain/index.htmlhttp://www.cse.wustl.edu/~jain/index.htmlhttps://arxiv.org/ftp/arxiv/papers/1206/1206.1337.pdfhttp://www.cse.wustl.edu/~jain/cse571-14/ftp/vanet_security/index.htmlhttp://www.cse.wustl.edu/~jain/index.htmlhttp://airccse.org/journal/nsa/5513nsa08.pdf