SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1238
Future of Transport: Connected Vehicles
Piyuesh Jain1, Latika Kharb2
1Student (MCA), Jagan Institute of Management Studies, Sector-5, Rohini, Delhi-110085, India
2Professor, Jagan Institute of Management Studies, Sector-5, Rohini, Delhi-110085, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Connected vehicles are the future of Transportation. Thoughautonomousvehicleshavebeenthereinthesceneforquite
a time now and are being implemented and used in the modern vehicles by the VehicleCompanies, thereisstillalotofchallengesin
attaining fully driver less vehicles that can run in dynamic scenarios. Connected vehicles is the way by which we can have
infrastructure and vehicles communicating among themselves and take smart decisions based on their communication. In this
paper we will discuss few techniques/protocols which can be used by Connected Vehicles to increase the performance, reliability
and data rates and also the potential threat vectors that could be potential source of vulnerabilities for the system.
Keywords—connected vehicle, driverless, communication, transport management.
1. INTRODUCTION
The most crucial problems that are present in most of developed and developing countries are traffic congestion, cost ofextra
fuel and road accidents. Despite of all the hi-tech transport management systems and other advanced technologies. With
increasing number of vehicles on road the above problems are also increasing which suggests us to come up with certain
paradigm which could reduce these problems and save millions oflivesofthepeople wholosetheirlifeinRoadaccidents every
year. One such techniques that are in trend is Connected Vehicles. However like every new technology there are lot of
challenges inside and outside that are still waiting for their answers as of now. Discussing further on Connected Vehicles a
study[1] led by the U.S. Department of Transportation (U.S. D.O.T.), connected vehicles can save 74% of car crashes. Hence
making this field more promising.
2. TECHNIQUES
There are few techniques used by the vehicles to make the communication among them possible. Few of the techniques are
Dedicated Short-Range Communications (DSRC), Online Control Approach for Power and Rates (OnCAR) which promises
consistent performance in highly dynamic environments[2].
2.1. Dedicated Short-Range Communications (DSRC)
DSRC or Dedicated Short-Range Communications can be explained as a communication that takes place between the various
components that together consist of the environment of the connected vehicles i.e. the infrastructureand the vehicle itself. The
DSRC consists of two types of the communication vehicle to vehicle a.k.a V2V and Vehicle to Infrastructure a.k.a V2I
communication. Both these communication constitutes the Connected vehicles environment. The DSRC technology enables
variety of applications suchas adaptive cruisecontrol,forwardcollisionwarning,lanechangeassistandetc[2].AccordingtoU.S.
Department of Transportation (U.S. D.O.T.)[3], DSRC enables the most reliable, high speed vehicle-based technology for crash
prevention safety applications, provides for a broad cross-section of dedicated connectivity options for surface transportation
safety and DSRC based communications serves as the basis for connected vehicle safety and mobility application integration.
There are two types of communications that take place in DSRC:
2.1.1. Vehicle to vehicle communication (V2V): According to wikipedia,[4] “Vehicle-to-vehicle(V2V)isanautomobile
technology designed to allow automobiles to "talk" to each other”. As the name suggests, vehicle to vehicle
communication takes place between vehicles to share vital information like positions so as to avoid collisions
when changing lanes or taking blind turns via. Notifications/warnings. This all communication takes place over
short-waves. The US V2V standard is commonly known as WAVE (Wireless Access for Vehicular Environments)
and based on the standard IEEE 802.11p.
2.1.2. Vehicle to infrastructure communication (V2I): Just like V2V, V2I is the technology by which the vehicle
communicates with the surrounding infrastructure. The infrastructure may vary from a traffic signal to a smart
band wore by a person to make his trajectory and position visible to the surrounding vehicles to ensure safety.
Vehicle to infrastructure works similar to the vehicle to vehicle communication. Its also known as V2X
communication as X in the context can be any part of infrastructure. The vehicletoinfrastructuremakespossible
the advance notifications to the system/driver about the potential concern about the possibility of a collision or
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1239
some other sort of the problem. The V2I communication comprises of mainly two equipment Vehicle on board
unit and Road side unit or RSE.
2.2Online Control Approach for Power and Rates (OnCAR): The above technique, DSRChavesomeshortcomings. As
traffic during rush hours can create disturbances in the channel 172, that is used by DSRC for communication. This
can compromise the driving safety. Moreover, during rush hours network topologies also couldbeverydynamicand
can change faster than normal making the communication difficult due to the questionable reliabilityonthechannel.
In order to optimize the performance of DSRC, we have Online Control Approach for PowerandRates(OnCAR),that
promises to enhance the overall reliability and efficiency of DSRC by 23.7%and31%,respectively[5]. Themotivation
to this approach is:
i. Real life traffic is dynamic, introducing rapid variations to the network structure/topology and wireless channels.
ii. The DSRC performance, especially the accuracy degrades when there is lack of responsiveness and coordination.
3. BASIC ECOSYSTEM
The typical connected ecosystem contains of different things like sentient vehicle, Road side unit, Trusted authority and
sentient components. All these components collectively constitute the system. [2]
Here is a short description of the components that constitute a typical ecosystem:
 Sentient car/vehicle: sentient car is an enabled car loaded with sensors, communication and actuators that make it
capable of communicating with other vehicles and infrastructure.
Fig 1: s-car [2]
 Road side unit (RSU): The road side units are the communication bridges between the sentient car and the other
communication channels the duty of the RSUs is to provide nearreal timeimageofsurroundingsforthes-cartomakeit
easier for it to be aware of the surroundings.
Fig 2. RSU [2]
 Trusted Authority (TA): T.A. or Trusted authority are the roots of certifications for the communication that takes
place between the ecosystem let it be the vehicles or the components. The Trusted Authority can be private or public
organization.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1240
Fig 3. TA [2]
 S-components: s-components or sentinel components are the components that come under infrastructureliketraffic
signals and few other components such as a wrist band for human. These components are not in picture as ofnow. But
as this ecosystem will advance lots of components will start to come under this category.
Fig 4. S-components [2]
 Environment: Environment constitutes of all other physical things that surround this ecosystem.
Fig 4. Environment [2]
4. THREAT VECTORS
In the fast pacing world, we commune from one place to another or one city to another with the means of vehicles [6]. As any
other system, connected vehicles has got its own set of nightmares to deal with. As just before this section we discussed the
ecosystem of a typical connected system we will now discuss potential spaces where attackercanattack ourconnectedvehicle
system.
The attacks could be global or inter-vehicular However this is the broad classification of the type of attacks:
i. On global communication: The first and most dangerous attack can be global attack that could bring whole system to
halt. The attacks can be DDOS or similar attacks compromising the speed of the system making it less responsive and
ultimately not working.
ii. On local V2V communication: Other possibility might be attacking the local V2V communication. This attacks are
believed to be less destructing as we have RSUs that make the V2V communication a solitary source of information and
signals.
iii. On in-vehicle communication: Other possible attack can be on the in-vehicle communication. The in vehicle
communication needs to be very efficient and reliable as it will be similar to response to stimuli in human. Any alteration
in response time of the in-vehicle communication can lead to serious damages.
iv. On exposed vehicle software: The communications in the vehicle usually takes place via single or multicore processors
but increasing need of other multimedia, it needs to be PC like. Hence have to run an OS on it. The problem with that is it
introduces the vulnerabilities inherent in the OS as well. Once anyone compromisesthe OS,theycanverywell fakesensor
data and provide that in loop to make system behave unexpectedly.
v. On exposed road side unit software: RSU are very critical components in the whole setup as they serve as the interface
and communication points for all the V2I communications. They act similar to mobile phone base stations inheriting all
the vulnerabilities the former are related to. These vulnerabilities can compromise wholeV2Icommunicationandleadto
serious consequences.
vi. On sensors and control sensitive data: The sensors are the eyes and ears of the system, as most of the detection and
responses are done with the help of sensors. Any change or compromise of the control sensitive data can lead to severe
consequences. Though we have no idea right now how this might occur but a skilled and motivated hacker can attack
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1241
along this threat vector.
vii. On authentication mechanism: The authentication mechanismcheckstheintegrityof thedata andsignals makingitvery
delicate part of the chain. Trusted Authorities should use secret key access mechanism to avoid the addition of any fake
hardware/RSU in the system.
viii. Physical level attacks: Physical level attacks are the attacks directly to the hardware. These attacks can be avoided by
making the build of hardware more robust and reliable.
REFERENCES
[1] W. G. Najm, J. Koopmann, J. D. Smith, and J. Brewer, “Frequencyoftargetcrashesfor intellidrivesafetysystems,” DOTHS811
381, 2010.
[2] António Lima, Francisco Rocha, Marcus Völp, and Paulo Esteves-Verissimo - Towards Safe and Secure Autonomous and
Cooperative Vehicle Ecosystems, October 28, 2016
[3] United States Department of Transportation http://www.its.dot.gov/factsheets/dsrc_factsheet.htm
[4] Wikipedia - Article on vehicle to vehicle communication https://en.wikipedia.org/wiki/Vehicle-to-vehicle
[5] Xi Chen, Linghe Kong, Xue Liu, Lei Rao, Fan Bai and Qiao Xiang - How Cars Talk Louder, Clearer and Fairer: Optimizing the
Communication Performance of Connected Vehicles via Online Synchronous Control, November 2015
[6] Kharb L. et al. Implementing IoT and Data Analytics to Overcome "Vehicles Danger". International Journal of Innovative
Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-11, September 2019

More Related Content

What's hot

Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network IRJET Journal
 
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P ijwmn
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
 
A review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networksA review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networksjournalBEEI
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
 
5g Technology: A key Enabler to next generation in car experiences
5g Technology: A key Enabler to next generation in car experiences5g Technology: A key Enabler to next generation in car experiences
5g Technology: A key Enabler to next generation in car experiencesPratapaditya Singh
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANETPallavi Agarwal
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network SecurityLim Jung
 
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...ijwmn
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET Journal
 
Aodv routing protocol implementation design
Aodv routing protocol implementation designAodv routing protocol implementation design
Aodv routing protocol implementation designProf Ansari
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Dr.Irshad Ahmed Sumra
 
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...IOSR Journals
 
EARLY ACM( EMLPP)
EARLY ACM( EMLPP)EARLY ACM( EMLPP)
EARLY ACM( EMLPP)dosaegg
 
VANET based Intelligent TransportationSystem using Li-Fi technology
VANET based Intelligent TransportationSystem using Li-Fi technologyVANET based Intelligent TransportationSystem using Li-Fi technology
VANET based Intelligent TransportationSystem using Li-Fi technologyIOSRJECE
 
Redline AGM 2012
Redline AGM 2012Redline AGM 2012
Redline AGM 2012rdlcom
 

What's hot (18)

Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network
 
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
 
A review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networksA review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networks
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication System
 
5g Technology: A key Enabler to next generation in car experiences
5g Technology: A key Enabler to next generation in car experiences5g Technology: A key Enabler to next generation in car experiences
5g Technology: A key Enabler to next generation in car experiences
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANET
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
 
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
 
Aodv routing protocol implementation design
Aodv routing protocol implementation designAodv routing protocol implementation design
Aodv routing protocol implementation design
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
 
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
 
VEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOKVEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOK
 
EARLY ACM( EMLPP)
EARLY ACM( EMLPP)EARLY ACM( EMLPP)
EARLY ACM( EMLPP)
 
VANET based Intelligent TransportationSystem using Li-Fi technology
VANET based Intelligent TransportationSystem using Li-Fi technologyVANET based Intelligent TransportationSystem using Li-Fi technology
VANET based Intelligent TransportationSystem using Li-Fi technology
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
Redline AGM 2012
Redline AGM 2012Redline AGM 2012
Redline AGM 2012
 

Similar to IRJET- Future of Transport: Connected Vehicles

Traffic Control and Vehicle-to-Everything (V2X) Communications
Traffic Control and Vehicle-to-Everything (V2X) CommunicationsTraffic Control and Vehicle-to-Everything (V2X) Communications
Traffic Control and Vehicle-to-Everything (V2X) CommunicationsOfinno
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET Journal
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd Iaetsd
 
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDRELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDIJCI JOURNAL
 
IRJET - Review on IoV (Internet of Vehicles): Threats, Applications and R...
IRJET -  	  Review on IoV (Internet of Vehicles): Threats, Applications and R...IRJET -  	  Review on IoV (Internet of Vehicles): Threats, Applications and R...
IRJET - Review on IoV (Internet of Vehicles): Threats, Applications and R...IRJET Journal
 
IRJET- Smart Technology for Vehicle Safety
IRJET- Smart Technology for Vehicle SafetyIRJET- Smart Technology for Vehicle Safety
IRJET- Smart Technology for Vehicle SafetyIRJET Journal
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETIJNSA Journal
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-finASMA HADELI
 
IRJET- A Vehicle to Vehicle Communication System
IRJET-  	  A Vehicle to Vehicle Communication SystemIRJET-  	  A Vehicle to Vehicle Communication System
IRJET- A Vehicle to Vehicle Communication SystemIRJET Journal
 
02-27-An Efficient On the Run in-Vehicle Diagnostic and Remote Diagnostics Su...
02-27-An Efficient On the Run in-Vehicle Diagnostic and Remote Diagnostics Su...02-27-An Efficient On the Run in-Vehicle Diagnostic and Remote Diagnostics Su...
02-27-An Efficient On the Run in-Vehicle Diagnostic and Remote Diagnostics Su...Sivaram P
 
IRJET - Integrated VLC with Wi-Fi for Smartway Transportation System: A Survey
IRJET - Integrated VLC with Wi-Fi for Smartway Transportation System: A SurveyIRJET - Integrated VLC with Wi-Fi for Smartway Transportation System: A Survey
IRJET - Integrated VLC with Wi-Fi for Smartway Transportation System: A SurveyIRJET Journal
 
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACHSECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACHcscpconf
 
Security issues and solutions in vehicular adhoc network a review approach
Security issues and solutions in vehicular adhoc network  a review approachSecurity issues and solutions in vehicular adhoc network  a review approach
Security issues and solutions in vehicular adhoc network a review approachcsandit
 
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET Journal
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationeSAT Journals
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationeSAT Publishing House
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETDr.Irshad Ahmed Sumra
 

Similar to IRJET- Future of Transport: Connected Vehicles (20)

Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
Traffic Control and Vehicle-to-Everything (V2X) Communications
Traffic Control and Vehicle-to-Everything (V2X) CommunicationsTraffic Control and Vehicle-to-Everything (V2X) Communications
Traffic Control and Vehicle-to-Everything (V2X) Communications
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
 
Routing protocols in Vanet
Routing protocols in VanetRouting protocols in Vanet
Routing protocols in Vanet
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDRELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
 
IRJET - Review on IoV (Internet of Vehicles): Threats, Applications and R...
IRJET -  	  Review on IoV (Internet of Vehicles): Threats, Applications and R...IRJET -  	  Review on IoV (Internet of Vehicles): Threats, Applications and R...
IRJET - Review on IoV (Internet of Vehicles): Threats, Applications and R...
 
IRJET- Smart Technology for Vehicle Safety
IRJET- Smart Technology for Vehicle SafetyIRJET- Smart Technology for Vehicle Safety
IRJET- Smart Technology for Vehicle Safety
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-fin
 
IRJET- A Vehicle to Vehicle Communication System
IRJET-  	  A Vehicle to Vehicle Communication SystemIRJET-  	  A Vehicle to Vehicle Communication System
IRJET- A Vehicle to Vehicle Communication System
 
02-27-An Efficient On the Run in-Vehicle Diagnostic and Remote Diagnostics Su...
02-27-An Efficient On the Run in-Vehicle Diagnostic and Remote Diagnostics Su...02-27-An Efficient On the Run in-Vehicle Diagnostic and Remote Diagnostics Su...
02-27-An Efficient On the Run in-Vehicle Diagnostic and Remote Diagnostics Su...
 
IRJET - Integrated VLC with Wi-Fi for Smartway Transportation System: A Survey
IRJET - Integrated VLC with Wi-Fi for Smartway Transportation System: A SurveyIRJET - Integrated VLC with Wi-Fi for Smartway Transportation System: A Survey
IRJET - Integrated VLC with Wi-Fi for Smartway Transportation System: A Survey
 
[IJET V2I2P27] Authors: Shruti Kamatekar, Prof. Balachandra G.C
[IJET V2I2P27] Authors: Shruti Kamatekar, Prof. Balachandra G.C[IJET V2I2P27] Authors: Shruti Kamatekar, Prof. Balachandra G.C
[IJET V2I2P27] Authors: Shruti Kamatekar, Prof. Balachandra G.C
 
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACHSECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
 
Security issues and solutions in vehicular adhoc network a review approach
Security issues and solutions in vehicular adhoc network  a review approachSecurity issues and solutions in vehicular adhoc network  a review approach
Security issues and solutions in vehicular adhoc network a review approach
 
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 

Recently uploaded (20)

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 

IRJET- Future of Transport: Connected Vehicles

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1238 Future of Transport: Connected Vehicles Piyuesh Jain1, Latika Kharb2 1Student (MCA), Jagan Institute of Management Studies, Sector-5, Rohini, Delhi-110085, India 2Professor, Jagan Institute of Management Studies, Sector-5, Rohini, Delhi-110085, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Connected vehicles are the future of Transportation. Thoughautonomousvehicleshavebeenthereinthesceneforquite a time now and are being implemented and used in the modern vehicles by the VehicleCompanies, thereisstillalotofchallengesin attaining fully driver less vehicles that can run in dynamic scenarios. Connected vehicles is the way by which we can have infrastructure and vehicles communicating among themselves and take smart decisions based on their communication. In this paper we will discuss few techniques/protocols which can be used by Connected Vehicles to increase the performance, reliability and data rates and also the potential threat vectors that could be potential source of vulnerabilities for the system. Keywords—connected vehicle, driverless, communication, transport management. 1. INTRODUCTION The most crucial problems that are present in most of developed and developing countries are traffic congestion, cost ofextra fuel and road accidents. Despite of all the hi-tech transport management systems and other advanced technologies. With increasing number of vehicles on road the above problems are also increasing which suggests us to come up with certain paradigm which could reduce these problems and save millions oflivesofthepeople wholosetheirlifeinRoadaccidents every year. One such techniques that are in trend is Connected Vehicles. However like every new technology there are lot of challenges inside and outside that are still waiting for their answers as of now. Discussing further on Connected Vehicles a study[1] led by the U.S. Department of Transportation (U.S. D.O.T.), connected vehicles can save 74% of car crashes. Hence making this field more promising. 2. TECHNIQUES There are few techniques used by the vehicles to make the communication among them possible. Few of the techniques are Dedicated Short-Range Communications (DSRC), Online Control Approach for Power and Rates (OnCAR) which promises consistent performance in highly dynamic environments[2]. 2.1. Dedicated Short-Range Communications (DSRC) DSRC or Dedicated Short-Range Communications can be explained as a communication that takes place between the various components that together consist of the environment of the connected vehicles i.e. the infrastructureand the vehicle itself. The DSRC consists of two types of the communication vehicle to vehicle a.k.a V2V and Vehicle to Infrastructure a.k.a V2I communication. Both these communication constitutes the Connected vehicles environment. The DSRC technology enables variety of applications suchas adaptive cruisecontrol,forwardcollisionwarning,lanechangeassistandetc[2].AccordingtoU.S. Department of Transportation (U.S. D.O.T.)[3], DSRC enables the most reliable, high speed vehicle-based technology for crash prevention safety applications, provides for a broad cross-section of dedicated connectivity options for surface transportation safety and DSRC based communications serves as the basis for connected vehicle safety and mobility application integration. There are two types of communications that take place in DSRC: 2.1.1. Vehicle to vehicle communication (V2V): According to wikipedia,[4] “Vehicle-to-vehicle(V2V)isanautomobile technology designed to allow automobiles to "talk" to each other”. As the name suggests, vehicle to vehicle communication takes place between vehicles to share vital information like positions so as to avoid collisions when changing lanes or taking blind turns via. Notifications/warnings. This all communication takes place over short-waves. The US V2V standard is commonly known as WAVE (Wireless Access for Vehicular Environments) and based on the standard IEEE 802.11p. 2.1.2. Vehicle to infrastructure communication (V2I): Just like V2V, V2I is the technology by which the vehicle communicates with the surrounding infrastructure. The infrastructure may vary from a traffic signal to a smart band wore by a person to make his trajectory and position visible to the surrounding vehicles to ensure safety. Vehicle to infrastructure works similar to the vehicle to vehicle communication. Its also known as V2X communication as X in the context can be any part of infrastructure. The vehicletoinfrastructuremakespossible the advance notifications to the system/driver about the potential concern about the possibility of a collision or
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1239 some other sort of the problem. The V2I communication comprises of mainly two equipment Vehicle on board unit and Road side unit or RSE. 2.2Online Control Approach for Power and Rates (OnCAR): The above technique, DSRChavesomeshortcomings. As traffic during rush hours can create disturbances in the channel 172, that is used by DSRC for communication. This can compromise the driving safety. Moreover, during rush hours network topologies also couldbeverydynamicand can change faster than normal making the communication difficult due to the questionable reliabilityonthechannel. In order to optimize the performance of DSRC, we have Online Control Approach for PowerandRates(OnCAR),that promises to enhance the overall reliability and efficiency of DSRC by 23.7%and31%,respectively[5]. Themotivation to this approach is: i. Real life traffic is dynamic, introducing rapid variations to the network structure/topology and wireless channels. ii. The DSRC performance, especially the accuracy degrades when there is lack of responsiveness and coordination. 3. BASIC ECOSYSTEM The typical connected ecosystem contains of different things like sentient vehicle, Road side unit, Trusted authority and sentient components. All these components collectively constitute the system. [2] Here is a short description of the components that constitute a typical ecosystem:  Sentient car/vehicle: sentient car is an enabled car loaded with sensors, communication and actuators that make it capable of communicating with other vehicles and infrastructure. Fig 1: s-car [2]  Road side unit (RSU): The road side units are the communication bridges between the sentient car and the other communication channels the duty of the RSUs is to provide nearreal timeimageofsurroundingsforthes-cartomakeit easier for it to be aware of the surroundings. Fig 2. RSU [2]  Trusted Authority (TA): T.A. or Trusted authority are the roots of certifications for the communication that takes place between the ecosystem let it be the vehicles or the components. The Trusted Authority can be private or public organization.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1240 Fig 3. TA [2]  S-components: s-components or sentinel components are the components that come under infrastructureliketraffic signals and few other components such as a wrist band for human. These components are not in picture as ofnow. But as this ecosystem will advance lots of components will start to come under this category. Fig 4. S-components [2]  Environment: Environment constitutes of all other physical things that surround this ecosystem. Fig 4. Environment [2] 4. THREAT VECTORS In the fast pacing world, we commune from one place to another or one city to another with the means of vehicles [6]. As any other system, connected vehicles has got its own set of nightmares to deal with. As just before this section we discussed the ecosystem of a typical connected system we will now discuss potential spaces where attackercanattack ourconnectedvehicle system. The attacks could be global or inter-vehicular However this is the broad classification of the type of attacks: i. On global communication: The first and most dangerous attack can be global attack that could bring whole system to halt. The attacks can be DDOS or similar attacks compromising the speed of the system making it less responsive and ultimately not working. ii. On local V2V communication: Other possibility might be attacking the local V2V communication. This attacks are believed to be less destructing as we have RSUs that make the V2V communication a solitary source of information and signals. iii. On in-vehicle communication: Other possible attack can be on the in-vehicle communication. The in vehicle communication needs to be very efficient and reliable as it will be similar to response to stimuli in human. Any alteration in response time of the in-vehicle communication can lead to serious damages. iv. On exposed vehicle software: The communications in the vehicle usually takes place via single or multicore processors but increasing need of other multimedia, it needs to be PC like. Hence have to run an OS on it. The problem with that is it introduces the vulnerabilities inherent in the OS as well. Once anyone compromisesthe OS,theycanverywell fakesensor data and provide that in loop to make system behave unexpectedly. v. On exposed road side unit software: RSU are very critical components in the whole setup as they serve as the interface and communication points for all the V2I communications. They act similar to mobile phone base stations inheriting all the vulnerabilities the former are related to. These vulnerabilities can compromise wholeV2Icommunicationandleadto serious consequences. vi. On sensors and control sensitive data: The sensors are the eyes and ears of the system, as most of the detection and responses are done with the help of sensors. Any change or compromise of the control sensitive data can lead to severe consequences. Though we have no idea right now how this might occur but a skilled and motivated hacker can attack
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1241 along this threat vector. vii. On authentication mechanism: The authentication mechanismcheckstheintegrityof thedata andsignals makingitvery delicate part of the chain. Trusted Authorities should use secret key access mechanism to avoid the addition of any fake hardware/RSU in the system. viii. Physical level attacks: Physical level attacks are the attacks directly to the hardware. These attacks can be avoided by making the build of hardware more robust and reliable. REFERENCES [1] W. G. Najm, J. Koopmann, J. D. Smith, and J. Brewer, “Frequencyoftargetcrashesfor intellidrivesafetysystems,” DOTHS811 381, 2010. [2] António Lima, Francisco Rocha, Marcus Völp, and Paulo Esteves-Verissimo - Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems, October 28, 2016 [3] United States Department of Transportation http://www.its.dot.gov/factsheets/dsrc_factsheet.htm [4] Wikipedia - Article on vehicle to vehicle communication https://en.wikipedia.org/wiki/Vehicle-to-vehicle [5] Xi Chen, Linghe Kong, Xue Liu, Lei Rao, Fan Bai and Qiao Xiang - How Cars Talk Louder, Clearer and Fairer: Optimizing the Communication Performance of Connected Vehicles via Online Synchronous Control, November 2015 [6] Kharb L. et al. Implementing IoT and Data Analytics to Overcome "Vehicles Danger". International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-11, September 2019