SlideShare a Scribd company logo
1 of 21
AN EFFICIENT PRIVACY PRESERVING AUTHENTICATION
WITH INSIDER ATTACK RESISTANCE FOR VANET
Presented by
1.SANJAY K (722820106116)
2.SARAN S (722820106121)
3.SOMANSANKARA P R (722820106134)
4.VISHNUPRASANTH B (722820106159)
Guided by
Mrs. K.Suganyadevi.,M.E.,(Ph.D.,)
ASSISTANT PROFESSOR
DEPARTMENT OF ECE
SRI ESHWAR COLLEGE OF
ENGINEERING.
21-11-2023 1
Batch no : 13
21-11-2023 Batch no : 13 2
Presentation Outline
• Introduction
• Abstract
• Literature Survey
• Objective
• Block Diagram
• Expected Outcome
• Execution Plan
• References
21-11-2023 Batch no : 13 3
Introduction
• VANETs support dynamic communication between fast-moving vehicles using
OBUs and RSUs. They facilitate safety-related applications and optimize
traffic through V2V and V2I protocols.
• VANETs demand robust security measures, including authentication for
communication between vehicles, privacy protection against unauthorized
access, and data verification to ensure integrity.
• Insider attacks in VANETs originate from authenticated entities within the
network.
• Balancing real-time communication and efficiency with comprehensive
security is crucial.
• Maintaining VANETs' efficiency while ensuring robust security against insider
threats requires a delicate balance in security measures to safeguard
communication while real-time exchanges between vehicles.
21-11-2023 Batch no : 13 4
Abstract
• VANETs, while pivotal for traffic management and safety, face vulnerabilities
like insider attacks due to their open and dynamic nature, posing significant
challenges for privacy and authentication.
• A novel approach merges Proof of Chain (PoC) and Causal Dependency
mechanisms to address privacy concerns and resist insider attacks during
authentication in VANETs.
• Causal Dependency mechanisms ensure message sequencing, guarding against
replay attacks and aiding vehicles in determining the relevance of received
information to their current state.
• By implementing these methods, individual vehicle traceability is significantly
reduced, enabling data exchange, traffic management, and safety
communication without compromising privacy or security in VANETs.
21-11-2023 Batch no : 13 5
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
1.PairingFree
Signatures with Insider
Attack Resistance for
Vehicular AdHoc
Networks (VANETs)
IEEE Access, vol. 9,
pp. 159587-159597.
Cryptographic operations
measured using C MIRACL
Core Cryptographic Library
Advantages:
It ensures message integrity, authentication,
privacy, tracing, non-repudiation, and resistance to
insider attacks
Disadvantages:
Limited Scalability,
Increased Latency,
Complexity of Revocation.
2. Comparative study
on security and privacy
issues in VANETs
Cloud and
IoT‐Based Vehicular
Ad Hoc Networks
(2021): 145-162.
Geolocalization Abilities,
Dedicated Short-Range
Communication (DSRC),
Low Motionlessness
Necessities
Advantages:
It achieves security and privacy in VANETs.
It enhances vehicle authentication time, collision
rate, data transmission rate, and privacy
preservation levels
Disadvantages:
Rapidly Evolving Technology,
Availability of Data,
Scope and Complexity
21-11-2023 Batch no : 13 6
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
3.Proven Secure Tree-
Based Authenticated
Key Agreement for
Securing V2V and V2I
Communications in
VANETs
IEEE Transactions
on Mobile
Computing, vol. 21,
no. 9, pp. 3280-3297,
1 Sept. 2022, doi:
10.1109/TMC.2021.
3056712.
V2V and V2I
Communications, Full
authentication mechanism,
Light weight Cryptography
mechanism
Advantages:
The outcome is proven secure, it has low
computational and communication overhead
Disadvantages:
Scalability,
Complexity,
Infrastructure Dependence,
Single Point of Failure.
4.Batch-Assisted
Verification Scheme
for Reducing Message
Verification Delay of
the Vehicular Ad Hoc
Networks
IEEE Internet of
Things Journal, vol.
7, no. 9, pp. 8144-
8156, Sept. 2020,
doi:
10.1109/JIOT.2020.3
004811
Dedicated Short Range
Communication (DSRC)
protocol, Collaborative
authentication method.
Advantages:
It reduces verification delay and achieves fast
message verification
Disadvantages:
Publication Bias,
Rapidly Evolving Technology,
Availability of Data,
Scope and Complexity
21-11-2023 Batch no : 13 7
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
5.The Delay-
Constrained and
Network-Situation-
Aware V2V2I VANET
Data Offloading Based
on the Multi-Access
Edge Computing (MEC)
Architecture,
IEEE Open Journal
of Vehicular
Technology, vol. 1,
pp. 331-347, 2020,
doi:
10.1109/OJVT.2020.
3028684.
MEC protocol Advantages:
Ensures lifetime and quality of the V2V2I path to
derive suitable offloading paths
Disadvantages:
Limited scope,
Simplified assumptions,
Lack of real-world validation
6.A novel cyber‐attack
modelling and detection
in overcurrent
protection relays based
on wavelet signature
analysis.
IET Generation,
Transmission &
Distribution (2023).
Wavelet analysis,BRFD
algorithm,NDN-VANET
interconnection techniques
Advantages:
Detecting cyber attacks, reducing redundancy and
improving packet satisfaction rate and delay
Disadvantages:
It does not provide a comprehensive analysis of all
possible cyber threats and vulnerabilities in the
smart grid
21-11-2023 Batch no : 13 8
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
7.A Survey of
VANET/V2X Routing
from the Perspective of
Non-Learning- and
Learning-Based
Approaches
IEEE Access, vol.
10, pp. 23022-
23050, 2022, Doi:
10.1109/ACCESS.2
022.3152767.
V2X routing protocols Advantages:
It delivers optimized packet delivery, handling
congestion and shadowing effects, reducing
network overhead
Disadvantages:
Potential limitation, Does not capture future
protocols, a lack of coverage of innovative
approaches
8.A receiver-forwarding
decision scheme based on
Bayesian for NDN-
VANET,
China
Communications,
vol. 17, no. 8, pp.
106-120, Aug. 2020,
doi:
10.23919/JCC.2020.
08.009.
Bayesian decision theory and
the BRFD (Bayesian-based
Receiver Forwarding
Decision) scheme
Advantages:
Reducing redundancy and improving packet
satisfaction rate and delay
Disadvantages:
It does not provide a comprehensive evaluation
of the proposed BRFD scheme.
21-11-2023 Batch no : 13 9
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
9.Comment on Secure
and Lightweight
Conditional Privacy-
Preserving
Authentication for
Securing Traffic
Emergency Messages
in VANETs
IEEE Transactions
on Information
Forensics and
Security, vol. 18, pp.
1037-1038, 2023,
doi:
10.1109/TIFS.2021.
3066277
PPA (privacy-preserving
authentication) protocol
Advantages:
The scheme does not satisfy conditional privacy and
allows for the forging of valid signatures on
arbitrary messages
Disadvantages:
Reliability and Availability,
Privacy Concerns,
Scalability,
Security Vulnerabilities
10.R.S. State-of-the-art
approach to clustering
protocols in VANET: a
survey
Wireless Netw 26,
5307–5336 (2020).
https://doi.org/10.10
07/s11276-020-
02392-2.
Clustering protocol,MAC
protocol
Advantages:
Improved scalability and reliability
Disadvantages:
Communication overhead,limited clustered node
percentage
21-11-2023 Batch no : 13 10
Objective
• Implement causal dependency mechanisms to ensure proper message
sequencing, guarding against replay attacks and enabling accurate
relevance assessment of received information based on current conditions.
• Utilize causal dependency to reduce the traceability of individual cars
within the VANET network, enhancing privacy measures without
compromising communication efficiency.
• Implement causal dependency mechanisms to deter unauthorized tracking
or tracing of vehicles, thereby safeguarding sensitive location and identity
information.
• Utilize causal dependency to enable secure data exchange among vehicles
while reducing the risk of privacy breaches or malicious tracking attempts
in VANETs.
21-11-2023 Batch no : 13 11
Motivation of the Work
• Address the vulnerability of VANETs to insider attacks and privacy
breaches by proposing a novel strategy combining Proof of Chain (PoC)
and Causal Dependency mechanisms.
• Aim to overcome challenges concerning privacy preservation and vehicle
traceability, which hinder the widespread deployment of VANETs, ensuring
that participating cars' identities and whereabouts remain protected.
• Enable secure communication among vehicles and roadside infrastructure
to manage traffic effectively while ensuring data integrity and non-
repudiation, crucial for conveying vital safety information.
• Strive to find a balance between robust security measures and the seamless
exchange of critical safety and traffic-related information, ensuring that
privacy and security concerns do not impede the functionality of VANETs.
21-11-2023 Batch no : 13 12
Flow Chart
21-11-2023 Batch no : 13 13
Explanation
• OBUs generate a signature key that is used to sign their messages and prove
their identity.
• They apply a probabilistic function to their signature key.
• They introduce dummy packets contain random data instead of fake data.
• OBU’s send a request to join a Trusted Authority (TA).
• The TA receives the request from the OBU and verifies its signature key.
• If the verification is successful, the TA sends a certification key to the OBU.
• The certification key is used to prove the OBU’s identity and verify its
signature by other OBU’s or RSU’s.
• RSUs verify received messages using OBUs' certification-derived public
keys; upon successful signature validation, RSUs grant access to requested
services or information.
21-11-2023 Batch no : 13 14
Process Diagram
21-11-2023 Batch no : 13 15
Software Details
Software used
Ns-3(Network Simulator version 3).
Language used
C++.
Software description
• It is a discrete event simulator for networking research.
• It provides substantial support to simulate bunch of protocols like TCP, FTP,
UDP, https and DSR.
• It simulates wired and wireless network.
• It helps users to visualize the behavior of network simulations.
21-11-2023 Batch no : 13 16
Methodology for the Proposed work
Causal Dependency
• Causal Dependency refers to the idea that in a VANET, the trustworthiness and
reliability of information exchanged between vehicles or between a vehicle
and roadside infrastructure should be established based on a causal
relationship.
Proof of Chain (PoC) Method
• Proof of Chain (PoC) is a security mechanism designed to establish the causal
dependency of messages or events in VANETs. It is a method used to provide
evidence that a particular event or message is part of a legitimate chain of events or
messages with a verifiable source.
21-11-2023 Batch no : 13 17
Results and Discussion
• Causal dependency tracking captures the inter-node relationships and
dependencies, offering a more comprehensive view of data flow.
• Causal dependency enables the reconstruction of true data flow patterns,
enhancing the accuracy and reliability of tracing data propagation paths.
• Causal dependency is fundamental in preserving meaningful traceability as the
system matures and adapts to increasing complexities.
• Causal dependency fosters a robust framework that can navigate intricate
network scenarios and maintain reliable traceability in the evolving landscape
of blockchain technology.
21-11-2023 Batch no : 13 18
Output
21-11-2023 Batch no : 13 19
References
1. L. E. Funderburg, H. Ren and I. -Y. Lee, "Pairing-Free Signatures with Insider-Attack Resistance for Vehicular
Ad-Hoc Networks (VANETs)," in IEEE Access, vol. 9, pp. 159587-159597, 2021, Doi:
10.1109/ACCESS.2021.3131189.
2. B T Rao, B. Tarakeswara, RSM Lakshmi Patibandla, and V. Lakshman Narayana. "Comparative study on security
and privacy issues in VANETs." Cloud and IoT‐Based Vehicular Ad Hoc Networks (2021): 145-162.
3. L. Wei, J. Cui, H. Zhong, Y. Xu and L. Liu, "Proven Secure Tree-Based Authenticated Key Agreement for
Securing V2V and V2I Communications in VANETs," in IEEE Transactions on Mobile Computing, vol. 21, no. 9,
pp. 3280-3297, 1 Sept. 2022, Doi: 10.1109/TMC.2021.3056712.
4. F. Wu, X. Zhang, C. Zhang, X. Chen, W. Fan and Y. Liu, "Batch-Assisted Verification Scheme for Reducing
Message Verification Delay of the Vehicular Ad Hoc Networks," in IEEE Internet of Things Journal, vol. 7, no. 9,
pp. 8144-8156, Sept. 2020, Doi: 10.1109/JIOT.2020.3004811.
5. C. M. Huang and C. -F. Lai, "The Delay-Constrained and Network-Situation-Aware V2V2I VANET Data
Offloading Based on the Multi-Access Edge Computing (MEC) Architecture," in IEEE Open Journal of Vehicular
Technology, vol. 1, pp. 331-347, 2020, Doi: 10.1109/OJVT.2020.3028684
6. Yousefi kia, Mohammad, Mohsen Saniei, and Seyyed Ghodratollah Seifossadat. "A novel cyber‐attack modelling
and detection in overcurrent protection relays based on wavelet signature analysis." IET Generation, Transmission
& Distribution (2023).
21-11-2023 Batch no : 13 20
References
7. T. Chatterjee, R. Karmakar, G. Kaddoum, S. Chattopadhyay and S. Chakraborty, "A Survey of VANET/V2X
Routing from the Perspective of Non-Learning- and Learning-Based Approaches," in IEEE Access, vol. 10, pp.
23022-23050, 2022, Doi: 10.1109/ACCESS.2022.3152767.
8. X. Guo, Y. Chen, L. Cao, D. Zhang and Y. Jiang, "A receiver-forwarding decision scheme based on Bayesian for
NDN-VANET," in China Communications, vol. 17, no. 8, pp. 106-120, Aug. 2020, Doi:
10.23919/JCC.2020.08.009.
9. J. Zhang and Q. Zhang, "Comment on “Secure and Lightweight Conditional Privacy-Preserving Authentication for
Securing Traffic Emergency Messages in VANETs”,in IEEE Transactions on Information Forensics and Security,
vol. 18, pp. 1037-1038, 2023, Doi: 10.1109/TIFS.2021.3066277.
10. J. Zhang and Q. Zhang, "Comment on “Secure and Lightweight Conditional Privacy-Preserving Authentication for
Securing Traffic Emergency Messages in VANETs”,in IEEE Transactions on Information Forensics and Security,
vol. 18, pp. 1037-1038, 2023, Doi: 10.1109/TIFS.2021.3066277.
21-11-2023 Batch no : 13 21

More Related Content

Similar to Final Presentation PPT for final years project

A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
 
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksIJCNCJournal
 
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSCROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSIJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
 
Improving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACKImproving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACKijsrd.com
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNishanth Gandhidoss
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Editor IJARCET
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Editor IJARCET
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Cp3210151018
Cp3210151018Cp3210151018
Cp3210151018IJMER
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Ijcem Journal
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Ijcem Journal
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsIJCSIS Research Publications
 
Towards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular NetworksTowards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular NetworksTELKOMNIKA JOURNAL
 

Similar to Final Presentation PPT for final years project (20)

A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
 
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
 
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSCROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
 
Improving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACKImproving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACK
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Cp3210151018
Cp3210151018Cp3210151018
Cp3210151018
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETs
 
Towards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular NetworksTowards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular Networks
 

Recently uploaded

100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Delhi Call girls
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfadriantubila
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...SUHANI PANDEY
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 

Recently uploaded (20)

100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 

Final Presentation PPT for final years project

  • 1. AN EFFICIENT PRIVACY PRESERVING AUTHENTICATION WITH INSIDER ATTACK RESISTANCE FOR VANET Presented by 1.SANJAY K (722820106116) 2.SARAN S (722820106121) 3.SOMANSANKARA P R (722820106134) 4.VISHNUPRASANTH B (722820106159) Guided by Mrs. K.Suganyadevi.,M.E.,(Ph.D.,) ASSISTANT PROFESSOR DEPARTMENT OF ECE SRI ESHWAR COLLEGE OF ENGINEERING. 21-11-2023 1 Batch no : 13
  • 2. 21-11-2023 Batch no : 13 2 Presentation Outline • Introduction • Abstract • Literature Survey • Objective • Block Diagram • Expected Outcome • Execution Plan • References
  • 3. 21-11-2023 Batch no : 13 3 Introduction • VANETs support dynamic communication between fast-moving vehicles using OBUs and RSUs. They facilitate safety-related applications and optimize traffic through V2V and V2I protocols. • VANETs demand robust security measures, including authentication for communication between vehicles, privacy protection against unauthorized access, and data verification to ensure integrity. • Insider attacks in VANETs originate from authenticated entities within the network. • Balancing real-time communication and efficiency with comprehensive security is crucial. • Maintaining VANETs' efficiency while ensuring robust security against insider threats requires a delicate balance in security measures to safeguard communication while real-time exchanges between vehicles.
  • 4. 21-11-2023 Batch no : 13 4 Abstract • VANETs, while pivotal for traffic management and safety, face vulnerabilities like insider attacks due to their open and dynamic nature, posing significant challenges for privacy and authentication. • A novel approach merges Proof of Chain (PoC) and Causal Dependency mechanisms to address privacy concerns and resist insider attacks during authentication in VANETs. • Causal Dependency mechanisms ensure message sequencing, guarding against replay attacks and aiding vehicles in determining the relevance of received information to their current state. • By implementing these methods, individual vehicle traceability is significantly reduced, enabling data exchange, traffic management, and safety communication without compromising privacy or security in VANETs.
  • 5. 21-11-2023 Batch no : 13 5 Literature Survey Paper Title Journal details Methodology Advantages/ Disadvantages 1.PairingFree Signatures with Insider Attack Resistance for Vehicular AdHoc Networks (VANETs) IEEE Access, vol. 9, pp. 159587-159597. Cryptographic operations measured using C MIRACL Core Cryptographic Library Advantages: It ensures message integrity, authentication, privacy, tracing, non-repudiation, and resistance to insider attacks Disadvantages: Limited Scalability, Increased Latency, Complexity of Revocation. 2. Comparative study on security and privacy issues in VANETs Cloud and IoT‐Based Vehicular Ad Hoc Networks (2021): 145-162. Geolocalization Abilities, Dedicated Short-Range Communication (DSRC), Low Motionlessness Necessities Advantages: It achieves security and privacy in VANETs. It enhances vehicle authentication time, collision rate, data transmission rate, and privacy preservation levels Disadvantages: Rapidly Evolving Technology, Availability of Data, Scope and Complexity
  • 6. 21-11-2023 Batch no : 13 6 Literature Survey Paper Title Journal details Methodology Advantages/ Disadvantages 3.Proven Secure Tree- Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs IEEE Transactions on Mobile Computing, vol. 21, no. 9, pp. 3280-3297, 1 Sept. 2022, doi: 10.1109/TMC.2021. 3056712. V2V and V2I Communications, Full authentication mechanism, Light weight Cryptography mechanism Advantages: The outcome is proven secure, it has low computational and communication overhead Disadvantages: Scalability, Complexity, Infrastructure Dependence, Single Point of Failure. 4.Batch-Assisted Verification Scheme for Reducing Message Verification Delay of the Vehicular Ad Hoc Networks IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8144- 8156, Sept. 2020, doi: 10.1109/JIOT.2020.3 004811 Dedicated Short Range Communication (DSRC) protocol, Collaborative authentication method. Advantages: It reduces verification delay and achieves fast message verification Disadvantages: Publication Bias, Rapidly Evolving Technology, Availability of Data, Scope and Complexity
  • 7. 21-11-2023 Batch no : 13 7 Literature Survey Paper Title Journal details Methodology Advantages/ Disadvantages 5.The Delay- Constrained and Network-Situation- Aware V2V2I VANET Data Offloading Based on the Multi-Access Edge Computing (MEC) Architecture, IEEE Open Journal of Vehicular Technology, vol. 1, pp. 331-347, 2020, doi: 10.1109/OJVT.2020. 3028684. MEC protocol Advantages: Ensures lifetime and quality of the V2V2I path to derive suitable offloading paths Disadvantages: Limited scope, Simplified assumptions, Lack of real-world validation 6.A novel cyber‐attack modelling and detection in overcurrent protection relays based on wavelet signature analysis. IET Generation, Transmission & Distribution (2023). Wavelet analysis,BRFD algorithm,NDN-VANET interconnection techniques Advantages: Detecting cyber attacks, reducing redundancy and improving packet satisfaction rate and delay Disadvantages: It does not provide a comprehensive analysis of all possible cyber threats and vulnerabilities in the smart grid
  • 8. 21-11-2023 Batch no : 13 8 Literature Survey Paper Title Journal details Methodology Advantages/ Disadvantages 7.A Survey of VANET/V2X Routing from the Perspective of Non-Learning- and Learning-Based Approaches IEEE Access, vol. 10, pp. 23022- 23050, 2022, Doi: 10.1109/ACCESS.2 022.3152767. V2X routing protocols Advantages: It delivers optimized packet delivery, handling congestion and shadowing effects, reducing network overhead Disadvantages: Potential limitation, Does not capture future protocols, a lack of coverage of innovative approaches 8.A receiver-forwarding decision scheme based on Bayesian for NDN- VANET, China Communications, vol. 17, no. 8, pp. 106-120, Aug. 2020, doi: 10.23919/JCC.2020. 08.009. Bayesian decision theory and the BRFD (Bayesian-based Receiver Forwarding Decision) scheme Advantages: Reducing redundancy and improving packet satisfaction rate and delay Disadvantages: It does not provide a comprehensive evaluation of the proposed BRFD scheme.
  • 9. 21-11-2023 Batch no : 13 9 Literature Survey Paper Title Journal details Methodology Advantages/ Disadvantages 9.Comment on Secure and Lightweight Conditional Privacy- Preserving Authentication for Securing Traffic Emergency Messages in VANETs IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1037-1038, 2023, doi: 10.1109/TIFS.2021. 3066277 PPA (privacy-preserving authentication) protocol Advantages: The scheme does not satisfy conditional privacy and allows for the forging of valid signatures on arbitrary messages Disadvantages: Reliability and Availability, Privacy Concerns, Scalability, Security Vulnerabilities 10.R.S. State-of-the-art approach to clustering protocols in VANET: a survey Wireless Netw 26, 5307–5336 (2020). https://doi.org/10.10 07/s11276-020- 02392-2. Clustering protocol,MAC protocol Advantages: Improved scalability and reliability Disadvantages: Communication overhead,limited clustered node percentage
  • 10. 21-11-2023 Batch no : 13 10 Objective • Implement causal dependency mechanisms to ensure proper message sequencing, guarding against replay attacks and enabling accurate relevance assessment of received information based on current conditions. • Utilize causal dependency to reduce the traceability of individual cars within the VANET network, enhancing privacy measures without compromising communication efficiency. • Implement causal dependency mechanisms to deter unauthorized tracking or tracing of vehicles, thereby safeguarding sensitive location and identity information. • Utilize causal dependency to enable secure data exchange among vehicles while reducing the risk of privacy breaches or malicious tracking attempts in VANETs.
  • 11. 21-11-2023 Batch no : 13 11 Motivation of the Work • Address the vulnerability of VANETs to insider attacks and privacy breaches by proposing a novel strategy combining Proof of Chain (PoC) and Causal Dependency mechanisms. • Aim to overcome challenges concerning privacy preservation and vehicle traceability, which hinder the widespread deployment of VANETs, ensuring that participating cars' identities and whereabouts remain protected. • Enable secure communication among vehicles and roadside infrastructure to manage traffic effectively while ensuring data integrity and non- repudiation, crucial for conveying vital safety information. • Strive to find a balance between robust security measures and the seamless exchange of critical safety and traffic-related information, ensuring that privacy and security concerns do not impede the functionality of VANETs.
  • 12. 21-11-2023 Batch no : 13 12 Flow Chart
  • 13. 21-11-2023 Batch no : 13 13 Explanation • OBUs generate a signature key that is used to sign their messages and prove their identity. • They apply a probabilistic function to their signature key. • They introduce dummy packets contain random data instead of fake data. • OBU’s send a request to join a Trusted Authority (TA). • The TA receives the request from the OBU and verifies its signature key. • If the verification is successful, the TA sends a certification key to the OBU. • The certification key is used to prove the OBU’s identity and verify its signature by other OBU’s or RSU’s. • RSUs verify received messages using OBUs' certification-derived public keys; upon successful signature validation, RSUs grant access to requested services or information.
  • 14. 21-11-2023 Batch no : 13 14 Process Diagram
  • 15. 21-11-2023 Batch no : 13 15 Software Details Software used Ns-3(Network Simulator version 3). Language used C++. Software description • It is a discrete event simulator for networking research. • It provides substantial support to simulate bunch of protocols like TCP, FTP, UDP, https and DSR. • It simulates wired and wireless network. • It helps users to visualize the behavior of network simulations.
  • 16. 21-11-2023 Batch no : 13 16 Methodology for the Proposed work Causal Dependency • Causal Dependency refers to the idea that in a VANET, the trustworthiness and reliability of information exchanged between vehicles or between a vehicle and roadside infrastructure should be established based on a causal relationship. Proof of Chain (PoC) Method • Proof of Chain (PoC) is a security mechanism designed to establish the causal dependency of messages or events in VANETs. It is a method used to provide evidence that a particular event or message is part of a legitimate chain of events or messages with a verifiable source.
  • 17. 21-11-2023 Batch no : 13 17 Results and Discussion • Causal dependency tracking captures the inter-node relationships and dependencies, offering a more comprehensive view of data flow. • Causal dependency enables the reconstruction of true data flow patterns, enhancing the accuracy and reliability of tracing data propagation paths. • Causal dependency is fundamental in preserving meaningful traceability as the system matures and adapts to increasing complexities. • Causal dependency fosters a robust framework that can navigate intricate network scenarios and maintain reliable traceability in the evolving landscape of blockchain technology.
  • 18. 21-11-2023 Batch no : 13 18 Output
  • 19. 21-11-2023 Batch no : 13 19 References 1. L. E. Funderburg, H. Ren and I. -Y. Lee, "Pairing-Free Signatures with Insider-Attack Resistance for Vehicular Ad-Hoc Networks (VANETs)," in IEEE Access, vol. 9, pp. 159587-159597, 2021, Doi: 10.1109/ACCESS.2021.3131189. 2. B T Rao, B. Tarakeswara, RSM Lakshmi Patibandla, and V. Lakshman Narayana. "Comparative study on security and privacy issues in VANETs." Cloud and IoT‐Based Vehicular Ad Hoc Networks (2021): 145-162. 3. L. Wei, J. Cui, H. Zhong, Y. Xu and L. Liu, "Proven Secure Tree-Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs," in IEEE Transactions on Mobile Computing, vol. 21, no. 9, pp. 3280-3297, 1 Sept. 2022, Doi: 10.1109/TMC.2021.3056712. 4. F. Wu, X. Zhang, C. Zhang, X. Chen, W. Fan and Y. Liu, "Batch-Assisted Verification Scheme for Reducing Message Verification Delay of the Vehicular Ad Hoc Networks," in IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8144-8156, Sept. 2020, Doi: 10.1109/JIOT.2020.3004811. 5. C. M. Huang and C. -F. Lai, "The Delay-Constrained and Network-Situation-Aware V2V2I VANET Data Offloading Based on the Multi-Access Edge Computing (MEC) Architecture," in IEEE Open Journal of Vehicular Technology, vol. 1, pp. 331-347, 2020, Doi: 10.1109/OJVT.2020.3028684 6. Yousefi kia, Mohammad, Mohsen Saniei, and Seyyed Ghodratollah Seifossadat. "A novel cyber‐attack modelling and detection in overcurrent protection relays based on wavelet signature analysis." IET Generation, Transmission & Distribution (2023).
  • 20. 21-11-2023 Batch no : 13 20 References 7. T. Chatterjee, R. Karmakar, G. Kaddoum, S. Chattopadhyay and S. Chakraborty, "A Survey of VANET/V2X Routing from the Perspective of Non-Learning- and Learning-Based Approaches," in IEEE Access, vol. 10, pp. 23022-23050, 2022, Doi: 10.1109/ACCESS.2022.3152767. 8. X. Guo, Y. Chen, L. Cao, D. Zhang and Y. Jiang, "A receiver-forwarding decision scheme based on Bayesian for NDN-VANET," in China Communications, vol. 17, no. 8, pp. 106-120, Aug. 2020, Doi: 10.23919/JCC.2020.08.009. 9. J. Zhang and Q. Zhang, "Comment on “Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs”,in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1037-1038, 2023, Doi: 10.1109/TIFS.2021.3066277. 10. J. Zhang and Q. Zhang, "Comment on “Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs”,in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1037-1038, 2023, Doi: 10.1109/TIFS.2021.3066277.

Editor's Notes

  1. Don’t include any decorative contents ( images , animations , sounds etc..) Don’t change background in to different colors. Ensure that date of presentation & batch number is updated before sending this ppt.
  2. This order can be varied based on the project Domain
  3. About the domain of your project (i.e embedded, wireless n/w , Iot etc….) Problems related to your project can be highlighted (Context and background of the idea)
  4. Discuss about the problem statement identified in your project and their solutions (not in paragraphs ….only bulletins )
  5. A minimum of 4 journal papers to be used. (select papers from the Journals like IEEE, Springer, Elsevier, Wiley) Paper details : title of the paper Journal Detail : Name of the journal , year , volume no , issue no Methodology : Technique , Algorithm, Domain etc…
  6. A minimum of 4 journal papers to be used. (select papers from the Journals like IEEE, Springer, Elsevier, Wiley) Paper details : title of the paper Journal Detail : Name of the journal , year , volume no , issue no Methodology : Technique , Algorithm, Domain etc…
  7. A minimum of 4 journal papers to be used. (select papers from the Journals like IEEE, Springer, Elsevier, Wiley) Paper details : title of the paper Journal Detail : Name of the journal , year , volume no , issue no Methodology : Technique , Algorithm, Domain etc…
  8. A minimum of 4 journal papers to be used. (select papers from the Journals like IEEE, Springer, Elsevier, Wiley) Paper details : title of the paper Journal Detail : Name of the journal , year , volume no , issue no Methodology : Technique , Algorithm, Domain etc…
  9. A minimum of 4 journal papers to be used. (select papers from the Journals like IEEE, Springer, Elsevier, Wiley) Paper details : title of the paper Journal Detail : Name of the journal , year , volume no , issue no Methodology : Technique , Algorithm, Domain etc…
  10. Mention the problem statement ….(what is your project work in statements …….not in paragraph ………only bulletin points)
  11. Mention the problem statement ….(what is your project work in statements …….not in paragraph ………only bulletin points)
  12. Explain about the proposed work
  13. Explain about the proposed work
  14. Provide Hardware / Software Details
  15. Project work flow
  16. Discuss about the Expected results from the Project
  17. Provide the list of references as per journal format Avoid putting links as Google.com, Wikipedia.com etc…. Provide the http link of the page or article refered
  18. Provide the list of references as per journal format Avoid putting links as Google.com, Wikipedia.com etc…. Provide the http link of the page or article refered