SlideShare a Scribd company logo
1 of 21
1
• What is a VANET?
• Vehicle to vehicle communication
• Vehicle to infrastructure communication
• Dedicated Short Range Communication
• Security challenges
• Attacks
• Security solution of VANET
• Applications of VANET
• conclusion
2
Forward radar
Computing platform
Event data recorder (EDR)
Positioning system
Rear radar
Communication
facility
Display
(GPS)
Human-Machine Interface
A modern vehicle is a network of sensors/actuators on wheels !
 Vehicular Communication System (VCS):-
Two main type of communications
Vehicle to Vehicle (V2V) Communication:-
Vehicle to Infrastructure (V2I) communication:-
 Advantage and Usage of VCS:-
Information sharing
Co-operative driving
Other value added services like Navigation,
internet access etc.
4
It allows safe and free flow traffic.
It uses GPS and DGPS equipped devices.
 It uses various technology like:-
1. Wireless communications
2. Floating car data/floating cellular data
3. Sensing technologies
4. Inductive loop detection
5. Video vehicle detection
6. Bluetooth Detection 5
6
Uses multi-hop/multi cast technique.
 uses two type of broadcasting
1. naive broadcasting
2. intelligent broadcasting
7
High bandwidth link with vehicle and roadside equipment.
Roadside units broadcast messages.
8
• Uses multi hop unicast
9
Each vehicle is a node with unique ID.
 proactive routing
• It tries to maintain routes to all destinations.
 Reactive routing
• It initiates route discovery in demand of data traffic.
 Position based Routing
• Routing based on destination’s position.
10
• Broadcasting algorithms used.
• Data and control packet forwarding are loop free.
• Ad hoc routing algorithms are used.
Mobicasting
• Consider time into account.
• Main goal is delivery of information to all nodes in a point
of time.
11
Challenges
• Authentication and data encryption
• Auditing sensor data
• Privacy (avoid tracking)
• Infrastructure boot-strapping
• Negative perception of smart vehicles
12
Key Features
• Context sensors (front-end radar, ultra-sound, etc)
• Event data recorder (i.e., “black box”)
• Tamper-proof device to handle encrypted
transmissions
• Location detection (GPS or distance bounding)
• Communication with road-side base stations
13
• Fake information
• message falsification
• Cheating (data manipulation, impersonation)
• Identity détection for vehicle tracking
• Denial of service
14
Security Mechanisms
• Electronic License Plate (post-mortem auditing)
• Asymmetric encryption using public key
infrastructure
• Large number of anonymous keys (no identity
information)
• Vehicles frequently change keys to avoid tracking
• Keys can be revoked (more later)
• Physical layer protection against denial of service
• Channel switching
• Implement more than one communication
technology
15
1. ARAN (Authenticated Routing for Ad hoc network)
Secure routing protocol for ad hoc network based on
authentication.
2. SEAD (Secure and Efficient Ad hoc Distance Vector)
Secure routing protocol which protects against
multiple uncoordinated attackers who creates
incorrect routing in any other node.
16
3. SMT (Secure Message Transmission)
Secure Message Transmission protocol which is light
and operates on end to end manner
4. NDM (Non-Disclosure Method)
Method to protect location information in mobile IP
5. ARIADNE
routing protocol which prevents the attacker from terming
the routes of uncompromised nodes and DoS attacks
17
18
19
• Consists of vehicle-to-vehicle, vehicle-to-infrastructure
communication.
• It improves the safety of vehicles.
• Supports Intelligent Transportation system.
20
21

More Related Content

Similar to VANET Security and Communication

IVC DOC-20230921-WA0004..pdf
IVC DOC-20230921-WA0004..pdfIVC DOC-20230921-WA0004..pdf
IVC DOC-20230921-WA0004..pdfNanDhu551039
 
Intelligent Transportation System (ITS)
Intelligent Transportation System (ITS)Intelligent Transportation System (ITS)
Intelligent Transportation System (ITS)Jonathan D'Cruz
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communicationR prasad
 
Intelligent transport system himanshi
Intelligent transport system   himanshiIntelligent transport system   himanshi
Intelligent transport system himanshiPreeti Rashmi
 
Intelligent transport system (ITS)
Intelligent transport system (ITS)Intelligent transport system (ITS)
Intelligent transport system (ITS)Aravind Samala
 
Connect and protect building a trust based internet of things for business cr...
Connect and protect building a trust based internet of things for business cr...Connect and protect building a trust based internet of things for business cr...
Connect and protect building a trust based internet of things for business cr...Aruba, a Hewlett Packard Enterprise company
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwarirahulpandey510
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesMadhur Gupta
 
Intelligent Transportation System Modified
Intelligent Transportation System ModifiedIntelligent Transportation System Modified
Intelligent Transportation System ModifiedDurgesh Mishra
 
EcoTelematics Group Oy innovative solution for transport
EcoTelematics Group Oy innovative solution for transportEcoTelematics Group Oy innovative solution for transport
EcoTelematics Group Oy innovative solution for transportEcoTelematics Sofjins
 
Intelligent transport system presentation
Intelligent transport system   presentationIntelligent transport system   presentation
Intelligent transport system presentationBhekumuzi Xaba
 
The Importance of Timing to Autonomous Vehicle Navigation
The Importance of Timing to Autonomous Vehicle NavigationThe Importance of Timing to Autonomous Vehicle Navigation
The Importance of Timing to Autonomous Vehicle NavigationTim Klimasewski
 
public transport system using RFID and GSM
public transport system using RFID and GSMpublic transport system using RFID and GSM
public transport system using RFID and GSMniteshmishra121
 
Aplicacions de 5G al IoT i la Indústria 4.0: mMTC i URLLC
Aplicacions de 5G al IoT i la Indústria 4.0: mMTC i URLLCAplicacions de 5G al IoT i la Indústria 4.0: mMTC i URLLC
Aplicacions de 5G al IoT i la Indústria 4.0: mMTC i URLLCTICAnoia
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs PresentationiQra Rafaqat
 
Intelligent transport systems
Intelligent  transport systemsIntelligent  transport systems
Intelligent transport systemsAbhijit Pal
 

Similar to VANET Security and Communication (20)

SAHITHI - VANET ppt.pptx
SAHITHI - VANET ppt.pptxSAHITHI - VANET ppt.pptx
SAHITHI - VANET ppt.pptx
 
SAHITHI - VANET ppt.pptx
SAHITHI - VANET ppt.pptxSAHITHI - VANET ppt.pptx
SAHITHI - VANET ppt.pptx
 
IVC DOC-20230921-WA0004..pdf
IVC DOC-20230921-WA0004..pdfIVC DOC-20230921-WA0004..pdf
IVC DOC-20230921-WA0004..pdf
 
Intelligent Transportation System (ITS)
Intelligent Transportation System (ITS)Intelligent Transportation System (ITS)
Intelligent Transportation System (ITS)
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communication
 
Intelligent transport system himanshi
Intelligent transport system   himanshiIntelligent transport system   himanshi
Intelligent transport system himanshi
 
Intelligent transport system (ITS)
Intelligent transport system (ITS)Intelligent transport system (ITS)
Intelligent transport system (ITS)
 
Connect and protect building a trust based internet of things for business cr...
Connect and protect building a trust based internet of things for business cr...Connect and protect building a trust based internet of things for business cr...
Connect and protect building a trust based internet of things for business cr...
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwari
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
 
Intelligent Transportation System Modified
Intelligent Transportation System ModifiedIntelligent Transportation System Modified
Intelligent Transportation System Modified
 
EcoTelematics Group Oy innovative solution for transport
EcoTelematics Group Oy innovative solution for transportEcoTelematics Group Oy innovative solution for transport
EcoTelematics Group Oy innovative solution for transport
 
Intelligent transport system presentation
Intelligent transport system   presentationIntelligent transport system   presentation
Intelligent transport system presentation
 
archana50337.pptx
archana50337.pptxarchana50337.pptx
archana50337.pptx
 
The Importance of Timing to Autonomous Vehicle Navigation
The Importance of Timing to Autonomous Vehicle NavigationThe Importance of Timing to Autonomous Vehicle Navigation
The Importance of Timing to Autonomous Vehicle Navigation
 
public transport system using RFID and GSM
public transport system using RFID and GSMpublic transport system using RFID and GSM
public transport system using RFID and GSM
 
Aplicacions de 5G al IoT i la Indústria 4.0: mMTC i URLLC
Aplicacions de 5G al IoT i la Indústria 4.0: mMTC i URLLCAplicacions de 5G al IoT i la Indústria 4.0: mMTC i URLLC
Aplicacions de 5G al IoT i la Indústria 4.0: mMTC i URLLC
 
vanets presentation-.pdf
vanets presentation-.pdfvanets presentation-.pdf
vanets presentation-.pdf
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs Presentation
 
Intelligent transport systems
Intelligent  transport systemsIntelligent  transport systems
Intelligent transport systems
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 

VANET Security and Communication

  • 1. 1
  • 2. • What is a VANET? • Vehicle to vehicle communication • Vehicle to infrastructure communication • Dedicated Short Range Communication • Security challenges • Attacks • Security solution of VANET • Applications of VANET • conclusion 2
  • 3. Forward radar Computing platform Event data recorder (EDR) Positioning system Rear radar Communication facility Display (GPS) Human-Machine Interface A modern vehicle is a network of sensors/actuators on wheels !
  • 4.  Vehicular Communication System (VCS):- Two main type of communications Vehicle to Vehicle (V2V) Communication:- Vehicle to Infrastructure (V2I) communication:-  Advantage and Usage of VCS:- Information sharing Co-operative driving Other value added services like Navigation, internet access etc. 4
  • 5. It allows safe and free flow traffic. It uses GPS and DGPS equipped devices.  It uses various technology like:- 1. Wireless communications 2. Floating car data/floating cellular data 3. Sensing technologies 4. Inductive loop detection 5. Video vehicle detection 6. Bluetooth Detection 5
  • 6. 6
  • 7. Uses multi-hop/multi cast technique.  uses two type of broadcasting 1. naive broadcasting 2. intelligent broadcasting 7
  • 8. High bandwidth link with vehicle and roadside equipment. Roadside units broadcast messages. 8
  • 9. • Uses multi hop unicast 9
  • 10. Each vehicle is a node with unique ID.  proactive routing • It tries to maintain routes to all destinations.  Reactive routing • It initiates route discovery in demand of data traffic.  Position based Routing • Routing based on destination’s position. 10
  • 11. • Broadcasting algorithms used. • Data and control packet forwarding are loop free. • Ad hoc routing algorithms are used. Mobicasting • Consider time into account. • Main goal is delivery of information to all nodes in a point of time. 11
  • 12. Challenges • Authentication and data encryption • Auditing sensor data • Privacy (avoid tracking) • Infrastructure boot-strapping • Negative perception of smart vehicles 12
  • 13. Key Features • Context sensors (front-end radar, ultra-sound, etc) • Event data recorder (i.e., “black box”) • Tamper-proof device to handle encrypted transmissions • Location detection (GPS or distance bounding) • Communication with road-side base stations 13
  • 14. • Fake information • message falsification • Cheating (data manipulation, impersonation) • Identity détection for vehicle tracking • Denial of service 14
  • 15. Security Mechanisms • Electronic License Plate (post-mortem auditing) • Asymmetric encryption using public key infrastructure • Large number of anonymous keys (no identity information) • Vehicles frequently change keys to avoid tracking • Keys can be revoked (more later) • Physical layer protection against denial of service • Channel switching • Implement more than one communication technology 15
  • 16. 1. ARAN (Authenticated Routing for Ad hoc network) Secure routing protocol for ad hoc network based on authentication. 2. SEAD (Secure and Efficient Ad hoc Distance Vector) Secure routing protocol which protects against multiple uncoordinated attackers who creates incorrect routing in any other node. 16
  • 17. 3. SMT (Secure Message Transmission) Secure Message Transmission protocol which is light and operates on end to end manner 4. NDM (Non-Disclosure Method) Method to protect location information in mobile IP 5. ARIADNE routing protocol which prevents the attacker from terming the routes of uncompromised nodes and DoS attacks 17
  • 18. 18
  • 19. 19
  • 20. • Consists of vehicle-to-vehicle, vehicle-to-infrastructure communication. • It improves the safety of vehicles. • Supports Intelligent Transportation system. 20
  • 21. 21