3. Introduction
Vehicles connected to each others through an ad hoc
formation form a wireless network called Vehicular Ad
Hoc Network(VANET).
Vehicular ad hoc networks (VANETs) are a subgroup of
mobile ad hoc networks (MANETs).
4. V2v Communication
Uses multi-hop/multi cast technique.
Uses two type of broadcasting
Naive broadcasting.
Intelligent broadcasting
5. V2i Communication
High bandwidth link with vehicle and roadside equipment.
Roadside units broadcast messages.
6. Function
Unique ID and IP address for each vehicle.
Each node can communicate with any other node.
Each vehicle equipped with WiFi device acts as a node.
7. Attacks
Denial of service
Spoofing
Signal jamming
Fake information
Sybil
Gray hole
8. Security Requirement
1 .Message authentication:-
Every message must be authenticated to make sure its origin
and to control authorization level of the vehicles .
Vehicles sign messages with their private keys.
9. 2.Availability :-
Vehicular network must be available all the time.A delay in
seconds for some applications will make the message
meaningless.
Attempting to meet real-time demands makes the system
vulnerable to the DoS attack.
10. 3.Integrity:-
Transmitted data over an open channel may be intercepted
and alert.
So there must be a mechanism to ensure the data integrity at
the receiver's end.
11. 4.Message confidentiality:-
Transmitted data should not be accessible to unauthorized
vehicles but use of shared channel acts as a security hole of
confidential data.
12. 5.Message non-repudiation:-
Non-repudiation will facilitate the ability to identify the
attackers even after the attack happens.
Entities can alter their identities and deny the message
transmission.
13. Resources
Resource Consumption: Intruder can consume the
available bandwidth by injecting fake messages.
Signal jamming: An intruder can jam the transmission
using interference.
Packet Drop: Intruder can also drop all or selected packets
to interrupt the routing.
17. Conclusion
The main goal of this is to identify different issues in ad
hoc routing protocols and to evaluate these routing
protocols against each other in VANET.
It improves the safety of vehicles.
Consists of vehicle-to-vehicle, vehicle-to-infrastructure
communication.
Supports Intelligent Transportation system.
18. References
S. Balasubramani, S.K. Rani and K. Suja Rajeswari, "Review
on Security Attacks and Mechanism in VANET and MANET",
Artificial Intelligence and Evolutionary Computations in
Engineering Systems Vol. 394 of the series Advances in
Intelligent Systems anComputing,Springer, pp.655-666, 2016.