Introduction to VANET


Published on

Introduction to VANET technology. A way ti implement Intelligent Transportation System.

Published in: Technology, Business
1 Comment
  • Nice !! Download 100 % Free Ebooks, PPts, Study Notes, Novels, etc @
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • 1. Smart vehicles2. 75 MHz in the 5.9 GHz band licensed for Dedicated Short Range Communication
  • 1. Smart vehicles2. 75 MHz in the 5.9 GHz band licensed for Dedicated Short Range Communication
  • 1. Smart vehicles2. 75 MHz in the 5.9 GHz band licensed for Dedicated Short Range Communication
  • Introduction to VANET

    1. 1. Akanksha Upadhyay M.Tech.
    2. 2. Organization of the Presentation     Introduction to VANET technology VANET Security Threats Challenges in VANET Security Requirements Akanksha Upadhyay 0108CS12MT26
    3. 3. Introduction to VANET Vehicles connected to each others through an ad hoc formation form a wireless network called “Vehicular Ad Hoc Network”. Vehicular ad hoc networks (VANETs) are a subgroup of mobile ad hoc networks (MANETs). It includes V2V communications and V2R communications and is important component of ITS. Nodes are expected to communicate by means of North American DSRC standard that employs the IEEE 802.11p standard for wireless communication. Akanksha Upadhyay 0108CS12MT26
    4. 4. Why VANET • Increase traveler safety o10.8 million vehicle crashes from 1990 to 2009 o36,000 o fatalities in 2009 only 24,000 of these due to collision with other vehicles / objects. o Costs more than $100 billion per year • Boost on-board luxury Akanksha Upadhyay 0108CS12MT26
    5. 5. VANET Akanksha Upadhyay 0108CS12MT26
    6. 6. Architecture V2V V2R Road Side Unit (RSU) Server (Traffic Monitoring) Server (Location Based Service) Akanksha Upadhyay 0108CS12MT26
    7. 7. Applications Akanksha Upadhyay 0108CS12MT26
    8. 8. Applications Akanksha Upadhyay 0108CS12MT26
    9. 9. Characteristics of VANET • • High mobility of nodes Rapidly changing network topology (predictable to some extent) • Unbounded network size • Potential support from infrastructure • Real-time, time-sensitive data exchange • Crucial effect of security and privacy Akanksha Upadhyay 0108CS12MT26
    10. 10. Security in VANETs • When data is compromised, the whole system suffers. • The nature of VANETs could lead to malicious attacks. o Predictable movement of nodes. o High mobility of victim/attacker. • Adversaries could break the system. o Data sinkholes (black hole). o Feed false information. o Sybil attacks. o Flood the system. • Security measures must be taken to avoid malicious attacks on the system. Akanksha Upadhyay 0108CS12MT26
    11. 11. Threats in VANET Threats to Availability Threats to Authentication Threats to driver’s Confidentiality Akanksha Upadhyay 0108CS12MT26
    12. 12. Threats to Availability Akanksha Upadhyay 0108CS12MT26
    13. 13. Threats to Authentication Akanksha Upadhyay 0108CS12MT26
    14. 14. Threats to Confidentiality Because VANET mobility is higher than MANET, routing with capability of ensuring security in VANET is more problematic than Adhoc. Illegal collection of messages by eavesdropping and gathering of location information available through the transmission of broadcast messages. Location privacy and anonymity are important issues for vehicle users . Akanksha Upadhyay 0108CS12MT26
    15. 15. Challenges in VANETs • • • • • Mobility Volatility Privacy VS Authentication Privacy VS Liability Network Scalability Akanksha Upadhyay 0108CS12MT26
    16. 16. Security Requirements • • • • • • • • Message authentication and integrity. Message non-repudiation. Node authentication. Access control. Message confidentiality. Availability Accountability. Privacy protection. Akanksha Upadhyay 0108CS12MT26
    17. 17. Authentication • Every message must be authenticated to make sure its origin and to control authorization level of the vehicles • Vehicles sign messages with their private keys along with digital certificate • Digital signature causes an overhead. To reduce this overhead ECC (Elliptic Curve Cryptography) can be used Akanksha Upadhyay 0108CS12MT26 17
    18. 18. Availability • Vehicular network must be available all the time, in real-time • A delay in seconds for some applications will make the message meaningless and maybe the result will be devastating • Attempting to meet real-time demands makes the system vulnerable to the DoS attack. Akanksha Upadhyay 0108CS12MT26 18
    19. 19. Accountability/Non-repudiation • Non-repudiation will facilitate the ability to identify the attackers even after the attack happens. This prevents cheaters from denying their crimes. • Accountability is related to the ability to provide necessary evidence to show how each party involves in the communications. • Any information related to the car, e.g. the trip route, speed, time, any violation will be stored in a tamper-proof OBU, any official side holding authorization can retrieve this data. Akanksha Upadhyay 0108CS12MT26 19
    20. 20. Privacy • Keeping the information of the drivers away from unauthorized observers, this information like real identity, trip path, speed etc… • The privacy could be achieved by using temporary (one-time) keys. Keys are stored in the tamper-proof OBU. The keys will be reloaded in next time that the vehicle makes an official checkup. • For preserving the real identity of the driver, an ELP (Electronic License Plate) is used, this license is installed in the factory for every new vehicle, it provides an identification number for the vehicle, to identify the vehicle in anywhere, with the RFID technology to hold the ELP. • In case when the police or any official wants the real identity, it can take an order from the judge to recover the identity of specific vehicles ELP. Akanksha Upadhyay 0108CS12MT26 20
    21. 21. Secure Routing Requirements • Two major routing categories: o ID based. o Geography based. • Depending on the needs, each category has its advantages. o ID methods are for sending data to an individual node. o Geography methods are for sending data to a group of nodes. Akanksha Upadhyay 0108CS12MT26 21
    22. 22. Thanks!!