Your SlideShare is downloading. ×
Introduction to VANET
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Introduction to VANET

7,477
views

Published on

Introduction to VANET technology. A way ti implement Intelligent Transportation System.

Introduction to VANET technology. A way ti implement Intelligent Transportation System.

Published in: Technology, Business

0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
7,477
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
666
Comments
0
Likes
5
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • 1. Smart vehicles2. 75 MHz in the 5.9 GHz band licensed for Dedicated Short Range Communication
  • 1. Smart vehicles2. 75 MHz in the 5.9 GHz band licensed for Dedicated Short Range Communication
  • 1. Smart vehicles2. 75 MHz in the 5.9 GHz band licensed for Dedicated Short Range Communication
  • Transcript

    • 1. Akanksha Upadhyay M.Tech.
    • 2. Organization of the Presentation     Introduction to VANET technology VANET Security Threats Challenges in VANET Security Requirements Akanksha Upadhyay 0108CS12MT26
    • 3. Introduction to VANET Vehicles connected to each others through an ad hoc formation form a wireless network called “Vehicular Ad Hoc Network”. Vehicular ad hoc networks (VANETs) are a subgroup of mobile ad hoc networks (MANETs). It includes V2V communications and V2R communications and is important component of ITS. Nodes are expected to communicate by means of North American DSRC standard that employs the IEEE 802.11p standard for wireless communication. Akanksha Upadhyay 0108CS12MT26
    • 4. Why VANET • Increase traveler safety o10.8 million vehicle crashes from 1990 to 2009 o36,000 o fatalities in 2009 only 24,000 of these due to collision with other vehicles / objects. o Costs more than $100 billion per year • Boost on-board luxury Akanksha Upadhyay 0108CS12MT26
    • 5. VANET Akanksha Upadhyay 0108CS12MT26
    • 6. Architecture V2V V2R Road Side Unit (RSU) Server (Traffic Monitoring) Server (Location Based Service) Akanksha Upadhyay 0108CS12MT26
    • 7. Applications Akanksha Upadhyay 0108CS12MT26
    • 8. Applications Akanksha Upadhyay 0108CS12MT26
    • 9. Characteristics of VANET • • High mobility of nodes Rapidly changing network topology (predictable to some extent) • Unbounded network size • Potential support from infrastructure • Real-time, time-sensitive data exchange • Crucial effect of security and privacy Akanksha Upadhyay 0108CS12MT26
    • 10. Security in VANETs • When data is compromised, the whole system suffers. • The nature of VANETs could lead to malicious attacks. o Predictable movement of nodes. o High mobility of victim/attacker. • Adversaries could break the system. o Data sinkholes (black hole). o Feed false information. o Sybil attacks. o Flood the system. • Security measures must be taken to avoid malicious attacks on the system. Akanksha Upadhyay 0108CS12MT26
    • 11. Threats in VANET Threats to Availability Threats to Authentication Threats to driver’s Confidentiality Akanksha Upadhyay 0108CS12MT26
    • 12. Threats to Availability Akanksha Upadhyay 0108CS12MT26
    • 13. Threats to Authentication Akanksha Upadhyay 0108CS12MT26
    • 14. Threats to Confidentiality Because VANET mobility is higher than MANET, routing with capability of ensuring security in VANET is more problematic than Adhoc. Illegal collection of messages by eavesdropping and gathering of location information available through the transmission of broadcast messages. Location privacy and anonymity are important issues for vehicle users . Akanksha Upadhyay 0108CS12MT26
    • 15. Challenges in VANETs • • • • • Mobility Volatility Privacy VS Authentication Privacy VS Liability Network Scalability Akanksha Upadhyay 0108CS12MT26
    • 16. Security Requirements • • • • • • • • Message authentication and integrity. Message non-repudiation. Node authentication. Access control. Message confidentiality. Availability Accountability. Privacy protection. Akanksha Upadhyay 0108CS12MT26
    • 17. Authentication • Every message must be authenticated to make sure its origin and to control authorization level of the vehicles • Vehicles sign messages with their private keys along with digital certificate • Digital signature causes an overhead. To reduce this overhead ECC (Elliptic Curve Cryptography) can be used Akanksha Upadhyay 0108CS12MT26 17
    • 18. Availability • Vehicular network must be available all the time, in real-time • A delay in seconds for some applications will make the message meaningless and maybe the result will be devastating • Attempting to meet real-time demands makes the system vulnerable to the DoS attack. Akanksha Upadhyay 0108CS12MT26 18
    • 19. Accountability/Non-repudiation • Non-repudiation will facilitate the ability to identify the attackers even after the attack happens. This prevents cheaters from denying their crimes. • Accountability is related to the ability to provide necessary evidence to show how each party involves in the communications. • Any information related to the car, e.g. the trip route, speed, time, any violation will be stored in a tamper-proof OBU, any official side holding authorization can retrieve this data. Akanksha Upadhyay 0108CS12MT26 19
    • 20. Privacy • Keeping the information of the drivers away from unauthorized observers, this information like real identity, trip path, speed etc… • The privacy could be achieved by using temporary (one-time) keys. Keys are stored in the tamper-proof OBU. The keys will be reloaded in next time that the vehicle makes an official checkup. • For preserving the real identity of the driver, an ELP (Electronic License Plate) is used, this license is installed in the factory for every new vehicle, it provides an identification number for the vehicle, to identify the vehicle in anywhere, with the RFID technology to hold the ELP. • In case when the police or any official wants the real identity, it can take an order from the judge to recover the identity of specific vehicles ELP. Akanksha Upadhyay 0108CS12MT26 20
    • 21. Secure Routing Requirements • Two major routing categories: o ID based. o Geography based. • Depending on the needs, each category has its advantages. o ID methods are for sending data to an individual node. o Geography methods are for sending data to a group of nodes. Akanksha Upadhyay 0108CS12MT26 21
    • 22. Thanks!!