SlideShare a Scribd company logo
1 of 11
VANET Security Research and
Development Ecosystem
VANET Security Research
Group (VSRG)
Dr I.A.Sumra
 Vehicular ad-hoc network is a special kind of network in which
nodes (Vehicles) can communicate with each other on the road
and with its Infrastructure.
Road Side Unit (RSU)
V2VV2V
Basic VANET Architecture
2
V2I
Introduction
 Safety Applications
 Non Safety Applications
Work
in Progress
Plz! use Alt.
route
Work Zone
Warning:!!!
Work Zone
Warning:!!!
Shopping MALL
( TESCO )
Parking Slot
Available!!!
RSU Parking Slot
Available!!!
3
 The first aspect of the VANET Security R&D Ecosystem is the Academic Research.
Past researchers have contributed a lot of novel ideas in new life saving network.
 Vehicular Ad hoc Network (VANET) have been introduced to provide the
infrastructure for life saving applications.
 The second aspect of the VANET Security R&D Ecosystem is the car manufacturers which form
a big and important industry. Researchers proposed and designed the concept of smart vehicle
with some special sensors that run using VANET infrastructure.
 Smart vehicles are different from the normal vehicles which are fitted with sensors, equipped
with processing and communication abilities that can help users access to services using their
private information, access to information useful for their journeys, doing business
transactions and making decisions.
 The third aspect of the VANET
Security R&D Ecosystem is the
Govt. Agencies (GA) that is
responsible for providing
authentication services for
users using secure public and
private keys, whether
permanent or temporary based
on the type of services on
highway.
 GA provides these keys for
secure communications
between vehicles and
infrastructure.
 Last aspect of VANET Security R&D Ecosystem is
end users.
 End users have their own security, trust and privacy
requirements
 Security is one of the key challenges in vehicular
network.
 This paper presents VANET Security R&D Ecosystem
that is necessary to be considered for successful
implementation.
 The major aspects of the ecosystem i.e. academic
research, car manufacturers, government
authorities, and end users were discussed.
 It is necessary to do further research related to the
four major aspects of the ecosystem.
10
 Complete paper is available on IEEE and Research
gate.
 Please download complete research paper from
researchgate.
11

More Related Content

What's hot

International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)ijfcst journal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)ijfcst journal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) MiajackB
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)ijfcst journal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) ijfcst journal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) ijfcst journal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)ijfcst journal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)ijfcst journal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)ijfcst journal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)ijfcst journal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)    International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) aciijournal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)    International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) jackson130
 
SASD students win big at NY International Auto Show | University of Bridgeport
SASD students win big at NY International Auto Show | University of BridgeportSASD students win big at NY International Auto Show | University of Bridgeport
SASD students win big at NY International Auto Show | University of BridgeportMichael D. Handler
 

What's hot (17)

Capstone PPT
Capstone PPTCapstone PPT
Capstone PPT
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
Ijcs
IjcsIjcs
Ijcs
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
Ijcs
IjcsIjcs
Ijcs
 
Ijcs
IjcsIjcs
Ijcs
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)    International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)    International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
SASD students win big at NY International Auto Show | University of Bridgeport
SASD students win big at NY International Auto Show | University of BridgeportSASD students win big at NY International Auto Show | University of Bridgeport
SASD students win big at NY International Auto Show | University of Bridgeport
 

Similar to VANET Security Research and Development Ecosystem

Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Dr.Irshad Ahmed Sumra
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET Journal
 
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...IOSR Journals
 
Towards design strong emergency and COVID-19 authentication scheme in VANET
Towards design strong emergency and COVID-19  authentication scheme in VANETTowards design strong emergency and COVID-19  authentication scheme in VANET
Towards design strong emergency and COVID-19 authentication scheme in VANETnooriasukmaningtyas
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANETDr.Irshad Ahmed Sumra
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
 
IRJET- Internet of Things based Emergency System
IRJET- Internet of Things based Emergency SystemIRJET- Internet of Things based Emergency System
IRJET- Internet of Things based Emergency SystemIRJET Journal
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationIRJET Journal
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationIRJET Journal
 
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...IJERA Editor
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETIJNSA Journal
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETIJNSA Journal
 
A Review Of Motion Planning For Highway Autonomous Driving
A Review Of Motion Planning For Highway Autonomous DrivingA Review Of Motion Planning For Highway Autonomous Driving
A Review Of Motion Planning For Highway Autonomous DrivingAndrew Parish
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET Journal
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-finASMA HADELI
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETDr.Irshad Ahmed Sumra
 
Ijartes v1-i1-004
Ijartes v1-i1-004Ijartes v1-i1-004
Ijartes v1-i1-004IJARTES
 
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11coachdave
 
Lane Detection and Object Detection
Lane Detection and Object DetectionLane Detection and Object Detection
Lane Detection and Object Detectionijtsrd
 

Similar to VANET Security Research and Development Ecosystem (20)

Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
 
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
 
Towards design strong emergency and COVID-19 authentication scheme in VANET
Towards design strong emergency and COVID-19  authentication scheme in VANETTowards design strong emergency and COVID-19  authentication scheme in VANET
Towards design strong emergency and COVID-19 authentication scheme in VANET
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANET
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
 
IRJET- Internet of Things based Emergency System
IRJET- Internet of Things based Emergency SystemIRJET- Internet of Things based Emergency System
IRJET- Internet of Things based Emergency System
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
 
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
 
A Review Of Motion Planning For Highway Autonomous Driving
A Review Of Motion Planning For Highway Autonomous DrivingA Review Of Motion Planning For Highway Autonomous Driving
A Review Of Motion Planning For Highway Autonomous Driving
 
Classes of Attacks in VANET
Classes of Attacks in VANETClasses of Attacks in VANET
Classes of Attacks in VANET
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-fin
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
 
Ijartes v1-i1-004
Ijartes v1-i1-004Ijartes v1-i1-004
Ijartes v1-i1-004
 
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
 
Lane Detection and Object Detection
Lane Detection and Object DetectionLane Detection and Object Detection
Lane Detection and Object Detection
 

More from Dr.Irshad Ahmed Sumra

Using the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETUsing the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETDr.Irshad Ahmed Sumra
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Dr.Irshad Ahmed Sumra
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveyDr.Irshad Ahmed Sumra
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANETDr.Irshad Ahmed Sumra
 
Comparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETComparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETDr.Irshad Ahmed Sumra
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Dr.Irshad Ahmed Sumra
 
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Dr.Irshad Ahmed Sumra
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETDr.Irshad Ahmed Sumra
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationBehavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationDr.Irshad Ahmed Sumra
 
User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsDr.Irshad Ahmed Sumra
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement Dr.Irshad Ahmed Sumra
 

More from Dr.Irshad Ahmed Sumra (18)

Using the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETUsing the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANET
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A Survey
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
 
Trusted Computing in VANET
Trusted Computing in VANETTrusted Computing in VANET
Trusted Computing in VANET
 
Comparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETComparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANET
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
 
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationBehavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
 
Timing Attack in Vehicular Network
Timing Attack in Vehicular NetworkTiming Attack in Vehicular Network
Timing Attack in Vehicular Network
 
User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET Applications
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement
 
VANET Security and Trust
VANET Security and TrustVANET Security and Trust
VANET Security and Trust
 
ITS and VSS
ITS and VSSITS and VSS
ITS and VSS
 
VANET Trust
VANET TrustVANET Trust
VANET Trust
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

VANET Security Research and Development Ecosystem

  • 1. VANET Security Research and Development Ecosystem VANET Security Research Group (VSRG) Dr I.A.Sumra
  • 2.  Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. Road Side Unit (RSU) V2VV2V Basic VANET Architecture 2 V2I Introduction
  • 3.  Safety Applications  Non Safety Applications Work in Progress Plz! use Alt. route Work Zone Warning:!!! Work Zone Warning:!!! Shopping MALL ( TESCO ) Parking Slot Available!!! RSU Parking Slot Available!!! 3
  • 4.
  • 5.  The first aspect of the VANET Security R&D Ecosystem is the Academic Research. Past researchers have contributed a lot of novel ideas in new life saving network.  Vehicular Ad hoc Network (VANET) have been introduced to provide the infrastructure for life saving applications.
  • 6.  The second aspect of the VANET Security R&D Ecosystem is the car manufacturers which form a big and important industry. Researchers proposed and designed the concept of smart vehicle with some special sensors that run using VANET infrastructure.  Smart vehicles are different from the normal vehicles which are fitted with sensors, equipped with processing and communication abilities that can help users access to services using their private information, access to information useful for their journeys, doing business transactions and making decisions.
  • 7.  The third aspect of the VANET Security R&D Ecosystem is the Govt. Agencies (GA) that is responsible for providing authentication services for users using secure public and private keys, whether permanent or temporary based on the type of services on highway.  GA provides these keys for secure communications between vehicles and infrastructure.
  • 8.  Last aspect of VANET Security R&D Ecosystem is end users.  End users have their own security, trust and privacy requirements
  • 9.  Security is one of the key challenges in vehicular network.  This paper presents VANET Security R&D Ecosystem that is necessary to be considered for successful implementation.  The major aspects of the ecosystem i.e. academic research, car manufacturers, government authorities, and end users were discussed.  It is necessary to do further research related to the four major aspects of the ecosystem.
  • 10. 10
  • 11.  Complete paper is available on IEEE and Research gate.  Please download complete research paper from researchgate. 11