This document proposes a lightweight message authentication framework for intelligent vehicle systems. It aims to allow vehicles to authenticate messages without relying on a central certificate authority. The framework has two phases: Phase I uses simulation experiments to determine a visibility time window (VTW) based on basic safety message (BSM) behavior over time. This window defines how long two vehicles can build a trusted relationship. Phase II monitors message consistency over the VTW by having the sending vehicle calculate a message authentication code (MAC) and the receiving vehicle verify it based on estimated vehicle attributes. The document focuses on Phase I, discussing BSM format and conducting simulations with different vehicle sizes, speeds and road settings to calculate VTW. Results show VTW ranges from 3.
SMS(Short Message Service)plays vital role in
day to day life. SMS used in many real world application like
Transportation Information System, private health facilities
using SMS, mobile banking, participation in elections through
SMS, in Crime Scene Investigation and many more.The major
problem facing in SMS is security ,while transferring message
like account number or password from one user to another
user it just taken as a plain text so there some type of attacks
like man in the middle attack, disclosure, replay attack takes
place and causing a huge risk. The traditional SMS service
does not provide information security like confidentiality,
integrity, authenticity. The attacker can alter SMS Information
using weak encryption algorithm like A5/1 or A5/2.The existing
protocol used for providing security in SMS is based on
asymmetric and symmetric key. To provide secure end to end
communication Easy SMS protocol is used which is completely
based on symmetric key. On applying AES algorithm it may
provide effective encryption for password. The expecting result
on using Easy SMS protocol is to reduce bandwidth
consumption and increasing the password or pass code
strength through SMS.
A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTSIJNSA Journal
Universal Mobile Telecommunication System (UMTS) is a popular 3G standard for mobile
telecommunication networks. ‘Vulnerability of the subscriber’s identity privacy and the need to eliminate
this vulnerability’, is an established security issue in UMTS. This vulnerability continues to exist up to
various extents in the descendent networks of UMTS, like LTE. Several solutions suggesting improvements
to the identity privacy in UMTS is present in the literature. In this paper, we look into select few of these
solutions, with the expectation that researcher envisioning to work in this area will get a direction in
devising an efficient mechanism in improving identity privacy in UMTS, its descendants and future mobile
networks.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATIONijcisjournal
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices. It
uses an Extended Password Key Exchange Protocols [2] and elliptic-curve-cryptosystem based trust
delegation mechanism to generate a delegation pass code for mobile station authentication, and it can
effectively defend all known attacks to mobile networks including the denial-of-service attack. Moreover,
the mobile station only needs to receive one message and send one message to authenticate itself to a
visitor’s location register, and the model only requires a single elliptic-curve scalar point multiplication on
a mobile device. Therefore, this model enjoys both computation efficiency and communication efficiency as
compared to known mobile authentication models.
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.
Enhanced Conditional Privacy Preservation In VANETsIJERDJOURNAL
Abstract:- The Vehicle drivers (users) do not want their personal information such as vehicle names, license plate, speed, positions, moving routes, and user information to be revealed, in order to protect them against any illegal tracing or user profiling. Thus, this information must be protected from any kind of misuse or attacks. For this the obscurity of vehicular nodes should be supported to preserve privacy of vehicles and their users. Also, we should be able to investigate for accidents or liabilities from non-repudiation. Hence, we present an enhanced conditional privacy preservation scheme for vehicular ad-hoc networks (VANETs). This scheme includes an ID-based cryptosystem to assure user's obscurity using pseudonyms; however the model provides a backdoor for authorities to track misbehaving and suspicious users
SMS(Short Message Service)plays vital role in
day to day life. SMS used in many real world application like
Transportation Information System, private health facilities
using SMS, mobile banking, participation in elections through
SMS, in Crime Scene Investigation and many more.The major
problem facing in SMS is security ,while transferring message
like account number or password from one user to another
user it just taken as a plain text so there some type of attacks
like man in the middle attack, disclosure, replay attack takes
place and causing a huge risk. The traditional SMS service
does not provide information security like confidentiality,
integrity, authenticity. The attacker can alter SMS Information
using weak encryption algorithm like A5/1 or A5/2.The existing
protocol used for providing security in SMS is based on
asymmetric and symmetric key. To provide secure end to end
communication Easy SMS protocol is used which is completely
based on symmetric key. On applying AES algorithm it may
provide effective encryption for password. The expecting result
on using Easy SMS protocol is to reduce bandwidth
consumption and increasing the password or pass code
strength through SMS.
A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTSIJNSA Journal
Universal Mobile Telecommunication System (UMTS) is a popular 3G standard for mobile
telecommunication networks. ‘Vulnerability of the subscriber’s identity privacy and the need to eliminate
this vulnerability’, is an established security issue in UMTS. This vulnerability continues to exist up to
various extents in the descendent networks of UMTS, like LTE. Several solutions suggesting improvements
to the identity privacy in UMTS is present in the literature. In this paper, we look into select few of these
solutions, with the expectation that researcher envisioning to work in this area will get a direction in
devising an efficient mechanism in improving identity privacy in UMTS, its descendants and future mobile
networks.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATIONijcisjournal
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices. It
uses an Extended Password Key Exchange Protocols [2] and elliptic-curve-cryptosystem based trust
delegation mechanism to generate a delegation pass code for mobile station authentication, and it can
effectively defend all known attacks to mobile networks including the denial-of-service attack. Moreover,
the mobile station only needs to receive one message and send one message to authenticate itself to a
visitor’s location register, and the model only requires a single elliptic-curve scalar point multiplication on
a mobile device. Therefore, this model enjoys both computation efficiency and communication efficiency as
compared to known mobile authentication models.
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.
Enhanced Conditional Privacy Preservation In VANETsIJERDJOURNAL
Abstract:- The Vehicle drivers (users) do not want their personal information such as vehicle names, license plate, speed, positions, moving routes, and user information to be revealed, in order to protect them against any illegal tracing or user profiling. Thus, this information must be protected from any kind of misuse or attacks. For this the obscurity of vehicular nodes should be supported to preserve privacy of vehicles and their users. Also, we should be able to investigate for accidents or liabilities from non-repudiation. Hence, we present an enhanced conditional privacy preservation scheme for vehicular ad-hoc networks (VANETs). This scheme includes an ID-based cryptosystem to assure user's obscurity using pseudonyms; however the model provides a backdoor for authorities to track misbehaving and suspicious users
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
Vehicular Networks (VNs) seek to provide, among other applications, safer driving conditions. Vehicles need to periodically broadcast safety messages providing precise position information to nearby vehicles. Recent advances in development of Wireless Communication in Vehicular Adhoc Network (VANET) has provided emerging platform for industrialists and researchers. Vehicular adhoc networks are multi-hop networks with no fixed infrastructure. As a result, the driver’s privacy is at stake. In order to mitigate this threat, while complying with the safety requirements of VNs, the creation of mix-zones security at appropriate places of the VN to prevent the attacks Vehicle. Propose to do so with the use of cryptography algorithm AES with zone based routing protocol, analytically how the combination of mix-zones into mix-networks brings forth location privacy in vehicle node. Finally, show by simulations that the proposed zone based security is effective in various scenarios.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Brisk and secure ad hoc vehicular communicationeSAT Journals
Abstract The idea of Car-to-Car communication is a revolutionary phenomenon in the automobile industry. This idea will surely change the future of humanity for good. This technology will surely change the perception of how a traditional automotive was initially thought of by adding endless applications as a boon to mankind. The application of cars communicating with each other is enormous and has already been discussed by many researchers by now. But, the important thing here is how to put it in practice with the increasing demand for cars and making it safe to use it, at least improve the current condition by this new technology and not worsen the situation by digital hacking and other flaws. Since the nature of the Communication System is highly dynamic a strict security mechanism is mandatory for its seamless functioning. We propose to encrypt the communication taking place in C2C communication which is not the same as using the Internet security mechanism due to limitation of its speed and residing hardware servers. Symmetric Cryptography thus fails to incorporate the scope of various security disciplines and hence it is ineffective to use such techniques. Asymmetric Cryptography on the other hand provides an ideal trade-off among various security disciplines and hence it is considered as an alternative approach to accomplish a secure system but it fails when applied in an ad-hoc environment. However, the traditional Public Key Infrastructure (PKI) technique fails in several ways so we propose a modified form of communication and authentication technique along with rapid communication and group messages to fasten the speed of communication. Keywords: Protocol, Communication, Security, Privacy
Vehicular ad hoc network is one of the most interesting research areas due to flexibility, low cost, high sensing fidelity, fault tolerance, creating many new and exciting application areas for remote sensing. So, it has emerged as a promising tool for monitoring the physical world with wireless sensor that can sense, process and communicate. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. VANETs have now been established as reliable networks that vehicles use for communication purpose on highways or urban environments. VANET considered as a distinct type of Mobile Ad Hoc Networks holds the opportunity to make peoples life and death decisions by predicting and helping the drivers and other people about the road safety and other critical conditions.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field throughout the most recent couple of years. VANETs are the likely an impacting way to deal with giving security of driver and different applications for the activity conditions and additionally travelers. Being dynamic in nature, it created the network, according to the condition and requirement of the users and provides consistent communication between the vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and security in VANET should be taken into consideration. This paper presented the security issues such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the performance and security of this network. The fundamental point of this paper is the several security challenges and the applications of VANETs.
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
Vehicular Ad-hoc Network (VANET) technology is the basis of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro between vehicles in vehicle-to-vehicle communication mode; or between vehicle and infrastructure in vehicle-to-infrastructure mode for safety and comfort. However, due to the openness of the wireless medium used by VANET, the technology is vulnerable to security threats in both communication modes. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of modification attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for modification attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the modification attack in VANET.
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
Recently, vehicular ad hoc networks (VANETs) have been garnering
significant inter-est from the people involved in transportation field.
Nowadays automotive manufactur-ers have already supplying vehicles with
multitude of road sensors that provides many useful characteristics. VANET
communication not only offers the drivers and passen-gers with the various
safety related services but also provides a wide range of valuable
applications. However, the inherent openness of the wireless communication
medium used by VANETs exposes vehicles to various security and privacy
issues. Researchers have proposed many security schemes to solve the issues
mentioned above for the widespread deployment of VANETs. However,
these schemes failed to fulfill all as-pects of security and privacy
requirements. Besides, these schemes have not provided the performance
parameters such as computation and communication costs. The pri-mary
emphasis of this paper is on the taxonomy of security schemes based
conditional privacy-preserving with respect to strengths and limitations.
Besides, a comparison be-tween these schemes related to the model of
security and privacy requirements, attacks, and performance parameters is
provided. Finally, this paper critically reviews the re-lated works by taking
into consideration the design and development of all VANETs security and
privacy schemes, this paper could serve as a guide and reference.
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
Cyber DoS attack-based security simulator for VANET IJECEIAES
At the late years, researches focused on the cyber denial of service (DoS) attacks in the vehicle ad hoc networks (VANETS). This is due to high importance of ensuring the save receiving of information in terms of vehicle to vehicle (V2V), vehicle to infrastructure (V2I) and Vehicle to Road side unit (V2R). In this paper, a cyber-security system is proposed to detect and block the DoS attacks in VANET. In addition, a simulator for VENAT based on lightweight authentication and key exchange is presented to simulate the network performance and attacks. The proposed system consists of three phases: registration, authentication as well as communications and DoS attack detection. These phases improve the system ability to detect the attacks in efficient way. Each phase working is based in a proposed related algorithm under the guidance of lightweight protocol. In order to test the proposed system, a prototype is considered includes six cars and we adopt police cars due to high importance of exchanged information. Different case studies have been considered to evaluate the proposed system and the obtained results show a high efficiency of performance in terms of information exchange and attack detection.
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)IAEME Publication
Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a threshold-based authentication scheme for cluster-based VANETs is proposed. The vehicles are clustered, and the threshold degree of each node is estimated. The threshold degree is a combination of direct threshold degree and indirect threshold degree. Based on this estimated threshold degree, cluster heads are selected. Then, each vehicle is monitored by a set of verifiers, and the messages are digitally signed by the sender and encrypted using a public/ private key as distributed by a threshold authority and decrypted by the destination. This verifies the identity of sender as well as receiver thus providing authentication to the scheme. By simulation results, we prove that the proposed technique provides high security with less overhead and delay.
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksIJCNCJournal
For creating a mobile network, the moving cars consider as nodes in the Vehicular Ad-Hoc Networks (VANETs). Each participating car is turned into a wireless router in the VANETs that allows the connecting and creating a network. To improve the comfort and safety of driving of automotive users, the vehicular environment system develops in the vehicular environment systems using the wireless access. The channel congestion causes the degradation of quality of service in such cases with higher vehicle density. The real-time and reliable communication is required for various safety applications of VANETs. The dense traffic network has included one of the major challenges as avoiding the communication channels’ degradation. To provide the network with efficient operation, most of the studies are recommended to use the appropriate congestion control methods. It’s important to note that many congestion control mechanisms are not implemented for event-driven real-time safety messages. Based on the congestion probability approach estimation, CFRS-CP-Congestion free route selection is introduced for minimizing the total number of data flow packets that passing through the congested nodes. At each node, the congestion probability is estimated using the proposed technique of CFRS-CP based on link quality, MAC overhead, neighbour density & vehicle velocity. Then, the estimated congestion probability is used for route assessment. The estimated probability value is appended to the control packets for comparison. All the available routes are assessed based on the estimated congestion probability which results in congestion free routing path for every round of data communication. The simulation results prove that the proposed method decreases end to end delay by 32% and improves PDR up to 30% and throughput up to 45% compared to the existing protocols.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
More Related Content
Similar to A Lightweight Message Authentication Framework in the Intelligent Vehicles System
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
Vehicular Networks (VNs) seek to provide, among other applications, safer driving conditions. Vehicles need to periodically broadcast safety messages providing precise position information to nearby vehicles. Recent advances in development of Wireless Communication in Vehicular Adhoc Network (VANET) has provided emerging platform for industrialists and researchers. Vehicular adhoc networks are multi-hop networks with no fixed infrastructure. As a result, the driver’s privacy is at stake. In order to mitigate this threat, while complying with the safety requirements of VNs, the creation of mix-zones security at appropriate places of the VN to prevent the attacks Vehicle. Propose to do so with the use of cryptography algorithm AES with zone based routing protocol, analytically how the combination of mix-zones into mix-networks brings forth location privacy in vehicle node. Finally, show by simulations that the proposed zone based security is effective in various scenarios.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Brisk and secure ad hoc vehicular communicationeSAT Journals
Abstract The idea of Car-to-Car communication is a revolutionary phenomenon in the automobile industry. This idea will surely change the future of humanity for good. This technology will surely change the perception of how a traditional automotive was initially thought of by adding endless applications as a boon to mankind. The application of cars communicating with each other is enormous and has already been discussed by many researchers by now. But, the important thing here is how to put it in practice with the increasing demand for cars and making it safe to use it, at least improve the current condition by this new technology and not worsen the situation by digital hacking and other flaws. Since the nature of the Communication System is highly dynamic a strict security mechanism is mandatory for its seamless functioning. We propose to encrypt the communication taking place in C2C communication which is not the same as using the Internet security mechanism due to limitation of its speed and residing hardware servers. Symmetric Cryptography thus fails to incorporate the scope of various security disciplines and hence it is ineffective to use such techniques. Asymmetric Cryptography on the other hand provides an ideal trade-off among various security disciplines and hence it is considered as an alternative approach to accomplish a secure system but it fails when applied in an ad-hoc environment. However, the traditional Public Key Infrastructure (PKI) technique fails in several ways so we propose a modified form of communication and authentication technique along with rapid communication and group messages to fasten the speed of communication. Keywords: Protocol, Communication, Security, Privacy
Vehicular ad hoc network is one of the most interesting research areas due to flexibility, low cost, high sensing fidelity, fault tolerance, creating many new and exciting application areas for remote sensing. So, it has emerged as a promising tool for monitoring the physical world with wireless sensor that can sense, process and communicate. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. VANETs have now been established as reliable networks that vehicles use for communication purpose on highways or urban environments. VANET considered as a distinct type of Mobile Ad Hoc Networks holds the opportunity to make peoples life and death decisions by predicting and helping the drivers and other people about the road safety and other critical conditions.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field throughout the most recent couple of years. VANETs are the likely an impacting way to deal with giving security of driver and different applications for the activity conditions and additionally travelers. Being dynamic in nature, it created the network, according to the condition and requirement of the users and provides consistent communication between the vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and security in VANET should be taken into consideration. This paper presented the security issues such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the performance and security of this network. The fundamental point of this paper is the several security challenges and the applications of VANETs.
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
Vehicular Ad-hoc Network (VANET) technology is the basis of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro between vehicles in vehicle-to-vehicle communication mode; or between vehicle and infrastructure in vehicle-to-infrastructure mode for safety and comfort. However, due to the openness of the wireless medium used by VANET, the technology is vulnerable to security threats in both communication modes. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of modification attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for modification attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the modification attack in VANET.
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
Recently, vehicular ad hoc networks (VANETs) have been garnering
significant inter-est from the people involved in transportation field.
Nowadays automotive manufactur-ers have already supplying vehicles with
multitude of road sensors that provides many useful characteristics. VANET
communication not only offers the drivers and passen-gers with the various
safety related services but also provides a wide range of valuable
applications. However, the inherent openness of the wireless communication
medium used by VANETs exposes vehicles to various security and privacy
issues. Researchers have proposed many security schemes to solve the issues
mentioned above for the widespread deployment of VANETs. However,
these schemes failed to fulfill all as-pects of security and privacy
requirements. Besides, these schemes have not provided the performance
parameters such as computation and communication costs. The pri-mary
emphasis of this paper is on the taxonomy of security schemes based
conditional privacy-preserving with respect to strengths and limitations.
Besides, a comparison be-tween these schemes related to the model of
security and privacy requirements, attacks, and performance parameters is
provided. Finally, this paper critically reviews the re-lated works by taking
into consideration the design and development of all VANETs security and
privacy schemes, this paper could serve as a guide and reference.
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
Cyber DoS attack-based security simulator for VANET IJECEIAES
At the late years, researches focused on the cyber denial of service (DoS) attacks in the vehicle ad hoc networks (VANETS). This is due to high importance of ensuring the save receiving of information in terms of vehicle to vehicle (V2V), vehicle to infrastructure (V2I) and Vehicle to Road side unit (V2R). In this paper, a cyber-security system is proposed to detect and block the DoS attacks in VANET. In addition, a simulator for VENAT based on lightweight authentication and key exchange is presented to simulate the network performance and attacks. The proposed system consists of three phases: registration, authentication as well as communications and DoS attack detection. These phases improve the system ability to detect the attacks in efficient way. Each phase working is based in a proposed related algorithm under the guidance of lightweight protocol. In order to test the proposed system, a prototype is considered includes six cars and we adopt police cars due to high importance of exchanged information. Different case studies have been considered to evaluate the proposed system and the obtained results show a high efficiency of performance in terms of information exchange and attack detection.
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)IAEME Publication
Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a threshold-based authentication scheme for cluster-based VANETs is proposed. The vehicles are clustered, and the threshold degree of each node is estimated. The threshold degree is a combination of direct threshold degree and indirect threshold degree. Based on this estimated threshold degree, cluster heads are selected. Then, each vehicle is monitored by a set of verifiers, and the messages are digitally signed by the sender and encrypted using a public/ private key as distributed by a threshold authority and decrypted by the destination. This verifies the identity of sender as well as receiver thus providing authentication to the scheme. By simulation results, we prove that the proposed technique provides high security with less overhead and delay.
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksIJCNCJournal
For creating a mobile network, the moving cars consider as nodes in the Vehicular Ad-Hoc Networks (VANETs). Each participating car is turned into a wireless router in the VANETs that allows the connecting and creating a network. To improve the comfort and safety of driving of automotive users, the vehicular environment system develops in the vehicular environment systems using the wireless access. The channel congestion causes the degradation of quality of service in such cases with higher vehicle density. The real-time and reliable communication is required for various safety applications of VANETs. The dense traffic network has included one of the major challenges as avoiding the communication channels’ degradation. To provide the network with efficient operation, most of the studies are recommended to use the appropriate congestion control methods. It’s important to note that many congestion control mechanisms are not implemented for event-driven real-time safety messages. Based on the congestion probability approach estimation, CFRS-CP-Congestion free route selection is introduced for minimizing the total number of data flow packets that passing through the congested nodes. At each node, the congestion probability is estimated using the proposed technique of CFRS-CP based on link quality, MAC overhead, neighbour density & vehicle velocity. Then, the estimated congestion probability is used for route assessment. The estimated probability value is appended to the control packets for comparison. All the available routes are assessed based on the estimated congestion probability which results in congestion free routing path for every round of data communication. The simulation results prove that the proposed method decreases end to end delay by 32% and improves PDR up to 30% and throughput up to 45% compared to the existing protocols.
Similar to A Lightweight Message Authentication Framework in the Intelligent Vehicles System (20)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
A Lightweight Message Authentication Framework in the Intelligent Vehicles System
1. The International Journal of Engineering and Science (IJES)
|| Volume || 6 || Issue || 6 || Pages || PP 33-39 || 2017 ||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805
DOI: 10.9790/1813-0606013339 www.theijes.com Page 33
A Lightweight Message Authentication Framework in the
Intelligent Vehicles System
1
Mostafa El-Said, 2
Alexander Arendsen, 3
Samah Mansour
1
School of Computing and Information Systems Grand Valley State University Allendale, MI 49401-9403
2
University of Central Florida Computer Science Dept 100 Weldon Boulevard, Sanford, FL 32773
3
School of Computing and Information Systems Grand Valley State University Allendale, MI 49401-9403
--------------------------------------------------------ABSTRACT-----------------------------------------------------------
Intelligent Vehicles System (IVS) supports a wide variety of Advanced Driver Assistance System (ADAS)
services such as vehicle visibility detection. In implementing this service, the message authentication is a vital
design parameter that protects victim vehicles from being tricked into accepting false messages as legitimate
ones and make a false decision based on the incoming message. However, implementing message authentication
service is too expensive especially if vehicles, initially, don’t trust each others or there is no certificate of
authority in place.
In this research, we investigate the use of the Basic Safety Message (BSM) behavior over time as a metric to
allow a receiving vehicle to anticipate at what distance it will continue to receive BSMs from within-range
vehicles. Therefore, the victim vehicle would reject the BSM messages that fall outside its acceptance window.
Simulation experiments are setup to study the realistic behavior of the BSM messages in different environment
characteristics including changing the vehicle size, number of road lanes and vehicle speed. Research findings
suggested that the lightweight message authentication can assist vehicles in estimating the duration for a trusted
relationship among those that are located within range of each others.
Keywords - ITS, DSRC, message authentication, Visibility.
-------------------------------------------------------------------------------------------------------------------------
Date of Submission: 14 January 2017 Date of Accepted: 09 June 2017
-------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
In a connected vehicle system, Basic Safety Message (BSM) is used to convey road safety messages on US high
ways [1]. Connected vehicles are communicating using either Vehicle-to-Vehicle (V2V) or Vehicle-to-
Infrastructure communication architecture. V2V communications aims to provide each vehicle with 360-degree
situational awareness of nearby vehicles, and by complementing onboard sensors in detecting possible crash
scenarios [3]. Moreover, in V2V or V2I architecture, vehicles use Dedicated Short Range Communications
(DSRC) transmissions to share Advanced Driver Assistance System (ADAS) safety information services such as
road conditions or vehicle’s location, weight, size or its heading direction, probability of vehicle collision with
neighboring vehicles. Authors in [1], indicated that a recent report issued by the National Highway Traffic
Safety Administration United States (NHTSA) shows that implementing just two V2V safety applications
(Intersection Movement Assist (IMA) and Left Turn Assist (LTA)) will potentially prevent 25,000 to 592,000
crashes, save 49 to 1,083 lives, avoid 11,000 to 270,000 maximum abbreviated injuries, and minimize 31,000 to
728,000 property damage. Research efforts to better use the BSM message in the dissemination process of
safety messages presented in the work presented by authors in [1]
Authors in [1], developed a Tractor-Trailer Basic Safety Message (TT-BSM) extensions to correctly represent
the location of the articulated vehicles in V2X communications. The authors’ approach aims to reduce the
potential for false safety warnings messages in the DSRC-based systems. Authors indicated that the additional
data sent in the BSM will have a minor effect on the over-the-air data traffic or the channel utilization efficiency
because the number tractor-trailer vehicles is fairly a small fraction of the overall vehicles on the road.
However, attacking and altering the safety messages sent in the V2V environment becomes possible due to the
fact that vehicles have various penetration inputs. Consequently, this will lead to defeat the purpose of
implementing a V2V communication to promote awareness and safety on our roads.
Vehicle attack surface represents all the possible ways to attack a victim vehicle. The target could be the
vehicle’s On Board Unit (OBU) or the entire vehicle system. The vehicle has multiple entry points to
synchronize the attack that is represented by the system’s possible weaknesses. In a V2V or V2I network
architecture, an attacker will consider all the possible ways to inject malicious or fake data into the vehicle
system via any of its sensors such as RADAR, LIDAR, ultrasound or the DSRC sensor such as shown in Fig. 1.
2. A Lightweight Message Authentication Framework in the Intelligent Vehicles System
DOI: 10.9790/1813-0606013339 www.theijes.com Page 34
Furthermore, the attacker constructs a dynamic threat model to study and track the victim vehicle to learn about
how these sensors communicate and at what time they are active. Then, choosing the location, entry point and
the right time to inject the malicious data becomes a critical factor to execute the hacking activity [2].
Figure 1. V2V Attack Scenario
Efforts made research and industry communities to protect the BSM messages over the air. In [3], authors
introduced an On-board Unit (OBU) VBSS solution, which generates a short-term certificate and signs Basic
Safety Messages (BSM) to preserve privacy and enhance security. In this work, authors developed their
solution based on the Public Key Infrastructure (PKI) where vehicles create groups. Each group will have its
public and private keys, and a vehicle will sign a message using its group’s private key. Moreover, authors
encouraged research community to continue conducting further research to validate the proposed vehicle-based
approach in V2V credential management.
In this research, we are investigating another Vehicle-Based Security System (VBSS) for a V2V system to
provide security and privacy via developing a lightweight message authentication framework solution. The
proposed framework allows a victim vehicle to discriminate against spoofed BSM messages. When building this
framework, several design goals were considered and special efforts were made to:
- Provide on a vehicle infrastructure-less solution.
- Rely on a Certificate Authority-less solution. Therefore, no need to the use of certificate authority body
hosted on a fixed Radio Service Unit (RSU).
- Predict the authentication session duration for how long the two vehicles will build their trust relationship via
message authentication.
The proposed solution’s framework consists of two phases such as described below:
Phase-I:
In this phase, the authentication session lifetime is estimated by having two vehicles predicting a Visibility
Time Window (VTW) factor based on the timing and the sequence of the BSM messages and the vehicle’s
speed. So, essentially the VTW window defines the duration for the authentication session. Simulation
experiments will be conducted to determine the VTW in different simulation environments. Messages arrived
outside the VTW may be ignored because they may redundant or malicious.
Phase-II: Monitoring the consistency of a
In this phase, the sending vehicle will calculate a Message Authentication Code (MAC) and the receiving
vehicle will verify this code over the duration of the VTW window such as follows:
a. At the sending vehicle, the MAC value is calculated based on hashing the vehicle VIN number, location and
size. Then the sending vehicle sends out its BSM message along with the calculated MAC value.
b. At the receiving vehicle, the OBU verifies the BSM message integrity using the incoming MAC value as well
as calculating a hash value such as follows:
i. Use the camera sensor to capture a picture for the sending vehicle,
ii. Use the picture estimation algorithm in [4] to estimate the vehicle’s size,
iii. Hash the sending vehicle’s estimated size from step (ii), VIN number, location,
iv. Compare the value calculated in above in (iii) with the incoming hash value and
v. If the two hash values match, this means that the message is coming from a trusted source; otherwise, it will be
disregarded and dropped.
Since calculating the VTW window is cornerstone for this solution framework, we will focus on implementing
the framework’s first phase in this paper. The remainder of the paper is organized as follows. Section 2
provides an overview on the BSM message format, Section 3 describes how the simulation experiments are
designed and executed. Sections 4 and 5 conclude the paper and outline the future work.
Attacker’s
Malicious
Warning
Message Attack
Vehicle
Victim
Vehicle
3. A Lightweight Message Authentication Framework in the Intelligent Vehicles System
DOI: 10.9790/1813-0606013339 www.theijes.com Page 35
II. BASIC SAFETY MESSAGE (BSM)
By default, BSMs are periodically broadcasted to nearby vehicles carrying the safety messages. However, user
custom information can be added to the BSM messages using custom fields. An example for custom info is a
pull-over BSM message sent to a police vehicle to a violating vehicle. Messages that carry such sensitive info
should be verified to ensure its legitimacy while protecting the identity of the driver or vehicle [3].
According to the SAE J2735 DSRC definition, BSM message consists of data elements (DEs) and data frames
(DFs). The data frame consists of one or more data elements or other data frames. Furthermore, the BSM
message consists of two sections such as shown in table 1. The first section is a required section of any BSM
message and is known as Basic Vehicle State with a size of 39 Bytes. The second section of the BSM is optional
and contains the Vehicle Safety Extensions and the Vehicle Status data frames. In general, vehicles periodically
broadcast the first section of the BSM message only. However, in some events such as emergency braking, the
BSM message can be further described by setting the corresponding event flag in the second part of the BSM,
[1].
Table 1: Basic Safety Message (BSM)
BSM Data Item Sequence BSM
Part
Type Bytes
Message ID I Data Element 1
Message Count I Data Element 1
Temporary ID I Data Element 4
Time I Data Element 2
Latitude
PositionLocal3D
I Data Element 4
Longitude I Data Element 4
Elevation I Data Element 2
Positioning Accuracy I Data Frame 4
Transmission & Speed
Motion
I Data Frame 2
Heading I Data Element 2
Steering Wheel Angle I Data Element 1
Accelerations I Data Frame 7
Brake System Status Control I Data Frame 2
Vehicle Size Vehicle Basics I Data Frame 3
To keep track of the number of BSM messages sent out over time, the BSM message format contains a field
called MsgCount. It is simply a number that serves the same purpose as sequence numbers in traditional
networking protocols. Fig. 2 is developed by a 3D Simulink model. It displays the progression of the MsgCount
field of two transmitting vehicles over time (one vehicle is pink, the other is yellow). Fig. 2 shows that two cars
are traveling together from the right of the screen to the left, while a third one is traveling on the opposite
direction is the receiving vehicle.
Figure 2. MsgCount Field Progression over Time for Two BSM Messages
III. EXPERIMENTAL ANALYSIS
We carried out multiple simulation experiments to calculate the visibility time between two testing vehicles. The
visibility time represents the amount of time during which the transmitting vehicle was within the receiving
vehicle's range. In the next sections, we’ll introduce our simulation environment implemented by PreScan and
the details of the conducted experiments to calculate the visibility time in different settings.
4. A Lightweight Message Authentication Framework in the Intelligent Vehicles System
DOI: 10.9790/1813-0606013339 www.theijes.com Page 36
3.1 Prescan Simulation Engine
PreScan is a simulation development environment that is used to simulate realistic driving conditions and allow
for testing users’ algorithms and ADAS services in realistic simulation environment. It supports
communications using various sensor technologies such as built-in vehicle camera, LIDAR, RADAR, and GPS
in V2V and V2I architecture. PreScan supports three design paradigms: model-based controller design (MIL),
real-time tests with software-in-the-loop (SIL) and hardware-in-the-loop (HIL) systems [4 and 5]. PreScan
provides a GUI that enables us to build a simulation scenario and model sensors, while the Simulink and
MATLAB interface allows us to add a control system to define the simulation building blocks to test the ADAS
application or the user algorithm. There are four steps to build and run a simulation scenario such as described
below and in Fig. 3.
a. Building the simulation scenario
A dedicated GUI is used to build and modify traffic scenarios using an existing database of road sections, trees,
buildings, traffic signs, different vehicles such as cars, trucks and various weather conditions such as rain, snow
and fog.
b. Modeling sensors
Various types of sensors such as radar, laser, camera, ultrasound, infrared, GPS and antennas for vehicle-to-X
(V2X) communication can be added with various parameters to adjust to fit the simulation scenario.
c. Adding control system
A Matlab/Simulink interface enables us to control the vehicle movement algorithm as well as sensor fusion and
adding any user custom module to perform a mathematical operation such as calculating the inter-vehicle
distance in a simulation environment and exporting collected data to output files.
d. Running the simulation experiment
A 3D visualization viewer allows users to monitor the progress of the simulation experiment as well as analyze
the obtained results.
Figure 3. PreScan Simulation Engine Life Cycle [5]
3.2 Building Simulation Experiments
PreScan has been chosen to implement the simulation environment because it supports DSRC communications.
We setup and ran PreScan and Simulink simulation experiments to determine the visibility time between two
testing vehicles using different scenarios such as described in table 2, 3, 4 and 5:
Table 2: Control Experiment Parameters
Experiment1: Control Experiment Parameters
Vehicle Size Vehicle Speed Vehicle Trajectory
Sending Vehicle Receiving Vehicle Sending
Vehicle (m/s)
Receiving
Vehicle (m/s)
Road
Length(m)
Number of
Lanes
Sedan - Citreon C3 -
Travels along westernmost
northbound lane, turns left
at intersection
Sedan - BMW Z3 - Travels
along southernmost
eastbound lane, turns left at
intersection
15 15 120 2 opposite
lanes
5. A Lightweight Message Authentication Framework in the Intelligent Vehicles System
DOI: 10.9790/1813-0606013339 www.theijes.com Page 37
Table 3: Truck Experiment Parameters
Experiment 2: Truck Experiment Parameters
Vehicle Size Vehicle Speed Vehicle Trajectory
Sending Vehicle Receiving Vehicle Sending Vehicle
(m/s)
Receiving
Vehicle (m/s)
Road
Length(m)
Number of
Lanes
Truck/Nissan Cabstar -
Travels along westernmost
northbound lane, turns left at
intersection
Sedan - BMW Z3 Travels
along southernmost
eastbound lane, turns left at
intersection
15 15 120 2 opposite
lanes
Table 4: Five Lanes Experiment Parameters
Experiment 3: Five Lanes Experiment Parameters
Vehicle Size Vehicle Speed Vehicle Trajectory
Sending Vehicle Receiving Vehicle Sending
Vehicle (m/s)
Receiving
Vehicle (m/s)
Road
Length(m)
Number of
Lanes
Sedan - Citreon C3 - Travels
along westernmost northbound
lane, turns left at intersection
Sedan - BMW Z3 - Travels
along southernmost
eastbound lane, turns left at
intersection
15 15 120 5 opposite
lanes
Table 5: 25 Meter per Sec Speed Experiment Parameters
Experiment 4: Twenty-Five MPS Experiment Parameters
Vehicle Size Vehicle Speed Vehicle Trajectory
Sending Vehicle Receiving Vehicle Sending Vehicle
(m/s)
Receiving
Vehicle (m/s)
Road
Length(m)
Number
of Lanes
Sedan - Citreon C3 - Travels
along westernmost northbound
lane, turns left at intersection
Sedan - BMW Z3 - Travels
along southernmost
eastbound lane, turns left at
intersection
25 25 120 2 opposite
lanes
A snapshot from the real time simulation environment for each experiment is depicted in Fig 4.
(a) Real Time View of the Simulation Environment For the
Control Experiment
(b) Real Time View of the Simulation Environment For
the Truck Experiment
(c) Real Time View of the Simulation Environment For the
5 Lanes Experiment
(d) Real Time View of the Simulation Environment For
the 25 m/s Speed Experiment
Figure 4. PreScan Simulation Environment
6. A Lightweight Message Authentication Framework in the Intelligent Vehicles System
DOI: 10.9790/1813-0606013339 www.theijes.com Page 38
The data collected from the simulation experiments are synchronous across all experiments, which means that
the time samples for all experiments match up to that of the control experiment without error. Simulation results
obtained are summarized in table 6.
Table 6: Simulation Results Summary
Experiment Type First BSM Message Time
(Sec)
Last BSM Message Time
(Sec)
Visibility Time (Sec)
Control Experiment (1) 2.2 5.90 3.75
Truck Experiment (2) 2.2 5.95 3.80
Five Lanes Experiment (3) 2.2 6.20 3.95
25 MPS Speed Experiment (4) 1.80 4.25 2.45
We have observed that, as long as the vehicles speed is the same, the visibility time is almost the same such as
shown below:
Control experiment (2.2 5.90: 3.75Sec),
Truck experiment (2.25.95: 3.80Sec),
Five Lanes experiment (2.26.20: 3.95Sec),
25m/s experiment (1.804.25: 2.45Sec).
This means that the receiving vehicle is able to detect its peer vehicle at an average visibility time of 3.83 Sec.
In other words, the two vehicles will be able to hold an active authenticated communications session for 3.83 Sec
starting from receiving the first BSM message. The only exception here is when the two vehicle are travelling
with a high speed (25m/s), the visibility time = 2.45 Sec. Therefore, the vehicle that is traveling at a higher
speed (25 m/s) was detectable for less time and they are able to hold a shorter V2V communications session. So,
when vehicles travel at the same speed for instance at (15m/s), vehicles can predict for how far and for how long
they will be engaged in an authenticated communication session. Assume that before a target vehicle is being
within range of an attack vehicle, the attack vehicle will know neither its distance from the victim vehicle nor its
victim's receiving range. Consequently, it will be very difficult for an attacker to successfully synchronize an
attack to get a spoofed fake message through without any outside help because the target vehicle is sensitive not
only to the contents of the BSM, but also to the behavior of the BSM's contents over time.
ACKNOWLEDGEMENTS
The authors would like to thank the TASS International Company in MI, USA for allowing us an opportunity to
test and practice with their PreScan Simulation environment.
IV. CONCLUSION
In this paper, authors focused on predicting the authentication session duration based on estimating the visibility
time between 2 vehicles in a V2V vehicle communication scenario. Authors introduced the visibility time
window as a measure for the authentication session duration. Authors conducted simulation experiments using
PreScan to study measure the visibility time between two vehicles in a V2V environment. The effect of several
driving environment conditions have been studied and analyzed such as vehicle size, speed, and number of road
lanes.
We found that it is fairly easy that vehicles can estimate how long their communication session can last for from
receiving the first BSM message. Any messages arrived outside the visibility time window may be ignored
Future Work
Authors would like to investigate the implementation and evaluation of the second phase of the proposed
framework.
REFERENCES
[1]. A. Svenson, G. Peredo, and L. Delgrossi (2015). Development of a Basic Safety Message for Tractor-
Trailers for Vehicle-to-Vehicle Communications. 24th International Technical Conference on the
Enhanced Safety of Vehicles (ESV), Gothenburg, Sweden
[2]. G. Corser, A. Arenas, and H. Fu (2016). Effect on vehicle safety of nonexistent or silenced basic safety
messages. 2016 International Conference on Computing, Networking and Communications (ICNC),
Kauai, Hawaii, USA.
[3]. J. Carter, and N. Paul (2015). Analysis of Vehicle-Based Security Operations. 24th International
Technical Conference on the Enhanced Safety of Vehicles (ESV), Gothenburg, Sweden
7. A Lightweight Message Authentication Framework in the Intelligent Vehicles System
DOI: 10.9790/1813-0606013339 www.theijes.com Page 39
[4]. M. Huang, Visibility and confidence estimation of an onboard-camera image for an intelligent vehicle.
(2015), Accessed 2016
[5]. PreScan automotive simulation, https://www.tassinternational.com/prescan, Accesses 2016
[6]. C. Smith (2014). Car Hacker's Manual Paperback, Theia Labs