SlideShare a Scribd company logo
1 of 23
PRESENTED BY:
AKASH KUMAR CHAUBEY(MCA/25014/18)
TOPIC: ARCHITECTURE ANDSECURITYIN VANET
OUTLINE
 Introduction
 Vehicular Communication
 VANET Architecture
 Characteristics
 Security
 Conclusion
 References
WHAT IS VANET?
 A VANET, is a technology that uses moving cars as
nodes in a network to create a mobile network.
 It is used toprovide communications among nearby
vehicles and between vehicles and nearest fixed
equipment, usually described as roadside equipment.
 “VANET make transportation systems more intelligent”
What is a VANET ?
• Communication patterns
– Roadside-to-Vehicle
Communications ( RVC or
V2I)
– Inter-Vehicle
Communications ( IVC or
V2V)
Roadside
base station
Inter-vehicle
communications
Vehicle-to-roadside
communications
Emergency
event
Roadside
units (RSU)
roadside -to-vehicle
communications
Why do we need VANET?
• Safety is the primary incentive
Hundreds of thousands of people are killed world- wide
due to road accidents yearly.
Many more areinjured.
 Traffic Optimization
Congestion/traffic jams cost time andfuel.
• Infotainment applications
– Traffic information, location of gas stations, Internet access
DSRC (Dedicated Short Range Communications ) is the
heart of the technology advance
Introduction – DSRC
• A short range communication system for safety and
infotainment applications in both roadside-to-vehicle and
vehicle-to-vehicle environment
• Designed to provide the high data transfer rates and
minimum latency in the communication link
• Federal Communication Commission allocated
5.9 GHz band (5.850-5.925 GHz) for DSRC to be used
by Intelligent Transportation Systems
Introduction – 5.9 GHz DSRC
• IEEE 802.11p
– an approved amendment to
the IEEE 802.11 standard to
add wireless access in
vehicular environments
(WAVE)
•IEEE 1609
– a higher
layer standard on IEEE
802.11p
DSRC ALLOWS:
Position
Direction
Speed
DSRC Adoption:
10 % by 2018
70 % by 2027
Differences from MANET
MANET
 Unicast and Multicast
protocols in MANETs
 Majority of nodes in MANETs
dependent on batteries fortheir
energy.
 Unavailability of infrastructure
VANET
 VANETs use broadcasting to
provide important controland
route establishment.
 VANET nodes are vehicles, so
there are less power andstorage
constraints.
 Fixed infrastructure forVANETs
Vehicular Communication
 VANET communicates through Wireless Accessfor
Vehicular Environments (WAVE).
 The WAVEuses different types of Wireless
Commutation devices such as (Wi-Fi / Wi-Max).
 The sensors or wireless devices can form a VANET
network which resides on top of the vehicle.
VANET ARCHITECTURE
 Staircase approach: An application can select among
multiple service access points to lower layers.
 Single-hop layer: communication to directradio
neighbors.
 Multi-hop layer :forwarding packets to non
neighbored nodes using neighbors asforwarders.
 Information connector: offering an interface to
events such as “Position Update Events” or “Neighbor
Position Change Events”.
IMPLEMENTING PROTOCOLS
In cases of emergencies, the protocol is used to open an instant
communication channel with the vehicle in the most dangerous
situation.
 Unicast information packed ina broadcast protocol
 Belongs to: Reliable Protocols fora Specific Purpose
VANET Characteristics
High mobility nodes
Dynamic Network Topology
No problem with power
Network Strength
Large Network
Problems in VANET
• Bogus information
– Attackers diffuse false information to affect the
behavior of other drivers
V changes its
route and frees
the road
A2 sends a false
message with1
2
traffic info
Problems in VANET
• ID disclosure
– Attackers tracks vehicles to obtain those drivers’
private information
1
*A at (x1,y1,) at time t1
*A communicates with B
2
*A refuels at time t2 and
location (x2,y2)
3
*A enters the parking lot at time
t3
*A downloads from Server x
Problems in VANET
• Masquerade
– Attackers use false identities to pretend
another vehicles
SLOW
DOWN
The way
is clear
Problems in VANET
• Denial of Service
– Attackers want to bring down the
VANET
Jammer
Roadside unit
Security Requirements
•
•
•
•
•
• Authentication
– Authenticate legitimate OBUs and senders of messages
Message Integrity
– Ensure data integrity
Privacy
– Provide message unlinkability and prevent driver’s tracking
Traceability and revocation
– Trace and disable abusing OBUs by the authority
Availability
– Provide network availability under jamming attacks
Efficiency
– Impose low computation and communication overheads
due to constraints on time
Assumptions
Roadways are divided
into geographic regions
 Trusted authorities
–
– Define regions to
identify thepositions of
the RSUs
Issue certificates to
RSUs and OBUs OBU
OBU
Assumptions
 RSUs
–
–
– Act as the regional authorities
for their regions
Are the tamper-proof devices
Get a copy of the authority’s
public key
 OBUs
– Know their current location
• GPS provides enough accuracy
– Know how to contact a RSU
Get a copy of the authority’s
public key
– OBU
OBU
Discussions and Conclusions
• VANET security is an emerging area
• As different VANET protocols and applications are
based on different assumptions, a common evaluation
framework is needed to compare different security
research contributions
• Detection of malicious vehicles is still a challenge
• Multicast source authentication which essentially
guarantees that the received data is sent from the
claimed source
References
R. Chen, D. Ma, and A. Regan, “TARI: Meeting delay
requirements in VANETs with efficient authentication and
revocation,” In Proceedings of WAVE, 2009
A. Perrig, R. Canetti, D. Tygar, D. Song, “The TESLA broadcast
authentication protocol,” CryptoBytes, vol. 5,2002
www.wikipedia.com
Security and Privacy in VANET:A Survey by Muhammed
Sameer,Jun Liang.
Architecture and security in Vanet PPT

More Related Content

What's hot

What's hot (20)

Vehicular network
Vehicular networkVehicular network
Vehicular network
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
VANET
VANETVANET
VANET
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Vanet Presentation
Vanet PresentationVanet Presentation
Vanet Presentation
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
MANET
MANETMANET
MANET
 
Vehicular ad hoc network
Vehicular ad hoc networkVehicular ad hoc network
Vehicular ad hoc network
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwari
 
MANET VS VANET
MANET VS VANETMANET VS VANET
MANET VS VANET
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communication
 
Vehicle to vehicle communication
Vehicle to vehicle communication  Vehicle to vehicle communication
Vehicle to vehicle communication
 
Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Manet
ManetManet
Manet
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs Presentation
 
Applications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksApplications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networks
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 

Similar to Architecture and security in Vanet PPT

Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An AnalysisChallenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An Analysisidescitation
 
Collision_Avoidance_in_VANETs_Grp5_Topic.ppt
Collision_Avoidance_in_VANETs_Grp5_Topic.pptCollision_Avoidance_in_VANETs_Grp5_Topic.ppt
Collision_Avoidance_in_VANETs_Grp5_Topic.pptMohammedThanishA
 
Overview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksOverview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksIRJET Journal
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...IJLT EMAS
 
Cp3210151018
Cp3210151018Cp3210151018
Cp3210151018IJMER
 
Communications in Vehicular networks
Communications in Vehicular networksCommunications in Vehicular networks
Communications in Vehicular networksDaisyWatson5
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
 
Qualitative based comparison of routing protocols for vanet1212final
Qualitative based comparison of routing protocols for vanet1212finalQualitative based comparison of routing protocols for vanet1212final
Qualitative based comparison of routing protocols for vanet1212finalAlexander Decker
 

Similar to Architecture and security in Vanet PPT (20)

Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An AnalysisChallenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
 
Collision_Avoidance_in_VANETs_Grp5_Topic.ppt
Collision_Avoidance_in_VANETs_Grp5_Topic.pptCollision_Avoidance_in_VANETs_Grp5_Topic.ppt
Collision_Avoidance_in_VANETs_Grp5_Topic.ppt
 
Overview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksOverview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security Attacks
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
 
vanets presentation-.pdf
vanets presentation-.pdfvanets presentation-.pdf
vanets presentation-.pdf
 
V2V tech
V2V techV2V tech
V2V tech
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
 
Cp3210151018
Cp3210151018Cp3210151018
Cp3210151018
 
Ivwc
IvwcIvwc
Ivwc
 
VANET Presentation.ppt
VANET Presentation.pptVANET Presentation.ppt
VANET Presentation.ppt
 
VANET.ppt
VANET.pptVANET.ppt
VANET.ppt
 
Communications in Vehicular networks
Communications in Vehicular networksCommunications in Vehicular networks
Communications in Vehicular networks
 
SAHITHI - VANET ppt.pptx
SAHITHI - VANET ppt.pptxSAHITHI - VANET ppt.pptx
SAHITHI - VANET ppt.pptx
 
SAHITHI - VANET ppt.pptx
SAHITHI - VANET ppt.pptxSAHITHI - VANET ppt.pptx
SAHITHI - VANET ppt.pptx
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
 
VANET-Guo.ppt
VANET-Guo.pptVANET-Guo.ppt
VANET-Guo.ppt
 
Qualitative based comparison of routing protocols for vanet1212final
Qualitative based comparison of routing protocols for vanet1212finalQualitative based comparison of routing protocols for vanet1212final
Qualitative based comparison of routing protocols for vanet1212final
 

More from Meghaj Mallick

PORTFOLIO BY USING HTML & CSS
PORTFOLIO BY USING HTML & CSSPORTFOLIO BY USING HTML & CSS
PORTFOLIO BY USING HTML & CSSMeghaj Mallick
 
Introduction to Software Testing
Introduction to Software TestingIntroduction to Software Testing
Introduction to Software TestingMeghaj Mallick
 
Introduction to System Programming
Introduction to System ProgrammingIntroduction to System Programming
Introduction to System ProgrammingMeghaj Mallick
 
Icons, Image & Multimedia
Icons, Image & MultimediaIcons, Image & Multimedia
Icons, Image & MultimediaMeghaj Mallick
 
Project Tracking & SPC
Project Tracking & SPCProject Tracking & SPC
Project Tracking & SPCMeghaj Mallick
 
Design Model & User Interface Design in Software Engineering
Design Model & User Interface Design in Software EngineeringDesign Model & User Interface Design in Software Engineering
Design Model & User Interface Design in Software EngineeringMeghaj Mallick
 
Text Mining of Twitter in Data Mining
Text Mining of Twitter in Data MiningText Mining of Twitter in Data Mining
Text Mining of Twitter in Data MiningMeghaj Mallick
 
DFS & BFS in Computer Algorithm
DFS & BFS in Computer AlgorithmDFS & BFS in Computer Algorithm
DFS & BFS in Computer AlgorithmMeghaj Mallick
 
Software Development Method
Software Development MethodSoftware Development Method
Software Development MethodMeghaj Mallick
 
Secant method in Numerical & Statistical Method
Secant method in Numerical & Statistical MethodSecant method in Numerical & Statistical Method
Secant method in Numerical & Statistical MethodMeghaj Mallick
 
Motivation in Organization
Motivation in OrganizationMotivation in Organization
Motivation in OrganizationMeghaj Mallick
 
Partial-Orderings in Discrete Mathematics
 Partial-Orderings in Discrete Mathematics Partial-Orderings in Discrete Mathematics
Partial-Orderings in Discrete MathematicsMeghaj Mallick
 
Hashing In Data Structure
Hashing In Data Structure Hashing In Data Structure
Hashing In Data Structure Meghaj Mallick
 
Complexity Analysis of Recursive Function
Complexity Analysis of Recursive FunctionComplexity Analysis of Recursive Function
Complexity Analysis of Recursive FunctionMeghaj Mallick
 

More from Meghaj Mallick (20)

24 partial-orderings
24 partial-orderings24 partial-orderings
24 partial-orderings
 
PORTFOLIO BY USING HTML & CSS
PORTFOLIO BY USING HTML & CSSPORTFOLIO BY USING HTML & CSS
PORTFOLIO BY USING HTML & CSS
 
Introduction to Software Testing
Introduction to Software TestingIntroduction to Software Testing
Introduction to Software Testing
 
Introduction to System Programming
Introduction to System ProgrammingIntroduction to System Programming
Introduction to System Programming
 
MACRO ASSEBLER
MACRO ASSEBLERMACRO ASSEBLER
MACRO ASSEBLER
 
Icons, Image & Multimedia
Icons, Image & MultimediaIcons, Image & Multimedia
Icons, Image & Multimedia
 
Project Tracking & SPC
Project Tracking & SPCProject Tracking & SPC
Project Tracking & SPC
 
Peephole Optimization
Peephole OptimizationPeephole Optimization
Peephole Optimization
 
Routing in MANET
Routing in MANETRouting in MANET
Routing in MANET
 
Macro assembler
 Macro assembler Macro assembler
Macro assembler
 
Design Model & User Interface Design in Software Engineering
Design Model & User Interface Design in Software EngineeringDesign Model & User Interface Design in Software Engineering
Design Model & User Interface Design in Software Engineering
 
Text Mining of Twitter in Data Mining
Text Mining of Twitter in Data MiningText Mining of Twitter in Data Mining
Text Mining of Twitter in Data Mining
 
DFS & BFS in Computer Algorithm
DFS & BFS in Computer AlgorithmDFS & BFS in Computer Algorithm
DFS & BFS in Computer Algorithm
 
Software Development Method
Software Development MethodSoftware Development Method
Software Development Method
 
Secant method in Numerical & Statistical Method
Secant method in Numerical & Statistical MethodSecant method in Numerical & Statistical Method
Secant method in Numerical & Statistical Method
 
Motivation in Organization
Motivation in OrganizationMotivation in Organization
Motivation in Organization
 
Communication Skill
Communication SkillCommunication Skill
Communication Skill
 
Partial-Orderings in Discrete Mathematics
 Partial-Orderings in Discrete Mathematics Partial-Orderings in Discrete Mathematics
Partial-Orderings in Discrete Mathematics
 
Hashing In Data Structure
Hashing In Data Structure Hashing In Data Structure
Hashing In Data Structure
 
Complexity Analysis of Recursive Function
Complexity Analysis of Recursive FunctionComplexity Analysis of Recursive Function
Complexity Analysis of Recursive Function
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Architecture and security in Vanet PPT

  • 1. PRESENTED BY: AKASH KUMAR CHAUBEY(MCA/25014/18) TOPIC: ARCHITECTURE ANDSECURITYIN VANET
  • 2. OUTLINE  Introduction  Vehicular Communication  VANET Architecture  Characteristics  Security  Conclusion  References
  • 3. WHAT IS VANET?  A VANET, is a technology that uses moving cars as nodes in a network to create a mobile network.  It is used toprovide communications among nearby vehicles and between vehicles and nearest fixed equipment, usually described as roadside equipment.  “VANET make transportation systems more intelligent”
  • 4. What is a VANET ? • Communication patterns – Roadside-to-Vehicle Communications ( RVC or V2I) – Inter-Vehicle Communications ( IVC or V2V) Roadside base station Inter-vehicle communications Vehicle-to-roadside communications Emergency event Roadside units (RSU) roadside -to-vehicle communications
  • 5. Why do we need VANET? • Safety is the primary incentive Hundreds of thousands of people are killed world- wide due to road accidents yearly. Many more areinjured.  Traffic Optimization Congestion/traffic jams cost time andfuel. • Infotainment applications – Traffic information, location of gas stations, Internet access DSRC (Dedicated Short Range Communications ) is the heart of the technology advance
  • 6. Introduction – DSRC • A short range communication system for safety and infotainment applications in both roadside-to-vehicle and vehicle-to-vehicle environment • Designed to provide the high data transfer rates and minimum latency in the communication link • Federal Communication Commission allocated 5.9 GHz band (5.850-5.925 GHz) for DSRC to be used by Intelligent Transportation Systems
  • 7. Introduction – 5.9 GHz DSRC • IEEE 802.11p – an approved amendment to the IEEE 802.11 standard to add wireless access in vehicular environments (WAVE) •IEEE 1609 – a higher layer standard on IEEE 802.11p DSRC ALLOWS: Position Direction Speed DSRC Adoption: 10 % by 2018 70 % by 2027
  • 8. Differences from MANET MANET  Unicast and Multicast protocols in MANETs  Majority of nodes in MANETs dependent on batteries fortheir energy.  Unavailability of infrastructure VANET  VANETs use broadcasting to provide important controland route establishment.  VANET nodes are vehicles, so there are less power andstorage constraints.  Fixed infrastructure forVANETs
  • 9. Vehicular Communication  VANET communicates through Wireless Accessfor Vehicular Environments (WAVE).  The WAVEuses different types of Wireless Commutation devices such as (Wi-Fi / Wi-Max).  The sensors or wireless devices can form a VANET network which resides on top of the vehicle.
  • 11.  Staircase approach: An application can select among multiple service access points to lower layers.  Single-hop layer: communication to directradio neighbors.  Multi-hop layer :forwarding packets to non neighbored nodes using neighbors asforwarders.  Information connector: offering an interface to events such as “Position Update Events” or “Neighbor Position Change Events”.
  • 12. IMPLEMENTING PROTOCOLS In cases of emergencies, the protocol is used to open an instant communication channel with the vehicle in the most dangerous situation.  Unicast information packed ina broadcast protocol  Belongs to: Reliable Protocols fora Specific Purpose
  • 13. VANET Characteristics High mobility nodes Dynamic Network Topology No problem with power Network Strength Large Network
  • 14. Problems in VANET • Bogus information – Attackers diffuse false information to affect the behavior of other drivers V changes its route and frees the road A2 sends a false message with1 2 traffic info
  • 15. Problems in VANET • ID disclosure – Attackers tracks vehicles to obtain those drivers’ private information 1 *A at (x1,y1,) at time t1 *A communicates with B 2 *A refuels at time t2 and location (x2,y2) 3 *A enters the parking lot at time t3 *A downloads from Server x
  • 16. Problems in VANET • Masquerade – Attackers use false identities to pretend another vehicles SLOW DOWN The way is clear
  • 17. Problems in VANET • Denial of Service – Attackers want to bring down the VANET Jammer Roadside unit
  • 18. Security Requirements • • • • • • Authentication – Authenticate legitimate OBUs and senders of messages Message Integrity – Ensure data integrity Privacy – Provide message unlinkability and prevent driver’s tracking Traceability and revocation – Trace and disable abusing OBUs by the authority Availability – Provide network availability under jamming attacks Efficiency – Impose low computation and communication overheads due to constraints on time
  • 19. Assumptions Roadways are divided into geographic regions  Trusted authorities – – Define regions to identify thepositions of the RSUs Issue certificates to RSUs and OBUs OBU OBU
  • 20. Assumptions  RSUs – – – Act as the regional authorities for their regions Are the tamper-proof devices Get a copy of the authority’s public key  OBUs – Know their current location • GPS provides enough accuracy – Know how to contact a RSU Get a copy of the authority’s public key – OBU OBU
  • 21. Discussions and Conclusions • VANET security is an emerging area • As different VANET protocols and applications are based on different assumptions, a common evaluation framework is needed to compare different security research contributions • Detection of malicious vehicles is still a challenge • Multicast source authentication which essentially guarantees that the received data is sent from the claimed source
  • 22. References R. Chen, D. Ma, and A. Regan, “TARI: Meeting delay requirements in VANETs with efficient authentication and revocation,” In Proceedings of WAVE, 2009 A. Perrig, R. Canetti, D. Tygar, D. Song, “The TESLA broadcast authentication protocol,” CryptoBytes, vol. 5,2002 www.wikipedia.com Security and Privacy in VANET:A Survey by Muhammed Sameer,Jun Liang.