1. AN EFFICIENT PRIVACY PRESERVING AUTHENTICATION
WITH INSIDER ATTACK RESISTANCE FOR VANET
Presented by
1.SANJAY K (722820106116)
2.SARAN S (722820106121)
3.SOMANSANKARA P R (722820106134)
4.VISHNUPRASANTH B (722820106159)
Guided by
Mrs. K.Suganyadevi.,M.E.,(Ph.D.,)
ASSISTANT PROFESSOR
DEPARTMENT OF ECE
SRI ESHWAR COLLEGE OF
ENGINEERING.
21-11-2023 1
Batch no : 13
2. 21-11-2023 Batch no : 13 2
Presentation Outline
• Introduction
• Abstract
• Literature Survey
• Objective
• Block Diagram
• Expected Outcome
• Execution Plan
• References
3. 21-11-2023 Batch no : 13 3
Introduction
• VANETs support dynamic communication between fast-moving vehicles using
OBUs and RSUs. They facilitate safety-related applications and optimize
traffic through V2V and V2I protocols.
• VANETs demand robust security measures, including authentication for
communication between vehicles, privacy protection against unauthorized
access, and data verification to ensure integrity.
• Insider attacks in VANETs originate from authenticated entities within the
network.
• Balancing real-time communication and efficiency with comprehensive
security is crucial.
• Maintaining VANETs' efficiency while ensuring robust security against insider
threats requires a delicate balance in security measures to safeguard
communication while real-time exchanges between vehicles.
4. 21-11-2023 Batch no : 13 4
Abstract
• VANETs, while pivotal for traffic management and safety, face vulnerabilities
like insider attacks due to their open and dynamic nature, posing significant
challenges for privacy and authentication.
• A novel approach merges Proof of Chain (PoC) and Causal Dependency
mechanisms to address privacy concerns and resist insider attacks during
authentication in VANETs.
• Causal Dependency mechanisms ensure message sequencing, guarding against
replay attacks and aiding vehicles in determining the relevance of received
information to their current state.
• By implementing these methods, individual vehicle traceability is significantly
reduced, enabling data exchange, traffic management, and safety
communication without compromising privacy or security in VANETs.
5. 21-11-2023 Batch no : 13 5
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
1.PairingFree
Signatures with Insider
Attack Resistance for
Vehicular AdHoc
Networks (VANETs)
IEEE Access, vol. 9,
pp. 159587-159597.
Cryptographic operations
measured using C MIRACL
Core Cryptographic Library
Advantages:
It ensures message integrity, authentication,
privacy, tracing, non-repudiation, and resistance to
insider attacks
Disadvantages:
Limited Scalability,
Increased Latency,
Complexity of Revocation.
2. Comparative study
on security and privacy
issues in VANETs
Cloud and
IoT‐Based Vehicular
Ad Hoc Networks
(2021): 145-162.
Geolocalization Abilities,
Dedicated Short-Range
Communication (DSRC),
Low Motionlessness
Necessities
Advantages:
It achieves security and privacy in VANETs.
It enhances vehicle authentication time, collision
rate, data transmission rate, and privacy
preservation levels
Disadvantages:
Rapidly Evolving Technology,
Availability of Data,
Scope and Complexity
6. 21-11-2023 Batch no : 13 6
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
3.Proven Secure Tree-
Based Authenticated
Key Agreement for
Securing V2V and V2I
Communications in
VANETs
IEEE Transactions
on Mobile
Computing, vol. 21,
no. 9, pp. 3280-3297,
1 Sept. 2022, doi:
10.1109/TMC.2021.
3056712.
V2V and V2I
Communications, Full
authentication mechanism,
Light weight Cryptography
mechanism
Advantages:
The outcome is proven secure, it has low
computational and communication overhead
Disadvantages:
Scalability,
Complexity,
Infrastructure Dependence,
Single Point of Failure.
4.Batch-Assisted
Verification Scheme
for Reducing Message
Verification Delay of
the Vehicular Ad Hoc
Networks
IEEE Internet of
Things Journal, vol.
7, no. 9, pp. 8144-
8156, Sept. 2020,
doi:
10.1109/JIOT.2020.3
004811
Dedicated Short Range
Communication (DSRC)
protocol, Collaborative
authentication method.
Advantages:
It reduces verification delay and achieves fast
message verification
Disadvantages:
Publication Bias,
Rapidly Evolving Technology,
Availability of Data,
Scope and Complexity
7. 21-11-2023 Batch no : 13 7
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
5.The Delay-
Constrained and
Network-Situation-
Aware V2V2I VANET
Data Offloading Based
on the Multi-Access
Edge Computing (MEC)
Architecture,
IEEE Open Journal
of Vehicular
Technology, vol. 1,
pp. 331-347, 2020,
doi:
10.1109/OJVT.2020.
3028684.
MEC protocol Advantages:
Ensures lifetime and quality of the V2V2I path to
derive suitable offloading paths
Disadvantages:
Limited scope,
Simplified assumptions,
Lack of real-world validation
6.A novel cyber‐attack
modelling and detection
in overcurrent
protection relays based
on wavelet signature
analysis.
IET Generation,
Transmission &
Distribution (2023).
Wavelet analysis,BRFD
algorithm,NDN-VANET
interconnection techniques
Advantages:
Detecting cyber attacks, reducing redundancy and
improving packet satisfaction rate and delay
Disadvantages:
It does not provide a comprehensive analysis of all
possible cyber threats and vulnerabilities in the
smart grid
8. 21-11-2023 Batch no : 13 8
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
7.A Survey of
VANET/V2X Routing
from the Perspective of
Non-Learning- and
Learning-Based
Approaches
IEEE Access, vol.
10, pp. 23022-
23050, 2022, Doi:
10.1109/ACCESS.2
022.3152767.
V2X routing protocols Advantages:
It delivers optimized packet delivery, handling
congestion and shadowing effects, reducing
network overhead
Disadvantages:
Potential limitation, Does not capture future
protocols, a lack of coverage of innovative
approaches
8.A receiver-forwarding
decision scheme based on
Bayesian for NDN-
VANET,
China
Communications,
vol. 17, no. 8, pp.
106-120, Aug. 2020,
doi:
10.23919/JCC.2020.
08.009.
Bayesian decision theory and
the BRFD (Bayesian-based
Receiver Forwarding
Decision) scheme
Advantages:
Reducing redundancy and improving packet
satisfaction rate and delay
Disadvantages:
It does not provide a comprehensive evaluation
of the proposed BRFD scheme.
9. 21-11-2023 Batch no : 13 9
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
9.Comment on Secure
and Lightweight
Conditional Privacy-
Preserving
Authentication for
Securing Traffic
Emergency Messages
in VANETs
IEEE Transactions
on Information
Forensics and
Security, vol. 18, pp.
1037-1038, 2023,
doi:
10.1109/TIFS.2021.
3066277
PPA (privacy-preserving
authentication) protocol
Advantages:
The scheme does not satisfy conditional privacy and
allows for the forging of valid signatures on
arbitrary messages
Disadvantages:
Reliability and Availability,
Privacy Concerns,
Scalability,
Security Vulnerabilities
10.R.S. State-of-the-art
approach to clustering
protocols in VANET: a
survey
Wireless Netw 26,
5307–5336 (2020).
https://doi.org/10.10
07/s11276-020-
02392-2.
Clustering protocol,MAC
protocol
Advantages:
Improved scalability and reliability
Disadvantages:
Communication overhead,limited clustered node
percentage
10. 21-11-2023 Batch no : 13 10
Objective
• Implement causal dependency mechanisms to ensure proper message
sequencing, guarding against replay attacks and enabling accurate
relevance assessment of received information based on current conditions.
• Utilize causal dependency to reduce the traceability of individual cars
within the VANET network, enhancing privacy measures without
compromising communication efficiency.
• Implement causal dependency mechanisms to deter unauthorized tracking
or tracing of vehicles, thereby safeguarding sensitive location and identity
information.
• Utilize causal dependency to enable secure data exchange among vehicles
while reducing the risk of privacy breaches or malicious tracking attempts
in VANETs.
11. 21-11-2023 Batch no : 13 11
Motivation of the Work
• Address the vulnerability of VANETs to insider attacks and privacy
breaches by proposing a novel strategy combining Proof of Chain (PoC)
and Causal Dependency mechanisms.
• Aim to overcome challenges concerning privacy preservation and vehicle
traceability, which hinder the widespread deployment of VANETs, ensuring
that participating cars' identities and whereabouts remain protected.
• Enable secure communication among vehicles and roadside infrastructure
to manage traffic effectively while ensuring data integrity and non-
repudiation, crucial for conveying vital safety information.
• Strive to find a balance between robust security measures and the seamless
exchange of critical safety and traffic-related information, ensuring that
privacy and security concerns do not impede the functionality of VANETs.
13. 21-11-2023 Batch no : 13 13
Explanation
• OBUs generate a signature key that is used to sign their messages and prove
their identity.
• They apply a probabilistic function to their signature key.
• They introduce dummy packets contain random data instead of fake data.
• OBU’s send a request to join a Trusted Authority (TA).
• The TA receives the request from the OBU and verifies its signature key.
• If the verification is successful, the TA sends a certification key to the OBU.
• The certification key is used to prove the OBU’s identity and verify its
signature by other OBU’s or RSU’s.
• RSUs verify received messages using OBUs' certification-derived public
keys; upon successful signature validation, RSUs grant access to requested
services or information.
15. 21-11-2023 Batch no : 13 15
Software Details
Software used
Ns-3(Network Simulator version 3).
Language used
C++.
Software description
• It is a discrete event simulator for networking research.
• It provides substantial support to simulate bunch of protocols like TCP, FTP,
UDP, https and DSR.
• It simulates wired and wireless network.
• It helps users to visualize the behavior of network simulations.
16. 21-11-2023 Batch no : 13 16
Methodology for the Proposed work
Causal Dependency
• Causal Dependency refers to the idea that in a VANET, the trustworthiness and
reliability of information exchanged between vehicles or between a vehicle
and roadside infrastructure should be established based on a causal
relationship.
Proof of Chain (PoC) Method
• Proof of Chain (PoC) is a security mechanism designed to establish the causal
dependency of messages or events in VANETs. It is a method used to provide
evidence that a particular event or message is part of a legitimate chain of events or
messages with a verifiable source.
17. 21-11-2023 Batch no : 13 17
Results and Discussion
• Causal dependency tracking captures the inter-node relationships and
dependencies, offering a more comprehensive view of data flow.
• Causal dependency enables the reconstruction of true data flow patterns,
enhancing the accuracy and reliability of tracing data propagation paths.
• Causal dependency is fundamental in preserving meaningful traceability as the
system matures and adapts to increasing complexities.
• Causal dependency fosters a robust framework that can navigate intricate
network scenarios and maintain reliable traceability in the evolving landscape
of blockchain technology.
19. 21-11-2023 Batch no : 13 19
References
1. L. E. Funderburg, H. Ren and I. -Y. Lee, "Pairing-Free Signatures with Insider-Attack Resistance for Vehicular
Ad-Hoc Networks (VANETs)," in IEEE Access, vol. 9, pp. 159587-159597, 2021, Doi:
10.1109/ACCESS.2021.3131189.
2. B T Rao, B. Tarakeswara, RSM Lakshmi Patibandla, and V. Lakshman Narayana. "Comparative study on security
and privacy issues in VANETs." Cloud and IoT‐Based Vehicular Ad Hoc Networks (2021): 145-162.
3. L. Wei, J. Cui, H. Zhong, Y. Xu and L. Liu, "Proven Secure Tree-Based Authenticated Key Agreement for
Securing V2V and V2I Communications in VANETs," in IEEE Transactions on Mobile Computing, vol. 21, no. 9,
pp. 3280-3297, 1 Sept. 2022, Doi: 10.1109/TMC.2021.3056712.
4. F. Wu, X. Zhang, C. Zhang, X. Chen, W. Fan and Y. Liu, "Batch-Assisted Verification Scheme for Reducing
Message Verification Delay of the Vehicular Ad Hoc Networks," in IEEE Internet of Things Journal, vol. 7, no. 9,
pp. 8144-8156, Sept. 2020, Doi: 10.1109/JIOT.2020.3004811.
5. C. M. Huang and C. -F. Lai, "The Delay-Constrained and Network-Situation-Aware V2V2I VANET Data
Offloading Based on the Multi-Access Edge Computing (MEC) Architecture," in IEEE Open Journal of Vehicular
Technology, vol. 1, pp. 331-347, 2020, Doi: 10.1109/OJVT.2020.3028684
6. Yousefi kia, Mohammad, Mohsen Saniei, and Seyyed Ghodratollah Seifossadat. "A novel cyber‐attack modelling
and detection in overcurrent protection relays based on wavelet signature analysis." IET Generation, Transmission
& Distribution (2023).
20. 21-11-2023 Batch no : 13 20
References
7. T. Chatterjee, R. Karmakar, G. Kaddoum, S. Chattopadhyay and S. Chakraborty, "A Survey of VANET/V2X
Routing from the Perspective of Non-Learning- and Learning-Based Approaches," in IEEE Access, vol. 10, pp.
23022-23050, 2022, Doi: 10.1109/ACCESS.2022.3152767.
8. X. Guo, Y. Chen, L. Cao, D. Zhang and Y. Jiang, "A receiver-forwarding decision scheme based on Bayesian for
NDN-VANET," in China Communications, vol. 17, no. 8, pp. 106-120, Aug. 2020, Doi:
10.23919/JCC.2020.08.009.
9. J. Zhang and Q. Zhang, "Comment on “Secure and Lightweight Conditional Privacy-Preserving Authentication for
Securing Traffic Emergency Messages in VANETs”,in IEEE Transactions on Information Forensics and Security,
vol. 18, pp. 1037-1038, 2023, Doi: 10.1109/TIFS.2021.3066277.
10. J. Zhang and Q. Zhang, "Comment on “Secure and Lightweight Conditional Privacy-Preserving Authentication for
Securing Traffic Emergency Messages in VANETs”,in IEEE Transactions on Information Forensics and Security,
vol. 18, pp. 1037-1038, 2023, Doi: 10.1109/TIFS.2021.3066277.
Don’t include any decorative contents ( images , animations , sounds etc..)
Don’t change background in to different colors.
Ensure that date of presentation & batch number is updated before sending this ppt.
This order can be varied based on the project Domain
About the domain of your project (i.e embedded, wireless n/w , Iot etc….)
Problems related to your project can be highlighted (Context and background of the idea)
Discuss about the problem statement identified in your project and their solutions (not in paragraphs ….only bulletins )
A minimum of 4 journal papers to be used. (select papers from the Journals like IEEE, Springer, Elsevier, Wiley)
Paper details : title of the paper
Journal Detail : Name of the journal , year , volume no , issue no
Methodology : Technique , Algorithm, Domain etc…
A minimum of 4 journal papers to be used. (select papers from the Journals like IEEE, Springer, Elsevier, Wiley)
Paper details : title of the paper
Journal Detail : Name of the journal , year , volume no , issue no
Methodology : Technique , Algorithm, Domain etc…
A minimum of 4 journal papers to be used. (select papers from the Journals like IEEE, Springer, Elsevier, Wiley)
Paper details : title of the paper
Journal Detail : Name of the journal , year , volume no , issue no
Methodology : Technique , Algorithm, Domain etc…
A minimum of 4 journal papers to be used. (select papers from the Journals like IEEE, Springer, Elsevier, Wiley)
Paper details : title of the paper
Journal Detail : Name of the journal , year , volume no , issue no
Methodology : Technique , Algorithm, Domain etc…
A minimum of 4 journal papers to be used. (select papers from the Journals like IEEE, Springer, Elsevier, Wiley)
Paper details : title of the paper
Journal Detail : Name of the journal , year , volume no , issue no
Methodology : Technique , Algorithm, Domain etc…
Mention the problem statement ….(what is your project work in statements …….not in paragraph ………only bulletin points)
Mention the problem statement ….(what is your project work in statements …….not in paragraph ………only bulletin points)
Explain about the proposed work
Explain about the proposed work
Provide Hardware / Software Details
Project work flow
Discuss about the Expected results from the Project
Provide the list of references as per journal format
Avoid putting links as Google.com, Wikipedia.com etc…. Provide the http link of the page or article refered
Provide the list of references as per journal format
Avoid putting links as Google.com, Wikipedia.com etc…. Provide the http link of the page or article refered