SlideShare a Scribd company logo
1 of 26
VEHICULAR AD-HOC NETWORKs(VANET)
Presented by :
Mayuresh Bhagat
Shubham Khati
Ankita Panchabhai
Priya Mude
CONSIDER THE SITUATIONS?
You are on the way in a car and….
 Wish to know about traffic jam condition at next turn or road
condition ahead.
 Wish to have prior alert, if vehicle in front of you applying breaks.
 Wish to have advance information, if any vehicle meet with an
accidents on the road ahead.
 Wish to know whether the nearby parking area has vacancy or not.
 Wish to avoid accidents in ever increasing traffic conditions
THE ANSWER IS?
VANET
WHAT IS VANET?
 A large self-organized communication network in automobiles referred to as a
Vehicular ad-hoc network (VANET).
 VANET is V2V communication in ad hoc manner that enables the intelligent
transportation system(ITS).
 In a VANET each vehicle periodically broadcasts its geographic information
through GPS.
 The VANET provides an omnipresent computing atmosphere.
System model of VANET
WHY VANET?
 Today’s car accident alert system is not efficient.
 The accident first needs to be physically reported and then announced via a
radio broadcast or a portable GPS unit before a driver is alerted.
 It leads to jams, car collisions and inconvenience in traffic flow as well as for
people.
 Poor traffic monitoring.
KEY MANAGEMENT TECHNIQUES
 Safety Message Broadcast in VANET
 Shared Key Management Framework
 Distributed Key Management Frame
 Efficient Cooperative Message Authentication in Vehicular Ad Hoc
Networks
 RFID authentication
ROUTING PROTOCOL ANALYSIS
A routing protocol specifies how routers communicate with each other and enables
them to select routes between any two nodes on a computer network.
 AODV(Ad hoc on-demand distance vector)
 DSR(Dynamic Source Routing)
 DSDV(Destination-Sequenced Distance-Vector Routing)
AODV(AD-HOC ON-DEMAND DISTANCE VECTOR)
 AODV is a routing protocol that creates routes between nodes only when
the routes are requested by the source nodes.
 This gives the network the flexibility to allow nodes to enter and leave
the network at will.
 AODV is a reactive protocol: the routes are created only when they are
needed.
DSR(DYNAMIC SOURCE ROUTING)
 DSR is a routing protocol for wireless mesh networks.
 It uses source routing supplied by packet’s originator to determine
packet’s path through the network.
 This protocol is truly based on source routing whereby all the routing
information is maintained (continually updated) at mobile nodes.
DSDV(DESTINATION SEQUENCED DISTANCE VECTOR
ROUTING)
 DSDV is one of the early algorithms available for data relay.
 The main contribution of the algorithm was to solve routing loop
problem.
 There is no commercial implementation of this algorithm, since no
formal specification of this algorithm is present.
COMPARISON OF ROUTING PROTOCOLS
parameters AODV DSR DSDV
Definition
Selection of routes
Bandwidth consumption
Packet delivery rate
Latency
This protocol establishes
routes to destinations on
demand and supports
both unicast and
multicast routing.
Destination sequence
numbers are used to find
the latest route .
Good
More
More
This protocol is
specifically designed for
multi-hop ad hoc
networks.
Source routing supplied
by packet’s originator to
determine packet’s path
.
Less than AODV.
Less than AODV
Less than AODV
It is quite suitable for
creating ad hoc
networks with small
number of nodes.
The route with the better
metrics is used if the
latest sequence number
matches the one already
present.
Wastage of bandwidth.
Less than both
Less
ISSUES IN VANET
 The complicated physical domain of VANET incurs many challenging
issues to the cyber domain.
 Frequent broadcast of safety messages from a vehicle along the road may leak the
travelling route of a vehicle, which could be a privacy issue.
 Vehicles communicate with each other through radio over the IEEE 802.11p on 5.9GHz.
 If a vehicle would like to cheat others, it will send false messages.
 For example, a vehicle may claim a traffic jam somewhere; however in fact no traffic jam
happens there.
 The other phrase we will use in the cooperative message authentication is invalid
message.
COOPERATIVE MESSAGE AUTHENTICATION
PROTOCOL(CMAP)
 A cooperative message authentication protocol (CMAP) is developed to
alleviate vehicles' computation burden.
 With CMAP, all the vehicles share their verification results with each other in a
cooperative way, so that the number of safety messages that each vehicle needs
to verify reduces significantly.
 A promising thread of techniques to reduce the computation overhead in
authentication is cooperative authentication.
HOW DOES CMAP WORKS?
 In the CMAP, each vehicle sends periodically broadcasted messages (PBM) which include its
current geographic information every 300 ms.
 When its neighboring vehicles receive the PBM, they will decide whether they are verifiers
of this message.
 If a vehicle is the verifier of the message, it will start to verify the message by itself.
 Once an invalid message is identified, verifiers will broadcast a one hop warning message
to others. Otherwise, verifiers will keep silent.
 Non-verifiers will wait for cooperative warning messages (CWM) from verifiers.
PROCESS IN CMAP TECHNIQUE
COMPUTATION AND COMMUNICATION
OVERHEAD
 Verifying the group signature attached to each broadcast message is the dominating
component that consumes computation capacity.
 In our simulation, we use the average number of verified messages per vehicle per second
as the metric for the computation overhead.
 It is worth noting that CMAP method achieves a much lower missed detection ratio than
the non cooperative authentication with the same computation overhead.
 We have the following observations:
1) Compared with the conventional non-cooperative authentication protocol, our CMAP method achieves
significantly lower computation overhead.
2) The computation overhead of CMAP is independent of vehicle density, while that of the non-cooperative
protocol increases with the density.
Characteristics of VANET
 High Mobility of nodes
 Dynamic Topology
 Unbounded network size
 Frequent exchange of information
 Wireless Communication
 Crucial effect of privacy and security
 Real time , time sensitive data exchange
Safety applications(to enhance driving safety) like :
 EEBL – Emergency Electronic Brake Light(sudden braking)
 PCN – Post Crash Notification
 RFN – Road Feature Notification(ex. Downhill curve)
 LCA – Lane Change Assistance
 CCW – Cooperative Collision Warning
 Blind Merge Assistant and many more…
APPLICATIONS
Convenience Applications (for better driving experience):
 Road Congestion Notification
 Dynamic Route/ Travel Time Planning
 Querying Parking Availability
 Finding Parking Spots
Other Commercial/Infotainment/Telematics Applications:
 Remote Vehicle Diagnostics
 Free Flow Tolling
 Social Networking
 Multimedia Content Exchange
 Advertising
KEY RESEARCH AREAS IN VANET
 Quality of Service (QoS)
 Network Security
 MAC layer protocol
 Scalability and Robustness
 Image processing
 Co-operative Communication
 Mobility model
 Efficient Routing Algorithms Design
 Fault tolerance
MAJOR PLAYERS IN VANET RESEARCH
CONCLUSION
 The CMAP significantly reduces the computation overhead of each
vehicle at the cost of a slightly increased communication
overhead.
 AODV is the most effective algorithm in terms of throughput and
data transmission delay time for mobile ad hoc networks in urban
areas.
 VANET security system achieves privacy, traceability, non frame
ability, and privacy preserving defense against misbehavior.
REFERENCES
[1] Y. Toor and P. Mühlethaler, “Vehicle Ad Hoc Networks: Applications and Related Technical
issues”, IEEE Communications surveys & Tutorials, 3rd quarter, vol. 10, no. 3, (2008), pp. 74-88.
[2] M. Raya and J. P. Hubaux, “Securing vehicular ad hoc networks,” J. Comput. Security, vol. 15, no.
1, pp.39–68, Jan. 2007. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS,
VOL.14, NO. 1, MARCH 2013.
[3] Xiaodong Lin, Xu Li “Achieving Efficient Cooperative Message Authentication in Vehicular Ad-
hoc Network”, IEEE Transactions on Vehicular Technology, volume 62, no. 7, September 2013.
[4] A. Boukerche, “Performance Evaluation of Routing Protocols for Ad Hoc Wireless Networks”,
Mobile Networks and Applications vol. 9, Netherlands, 2004.
[5] Y. Hao, Y. Cheng, C. Zhou, and W. Song, ``A distributed key management framework with
cooperative message authentication in VANETs,'' IEEE J.Sel. Areas Commun., vol. 29, no. 3, pp.
616_629, Mar. 2011.
THANK YOU

More Related Content

What's hot

VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and HashingPallavi Agarwal
 
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksPonmudiselvan.N Selvan
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPTMeghaj Mallick
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsjournalBEEI
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs PresentationiQra Rafaqat
 
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksData Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksMichele Weigle
 
Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)Prof Ansari
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile ComputingKABILESH RAMAR
 
Presentation pfe
Presentation pfePresentation pfe
Presentation pfeMalik Riahi
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography Pallavi Agarwal
 

What's hot (20)

VEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOKVEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOK
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
VANET (BY-VEDANT)
VANET (BY-VEDANT)VANET (BY-VEDANT)
VANET (BY-VEDANT)
 
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPT
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocols
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs Presentation
 
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksData Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
 
VANET
VANETVANET
VANET
 
Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile Computing
 
Presentation pfe
Presentation pfePresentation pfe
Presentation pfe
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
Routing protocols in Vanet
Routing protocols in VanetRouting protocols in Vanet
Routing protocols in Vanet
 

Similar to Cooperative Message Authentication Protocol(CMAP) in VANET

Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanetscsandit
 
Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetDhruvMarothi
 
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An AnalysisChallenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An Analysisidescitation
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANETPallavi Agarwal
 
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksMulticast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksIOSR Journals
 
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...rifat1tasnim
 
vehicular communications
vehicular communicationsvehicular communications
vehicular communicationsSaikiran Guduri
 
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksIJCNCJournal
 
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSCROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSIJCNCJournal
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANETDr.Irshad Ahmed Sumra
 
Communications in Vehicular networks
Communications in Vehicular networksCommunications in Vehicular networks
Communications in Vehicular networksDaisyWatson5
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...IJLT EMAS
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 

Similar to Cooperative Message Authentication Protocol(CMAP) in VANET (20)

Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanets
 
Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in Vanet
 
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An AnalysisChallenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANET
 
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksMulticast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
 
Ivwc
IvwcIvwc
Ivwc
 
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
 
A Secure Intrusion Prevention Protocol for VANET to Enhance Security
A Secure Intrusion Prevention Protocol for VANET to Enhance SecurityA Secure Intrusion Prevention Protocol for VANET to Enhance Security
A Secure Intrusion Prevention Protocol for VANET to Enhance Security
 
vehicular communications
vehicular communicationsvehicular communications
vehicular communications
 
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
 
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSCROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
 
Communications in Vehicular networks
Communications in Vehicular networksCommunications in Vehicular networks
Communications in Vehicular networks
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 

Recently uploaded

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...Call girls in Ahmedabad High profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

Cooperative Message Authentication Protocol(CMAP) in VANET

  • 1. VEHICULAR AD-HOC NETWORKs(VANET) Presented by : Mayuresh Bhagat Shubham Khati Ankita Panchabhai Priya Mude
  • 2. CONSIDER THE SITUATIONS? You are on the way in a car and….  Wish to know about traffic jam condition at next turn or road condition ahead.  Wish to have prior alert, if vehicle in front of you applying breaks.  Wish to have advance information, if any vehicle meet with an accidents on the road ahead.  Wish to know whether the nearby parking area has vacancy or not.  Wish to avoid accidents in ever increasing traffic conditions
  • 4. WHAT IS VANET?  A large self-organized communication network in automobiles referred to as a Vehicular ad-hoc network (VANET).  VANET is V2V communication in ad hoc manner that enables the intelligent transportation system(ITS).  In a VANET each vehicle periodically broadcasts its geographic information through GPS.  The VANET provides an omnipresent computing atmosphere.
  • 6. WHY VANET?  Today’s car accident alert system is not efficient.  The accident first needs to be physically reported and then announced via a radio broadcast or a portable GPS unit before a driver is alerted.  It leads to jams, car collisions and inconvenience in traffic flow as well as for people.  Poor traffic monitoring.
  • 7. KEY MANAGEMENT TECHNIQUES  Safety Message Broadcast in VANET  Shared Key Management Framework  Distributed Key Management Frame  Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks  RFID authentication
  • 8. ROUTING PROTOCOL ANALYSIS A routing protocol specifies how routers communicate with each other and enables them to select routes between any two nodes on a computer network.  AODV(Ad hoc on-demand distance vector)  DSR(Dynamic Source Routing)  DSDV(Destination-Sequenced Distance-Vector Routing)
  • 9. AODV(AD-HOC ON-DEMAND DISTANCE VECTOR)  AODV is a routing protocol that creates routes between nodes only when the routes are requested by the source nodes.  This gives the network the flexibility to allow nodes to enter and leave the network at will.  AODV is a reactive protocol: the routes are created only when they are needed.
  • 10. DSR(DYNAMIC SOURCE ROUTING)  DSR is a routing protocol for wireless mesh networks.  It uses source routing supplied by packet’s originator to determine packet’s path through the network.  This protocol is truly based on source routing whereby all the routing information is maintained (continually updated) at mobile nodes.
  • 11. DSDV(DESTINATION SEQUENCED DISTANCE VECTOR ROUTING)  DSDV is one of the early algorithms available for data relay.  The main contribution of the algorithm was to solve routing loop problem.  There is no commercial implementation of this algorithm, since no formal specification of this algorithm is present.
  • 12. COMPARISON OF ROUTING PROTOCOLS parameters AODV DSR DSDV Definition Selection of routes Bandwidth consumption Packet delivery rate Latency This protocol establishes routes to destinations on demand and supports both unicast and multicast routing. Destination sequence numbers are used to find the latest route . Good More More This protocol is specifically designed for multi-hop ad hoc networks. Source routing supplied by packet’s originator to determine packet’s path . Less than AODV. Less than AODV Less than AODV It is quite suitable for creating ad hoc networks with small number of nodes. The route with the better metrics is used if the latest sequence number matches the one already present. Wastage of bandwidth. Less than both Less
  • 13. ISSUES IN VANET  The complicated physical domain of VANET incurs many challenging issues to the cyber domain.  Frequent broadcast of safety messages from a vehicle along the road may leak the travelling route of a vehicle, which could be a privacy issue.  Vehicles communicate with each other through radio over the IEEE 802.11p on 5.9GHz.  If a vehicle would like to cheat others, it will send false messages.  For example, a vehicle may claim a traffic jam somewhere; however in fact no traffic jam happens there.  The other phrase we will use in the cooperative message authentication is invalid message.
  • 14. COOPERATIVE MESSAGE AUTHENTICATION PROTOCOL(CMAP)  A cooperative message authentication protocol (CMAP) is developed to alleviate vehicles' computation burden.  With CMAP, all the vehicles share their verification results with each other in a cooperative way, so that the number of safety messages that each vehicle needs to verify reduces significantly.  A promising thread of techniques to reduce the computation overhead in authentication is cooperative authentication.
  • 15. HOW DOES CMAP WORKS?  In the CMAP, each vehicle sends periodically broadcasted messages (PBM) which include its current geographic information every 300 ms.  When its neighboring vehicles receive the PBM, they will decide whether they are verifiers of this message.  If a vehicle is the verifier of the message, it will start to verify the message by itself.  Once an invalid message is identified, verifiers will broadcast a one hop warning message to others. Otherwise, verifiers will keep silent.  Non-verifiers will wait for cooperative warning messages (CWM) from verifiers.
  • 16. PROCESS IN CMAP TECHNIQUE
  • 17. COMPUTATION AND COMMUNICATION OVERHEAD  Verifying the group signature attached to each broadcast message is the dominating component that consumes computation capacity.  In our simulation, we use the average number of verified messages per vehicle per second as the metric for the computation overhead.  It is worth noting that CMAP method achieves a much lower missed detection ratio than the non cooperative authentication with the same computation overhead.
  • 18.  We have the following observations: 1) Compared with the conventional non-cooperative authentication protocol, our CMAP method achieves significantly lower computation overhead. 2) The computation overhead of CMAP is independent of vehicle density, while that of the non-cooperative protocol increases with the density.
  • 19. Characteristics of VANET  High Mobility of nodes  Dynamic Topology  Unbounded network size  Frequent exchange of information  Wireless Communication  Crucial effect of privacy and security  Real time , time sensitive data exchange
  • 20. Safety applications(to enhance driving safety) like :  EEBL – Emergency Electronic Brake Light(sudden braking)  PCN – Post Crash Notification  RFN – Road Feature Notification(ex. Downhill curve)  LCA – Lane Change Assistance  CCW – Cooperative Collision Warning  Blind Merge Assistant and many more… APPLICATIONS
  • 21. Convenience Applications (for better driving experience):  Road Congestion Notification  Dynamic Route/ Travel Time Planning  Querying Parking Availability  Finding Parking Spots Other Commercial/Infotainment/Telematics Applications:  Remote Vehicle Diagnostics  Free Flow Tolling  Social Networking  Multimedia Content Exchange  Advertising
  • 22. KEY RESEARCH AREAS IN VANET  Quality of Service (QoS)  Network Security  MAC layer protocol  Scalability and Robustness  Image processing  Co-operative Communication  Mobility model  Efficient Routing Algorithms Design  Fault tolerance
  • 23. MAJOR PLAYERS IN VANET RESEARCH
  • 24. CONCLUSION  The CMAP significantly reduces the computation overhead of each vehicle at the cost of a slightly increased communication overhead.  AODV is the most effective algorithm in terms of throughput and data transmission delay time for mobile ad hoc networks in urban areas.  VANET security system achieves privacy, traceability, non frame ability, and privacy preserving defense against misbehavior.
  • 25. REFERENCES [1] Y. Toor and P. Mühlethaler, “Vehicle Ad Hoc Networks: Applications and Related Technical issues”, IEEE Communications surveys & Tutorials, 3rd quarter, vol. 10, no. 3, (2008), pp. 74-88. [2] M. Raya and J. P. Hubaux, “Securing vehicular ad hoc networks,” J. Comput. Security, vol. 15, no. 1, pp.39–68, Jan. 2007. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL.14, NO. 1, MARCH 2013. [3] Xiaodong Lin, Xu Li “Achieving Efficient Cooperative Message Authentication in Vehicular Ad- hoc Network”, IEEE Transactions on Vehicular Technology, volume 62, no. 7, September 2013. [4] A. Boukerche, “Performance Evaluation of Routing Protocols for Ad Hoc Wireless Networks”, Mobile Networks and Applications vol. 9, Netherlands, 2004. [5] Y. Hao, Y. Cheng, C. Zhou, and W. Song, ``A distributed key management framework with cooperative message authentication in VANETs,'' IEEE J.Sel. Areas Commun., vol. 29, no. 3, pp. 616_629, Mar. 2011.