SlideShare a Scribd company logo
1 of 13
A Novel Vehicular SMS System (VSS) approach for
Intelligent Transport System (ITS)
Dr.IA.Sumra
 Approximately 1.27 million people died every year over the globe in
traffic accidents and 50 million people are seriously injured.
 In poor countries the children death rate due to road accident is high as
compare to any other serious disease such as malaria or AIDS.
 With the passage of time the rate of road accident is increasing and by
2020 the increasing road accidents will become serious threats to
human lives.
Introduction
People
Injured
People
Died
Road
Accident
2
 Vehicular ad-hoc network is a special kind of network in which nodes
(Vehicles) can communicate with each other on the road and with its
Infrastructure.
Road Side Unit (RSU)
V2VV2V
Basic VANET Architecture
3
V2I
VANET Applications
 Safety Applications
 Non Safety Applications
Work
in Progress
Plz! use Alt.
route
Work Zone
Warning:!!!
Work Zone
Warning:!!!
Shopping MALL
( TESCO )
Parking Slot
Available!!!
RSU Parking Slot
Available!!!
4
Challenges of VANET
Cost Factor
Security TrustPrivacy
Implementation Time Frame
5
Attacker
Safety
Application
Non Safety
Application
VANET
USERS
6
Security TrustPrivacy
Three Close
Friends
Change
the
behavior
PROPOSED VEHICULAR SMS SYSTEM (VSS)
Vehicle
BTS Mobile
User
Data Capture Device(DCD)
MSC
BSC
HLR VLR
AC
SMSC
EIR
Mobile
Network
SAS NSAS
7
VANET applications on mobile station
Mobile Station
Safety Applications Non-Safety Applications
Mobile Network
Vehicle
User
S
M
S
S
M
S
8
VSS Communication Types
 Infrastructure to User Communication
BTS
Shopping Mall
Shopping Mall and
Restaurant at 100M
Non safety
Application
Safety
Application
9
VSS Communication Types
 User to Infrastructure Communication
BTS
Shopping MallParking
Area
A
Clear the blind
situation
10
 Intelligent Transport System (ITS) is directly involved
in handling safety and non-safety messages to road
users and to make journey on road more comfortable.
This objective is normally done through the VANET
services in conjunction with ITS.
 Our proposed approach is an alternative way i.e. by
using vehicular SMS system (VSS).
 It has the potential of being more cost effective as
compared to VANET but needs further research to
resolve its trust and privacy issues.
11
Conclusion
12
13
 Send email: isomro28@gmail.com
 Please download complete paper
 IEEEE website
 ResearchGate
 Video Available on given link:-
 https://www.youtube.com/watch?v=XdBWXk6QjMY

More Related Content

What's hot

Introduction to the connected vehicle imsa 2015 annual conference
Introduction to the connected vehicle   imsa 2015 annual conferenceIntroduction to the connected vehicle   imsa 2015 annual conference
Introduction to the connected vehicle imsa 2015 annual conferenceJim Frazer
 
Global NCAP highlights pedestrian safety at the UN
Global NCAP highlights pedestrian safety at the UNGlobal NCAP highlights pedestrian safety at the UN
Global NCAP highlights pedestrian safety at the UNGlobal NCAP
 
The Road Ahead - Mobileye Collision Prevention Systems
The Road Ahead - Mobileye Collision Prevention SystemsThe Road Ahead - Mobileye Collision Prevention Systems
The Road Ahead - Mobileye Collision Prevention SystemsMobileye
 
Driving the future
Driving the futureDriving the future
Driving the futureHassan Muse
 
Technology Symposium to Demonstrate Unmanned Aerial Vehicle Uses on the Farm.
Technology Symposium to Demonstrate Unmanned Aerial Vehicle Uses on the Farm.Technology Symposium to Demonstrate Unmanned Aerial Vehicle Uses on the Farm.
Technology Symposium to Demonstrate Unmanned Aerial Vehicle Uses on the Farm.cooperqsdiamobtv
 
Mobileye presentation
Mobileye presentationMobileye presentation
Mobileye presentationEran Perzelan
 
Why consumers choose mobileye
Why consumers choose mobileyeWhy consumers choose mobileye
Why consumers choose mobileyeMobileye
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANETDr.Irshad Ahmed Sumra
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-finASMA HADELI
 
Future of intelligent transportation CIO Roundtable 080214
Future of intelligent transportation   CIO Roundtable 080214Future of intelligent transportation   CIO Roundtable 080214
Future of intelligent transportation CIO Roundtable 080214James Sutter
 
User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsDr.Irshad Ahmed Sumra
 
Las432 team f-autonomouscar
Las432 team f-autonomouscarLas432 team f-autonomouscar
Las432 team f-autonomouscarbrentzipkin
 
V2V design presentation final
V2V design presentation finalV2V design presentation final
V2V design presentation finalIbrahim Mosaad
 
UIC, the worldwide railway organisation, launches the 11 International Level ...
UIC, the worldwide railway organisation, launches the 11 International Level ...UIC, the worldwide railway organisation, launches the 11 International Level ...
UIC, the worldwide railway organisation, launches the 11 International Level ...UICcom
 
Cisco Smart Intersections: IoT insights using video analytics and AI
Cisco Smart Intersections: IoT insights using video analytics and AICisco Smart Intersections: IoT insights using video analytics and AI
Cisco Smart Intersections: IoT insights using video analytics and AICarl Jackson
 

What's hot (20)

Introduction to the connected vehicle imsa 2015 annual conference
Introduction to the connected vehicle   imsa 2015 annual conferenceIntroduction to the connected vehicle   imsa 2015 annual conference
Introduction to the connected vehicle imsa 2015 annual conference
 
Car to car communication
Car to car communicationCar to car communication
Car to car communication
 
Connected and Autonomous Vehicle Systems R&D Overview
Connected and Autonomous Vehicle Systems R&D OverviewConnected and Autonomous Vehicle Systems R&D Overview
Connected and Autonomous Vehicle Systems R&D Overview
 
Global NCAP highlights pedestrian safety at the UN
Global NCAP highlights pedestrian safety at the UNGlobal NCAP highlights pedestrian safety at the UN
Global NCAP highlights pedestrian safety at the UN
 
The Road Ahead - Mobileye Collision Prevention Systems
The Road Ahead - Mobileye Collision Prevention SystemsThe Road Ahead - Mobileye Collision Prevention Systems
The Road Ahead - Mobileye Collision Prevention Systems
 
Driving the future
Driving the futureDriving the future
Driving the future
 
Technology Symposium to Demonstrate Unmanned Aerial Vehicle Uses on the Farm.
Technology Symposium to Demonstrate Unmanned Aerial Vehicle Uses on the Farm.Technology Symposium to Demonstrate Unmanned Aerial Vehicle Uses on the Farm.
Technology Symposium to Demonstrate Unmanned Aerial Vehicle Uses on the Farm.
 
Mobileye presentation
Mobileye presentationMobileye presentation
Mobileye presentation
 
Why consumers choose mobileye
Why consumers choose mobileyeWhy consumers choose mobileye
Why consumers choose mobileye
 
Safety Impacts of Connected and Automated Vehicles
Safety Impacts of Connected and Automated VehiclesSafety Impacts of Connected and Automated Vehicles
Safety Impacts of Connected and Automated Vehicles
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANET
 
The value of communication and infrastructure for automated cars
The value of communication and infrastructure for automated carsThe value of communication and infrastructure for automated cars
The value of communication and infrastructure for automated cars
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-fin
 
Future of intelligent transportation CIO Roundtable 080214
Future of intelligent transportation   CIO Roundtable 080214Future of intelligent transportation   CIO Roundtable 080214
Future of intelligent transportation CIO Roundtable 080214
 
User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET Applications
 
[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja
[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja
[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja
 
Las432 team f-autonomouscar
Las432 team f-autonomouscarLas432 team f-autonomouscar
Las432 team f-autonomouscar
 
V2V design presentation final
V2V design presentation finalV2V design presentation final
V2V design presentation final
 
UIC, the worldwide railway organisation, launches the 11 International Level ...
UIC, the worldwide railway organisation, launches the 11 International Level ...UIC, the worldwide railway organisation, launches the 11 International Level ...
UIC, the worldwide railway organisation, launches the 11 International Level ...
 
Cisco Smart Intersections: IoT insights using video analytics and AI
Cisco Smart Intersections: IoT insights using video analytics and AICisco Smart Intersections: IoT insights using video analytics and AI
Cisco Smart Intersections: IoT insights using video analytics and AI
 

Similar to ITS and VSS

Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)Dr. Amarjeet Singh
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement Dr.Irshad Ahmed Sumra
 
V2V communications
V2V communicationsV2V communications
V2V communicationsSai Avinash
 
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...ijtsrd
 
Internet of vehicles, vehicular social networks and cybersecurity
Internet of vehicles, vehicular social networks and cybersecurityInternet of vehicles, vehicular social networks and cybersecurity
Internet of vehicles, vehicular social networks and cybersecurityShambhu Ram
 
Friendly roads an innovative citizen engagement project
Friendly roads an innovative citizen engagement projectFriendly roads an innovative citizen engagement project
Friendly roads an innovative citizen engagement projectGela Kvashilava
 
Uncovering the mishaps & dangers of Road safety
Uncovering the mishaps & dangers of Road safetyUncovering the mishaps & dangers of Road safety
Uncovering the mishaps & dangers of Road safetyEmmanuel Jaiyeola
 
Vehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic RoutingVehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic RoutingEditor IJCATR
 
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES ijasuc
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
 
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...IJERA Editor
 
Survey on Enhancing Accident Safety: Technological Solutions
Survey on Enhancing Accident Safety: Technological SolutionsSurvey on Enhancing Accident Safety: Technological Solutions
Survey on Enhancing Accident Safety: Technological SolutionsIRJET Journal
 
Creating a Safer, Smarter ride - NFV for Automotive
Creating a Safer, Smarter ride - NFV for AutomotiveCreating a Safer, Smarter ride - NFV for Automotive
Creating a Safer, Smarter ride - NFV for AutomotiveTrinath Somanchi
 
Cisco Smart Intersections: IoT insights using wifi
Cisco Smart Intersections: IoT insights using wifiCisco Smart Intersections: IoT insights using wifi
Cisco Smart Intersections: IoT insights using wifiCarl Jackson
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)
ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)
ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)IRJET Journal
 
Edge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protection Edge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protection Carl Jackson
 
ESOA US Connected Cars Infogram
ESOA US Connected Cars InfogramESOA US Connected Cars Infogram
ESOA US Connected Cars Infogramcouchp
 
IRJET- Review on Road Safety in Hilly Area using WSN and IoT
IRJET-  	  Review on Road Safety in Hilly Area using WSN and IoTIRJET-  	  Review on Road Safety in Hilly Area using WSN and IoT
IRJET- Review on Road Safety in Hilly Area using WSN and IoTIRJET Journal
 

Similar to ITS and VSS (20)

Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement
 
Ijetr042176
Ijetr042176Ijetr042176
Ijetr042176
 
V2V communications
V2V communicationsV2V communications
V2V communications
 
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
 
Internet of vehicles, vehicular social networks and cybersecurity
Internet of vehicles, vehicular social networks and cybersecurityInternet of vehicles, vehicular social networks and cybersecurity
Internet of vehicles, vehicular social networks and cybersecurity
 
Friendly roads an innovative citizen engagement project
Friendly roads an innovative citizen engagement projectFriendly roads an innovative citizen engagement project
Friendly roads an innovative citizen engagement project
 
Uncovering the mishaps & dangers of Road safety
Uncovering the mishaps & dangers of Road safetyUncovering the mishaps & dangers of Road safety
Uncovering the mishaps & dangers of Road safety
 
Vehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic RoutingVehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic Routing
 
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
 
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
 
Survey on Enhancing Accident Safety: Technological Solutions
Survey on Enhancing Accident Safety: Technological SolutionsSurvey on Enhancing Accident Safety: Technological Solutions
Survey on Enhancing Accident Safety: Technological Solutions
 
Creating a Safer, Smarter ride - NFV for Automotive
Creating a Safer, Smarter ride - NFV for AutomotiveCreating a Safer, Smarter ride - NFV for Automotive
Creating a Safer, Smarter ride - NFV for Automotive
 
Cisco Smart Intersections: IoT insights using wifi
Cisco Smart Intersections: IoT insights using wifiCisco Smart Intersections: IoT insights using wifi
Cisco Smart Intersections: IoT insights using wifi
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)
ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)
ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)
 
Edge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protection Edge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protection
 
ESOA US Connected Cars Infogram
ESOA US Connected Cars InfogramESOA US Connected Cars Infogram
ESOA US Connected Cars Infogram
 
IRJET- Review on Road Safety in Hilly Area using WSN and IoT
IRJET-  	  Review on Road Safety in Hilly Area using WSN and IoTIRJET-  	  Review on Road Safety in Hilly Area using WSN and IoT
IRJET- Review on Road Safety in Hilly Area using WSN and IoT
 

More from Dr.Irshad Ahmed Sumra

Using the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETUsing the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETDr.Irshad Ahmed Sumra
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Dr.Irshad Ahmed Sumra
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveyDr.Irshad Ahmed Sumra
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANETDr.Irshad Ahmed Sumra
 
Comparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETComparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETDr.Irshad Ahmed Sumra
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Dr.Irshad Ahmed Sumra
 
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Dr.Irshad Ahmed Sumra
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Dr.Irshad Ahmed Sumra
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETDr.Irshad Ahmed Sumra
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETDr.Irshad Ahmed Sumra
 
VANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemVANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemDr.Irshad Ahmed Sumra
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationBehavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationDr.Irshad Ahmed Sumra
 

More from Dr.Irshad Ahmed Sumra (19)

Using the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETUsing the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANET
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A Survey
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
 
Trusted Computing in VANET
Trusted Computing in VANETTrusted Computing in VANET
Trusted Computing in VANET
 
Comparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETComparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANET
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
 
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
 
VANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemVANET Security Research and Development Ecosystem
VANET Security Research and Development Ecosystem
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationBehavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
 
Timing Attack in Vehicular Network
Timing Attack in Vehicular NetworkTiming Attack in Vehicular Network
Timing Attack in Vehicular Network
 
Classes of Attacks in VANET
Classes of Attacks in VANETClasses of Attacks in VANET
Classes of Attacks in VANET
 
VANET Security and Trust
VANET Security and TrustVANET Security and Trust
VANET Security and Trust
 
VANET Trust
VANET TrustVANET Trust
VANET Trust
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

ITS and VSS

  • 1. A Novel Vehicular SMS System (VSS) approach for Intelligent Transport System (ITS) Dr.IA.Sumra
  • 2.  Approximately 1.27 million people died every year over the globe in traffic accidents and 50 million people are seriously injured.  In poor countries the children death rate due to road accident is high as compare to any other serious disease such as malaria or AIDS.  With the passage of time the rate of road accident is increasing and by 2020 the increasing road accidents will become serious threats to human lives. Introduction People Injured People Died Road Accident 2
  • 3.  Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. Road Side Unit (RSU) V2VV2V Basic VANET Architecture 3 V2I
  • 4. VANET Applications  Safety Applications  Non Safety Applications Work in Progress Plz! use Alt. route Work Zone Warning:!!! Work Zone Warning:!!! Shopping MALL ( TESCO ) Parking Slot Available!!! RSU Parking Slot Available!!! 4
  • 5. Challenges of VANET Cost Factor Security TrustPrivacy Implementation Time Frame 5
  • 7. PROPOSED VEHICULAR SMS SYSTEM (VSS) Vehicle BTS Mobile User Data Capture Device(DCD) MSC BSC HLR VLR AC SMSC EIR Mobile Network SAS NSAS 7
  • 8. VANET applications on mobile station Mobile Station Safety Applications Non-Safety Applications Mobile Network Vehicle User S M S S M S 8
  • 9. VSS Communication Types  Infrastructure to User Communication BTS Shopping Mall Shopping Mall and Restaurant at 100M Non safety Application Safety Application 9
  • 10. VSS Communication Types  User to Infrastructure Communication BTS Shopping MallParking Area A Clear the blind situation 10
  • 11.  Intelligent Transport System (ITS) is directly involved in handling safety and non-safety messages to road users and to make journey on road more comfortable. This objective is normally done through the VANET services in conjunction with ITS.  Our proposed approach is an alternative way i.e. by using vehicular SMS system (VSS).  It has the potential of being more cost effective as compared to VANET but needs further research to resolve its trust and privacy issues. 11 Conclusion
  • 12. 12
  • 13. 13  Send email: isomro28@gmail.com  Please download complete paper  IEEEE website  ResearchGate  Video Available on given link:-  https://www.youtube.com/watch?v=XdBWXk6QjMY