This document discusses vehicle ad-hoc networks (VANETs), including vehicle-to-vehicle and vehicle-to-infrastructure communication technologies, applications like cooperative driving and navigation, and security challenges involving authentication, privacy, and attacks. It outlines routing protocols and security mechanisms for VANETs, such as encryption, frequent key changes to avoid tracking, and revoking compromised keys. The goal is to securely share information to support intelligent transportation systems and improve traffic safety.
2. • What is a VANET?
• Vehicle to vehicle communication
• Vehicle to infrastructure communication
• Dedicated Short Range Communication
• Security challenges
• Attacks
• Security solution of VANET
• Applications of VANET
• conclusion
2
3. Forward radar
Computing platform
Event data recorder (EDR)
Positioning system
Rear radar
Communication
facility
Display
(GPS)
Human-Machine Interface
A modern vehicle is a network of sensors/actuators on wheels !
4. Vehicular Communication System (VCS):-
Two main type of communications
Vehicle to Vehicle (V2V) Communication:-
Vehicle to Infrastructure (V2I) communication:-
Advantage and Usage of VCS:-
Information sharing
Co-operative driving
Other value added services like Navigation,
internet access etc.
4
5. It allows safe and free flow traffic.
It uses GPS and DGPS equipped devices.
It uses various technology like:-
1. Wireless communications
2. Floating car data/floating cellular data
3. Sensing technologies
4. Inductive loop detection
5. Video vehicle detection
6. Bluetooth Detection 5
10. Each vehicle is a node with unique ID.
proactive routing
• It tries to maintain routes to all destinations.
Reactive routing
• It initiates route discovery in demand of data traffic.
Position based Routing
• Routing based on destination’s position.
10
11. • Broadcasting algorithms used.
• Data and control packet forwarding are loop free.
• Ad hoc routing algorithms are used.
Mobicasting
• Consider time into account.
• Main goal is delivery of information to all nodes in a point
of time.
11
12. Challenges
• Authentication and data encryption
• Auditing sensor data
• Privacy (avoid tracking)
• Infrastructure boot-strapping
• Negative perception of smart vehicles
12
13. Key Features
• Context sensors (front-end radar, ultra-sound, etc)
• Event data recorder (i.e., “black box”)
• Tamper-proof device to handle encrypted
transmissions
• Location detection (GPS or distance bounding)
• Communication with road-side base stations
13
14. • Fake information
• message falsification
• Cheating (data manipulation, impersonation)
• Identity détection for vehicle tracking
• Denial of service
14
15. Security Mechanisms
• Electronic License Plate (post-mortem auditing)
• Asymmetric encryption using public key
infrastructure
• Large number of anonymous keys (no identity
information)
• Vehicles frequently change keys to avoid tracking
• Keys can be revoked (more later)
• Physical layer protection against denial of service
• Channel switching
• Implement more than one communication
technology
15
16. 1. ARAN (Authenticated Routing for Ad hoc network)
Secure routing protocol for ad hoc network based on
authentication.
2. SEAD (Secure and Efficient Ad hoc Distance Vector)
Secure routing protocol which protects against
multiple uncoordinated attackers who creates
incorrect routing in any other node.
16
17. 3. SMT (Secure Message Transmission)
Secure Message Transmission protocol which is light
and operates on end to end manner
4. NDM (Non-Disclosure Method)
Method to protect location information in mobile IP
5. ARIADNE
routing protocol which prevents the attacker from terming
the routes of uncompromised nodes and DoS attacks
17
20. • Consists of vehicle-to-vehicle, vehicle-to-infrastructure
communication.
• It improves the safety of vehicles.
• Supports Intelligent Transportation system.
20