IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 134-139

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Security Challenges and Attacks in Vehicular Ad hoc Network Er. Geetika Sharma1, Er. Tamanna Narula2 Assistant Professor, Department of Computer Science, Chandigarh University Gharaun,Mohali,India [email protected]

1

2

Assistant Professor, Department of Computer Science, Chandigarh University Gharaun,Mohali,India [email protected] Abstract

A Vehicular Ad hoc Network is a collection of mobile hosts forming a temporary network without the aid of any established infrastructure. This exibility in space and time induces new challenges towards the security needed to support secure communications. VANETs are being used to improve road safety and enable a wide variety of value-added services. Here we discuss some of the main security threats and attacks that can be exploited in VANETs. The main contribution of this paper is to classify and identify different types of attacks in VANET. For the implementation of VANET, security is an important constraint. Most of the research concerted efforts in academics and industry are focused to provide efficient security architecture for VANET; to protect the network from adversary nodes and attacks. This paper focuses on the security challenges in VANET, especially for achieving privacy and their possible solutions.

Keywords - Vehicular Ad hoc Network (VANET), attackers, attacks, Security.

1. INTRODUCTION Mobile Ad Hoc Networks have undergone incredible growth of popularity during the last years. One of the most practical example of these networks is Vehicular Ad Hoc Network (VANET).[7] A Vehicular Adhoc network (VANET),a form of Mobile Adhoc Networks (MANETs), provides communication among nearby vehicles, between vehicles and nearby fixed equipments called Road Side Units (RSUs).The use of wireless communication in VANET implies an always increasing number of potential applications in these networks such as driving assistance, road traffic information or emergency braking alert. All these applications need to exchange data with other vehicles that may be related to the driver safety. Fig. 1 shows the VANET architecture. Every node i.e., a vehicle or RSU communicates with other nodes in single hop or multi hop. VANETs are designed with the goals of enhancing driving safety and providing passenger comfort. In VANETs, the types of communication are the following: • Vehicle-to-Vehicular (V-V) or Inter-Vehicular Communication •

Vehicle-to-Infrastructure (V-I) or Vehicle-to-Roadside Communication



Inter Roadside Communication.

Fig 1. VANET Architecture Er. Geetika Sharma, IJRIT

134

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 134-139

2. SECURITY CHALLENGES IN VANET VANET poses a number of the foremost difficult issues in wireless ad hoc and detector network analysis. additionally, the problems on VANET security become more challenging due to the distinctive options of the network, like high-speed quality of network entity or vehicle, and extremely great amount of network entities specifically, it's essential to create sure that “lifecritical safety” data can't be inserted or changed by an attacker; likewise, the system ought to be ready to help establishing the liability of drivers; however at a similar time, it ought to protect as way as possible the privacy of the drivers and passengers[5]. It is obvious that any malicious behavior of users, like a modification and replay attack with regard to the disseminated messages, might be fatal to alternative users [2]. VANET security ought to satisfy the following needs:-

Message Authentication and Integrity: Message should be protected against any alteration and therefore the receiver of a message should corroborate the sender of the message. However integrity doesn't essentially imply identification of the sender of the message. Message Non-Repudiation: The sender cannot deny of sent an information message. Entity Authentication: The receiver isn't solely ensured that the sender generated a message, however additionally has evidence of the liveness of the sender. Access Control: Access to specific services provided by the infrastructure nodes, or different nodes, is decided locally by police. As a part of access management, authorization establishes what every node is allowed to try and do in VANET. Message Confidentiality: The information of a message is kept secret from unauthorized to access it. Availability: The network and applications ought to stay operational even within the presence of faults or malicious conditions. This means not solely secure however additionally fault-tolerant styles, resilience to resource depletion attacks, further as survivable protocols, that resume their traditional operations when the removal of the faulty participants. Privacy and Anonymity: Conditional privacy should be achieved within the sense that the user connected info, as well as the driver’s name, the license plate, speed, position, and traveling routes at the side of their relationships, has got to be protected; whereas the authorities ought to be ready to reveal the identities of message senders within the case of a dispute like a crime/car accident scene investigation, which may be accustomed hunt for witnesses. Liability Identification: Users of vehicles are liable for their deliberate or accidental actions that disrupt the operation of other nodes, or the transportation system. Several attacks are known which will be classified depending on the layer the attacker uses. At the physical layer and link layers the attacker will disturb the system either by jamming or overloading the channel with messages. Flooding false messages or rebroadcasting a recent message is also an attainable attack. Jamming: The jammer deliberately generates interfering transmissions that prevent communication within their reception range. In the VANET scenario, an attacker can relatively easily partition the network, without compromising cryptographic mechanisms and with limited transmission power. Impersonation: An attacker can masquerade as an emergency vehicle to mislead other vehicles to slow down and yield. An adversary can also impersonate Road Side Units, spoofing service advertisements or safety messages. So an impersonator can be a threat. Message fabrication, alteration, and replay can all be used towards impersonation.

3. ATTACKS IN VANET In VANET, there are some problematic issues most of which are flied around security issues such as data integrity, privacy, and confidentiality. Moreover, there are some issues which can influence the efficiency of VANET such as unpredictable temporary situations (e.g. creating traffic jam because of an accident). The security of VANETs is one of the most critical issues because their information transmission is propagated in open access environments. It is necessary that each one transmitted information cannot be modified by users who have malicious goals. Moreover, the system must be able to detect the obligation of drivers while still maintaining their privacy. There are so many different kinds of attacks [1] that we cannot enumerate every possible one. The most obvious attack we can imagine may be an adversary send some false information and try to convince other drivers and the system. Due to the nature of open wireless medium used in VANET, there are a different type number of possible attacks by that the VANET is exposed to[5]. The purpose of the attackers is to create problem for legal users, and as a result services are not readily available, thus denial of service. Some of the attacks are mentioned below. I. Sybil Attack : Sybil attack is a kind of impersonation, where multiple identities of the attacker node are present. With several entities in the network it will be able to reduce the effectiveness of fault-tolerant schemes. Fig. 2 shows the Sybil nodes assuming multiple personalities of the attacker node. • In Sybil attack, a malicious node fabricates different identities in the form of multiple nodes. •

These fabrications mislead neighbouring vehicles by communicating with other physical nodes and distributing false traffic information (e.g., traffic jam or accidents).



This attack is very dangerous in geographical routing because a node can claim to be in several positions at the same time[8].

Er. Geetika Sharma, IJRIT

135

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 134-139

Fig 2. Sybil Attack II.

Node Impersonation :Impersonation is an endeavor by a node to send a changed version of a message received from the $64000 mastermind for the incorrect purpose and claim the message has come back from the mastermind. To beat this downside, a novel symbol is appointed to every vehicle node in VANET, which can be wont to verify the $64000 message mastermind. Police might use it to spot the motive force because it is related to driver’s identity[3]. It’s necessary to guard this symbol in order that it cannot be misused by the assaulter.

III.

IV.

V.

Message Suppression Attack: This attack happens when the attacker selectively dropping packets from the network, packets may have bearing important information for the receiver, packets are suppress by the attacker and use them again in other time [4]. The aim of such an attacker would be to prevent insurance and registration authorities from knowing about collisions involving his vehicle and to avoid sending collision reports to RSU [6]. Fabrication Attack : In this attack, false information are transmitting into the network by an attacker, the transmitter could claim that somebody else are sending information and that information is false as well. Fabricate warnings, Identities, messages, certificates, etc are included in this attack [2], [4] ,[6]. Alteration Attack :An attacker alters an existing data in a network. This attack includes replaying earlier transmission, altering the actual entry of the data transmitted, or delaying the transmission of the information [4]. For instance, message is alter by an attacker that “Current road is clear” and send this to other nodes, but actually there is congestion on that place [6].

Fig 3: Aleration Attack VI.

VII.

VIII.

Black Hole Attack : In this problem a node refuses to participate in the network or when an established node drops out to form a black hole. In this all the traffic of the network gets redirected towards a specific node which is actually doesn’t exist which results in data lost. The malicious code picks whether to drop a packet to perform a denial-ofservice attack or to use its place on the route as the first step in a man-in-the-middle attack [18]. ID Disclosure : It is a passive attack. During this attacker send the malicious code to the neighbors of the target node and collects the desired information. They take the ID of the target node and its current location. Due to this target vehicle’s ID are disclosed and that they lose their privacy. In this global observer will access their information by observance the route of the target vehicle. For this purpose attacker will use the RSU (Road side Unit). Man in the middle attack : The attacker sits in the middle of the two communicating vehicle and launch this attack. In this type of attacker control all the communication between the sender and the receiver but communicating Er. Geetika Sharma, IJRIT

136

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 134-139

IX.

X.

vehicles assume they are directly communicating with each other [19]. In MIMA attacker listen the communication between the vehicles and inject false or modified message between the vehicles. Brute force :Key management deals with the secure generation, distribution and storage of keys. For ad hoc networks, the current literature reports three main approaches for key management: key exchange, key agreement and key management infrastructure. The distribution of safety-related information (such as turn warnings, speed limit information, etc.) is a major application of VANET. In VANET communication, keys are used for encrypting data. Brute force attack is an exhaustive key search strategy by checking all possible key values [15]. If the confidentiality of the keys is lost, the identity of the vehicle is lost. Integrity and authenticity of the node is also compromised. Sinkhole attack : In sinkhole attacks, all the traffic from a particular area goes through the attacker node. Therefore, the attacker will have control over the traffic, enabling the occurrence of many other attacks, such as selective forwarding. Fig. 4 shows the malicious node transferring the data to the sink node. Wormhole attacks can be considered as a subclass of sinkhole attacks, where two nodes create a tunnel between them and forward the packets through it. This can be useful to lure a node of a better path to the destination[8].

Fig. 4. Sinkhole Attack XI.

Illusion attack : Illusion attack is a new security threat on VANET applications where the adversary intentionally deceives sensors on her/his own vehicle to produce wrong sensor readings [9]. As a result, the corresponding system reaction is invoked and incorrect traffic warning messages are broadcasted to neighbours, creating an illusion condition on VANET. An attacker must create a virtual traffic event to produce an illusion attack. Two prerequisite conditions must be achieved by the attacker to create the virtual traffic event. The first condition is to realise or create the prerequisite traffic situation on the road. Second, the false traffic warning messages should be generated and distributed by the attacker. The traditional message authentication and integrity check used in wireless networks are inadequate against the illusion attack. Fig. 5 shows how the concept of Illusion attack is brought in VANETs.

Fig 5. Illusion Attack XII.

Denial of service (DOS) attack : In DOS [10] the most objective is to prevent the legitimate user from accessing the network services and from network resources. DOS attack will occur by jam the channel system so no authentic vehicle will access it.In VANET it's most major problem because the user cannot communicate within the network and pass data to other vehicle that could result in a lot of devastation in life important applicationIn this type of attack, typically the attacker attacks the communication medium to cause the channel jam or to create some problems for the nodes from accessing the network. The main purpose of the attacker is to prevent authentic nodes from accessing the network services and from using the network resources. The attacker may attack either vehicular nodes or network infrastructure i.e. RSU (access points) and sometimes both.

Er. Geetika Sharma, IJRIT

137

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 134-139

Fig.6 DOS Attack XIII.

Distributed Denial of service Attack: In this case attacker launches DOS attacks from different locations. The attackers may use different time slots/slices for sending the messages and the nature of the messages and time slot may be varied from vehicle to vehicle of the attackers. The aim of the attacks is to down the network as that of in DOS attack. In this case also, attacker may attack both vehicular nodes and infrastructure.[11]

Fig. 6 DDOS Attack

4. Conclusion and Future work In this paper various attacks in VANET have been classified. It has been observed that the classification helps to deal with different types of attack on VANET. Due to recent improvements in connecting vehicles to external networks, proper security mechanisms must be developed in parallel to reduce the risk of malicious and unauthorized behavior in the vehicular network domain. Users require safety on road in future vehicular network and it could be possible by implementing VANET applications. We expect that the proposed attacks classes may helpful to identify attacks and understand attackers. It is difficult to control attackers but in future work we will develop such system to identify attacks in network with respect to some specific type of attack. Implementation could be easy of this future human life saving network if we control attackers and their attacks. In this work, we have analyzed the attacks that VANETs can be subjected to. And a brief summary of the security attacks we have identified that may be launched on VANETs. I hope that this survey will enable VANET designers and developers to build more secure and robust VANET architectures, protocols and applications in the future.

5. REFERENCES [1] Farrukh Shahzad, Amir Qayyum, Rashid Mehmood," A Survey on Security in Vehicular Ad Hoc Networks Saira Gillani", Communication Technologies for Vehicles, Springer Berlin Heidelberg, pp. 59-74, 2013. [2] Tim Leinmuller, Elmar Schoch, and Christian Maihofer, “Security Requirements and Solution Concepts in Vehicular Ad Hoc Networks”, Proceedings of Forth Annual Conference on Wireless on Demand Network Systems and Services Oberguyrgl,pp.84-91, 2007 [3] P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, M. Zhendong, F. Kargl, A. Kung, J-P Hubaux, “Secure vehicular communication system : Design and Architecture Communications” IEEE Magazine, November 2008,vol. 46, pp. 100-109. [4] S. Jaap, M. Bechler and L. Wolf, "Evaluation of Routing Protocols for Vehicular Ad Hoc Networks in City Traffic Scenarios," Proceedings ofthe 5th International Conference on Intelligent Transportation Systems Telecommunications (ITST), Brest, France, June 2005. [5] Ayonija Pathre,Chetan Agrawal, Anurag Jain,” Identification of malicious vehicle in vanet environment from ddos attack”, Journal of Global Research in Computer Science, Volume 4, No. 6, June 2013 Er. Geetika Sharma, IJRIT

138

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 134-139 [6] M. Bakhouya and N. Cottin, “Performance Evaluation of the Locationbased Protocol DREAM for Large Mobile Ad hoc Networks”, In New Technologies, Mobility and Security, NTMS'08 [7] Mohamed Salah Bouassida, Gilles Guette, Mohamed Shawky, and Bertrand Ducourthial,” Sybil Nodes Detection Based on Received Signal Strength Variations within VANET”, International Journal of Network Security, Vol.9, No.1, PP.22{33, July 2009 [8] Maria Elsa Mathew and Arun Raj Kumar P.,”Threat Analysis and Defence Mechanisms in VANET” International Journal of Advanced Research in Computer Science and Software Engineering”, Volume 3, Issue 1, January 2013 [9] Nai-Wei Lo, Hsiao-Chien Tsai,”Illusion Attack On VANET Applications – A Message Plausibility Proble, Global Workshops”, IEEE 2007 [10]Cencioni P., Di Pietro R., ―A Mechanism To Enforce Privacy In Vehicle-To-Infrastructure Communication‖, (2008) Computer. Commun (12), pp. 2790–2802. [11] Adil Mudasir Malla, Ravi Kant Sahu,” Security Attacks with an Effective Solution for DOS Attacks in VANET”, International Journal of Computer Applications ,Volume 66– No.22, March 2013. [12] Sumit A. Khandelwal, Ashwini B Abhale,” Topology base Routing Attacks in Vehicular Ad hoc Network – Survey”, International Journal of Advanced Research in Computer Science and Software Engineering,Volume 3, Issue 11, November 2013 [13] Ali Hamieh, Jalel Ben-Othman, Lynda Mokdad, “Detection of Radio Interference Attacks in VANET”, IEEE "GLOBECOM" 2009 [14] J. Jakubiak, Y. Koucheryavy, ”State of the Art and Research Challenges for VANETs”, 5th IEEE Consumer Communications and Networking Conference, 10-12 Jan. 2008, pp. 912-916. [15] Y. Qian, N. Moayeri, ”Design of Secure and Application Oriented VANETs”, IEEE Vehicular Technology Conference 2008, 11-14 May 2008, Singapore. [16] I Aad, JP Hubaux, EW Knightly, ”Impact of Denial of Service Attacks on Ad Hoc networks”, Networking, IEEE/ACM Transactions on Volume 16, August, 2008 [17] Aditya Sinha, Prof. Santosh K. Mishra,” Preventing VANET From DOS & DDOS Attack”, International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 10- Oct 2013. [18] Subir Biswas, Jelena Miˇsi´c, Vojislav Miˇsi´c “DDoS Attack on WAVE-enabled VANET Through Synchronization”, Communication and Information System Security Symposium -Globecom 2012. [19] J. Blum, A. Eskandarian, ”The Threat of Intelligent Collisions”, IT Professional, IEEE Computer Society, 2004.

Er. Geetika Sharma, IJRIT

139

Security Challenges and Attacks in Vehicular Ad hoc ...

DOS attack will occur by jam the channel system so no authentic vehicle will access it.In VANET it's most major problem because the user cannot communicate within the network and pass data to other vehicle that could result in a lot of devastation in life important applicationIn this type of attack, typically the attacker attacks ...

174KB Sizes 1 Downloads 195 Views

Recommend Documents

Simulation of Mobility Models in Vehicular Ad hoc ...
take place freely in the open area. Indeed ... Software Organization & MonIToring of Ambient Systems Work- shop. ..... SUMO is an open-source application im-.

Critical Data Validation in Vehicular Ad Hoc Networks
Assumptions. • Each vehicle is equipped with GPS (Global Positioning System), sensors, networking devices, digital map which has the road segment information, and computing devices. • Technology used for communication is WiFi. • Length of each

Simulation of Mobility Models in Vehicular Ad hoc ...
of mobile nodes tracking a particular target, which may be either static or move ... it uses real maps obtained from the TIGER/Lines database. [11]. For each route ...

Interlayer Attacks in Mobile Ad Hoc Networks
attacks initialized at MAC layer but aiming at ad hoc routing mechanisms and also .... lines in the figure represent the physical connections between each pair of ...

Routing Architecture for Vehicular Ad-Hoc Networks - Sites
applications of vehicular networks [6], also providing services with the possible link ... Figure 1 is the proposed architecture for VANETs. The routing protocols ...

Mobile ad hoc networking: imperatives and challenges
each other, but can also receive Internet services through .... Location Based Services include finding nearest service providers, such as restaurant or cinema;.

4.Security in Mobile Ad-hoc Networks.pdf
Security in Mobile Ad-hoc Networks.pdf. 4.Security in Mobile Ad-hoc Networks.pdf. Open. Extract. Open with. Sign In. Main menu.

Improving Security and Performance of an Ad Hoc ...
munications systems, the Research Community focused its effort on security and. ⋆ The work of ... privacy to wireless Mobile Ad Hoc networks (MANETs). ...... For a text file, it is simply not possible, we could loose information which prevents the 

An Efficient and Reliable MAC for Vehicular Ad Hoc ...
MAC. Duc Dang, Hanh Dang, Cuong Do and ChoongSeon Hong. An Efficient and ..... Receiver selects the "best" TxSlot and then sends the ACK indicating the ...

Routing in Ad-Hoc Networks
generate a significant amount of network control traffic when the topology of the network changes frequently. Lastly, packets can .... time, which happens very often in radio networks due to collisions or other transmission problems. In addition, OLS

Mobile Ad hoc Network Security Issues - International Journal of ...
IJRIT International Journal of Research in Information Technology, Volume 3, ... Among all network threats, Distributed Denial of Service (DDoS) attacks are the ...

Mobile Ad hoc Network Security Issues - International Journal of ...
IJRIT International Journal of Research in Information Technology, Volume 3, ... A Mobile Ad-hoc Network (MANET) is a dynamic multi hop wireless network ...

Elixir Ad Hoc Designer
Current export formats include exporting as HTML webpage, an Adobe Acrobat PDF document ... and Remote designer for more details and available classes.

Modelling cooperation in mobile ad hoc networks: a ...
one. However, the general approach followed was proposing a mechanism or a protocol ... network with probability one. ... nodes from all the network services.

Mitigating starvation in Wireless Ad hoc Networks: Multi ...
sage indicating the transmission power Pd. Upon receiving the ATIM-ACK, node S ..... mation Computing Development Program through the Na- tional Research ...

Overhearing-aided Data Caching in Wireless Ad Hoc Networks
Abstract—The wireless ad hoc network is a promising networking technology to provide users with various network services anywhere anytime. To cope with resource constraints of wireless ad hoc networks, data caching is widely used to efficiently red

Connected k-Hop Clustering in Ad Hoc Networks
information transmission flooding could be confined within each cluster. In an ad ...... dominating set (CDS) to carry out data propagation. Find- ing a minimum ...

Secure Anonymous routing in Ad Hoc networks
vulnerable to packet type analysis attacks thus do not provide complete ... requiring operations, this goal effectively means that the protocol should make ...

Certificate Status Validation in Mobile Ad-Hoc Networks
nodes that can be connected or disconnected from the Internet. On the other hand, trust and security are basic requirements to support business ... Like in PGP, the nodes build trust paths certifying from one node to other, as in a .... knowledge of

Throughput Versus Routing Overhead in Large Ad Hoc ...
Consider a wireless ad hoc network with n nodes distributed uniformly on ... not made or distributed for profit or commercial advantage and that copies bear this ...

Stimulating Cooperative Diversity in Wireless Ad Hoc ...
pricing game that stimulates cooperation via reimbursements to the relay. ... service prices, one for each source-relay pair in the network. These prices are ...