3. WHAT IS VANET?
A VANET, is a technology that uses moving cars as
nodes in a network to create a mobile network.
It is used toprovide communications among nearby
vehicles and between vehicles and nearest fixed
equipment, usually described as roadside equipment.
“VANET make transportation systems more intelligent”
4. What is a VANET ?
• Communication patterns
– Roadside-to-Vehicle
Communications ( RVC or
V2I)
– Inter-Vehicle
Communications ( IVC or
V2V)
Roadside
base station
Inter-vehicle
communications
Vehicle-to-roadside
communications
Emergency
event
Roadside
units (RSU)
roadside -to-vehicle
communications
5. Why do we need VANET?
• Safety is the primary incentive
Hundreds of thousands of people are killed world- wide
due to road accidents yearly.
Many more areinjured.
Traffic Optimization
Congestion/traffic jams cost time andfuel.
• Infotainment applications
– Traffic information, location of gas stations, Internet access
DSRC (Dedicated Short Range Communications ) is the
heart of the technology advance
6. Introduction – DSRC
• A short range communication system for safety and
infotainment applications in both roadside-to-vehicle and
vehicle-to-vehicle environment
• Designed to provide the high data transfer rates and
minimum latency in the communication link
• Federal Communication Commission allocated
5.9 GHz band (5.850-5.925 GHz) for DSRC to be used
by Intelligent Transportation Systems
7. Introduction – 5.9 GHz DSRC
• IEEE 802.11p
– an approved amendment to
the IEEE 802.11 standard to
add wireless access in
vehicular environments
(WAVE)
•IEEE 1609
– a higher
layer standard on IEEE
802.11p
DSRC ALLOWS:
Position
Direction
Speed
DSRC Adoption:
10 % by 2018
70 % by 2027
8. Differences from MANET
MANET
Unicast and Multicast
protocols in MANETs
Majority of nodes in MANETs
dependent on batteries fortheir
energy.
Unavailability of infrastructure
VANET
VANETs use broadcasting to
provide important controland
route establishment.
VANET nodes are vehicles, so
there are less power andstorage
constraints.
Fixed infrastructure forVANETs
9. Vehicular Communication
VANET communicates through Wireless Accessfor
Vehicular Environments (WAVE).
The WAVEuses different types of Wireless
Commutation devices such as (Wi-Fi / Wi-Max).
The sensors or wireless devices can form a VANET
network which resides on top of the vehicle.
11. Staircase approach: An application can select among
multiple service access points to lower layers.
Single-hop layer: communication to directradio
neighbors.
Multi-hop layer :forwarding packets to non
neighbored nodes using neighbors asforwarders.
Information connector: offering an interface to
events such as “Position Update Events” or “Neighbor
Position Change Events”.
12. IMPLEMENTING PROTOCOLS
In cases of emergencies, the protocol is used to open an instant
communication channel with the vehicle in the most dangerous
situation.
Unicast information packed ina broadcast protocol
Belongs to: Reliable Protocols fora Specific Purpose
14. Problems in VANET
• Bogus information
– Attackers diffuse false information to affect the
behavior of other drivers
V changes its
route and frees
the road
A2 sends a false
message with1
2
traffic info
15. Problems in VANET
• ID disclosure
– Attackers tracks vehicles to obtain those drivers’
private information
1
*A at (x1,y1,) at time t1
*A communicates with B
2
*A refuels at time t2 and
location (x2,y2)
3
*A enters the parking lot at time
t3
*A downloads from Server x
16. Problems in VANET
• Masquerade
– Attackers use false identities to pretend
another vehicles
SLOW
DOWN
The way
is clear
17. Problems in VANET
• Denial of Service
– Attackers want to bring down the
VANET
Jammer
Roadside unit
18. Security Requirements
•
•
•
•
•
• Authentication
– Authenticate legitimate OBUs and senders of messages
Message Integrity
– Ensure data integrity
Privacy
– Provide message unlinkability and prevent driver’s tracking
Traceability and revocation
– Trace and disable abusing OBUs by the authority
Availability
– Provide network availability under jamming attacks
Efficiency
– Impose low computation and communication overheads
due to constraints on time
19. Assumptions
Roadways are divided
into geographic regions
Trusted authorities
–
– Define regions to
identify thepositions of
the RSUs
Issue certificates to
RSUs and OBUs OBU
OBU
20. Assumptions
RSUs
–
–
– Act as the regional authorities
for their regions
Are the tamper-proof devices
Get a copy of the authority’s
public key
OBUs
– Know their current location
• GPS provides enough accuracy
– Know how to contact a RSU
Get a copy of the authority’s
public key
– OBU
OBU
21. Discussions and Conclusions
• VANET security is an emerging area
• As different VANET protocols and applications are
based on different assumptions, a common evaluation
framework is needed to compare different security
research contributions
• Detection of malicious vehicles is still a challenge
• Multicast source authentication which essentially
guarantees that the received data is sent from the
claimed source
22. References
R. Chen, D. Ma, and A. Regan, “TARI: Meeting delay
requirements in VANETs with efficient authentication and
revocation,” In Proceedings of WAVE, 2009
A. Perrig, R. Canetti, D. Tygar, D. Song, “The TESLA broadcast
authentication protocol,” CryptoBytes, vol. 5,2002
www.wikipedia.com
Security and Privacy in VANET:A Survey by Muhammed
Sameer,Jun Liang.