overview of security issues in vanet (vehicular adhoc network)

2 downloads 0 Views 449KB Size Report
Nov 9, 2014 - Jose Maria de Fuentes, Ana Isabel Gonzalez Tablas, Arturo Ribagorda,“ Overview of security issues in Vehicular Ad-hoc Networks”,Copyright ...
International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 3, Issue 9 November 2014

OVERVIEW OF SECURITY ISSUES IN VANET (VEHICULAR ADHOC NETWORK) Nazish Siddiqui (MTech 2nd year) Computer Science & Engineering Integral University, Lucknow

ABSTRACT Vehicular Ad Hoc Network is a kind of special wireless ad hoc network, which has the characteristics of high node mobility and fast topology changes. The Vehicular Networks can provide wide variety of services, ranging from safety related warning system to improved navigation mechanisms as well as information and entertainment providing applications. So a lot of work and research is being conducted to study problems related to the vehicular communications. These problems include network architecture, protocols for physical and link layers, routing algorithms, as well as security issues. The need for a robust VANET network is strongly dependent on their security and privacy features, which will be discussed in this paper. A various types of security problems and potential attacks and challenges of VANET has been analyzed and discussed. This paper offers an overview of the current status of security issues over VANET. For this purpose, different communication models have been identified and analyzed from the security point of view. The main objective of this paper is to improve the security issues in VANET.

INTRODUCTION With the Internet becoming an increasingly significant part of our lives, the dream of Wi-FI enabled city is becoming closer and closer to reality. One of the hindrances to this dream, however, is the high router requirement. For wireless internet to blanket a city, thousands of wireless routers must be strategically placed to ensure constant coverage. Since this is a process that can become quite complicated and costly, researchers began looking for a technology to which routers could be attached or involved. The Vehicular Ad-Hoc Network, or VANET, is a technology that uses moving cars as nodes in a network to create a mobile network. VANET turns every participating car into a wireless router or node, allowing cars approximately 100 to 300 metres of each other to connect and, in turn, create a network with a wide range. As cars fall out of the signal range and drop out of the network, other cars can join in, connecting vehicles to one another so that a mobile Internet is created. VANETs are a subset of MANETs (Mobile Ad-hoc NETworks) in which communicating nodes are mainly vehicles. As such, this kind of network should deal with a great number of highly mobile nodes, eventually dispersed in different roads. In VANETs, vehicles can communicate each other (V2V, Vehicle-to-Vehicle communications). Moreover, they can connect to an infrastructure (V2I, Vehicle-to-Infrastructure) to get some service. This infrastructure is assumed 60 Nazish Siddiqui

International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 3, Issue 9 November 2014

to be located along the roads. Data interchanged over VANETs often play a vital role in traffic safety. Information must be accurate and truthful, as lives could depend on these information. In this way, very stringent security requirements are to be achieved. Moreover, privacy of drivers should be protected – a vehicle should not be easily tracked by unauthorized entities. Satisfying all these security requirements have lead to a great amount of research contributions each one covering different aspects of data security and privacy.

DESCRIPTION A Vehicular Ad-Hoc Network or VANET is a form of Mobile Ad-Hoc Network or MANET which provides communication between vehicles and between vehicles and road-side base stations. A vehicle in VANET is considered to be an intelligent mobile node capable of communicating with its neighbors and other vehicles in the network. VANET is different from MANET due to high mobility of nodes and the large scale of networks. Security and privacy are the two main concerns in designing a VANET .Although there are many proposed solutions for improving securities in VANET but security still remains a delicate research subject.

OVERVIEW OF VANET In intelligent transportation systems (ITS), each vehicle takes on the role of sender, receiver, and router to broadcast information to the vehicular network or transportation agency, which then uses the information to ensure safe, free-flow of traffic. For communication to occur between vehicles and Road Side Units (RSUs), vehicles must be equipped with some sort of radio interface or On Board Unit (OBU) that enables short-range wireless ad hoc networks to be formed. Vehicles must also be fitted with hardware that permits detailed position information such as Global Positioning System (GPS) or a Differential Global Positioning System (DGPS) receiver. Fixed RSUs, which are connected to the backbone network, must be in place to facilitate communication. The number and distribution of road side units is dependent on the communication protocol to be used. For example, some protocols require road side units to be distributed evenly throughout the whole road network, some require roadside units only at intersections, while others require roadside units only at region borders. Though it is safe to assume that infrastructure exists to some extent and vehicles have access to it intermittently, it is unrealistic to require that vehicles always have wireless access to roadside units.

The communication may be of 3 types1.inter-vehicle communication i.e vehicle to vehicle communication 2.vehicle to roadside communication i.e communication between RSU and vehicles 3.inter-roadside communication i.e communication between RSU and the base station.

61

Nazish Siddiqui

International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 3, Issue 9 November 2014

GENERAL VANET STRUCTURE [3]

STANDARDS FOR WIRELESS ACCESS IN VANET In VANET, the connectivity is established among vehicle to vehicle and vehicle to road side infrastructure (RSU) and vehicle or road side infrastructures to the Central Authority (CA) [5] responsible for the network maintenance. The basic tool for communication is the short range radios that are being installed in any of the nodes. Vehicular node has the shortest transmission range. RSU’s are spread sporadically or regularly depending on the deployment of the network in any particular region. They act as an intermediary node between the Central Authority (CA) and Vehicular Node (VN). In 1999, the Federal Communication Commission (FCC) has allocated a frequency band of 5.850- 5.925 GHz in the US specifically for the purpose of vehicular networks. Similar bands exists in Japan and Europe. The emerging de facto standard for Vehicular Communication is the Dedicated Short Range Communications (DSRC)[7][3]. DSRC has a MAC Layer that is either a modified version of 802.11WLAN or the 3G protocol extended for decentralized access. Since the current 802.11 protocol is not suitable for VANET due to the high mobility and highly dynamic topology, a special version of it, called 802.11p [7][3] is being developed by the IEEE. Also, the current 3G protocol is designed for centralized cellular networks, but in VANET centralized infrastructure is not always present. The IEEE 802.11p standard which is a modification of the popular IEEE 802.11 (Wi-Fi) standard, looks at issues related to the highly dynamic environment and the extremely short time durations, during which communications must be completed due to the high speed of the communicating vehicles.

SECURITY CONCERNS IN VANET The reasons that could affect the security in Vehicular Network can be classified into two parts, the Adversaries or Attackers that can attack the system and the type of Attacks that can be encountered in VANET.

62

Nazish Siddiqui

International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 3, Issue 9 November 2014

A TYPES OF ATTACKS 1. DOS attack: The Denial Of Service attack happens when the attacker takes control of a vehicle’s resources or jams the communication channel used by the Vehicular Network, so it prevents critical information from arriving. For example, if a malicious wants to create a massive pile up on the highway, it can make an accident and use the DoS attack to prevent the warning from reaching to the approaching vehicles 2. Message Suppression Attack: The attacker selectively suppresses some packets from the network, these packets may hold critical information for the receiver, the attacker uses them again in other time. For instance, an attacker may suppress a congestion warning, and use it in another time, so vehicles will not receive the warning and will be forced to wait in the traffic. 3. Fabrication Attack: In this attack, attacker can make this attack by transmitting false Information into the network, the information could be false or the transmitter could claim that it is somebody else. 4. Alteration Attack: This attack happens when attacker alters an existing data, it includes delaying the transmission of the information, replaying earlier transmission, or altering the actual entry of the data transmitted. For instance, an attacker can alter a message telling other vehicles that the current road is clear while the road is congested. 5. Replay Attack: This attack happens when an attacker replay the transmission of an earlier information to take advantage of the situation of the message at time of sending. The goal of such an attack would be to confuse the authorities and possibly prevent identification of vehicles in hit-and-run incidents. 6. Sybil Attack: This attack happens when an attacker creates its multiple identities and claims or acts like it is more than a hundred vehicles, to tell other vehicles that there is jam ahead, and force them to take alternate route. Sybil attack depends on how cheaply identities can be generated, the degree to which the system accepts inputs from entities that do not have a chain of trust linking them to a trusted entity, and whether the system treats all entities identically. 7. Malware: The introduction of malware, such as viruses or worms, into VANETs has the potential to cause serious disruption to its operation. Malware attacks are more likely to be introduced into the network when the onboard units of vehicles and roadside units receive software and firmware updates. 8. Spamming: The presence of spam messages on VANETs elevates the risk of increased transmission latency. Spamming is made more difficult to control because of the absence of a basic infrastructure and centralised administration. 9. Black Hole Attack: A black hole is formed when nodes refuse to participate in the Network or when an established node drops out. When the node drops out, all routes it participated in are broken leading to a failure to propagate messages.

63

Nazish Siddiqui

International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 3, Issue 9 November 2014

10. Masquerading: Masquerading attacks are easy to perform on VANETs as all that is required for an attacker to join the network is a functioning onboard unit. By posing as legitimate vehicles in the network, outsiders can conduct a variety of attacks such as forming black holes or producing false messages. 11. Global Positioning System (GPS) Spoofing: The GPS satellite maintains a location table with the geographic location and identity of all vehicles on the network. An attacker can fool vehicles into thinking that they are in a different location by producing false readings in the GPS positioning system devices. This is possible through the use of a GPS satellite simulator to generate signals that are stronger than those generated by the genuine satellite. 12. Tunneling: An attacker exploits the momentary loss of positioning information when a vehicle enters a tunnel and before it receives the authentic positioning information the attacker injects false data into the onboard unit. B ATTACKERS 1. Selfish Drivers: Some selfish or greedy drivers try to maximize their profit from the network, by taking advantage of the network resources illegally. A Selfish Driver can tell other vehicles that there is congestion in the road, so they must choose an alternate route, so the road will be clear for it. Message Falsification and Message Delay are the type of attacks usually done by these attackers.

2. Malicious Attacker: This kind of attacker tries to cause damage via the applications available on the vehicular network. They are more professional attackers. In many cases, these attackers will have specific targets, and they will have access to the resources of the network. For instance, a terrorist can issue a deceleration warning, to make the road congested before detonating a bomb. 3. Pranksters: Pranksters are especially the bored teenagers who will attempt things for fun.For instance, a prankster can convince one vehicle to slow down, and tell the vehicle behind it to increase the speed. Generally they perform Denial Of Service or Message Alteration attacks. 4. Snoops/Eavesdropper: These people are those who try to collect information about you. While data mining is acceptable over aggregate data, but for identifying information for an individual, that raises serious privacy concerns and is not acceptable. Impersonation is a type of attack done by the snoops. An attacker may take on someone else’s identity and gain certain advantages or cause damage to other vehicles.

5. Industrial Insiders: 64 Nazish Siddiqui

International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 3, Issue 9 November 2014

Industrial insiders are those who stays inside the car manufacturing company Attacks from insiders can be very harmful, and the extent to which vehicular networks are vulnerable will depend on other security design decisions. For example, if mechanics can update the firmware of a vehicle, they also have an opportunity to load malicious firmware. If we allow vehicle manufacturers to distribute keys, then a insider at one manufacturer could create keys that would be accepted by all other vehicles. Hardware Tampering is usually done by the industrial insiders. Attackers can tamper with the security hardware of a vehicle to steal identities as well as extract cryptographic keys. Therefore, specific mechanism like tamper proof hardware needs to be implemented to ensure such attacks cannot be easily accomplished. Sensors tampering are also another easy attack done by the insiders If the main system is tamper proof it is easy to fool the vehicle’s sensors with wrong information by simulating false conditions. Examples include tampering with the GPS system and temperature sensors.

SECURITY REQUIREMENTS IN VANET 1. Authentication: In Vehicular Communication every message must be authenticated, to make sure for its origin and to control authorization level of the vehicles. Authentication is a major requirement in VANET as it ensures that the messages are sent by the actual nodes and hence attacks done by the greedy drivers or the other adversaries can be reduced to a greater extent. 2. Availability: Vehicular network must be available all the time. Many applications need faster response time as a delay of few seconds may make the message meaningless and maybe the result will be devastating. So it must provide Real time guarantee. 3. Integrity: Integrity for all messages should be protected to prevent attackers from altering them, and message contents to betrusted. This is very much required as it ensures that the message is not changed when it is received. 4. Confidentiality: The privacy of each driver must be protected; the messages should be encrypted to prevent outsiders from gaining the drivers information. It is a system which is required when certain nodes wants to communicate in private. 5. Non-repudiation: Non-repudiation will facilitate the ability to identify the attackers even after the attack happens. This prevents cheaters from denying their crimes. In this security based system a sender cannot deny the fact having sent the message. But that doesn’t mean that everyone can identify the sender, only specific authorities should be allowed to identify a vehicle from the authenticated messages it sends.

65

Nazish Siddiqui

International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 3, Issue 9 November 2014

6. Privacy: It is about keeping the information of the drivers away from unauthorized observers. This system is used to ensure that the information is not leaked to the unauthorized people who are not allowed to view the information Third parties should also not be able to track vehicle movements as it is a violation of personal privacy. Location privacy is also important so that no one should be able to learn the past or future locations of vehicles. 7.Access Control:It is required to ensure that all nodes function according to the roles and privileges authorized to them in the network. Towards access control, Authorization specifies what each node can do in the network and what messages can be generated by it.

CHALLENGES IN VANET 1. Authentication V/S Privacy: For authentication of all message transmission, it is required to track the vehicles for the identification of vehicles from the message they send which most consumers will not like others to know about their personal identification therefore this has to come in equilibrium. 2. High Mobility: in Vehicular Ad Hoc Networks nodes moving in high mobility, vehicles make connection throw their way with another vehicles that maybe never faced before, and this connection lasts for only few seconds as each vehicle goes in its direction, and these two vehicles may never meet again. So securing mobility challenge is hard problem. 3. Real Time guarantees: As the major VANET applications are used for collision avoidance, hazard warning and accident warning information, so applications require strict deadlines for message delivery. 4. Location Awareness: Certain location based service is essential for most VANET applications to be truly effective, so that reliance of the VANET system on GPS or other specific location based instruments can be increased as any error in these is likely to effect in the VANET applications. 5. Liability V/S Privacy: Liability will give a good opportunity for legal investigation and this data can’t be denied (in case of accidents). On the other hand the privacy mustn’t be violated and each driver must have the ability to keep his personal information from others (Identity, Driving Path, Account Number for toll Collector etc.). 6. Volatility: The network in Vanet is highly volatile. The connectivity among nodes is temporary, and may be will not happen again, vehicles travelling throw coverage area and making connection with other

66

Nazish Siddiqui

International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 3, Issue 9 November 2014

vehicles, these connections will be lost as each car has a high mobility, and maybe will travel in opposite direction. Vehicular networks lacks the relatively long life context. 5. Network Scalability: The scale of this network in the world approximately exceeding continuously and this number is growing, another problem arise when we must know that there is no a global authority to govern the standards for this network. for example: the standards for DSRC in North America is different from the DSRC standards in Europe, the standards for the GM Vehicles is deferent from the BMW one.

CONCLUSION & FUTURE RESEARCH DIRECTION Vehicular Networks are receiving a lot of attention due to the wide variety of services they can provide. Their applications range from safety and crash avoidance to Internet access and multimedia. A lot of work and research around the globe is being conducted to define the standards for vehicular communications. These include frequency allocation, standards for physical and data link layers, routing algorithms, as well as security issues and new applications. VANET security is an emerging area in which several future research lines can be pointed out. Although several mechanisms have been proposed, some issues still have to be addressed. Several technologies that are proposed and implemented faces the issue of Cost and Time. VANET is an excellent discovery in terms of safety related information but if the information received later, i.e. after a good amount of time then it will be useless to have such system. So reducing time delay should be a prime research topic. Although when it comes to security, cost should not be the matter but still work should be done for the Cost effectiveness of the system.

REFERENCES [1]. Jose Maria de Fuentes, Ana Isabel Gonzalez Tablas, Arturo Ribagorda,“ Overview of

security issues in Vehicular Ad-hoc Networks”,Copyright IGI Global, www.igi-global.com 2010. [2]. Ankita Agrawal, Aditi Garg, Niharika Chaudhiri, Shivanshu Gupta, Devesh Pandey, Tumpa Roy, “Security on Vehicular Ad Hoc Networks (VANET) : A Review Paper” , GLNA Institute of Technology, Mathura, International Journal of Emerging Technology and Advanced Engineering , Volume 3, Issue 1, January 2013. [3]. Ghassan Samara, Wafaa A.H. Al-Salihy, R. Sures, “Security Analysis of Vehicular Ad Hoc

Networks (VANET)” , Second International Conference on Network Applications, Protocols and Services, 2010.

67

Nazish Siddiqui

International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 3, Issue 9 November 2014

[4]. Rizwanul Karim Sakib, Bisway Reza, “SECURITY ISSUES IN VANET” , Department of Electronics and Communication Engineering, BRAC University, Dhaka, Bangladesh, April 16, 2010 [5]. L. Ertaul, S. Mullapudi “ The Security Problems of Vehicular Ad Hoc Networks (VANETs) and Proposed Solutions in Securing their Operations”, Department of Mathematics and Computer Science, California State University, East Bay, Hayward, CA, USA [6]. Ahren Studer, Fan Bai, Bhargav Bellur, Adrian Perrig, “Full Paper: Flexible, Extensible, and Efficient VANET Authentication” CyLab Carnegie Mellon University ,Pittsburgh, PA 15213 March 14, 2008. [7]., Sherali Zeadally · Ray Hunt · Yuh-Shyan Chen · Angela Irwin · Aamir Hassan, “Vehicular ad hoc networks (VANETS): status, results, and challenges”, © Springer Science+Business Media, LLC , December 9 2010.

68

Nazish Siddiqui