The document outlines a research paper on secure vehicular clouds. It discusses vehicular ad-hoc networks (VANETs), cloud computing, the concept of a vehicular cloud where vehicles' computing resources are pooled, and security issues in vehicular clouds. The paper motivates vehicular clouds by noting unused computing/storage resources in parked vehicles and opportunities for roadside infrastructure integration. It describes vehicular clouds and how they differ from traditional clouds due to vehicle mobility and autonomy. Storage as a service using on-board vehicle storage is presented as an example application.
Do s attacks in vanet presentation in vanetsirojiddin
VANETs use wireless communications like DSRC to allow vehicles to communicate with each other and roadside infrastructure to share safety and traffic information; however, these wireless networks are vulnerable to various security attacks from malicious or rational attackers seeking to disrupt traffic, track vehicles, or cause accidents through spoofing messages about collisions or traffic conditions; effective security solutions need to provide authentication, data verification, availability, non-repudiation, and address real-time constraints of high-speed vehicle networks.
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour DetectionAnkit Singh
The document discusses security and privacy issues in Vehicular Ad-hoc Networks (VANETs) and proposes anonymous credential protocols to address these issues. It introduces VANETs and the privacy problems. It then discusses security and privacy requirements, assumptions made in designing protocols, and players involved. Two protocol versions are proposed: one without revocation and one with revocation. The protocols are implemented using an anonymous credential library. The document analyzes security and privacy fulfillment, concludes the thesis achieved its goals, and discusses future work to optimize performance.
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
This presentation proposes a three-tier cloud architecture for vehicle networks called V-Cloud. The first tier contains devices in vehicles like sensors, GPS and smartphones. The second tier enables in-vehicle, vehicle-to-vehicle, and vehicle-to-infrastructure communication. The third tier provides context-based, communication-based, and customized services through the cloud. V-Cloud would make real-time services possible, allow resource sharing between vehicles cost-effectively, and provide accurate personalized services through cloud computing. In conclusion, as vehicles and communication technologies advance, V-Cloud could improve safety, connectivity and comfort through its tiered cloud architecture.
This document discusses security issues in vehicular ad hoc networks (VANETs) and proposes a method to prevent denial of service (DoS) attacks using a quick response table. It begins with an introduction to VANETs and their communication methods. It then outlines common security threats like DoS attacks, spoofing, and fake information. The document also lists security requirements for VANETs such as message authentication, availability, integrity, and non-repudiation. Finally, it proposes using a quick response table to prevent DoS attacks in VANETs and concludes that this can improve vehicle safety and support intelligent transportation systems.
This document discusses Vehicular Ad-Hoc Networks (VANETs) which allow vehicles to communicate with each other to share safety and traffic information. It outlines the architecture of VANETs including vehicle-to-vehicle and vehicle-to-infrastructure communication. The document also discusses security issues in VANETs such as bogus information attacks, identity disclosure, and denial-of-service attacks. It proposes the use of authentication, message integrity, privacy, traceability and availability to address these security requirements. The document assumes that roadways are divided into regions managed by trusted roadside infrastructure units.
[Ppt] Survey Of Vehicular Network SecurityLim Jung
This document summarizes research on security and privacy issues in vehicular networks. It discusses design challenges including authentication, encryption, and privacy concerns. It also examines certificate-based security mechanisms using public key infrastructure and revocation of compromised devices or certificates. Finally, it reviews approaches for validating sensor data from vehicles and detecting malicious information.
The document outlines a research paper on secure vehicular clouds. It discusses vehicular ad-hoc networks (VANETs), cloud computing, the concept of a vehicular cloud where vehicles' computing resources are pooled, and security issues in vehicular clouds. The paper motivates vehicular clouds by noting unused computing/storage resources in parked vehicles and opportunities for roadside infrastructure integration. It describes vehicular clouds and how they differ from traditional clouds due to vehicle mobility and autonomy. Storage as a service using on-board vehicle storage is presented as an example application.
Do s attacks in vanet presentation in vanetsirojiddin
VANETs use wireless communications like DSRC to allow vehicles to communicate with each other and roadside infrastructure to share safety and traffic information; however, these wireless networks are vulnerable to various security attacks from malicious or rational attackers seeking to disrupt traffic, track vehicles, or cause accidents through spoofing messages about collisions or traffic conditions; effective security solutions need to provide authentication, data verification, availability, non-repudiation, and address real-time constraints of high-speed vehicle networks.
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour DetectionAnkit Singh
The document discusses security and privacy issues in Vehicular Ad-hoc Networks (VANETs) and proposes anonymous credential protocols to address these issues. It introduces VANETs and the privacy problems. It then discusses security and privacy requirements, assumptions made in designing protocols, and players involved. Two protocol versions are proposed: one without revocation and one with revocation. The protocols are implemented using an anonymous credential library. The document analyzes security and privacy fulfillment, concludes the thesis achieved its goals, and discusses future work to optimize performance.
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
This presentation proposes a three-tier cloud architecture for vehicle networks called V-Cloud. The first tier contains devices in vehicles like sensors, GPS and smartphones. The second tier enables in-vehicle, vehicle-to-vehicle, and vehicle-to-infrastructure communication. The third tier provides context-based, communication-based, and customized services through the cloud. V-Cloud would make real-time services possible, allow resource sharing between vehicles cost-effectively, and provide accurate personalized services through cloud computing. In conclusion, as vehicles and communication technologies advance, V-Cloud could improve safety, connectivity and comfort through its tiered cloud architecture.
This document discusses security issues in vehicular ad hoc networks (VANETs) and proposes a method to prevent denial of service (DoS) attacks using a quick response table. It begins with an introduction to VANETs and their communication methods. It then outlines common security threats like DoS attacks, spoofing, and fake information. The document also lists security requirements for VANETs such as message authentication, availability, integrity, and non-repudiation. Finally, it proposes using a quick response table to prevent DoS attacks in VANETs and concludes that this can improve vehicle safety and support intelligent transportation systems.
This document discusses Vehicular Ad-Hoc Networks (VANETs) which allow vehicles to communicate with each other to share safety and traffic information. It outlines the architecture of VANETs including vehicle-to-vehicle and vehicle-to-infrastructure communication. The document also discusses security issues in VANETs such as bogus information attacks, identity disclosure, and denial-of-service attacks. It proposes the use of authentication, message integrity, privacy, traceability and availability to address these security requirements. The document assumes that roadways are divided into regions managed by trusted roadside infrastructure units.
[Ppt] Survey Of Vehicular Network SecurityLim Jung
This document summarizes research on security and privacy issues in vehicular networks. It discusses design challenges including authentication, encryption, and privacy concerns. It also examines certificate-based security mechanisms using public key infrastructure and revocation of compromised devices or certificates. Finally, it reviews approaches for validating sensor data from vehicles and detecting malicious information.
Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Atta...Innopolis University
This document presents a scheme for privacy-aware misbehavior and Sybil attack detection in VANETs. The scheme incorporates both data-centric and entity-centric misbehavior detection, and detection of Sybil attacks. It proposes calculating vehicular density based on received beacons to determine whether to apply misbehavior or Sybil attack detection. Position information is verified using beacons from opposite traffic. The scheme aims to detect misbehavior independently based on position verification while preserving user privacy and providing conditional anonymity. It is evaluated in terms of security, privacy and computational overhead compared to other schemes.
The document discusses Vehicular Ad-Hoc Networks (VANETs) which allow vehicles to communicate with each other to share safety and traffic information. It outlines the architecture of VANETs including vehicle-to-vehicle and vehicle-to-roadside communications. The document then covers security challenges in VANETs such as threats to availability, authentication, and confidentiality. It also discusses challenges like mobility, volatility, and balancing privacy with authentication and liability. Finally, it lists security requirements for VANETs including message authentication, non-repudiation, availability, and privacy protection.
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...IJMER
Vehicular Ad-hoc Network (VANET) and Mobile Ad-hoc Network (MANET) provide a distinguish approach for Intelligent Transport System (ITS). The existing applications in VANET provide secure message passing and circulation of data within the range, but there are very few applications where individual's security is taken into consideration. In new applications we can make one which provides safety for individuals on road or indirectly related to roads or vehicles. For making such an application we will be using Radio Frequency (RF) signals, VANET network, GPS and GSM techniques. RF signals will be generating input signals; vehicles for making an alarm for generated signals; VANET network to spread the information about panic area to the other vehicles in range; GPS & GSM to track the location & position of victim and send this information to authorized helping system respectively. Thus using all above techniques and principles we are designing a scheme which provides safety using VANET protocols
This document discusses securing vehicular ad hoc networks (VANETs). It begins with an overview of VANETs, including their components and communication patterns. It then discusses some security problems in VANETs like bogus information, identity disclosure, and denial of service attacks. Next, it outlines security requirements like authentication, integrity, privacy and availability. It reviews some related work on using public key infrastructure and group signatures for security. Finally, it discusses challenges in VANET security and concludes that detection of malicious vehicles remains a challenge that requires further research.
This document discusses security issues in vehicular ad hoc networks (VANETs). It begins with an overview of what a VANET is and examples of VANET applications like congestion detection and deceleration warnings. It then discusses potential adversaries and security attacks against VANETs, such as congestion creation, location spoofing, and denial of service attacks. The document outlines security requirements for VANETs including authentication, data verification, availability, non-repudiation, and privacy. It proposes a security architecture using tamper-proof devices, digital signatures, and a vehicular PKI for identity management and key distribution. Finally, it discusses potential security primitives like authenticated localization, anonymization services,
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
Security issues and solutions in vehicular adhoc network a review approachcsandit
Vehicular networks are the promising approach to provide safety to the drivers. It becomes a
key component of intelligent transport system. A lot of research work has been done towards it
but security issue got less attention. In this article we discuss about the VANET, it's technical
and security challenges. We also discuss some major attacks and solutions that can be
implemented against these attacks. We compare the solution on different parameters and lastly
discuss the mechanisms that are used in the solutions.
This document provides an overview of Vehicular Ad-Hoc Networks (VANETs). It discusses the key components of VANETs including on-board units, roadside units, and a trusted authority. It describes the different types of communication in VANETs and lists some of the main applications like safety and convenience applications. The document also outlines some of the security requirements for VANETs, challenges in deploying them at scale, and techniques for establishing trust between vehicles.
Cooperative Message Authentication Protocol(CMAP) in VANETMayuresh Bhagat
VANETs allow vehicles to communicate with each other to share information about traffic and road conditions. This addresses issues like lack of timely accident alerts. A VANET uses vehicle-to-vehicle communication through wireless networks to provide drivers with real-time traffic updates. It allows vehicles to broadcast safety messages to nearby vehicles to warn of hazards. Cooperative message authentication protocols help verify these messages efficiently through distributed verification. VANET research focuses on security, routing protocols, applications for safety and convenience, and reducing computational overhead of verification.
This document presents a proposed improved safety information routing protocol for vehicular ad hoc networks (VANETs). The proposed protocol uses spray and wait and direct delivery routing to transmit data between nodes. It calculates traffic density based on vehicle length, safety distance, and road dimensions. The protocol establishes routes from source to destination nodes. Simulation results show that the spray and wait router performs better than the direct delivery router in terms of delivered messages and overhead ratio. The proposed protocol can help reduce delays in VANET safety message routing.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document discusses geographical routing protocols for vehicular ad hoc networks (VANETs). It provides an overview of VANET characteristics and challenges, including changing network topology due to node mobility. Several geographical routing protocols are described, including GPSR, GPSR-AGF, GPCR, A-STAR, GSR, GyTAR and LOUVRE. The document compares GPSR and GPCR, and discusses how protocols like A-STAR may be better suited for urban environments compared to GPSR. Simulation tools for evaluating VANET protocols are also covered, along with considerations for implementing geographical routing in Bangladesh.
Overview of VANET with Its Features and Security AttacksIRJET Journal
This document discusses Vehicular Ad-hoc Networks (VANETs), including an overview of their features, applications, standards, and security issues. Specifically, it describes how VANETs allow vehicle-to-vehicle and vehicle-to-infrastructure wireless communication. It outlines the characteristics, applications in safety, user services, and vehicle functions. Standards like DSRC, WAVE, and IEEE 802.11p that enable VANET communication are also summarized. Finally, the document analyzes security issues in VANETs and the requirements for authentication, availability, non-repudiation, privacy, and more.
A review on various security attacks in vehicular ad hoc networksjournalBEEI
Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.
A vehicular ad-hoc network (VANETs) is emerging technology in wireless ad-hoc
network.VANETs are dope out to improve vehicular safety and manage the traffic in the urban areas. Adaptive
slot assignment strategy with fuzzy logic are used with multipath routing mechanism with TDMA allocation to
limit the collision rate and improve the energy and reduce stoppage in the vehicle statement. In this paper, an
interruption avoidance protocol that are integrated with digital signature and game theory approach with Road
side unit control to enhance the security and protecting the VANET environment. Using this intrusion
prevention protocol is implemented to examine the various parameter values to provide the Quality of Service,
inter –vehicle and intra-vehicle security in the zone with security showed with the simulated results.
The main idea behind trusted computing is the hardware based TPM which contains active security modules that supports web of trust to be built within components of the network. We propose a new model for web of trust within vehicular to handle all types of attacks and maintain the integrity of messages.
Security attacks and solutions in vehicular ad hoc networks a surveypijans
This document summarizes a survey of security attacks and solutions in vehicular ad hoc networks (VANETs). It discusses several types of attacks that can occur in VANETs, including Sybil attacks, wormhole attacks, and spoofing attacks. It also reviews related work on VANET security and categorizes existing attacks. The document outlines security requirements for VANETs such as confidentiality, integrity, availability, privacy, and non-repudiation. It provides examples of how different attacks can be carried out and potential solutions to counter each type of attack.
Various Metaheuristic algorithms For Securing VANETKishan Patel
Metaheuristic can be considered as a "master strategy that guides and modifies other heuristics to produce solutions. Generally metaheuristic is used for solving problem in ad hoc networks.
SOTM : A Self Organized Trust Management System for VANET csandit
Security and trust management in Vehicular Adhoc NETworks (VANET) is a crucial research domain
which is the scope of many researches and domains. Although, the majority of the proposed trust
management systems for VANET are based on specific road infrastructure, which may not be present in all
the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a
new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the
spread of false warnings in the network through four principal components: cooperation, trust
management, communication and security.
The document discusses security issues and trust management in Vehicular Ad-Hoc Networks (VANETs). It outlines various security challenges in VANETs including handling malicious nodes, privacy, and message attacks. It also discusses approaches for trust establishment including infrastructure-based, self-organizing, and hybrid models. A case study is presented on a collaborative research project for a multi-source trust model to detect legitimate and spurious safety messages in VANETs.
Vehicular Networks (VNs) seek to provide, among other applications, safer driving conditions. Vehicles need to periodically broadcast safety messages providing precise position information to nearby vehicles. Recent advances in development of Wireless Communication in Vehicular Adhoc Network (VANET) has provided emerging platform for industrialists and researchers. Vehicular adhoc networks are multi-hop networks with no fixed infrastructure. As a result, the driver’s privacy is at stake. In order to mitigate this threat, while complying with the safety requirements of VNs, the creation of mix-zones security at appropriate places of the VN to prevent the attacks Vehicle. Propose to do so with the use of cryptography algorithm AES with zone based routing protocol, analytically how the combination of mix-zones into mix-networks brings forth location privacy in vehicle node. Finally, show by simulations that the proposed zone based security is effective in various scenarios.
Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Atta...Innopolis University
This document presents a scheme for privacy-aware misbehavior and Sybil attack detection in VANETs. The scheme incorporates both data-centric and entity-centric misbehavior detection, and detection of Sybil attacks. It proposes calculating vehicular density based on received beacons to determine whether to apply misbehavior or Sybil attack detection. Position information is verified using beacons from opposite traffic. The scheme aims to detect misbehavior independently based on position verification while preserving user privacy and providing conditional anonymity. It is evaluated in terms of security, privacy and computational overhead compared to other schemes.
The document discusses Vehicular Ad-Hoc Networks (VANETs) which allow vehicles to communicate with each other to share safety and traffic information. It outlines the architecture of VANETs including vehicle-to-vehicle and vehicle-to-roadside communications. The document then covers security challenges in VANETs such as threats to availability, authentication, and confidentiality. It also discusses challenges like mobility, volatility, and balancing privacy with authentication and liability. Finally, it lists security requirements for VANETs including message authentication, non-repudiation, availability, and privacy protection.
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...IJMER
Vehicular Ad-hoc Network (VANET) and Mobile Ad-hoc Network (MANET) provide a distinguish approach for Intelligent Transport System (ITS). The existing applications in VANET provide secure message passing and circulation of data within the range, but there are very few applications where individual's security is taken into consideration. In new applications we can make one which provides safety for individuals on road or indirectly related to roads or vehicles. For making such an application we will be using Radio Frequency (RF) signals, VANET network, GPS and GSM techniques. RF signals will be generating input signals; vehicles for making an alarm for generated signals; VANET network to spread the information about panic area to the other vehicles in range; GPS & GSM to track the location & position of victim and send this information to authorized helping system respectively. Thus using all above techniques and principles we are designing a scheme which provides safety using VANET protocols
This document discusses securing vehicular ad hoc networks (VANETs). It begins with an overview of VANETs, including their components and communication patterns. It then discusses some security problems in VANETs like bogus information, identity disclosure, and denial of service attacks. Next, it outlines security requirements like authentication, integrity, privacy and availability. It reviews some related work on using public key infrastructure and group signatures for security. Finally, it discusses challenges in VANET security and concludes that detection of malicious vehicles remains a challenge that requires further research.
This document discusses security issues in vehicular ad hoc networks (VANETs). It begins with an overview of what a VANET is and examples of VANET applications like congestion detection and deceleration warnings. It then discusses potential adversaries and security attacks against VANETs, such as congestion creation, location spoofing, and denial of service attacks. The document outlines security requirements for VANETs including authentication, data verification, availability, non-repudiation, and privacy. It proposes a security architecture using tamper-proof devices, digital signatures, and a vehicular PKI for identity management and key distribution. Finally, it discusses potential security primitives like authenticated localization, anonymization services,
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
Security issues and solutions in vehicular adhoc network a review approachcsandit
Vehicular networks are the promising approach to provide safety to the drivers. It becomes a
key component of intelligent transport system. A lot of research work has been done towards it
but security issue got less attention. In this article we discuss about the VANET, it's technical
and security challenges. We also discuss some major attacks and solutions that can be
implemented against these attacks. We compare the solution on different parameters and lastly
discuss the mechanisms that are used in the solutions.
This document provides an overview of Vehicular Ad-Hoc Networks (VANETs). It discusses the key components of VANETs including on-board units, roadside units, and a trusted authority. It describes the different types of communication in VANETs and lists some of the main applications like safety and convenience applications. The document also outlines some of the security requirements for VANETs, challenges in deploying them at scale, and techniques for establishing trust between vehicles.
Cooperative Message Authentication Protocol(CMAP) in VANETMayuresh Bhagat
VANETs allow vehicles to communicate with each other to share information about traffic and road conditions. This addresses issues like lack of timely accident alerts. A VANET uses vehicle-to-vehicle communication through wireless networks to provide drivers with real-time traffic updates. It allows vehicles to broadcast safety messages to nearby vehicles to warn of hazards. Cooperative message authentication protocols help verify these messages efficiently through distributed verification. VANET research focuses on security, routing protocols, applications for safety and convenience, and reducing computational overhead of verification.
This document presents a proposed improved safety information routing protocol for vehicular ad hoc networks (VANETs). The proposed protocol uses spray and wait and direct delivery routing to transmit data between nodes. It calculates traffic density based on vehicle length, safety distance, and road dimensions. The protocol establishes routes from source to destination nodes. Simulation results show that the spray and wait router performs better than the direct delivery router in terms of delivered messages and overhead ratio. The proposed protocol can help reduce delays in VANET safety message routing.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document discusses geographical routing protocols for vehicular ad hoc networks (VANETs). It provides an overview of VANET characteristics and challenges, including changing network topology due to node mobility. Several geographical routing protocols are described, including GPSR, GPSR-AGF, GPCR, A-STAR, GSR, GyTAR and LOUVRE. The document compares GPSR and GPCR, and discusses how protocols like A-STAR may be better suited for urban environments compared to GPSR. Simulation tools for evaluating VANET protocols are also covered, along with considerations for implementing geographical routing in Bangladesh.
Overview of VANET with Its Features and Security AttacksIRJET Journal
This document discusses Vehicular Ad-hoc Networks (VANETs), including an overview of their features, applications, standards, and security issues. Specifically, it describes how VANETs allow vehicle-to-vehicle and vehicle-to-infrastructure wireless communication. It outlines the characteristics, applications in safety, user services, and vehicle functions. Standards like DSRC, WAVE, and IEEE 802.11p that enable VANET communication are also summarized. Finally, the document analyzes security issues in VANETs and the requirements for authentication, availability, non-repudiation, privacy, and more.
A review on various security attacks in vehicular ad hoc networksjournalBEEI
Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.
A vehicular ad-hoc network (VANETs) is emerging technology in wireless ad-hoc
network.VANETs are dope out to improve vehicular safety and manage the traffic in the urban areas. Adaptive
slot assignment strategy with fuzzy logic are used with multipath routing mechanism with TDMA allocation to
limit the collision rate and improve the energy and reduce stoppage in the vehicle statement. In this paper, an
interruption avoidance protocol that are integrated with digital signature and game theory approach with Road
side unit control to enhance the security and protecting the VANET environment. Using this intrusion
prevention protocol is implemented to examine the various parameter values to provide the Quality of Service,
inter –vehicle and intra-vehicle security in the zone with security showed with the simulated results.
The main idea behind trusted computing is the hardware based TPM which contains active security modules that supports web of trust to be built within components of the network. We propose a new model for web of trust within vehicular to handle all types of attacks and maintain the integrity of messages.
Security attacks and solutions in vehicular ad hoc networks a surveypijans
This document summarizes a survey of security attacks and solutions in vehicular ad hoc networks (VANETs). It discusses several types of attacks that can occur in VANETs, including Sybil attacks, wormhole attacks, and spoofing attacks. It also reviews related work on VANET security and categorizes existing attacks. The document outlines security requirements for VANETs such as confidentiality, integrity, availability, privacy, and non-repudiation. It provides examples of how different attacks can be carried out and potential solutions to counter each type of attack.
Various Metaheuristic algorithms For Securing VANETKishan Patel
Metaheuristic can be considered as a "master strategy that guides and modifies other heuristics to produce solutions. Generally metaheuristic is used for solving problem in ad hoc networks.
SOTM : A Self Organized Trust Management System for VANET csandit
Security and trust management in Vehicular Adhoc NETworks (VANET) is a crucial research domain
which is the scope of many researches and domains. Although, the majority of the proposed trust
management systems for VANET are based on specific road infrastructure, which may not be present in all
the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a
new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the
spread of false warnings in the network through four principal components: cooperation, trust
management, communication and security.
The document discusses security issues and trust management in Vehicular Ad-Hoc Networks (VANETs). It outlines various security challenges in VANETs including handling malicious nodes, privacy, and message attacks. It also discusses approaches for trust establishment including infrastructure-based, self-organizing, and hybrid models. A case study is presented on a collaborative research project for a multi-source trust model to detect legitimate and spurious safety messages in VANETs.
Vehicular Networks (VNs) seek to provide, among other applications, safer driving conditions. Vehicles need to periodically broadcast safety messages providing precise position information to nearby vehicles. Recent advances in development of Wireless Communication in Vehicular Adhoc Network (VANET) has provided emerging platform for industrialists and researchers. Vehicular adhoc networks are multi-hop networks with no fixed infrastructure. As a result, the driver’s privacy is at stake. In order to mitigate this threat, while complying with the safety requirements of VNs, the creation of mix-zones security at appropriate places of the VN to prevent the attacks Vehicle. Propose to do so with the use of cryptography algorithm AES with zone based routing protocol, analytically how the combination of mix-zones into mix-networks brings forth location privacy in vehicle node. Finally, show by simulations that the proposed zone based security is effective in various scenarios.
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field throughout the most recent couple of years. VANETs are the likely an impacting way to deal with giving security of driver and different applications for the activity conditions and additionally travelers. Being dynamic in nature, it created the network, according to the condition and requirement of the users and provides consistent communication between the vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and security in VANET should be taken into consideration. This paper presented the security issues such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the performance and security of this network. The fundamental point of this paper is the several security challenges and the applications of VANETs.
A fully automated, self-driving car can perceive its environment, determine the optimal route, and drive
unaided by human intervention for the entire journey. Connected autonomous vehicles (CAVs) have the
potential to drastically reduce accidents, travel time, and the environmental impact of road travel. Such
technology includes the use of several sensors, various algorithms, interconnected network connections,
and multiple auxiliary systems. CAVs have been subjected to attacks by malicious users to gain/deny
control of one or more of its various systems. Data security and data privacy is one such area of CAVs that
has been targeted via different types of attacks. The scope of this study is to present a good background
knowledge of issues pertaining to different attacks in the context of data security and privacy, as well
present a detailed review and analysis of eight very recent studies on the broad topic of security and
privacy related attacks. Methodologies including Blockchain, Named Data Networking, Intrusion
Detection System, Cognitive Engine, Adversarial Objects, and others have been investigated in the
literature and problem- and context-specific models have been proposed by their respective authors.
EXAMINING MODERN DATA SECURITY AND PRIVACY PROTOCOLS IN AUTONOMOUS VEHICLESijcsit
A fully automated, self-driving car can perceive its environment, determine the optimal route, and drive
unaided by human intervention for the entire journey. Connected autonomous vehicles (CAVs) have the
potential to drastically reduce accidents, travel time, and the environmental impact of road travel. Such
technology includes the use of several sensors, various algorithms, interconnected network connections,
and multiple auxiliary systems. CAVs have been subjected to attacks by malicious users to gain/deny
control of one or more of its various systems. Data security and data privacy is one such area of CAVs that
has been targeted via different types of attacks. The scope of this study is to present a good background
knowledge of issues pertaining to different attacks in the context of data security and privacy, as well
present a detailed review and analysis of eight very recent studies on the broad topic of security and
privacy related attacks. Methodologies including Blockchain, Named Data Networking, Intrusion
Detection System, Cognitive Engine, Adversarial Objects, and others have been investigated in the
literature and problem- and context-specific models have been proposed by their respective authors
This document summarizes routing protocols, security issues, and simulation tools for vehicular ad hoc networks (VANETs). It discusses five categories of routing protocols for VANETs: topology based, position based, cluster based, geocast, and broadcast based. It also outlines several common security attacks for VANETs, including denial of service attacks, message suppression attacks, fabrication attacks, and alteration attacks. Finally, it states that network and traffic simulators are commonly used together to test VANET safety applications before real-world deployment, as simulation provides a simple, easy, and cheap alternative to outdoor experimentation.
Creating a Safer, Smarter ride - NFV for AutomotiveTrinath Somanchi
While NFV and SDN have showcases their potential in cloud Data centers, experts are looking to bring its expertise for creating a secured safer smart ride through the integration of vehicle-vehicle and vehicle-infrastructure communications which create smart locales. Today we have understood the requirements and networking involved to realize centralized and distributed clouds to support customer premise services and IIoT. But we have a partial gain from these technologies. To unlock the real potential of Edge networks, the Automotive industry is moving towards integrating ADAS and intelligent roadside infrastructure with Cloud Edge and NFV technologies to create a Safer and Smarter Ride.
This presentation showcases on NFV for Automotive to create safer and smart ride.
Vehicular networks, also known as VANETs, allow vehicles to communicate with each other to share safety information. They involve vehicle-to-vehicle and vehicle-to-infrastructure communication using wireless technologies. VANETs aim to improve road safety by providing drivers with warnings about accidents, traffic, or dangerous road conditions. However, designing reliable VANETs presents challenges related to security, scalability, high mobility, and environmental factors that affect wireless communication. Recent research focuses on developing intelligent transportation systems using VANETs to assist drivers with safety and provide applications for traffic efficiency and infotainment.
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
VANET provide facility for the vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages to other vehicles. However, this raises the issue of security and privacy. Here, we have described various existing solutions/protocols that are used in order to satisfy the security and privacy requirement of the vehicular ad hoc network. We have also described security issues and challenges in VANET. We have presented various security attributes that may be considered as criteria to measure security such as availability, confidentiality, integrity, authentication and non-repudiation. This paper also give the detail information of some of the schemes such as RAISE ,IBV with their pros and cons.
This document discusses Vehicular Ad-Hoc Networks (VANETs). It defines VANETs as a technology that uses vehicles as nodes in a mobile network to communicate among nearby vehicles and with roadside equipment. The document outlines the motivation for VANETs as improving safety by preventing road accidents and optimizing traffic flow. It also describes the differences between VANETs and mobile ad-hoc networks, provides a schematic of a VANET, and discusses VANET architecture, applications such as collision warnings, and current research being done in both the US and Europe.
Vehicular ad-hoc networks (VANETs) allow vehicles to communicate with each other using sensors, GPS, WiFi and other technologies. In a VANET, vehicles act as wireless routers to connect to other vehicles within 100-300 meters, creating a mobile internet. VANETs provide safety benefits by sharing information about location, speed and road conditions to warn of accidents and traffic. They can also notify drivers of nearby services. Inter-vehicle communication does not require infrastructure and allows real-time sharing of safety messages between any vehicles that are nearby.
VANET: Routing Protocols, Security Issues and Simulation ToolsIOSR Journals
The document summarizes routing protocols, security issues, and simulation tools for vehicular ad hoc networks (VANETs). It discusses five categories of routing protocols - topology based, position based, cluster based, geocast, and broadcast based. It also outlines several attacks against VANETs like denial of service, message suppression, fabrication, and alteration attacks. Finally, it notes that simulators are preferred over outdoor experiments for initially testing VANET safety applications before real-world deployment due to their simplicity, low cost and ease of use.
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
Recently, vehicular ad hoc networks (VANETs) have been garnering
significant inter-est from the people involved in transportation field.
Nowadays automotive manufactur-ers have already supplying vehicles with
multitude of road sensors that provides many useful characteristics. VANET
communication not only offers the drivers and passen-gers with the various
safety related services but also provides a wide range of valuable
applications. However, the inherent openness of the wireless communication
medium used by VANETs exposes vehicles to various security and privacy
issues. Researchers have proposed many security schemes to solve the issues
mentioned above for the widespread deployment of VANETs. However,
these schemes failed to fulfill all as-pects of security and privacy
requirements. Besides, these schemes have not provided the performance
parameters such as computation and communication costs. The pri-mary
emphasis of this paper is on the taxonomy of security schemes based
conditional privacy-preserving with respect to strengths and limitations.
Besides, a comparison be-tween these schemes related to the model of
security and privacy requirements, attacks, and performance parameters is
provided. Finally, this paper critically reviews the re-lated works by taking
into consideration the design and development of all VANETs security and
privacy schemes, this paper could serve as a guide and reference.
This document summarizes Dr. I.A. Sumra's research on using computing methods to secure vehicular ad hoc networks (VANETs). It discusses how VANETs work and their safety and non-safety applications. It also outlines key security requirements for VANETs like identification, authentication, privacy, and availability. The document then reviews various computing methods that could help secure VANETs, including cloud computing, grid computing, soft computing, trusted computing, quantum computing, pervasive computing, and their relationship to addressing security challenges in VANETs posed by dynamic topologies and attacker behaviors.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
Internet for vanet network communications fleetnetIJCNCJournal
Now in the world, the exchange of information between vehicles in the roads without any fixed infrastructure is enabled thanks to the novel technology of the Vehicular adhoc networks called (VANETs).The accidents and congestions warning, Internet access e.g. via gateways along the road are the main applications of these networks related to the safety and comfort applications. A high requirement on the routing protocols is introduced in these complexed VANETs networks In order to implement a reference intelligent transportation system and contribute to the standardization of vehicle to vehicle communication or vehicle to infrastructure, in Europe, several projects are held and different partners are joined from the industry, governmental agencies and academia.This paper explains the main progress and purposes of the standardization process and research initiatives of FleetNet project. These solutions will present in the future a common worldwide VANET platform integrating several services of inter-vehicles communications.
Vehicular Ad Hoc Networks (VANETs) are based on network technology where cars act as mobile nodes to form a communication network. In VANETs, routing protocols have a significance regarding the overall network performance since they determine the way of sending and receiving packets between mobile nodes. Most of the protocols proposed for VANETs are adapted from Mobile ad hoc networks (MANETs) routing protocols. However, due to the specific characteristics of VANETs, especially high mobility, and dynamic topology, the routing protocols in ad hoc networks do not adapt immediately to VANETs. Therefore, secure routing of Vehicular ad hoc networks (VANETs) against attacks, which are of various types, is still a challenging issue. This paper is going to present a synthesis of the most relevant protocols that have addressed the secure routing issue in VANETs. It also establishes a comparison regarding the offered features and the studied performance aspects through which it is notified that a security mechanism depends not only on the level of efficiency but also on the network constraints.
Vehicular Ad Hoc Networks (VANETs) are based on network technology where cars act as mobile nodes to form a communication network. In VANETs, routing protocols have a significance regarding the overall network performance since they determine the way of sending and receiving packets between mobile nodes. Most of the protocols proposed for VANETs are adapted from Mobile ad hoc networks (MANETs) routing protocols. However, due to the specific characteristics of VANETs, especially high mobility, and dynamic topology, the routing protocols in ad hoc networks do not adapt immediately to VANETs. Therefore, secure routing of Vehicular ad hoc networks (VANETs) against attacks, which are of various types, is still a challenging issue. This paper is going to present a synthesis of the most relevant protocols that have addressed the secure routing issue in VANETs. It also establishes a comparison regarding the offered features and the studied performance aspects through which it is notified that a security mechanism depends not only on the level of efficiency but also on the network constraints.
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
Similar to Providing Location Security in Vehicular Networks (20)
Comparing the Archival Rate of Arabic, English, Danish, and Korean Language W...Michele Weigle
Based on work published in ACM Transactions on Information Systems (TOIS), 36(1), July 2017 by Lulwah Alkwai, Michael L. Nelson, and Michele C. Weigle
Presented at ACM SIGIR 2019 on July 24, 2019 by Michele C. Weigle
WS-DL’s Work towards Enabling Personal Use of Web ArchivesMichele Weigle
Talk given at Library of Congress by Michele C. Weigle (@weiglemc)
December 18, 2018
Web Science and Digital Libraries (WS-DL) Research Group (@WebSciDL)
Old Dominion University
Norfolk, VA
This document provides an introduction to web archiving presented by Dr. Michele Weigle from Old Dominion University's Web Sciences and Digital Libraries Group. It discusses how webpages can disappear from the live web, the importance of archiving webpages to preserve history, and several tools developed by the group like Mink, #icanhazmemento, and ArchiveNow that make web archiving easier. It also introduces Memento, a system that allows accessing archived versions of webpages from multiple archives.
Keynote talk presented at Web Archiving and Digital Libraries (WADL) 2018
June 6, 2018 - Fort Worth, TX
Michele C. Weigle (@weiglemc)
Web Science and Digital Libraries (WS-DL) Research Group (@WebSciDL)
Old Dominion University
Norfolk, VA
This document provides guidance on writing academic papers. It discusses what a PhD program entails and emphasizes communication skills. It outlines the typical structure of academic papers, including an introduction, related work, approach, evaluation, future work and conclusions. It covers citations, references, and the writing process. Effective organization, structure, and attention to detail are important. The writing process should begin with outlining before writing full sentences. Telling the story in a clear way takes significant time and effort.
How to Prepare and Give and Academic PresentationMichele Weigle
The document provides tips for preparing and delivering an academic presentation. It begins by discussing what a PhD program entails and emphasizing the importance of communication skills. It then outlines how to structure a presentation like telling a story, including setting the scene, presenting the problem, highlighting the approach, showing results, and concluding with a summary. The document concludes by offering concrete tips, such as considering the audience, using visuals effectively, and helping the audience, as well as things to avoid such as walls of text. It emphasizes speaking clearly, facing the audience, practicing, and planning beginnings and endings.
The document describes the speaker's career journey through computer science by summarizing highlights captured on the Internet Archive from 1997 to 2013, including her undergraduate studies, teaching positions, research, marriage, graduation, faculty roles, and advising her first PhD student. She notes it was interesting but not always easy to piece her story together from archived web pages. Today social media would also contribute to one's story but posts are not saved by the Internet Archive.
A Retasking Framework For Wireless Sensor NetworksMichele Weigle
The document discusses re-tasking wireless sensor networks using the Deluge framework. Key points:
1. The goals were to analyze Deluge, implement selective re-tasking of specific nodes or groups, and design a GUI for monitoring and re-tasking.
2. Deluge allows distributing program binaries over sensor networks but only supports re-tasking all nodes.
3. The author implemented selective re-tasking using a node ID hash and group ID to target specific nodes or groups for re-tasking. Collection was also added to gather network status from nodes.
4. A Deluge visualizer GUI was created to issue commands and monitor node status. The changes increased code size
Strategies for Sensor Data Aggregation in Support of Emergency ResponseMichele Weigle
Presented by Xianping Wang
Military Communications Conference (MILCOM)
October 6-8, 2014
Baltimore, MD
Xianping Wang, Aaron Walden, Michele C. Weigle and Stephan Olariu, "Strategies for Sensor Data Aggregation in Support of Emergency Response," In Proceedings of the Military Communications Conference (MILCOM). Baltimore, MD, October 2014.
Presented by Michele C. Weigle, June 4, 2015
Columbia University Web Archiving Collaboration: New Tools and Models
Work by Yasmin AlNoamany, Michele C. Weigle, and Michael L. Nelson
What's Grad School All About?
Capital Region Celebration of Women in Computing (CAPWIC), Harrisonburg, VA
February 27, 2015
Presented by Michele Weigle
The document summarizes Dr. Michele Weigle's presentation on tools for managing the past web. It discusses how webpages can disappear quickly from the live web and may only be accessible through web archives. It then describes several tools and projects from Old Dominion University's Web Sciences and Digital Libraries group that make archived web content more accessible and useful, such as tools that integrate the live and archived web, detect damage in archived pages, summarize collections of archived pages, and enable personal web archiving.
The document summarizes tools developed by the Web Sciences and Digital Libraries Group for managing archived web content. It describes WARCreate, a Chrome extension that archives the current state of web pages; WAIL, which loads archived web pages (WARC files) into a local Wayback instance for viewing; and Mink, a Chrome extension that displays archived versions of visited pages. It also discusses techniques for assessing damage in archived pages, generating thumbnail summaries of archive collections, and detecting off-topic pages within archives. The tools are intended to make web archiving more accessible and help curate archived web collections.
Archive What I See Now - 2014 NEH ODH OverviewMichele Weigle
"Archive What I See Now": Bringing Institutional Web Archiving Tools to the Individual Researcher
Slides from 2014 NEH ODH Project Directors' Meeting
September 15, 2014
Michele C. Weigle, Michael L. Nelson, Liza Potts
The document discusses potential summer research projects in the areas of digital preservation, web archiving, and information visualization. It describes the Web Sciences and Digital Libraries research group's work in web archiving and efforts to make archived web content more accessible and usable. Potential summer projects outlined include developing a visualization of health data from the Blue Button initiative, visualizing aggregate health data using public datasets, and exploring tools for analyzing large collections of academic documents.
Dr. Michele Weigle gave a presentation on telling stories using web archives. She discussed defining a story's timeline and key events, identifying relevant archived web pages, and visualizing the assembled story. Her research group is exploring how to help others reconstruct personal and historical narratives from archived web content, as pages on the live web often disappear over time.
"Archive What I See Now" - NEH ODH overviewMichele Weigle
"Archive What I See Now": Bringing Institutional Web Archiving Tools to the Individual Researcher
Slides from shutdown-cancelled NEH ODH Project Directors' Meeting (originally scheduled for Oct 4, 2013)
Michele C. Weigle and Michael L. Nelson
TDMA Slot Reservation in Cluster-Based VANETsMichele Weigle
Mohammad Almalag's PhD Defense Slides
Department of Computer Science
Old Dominion University
April 3, 2013
Note: You may need to download the file to see all of the animations.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Providing Location Security in Vehicular Networks
1. Providing
Location
Security in
Vehicular
Adhoc
Providing Location Security in Vehicular
Networks
Adhoc Networks
Introduction
Related Work
Location
Integrity Gongjun Yan
Location
Confidentiality
Co-advisors: Dr. Stephan Olariu
Summary
Dr. Michele C. Weigle
Computer Science Department
Old Dominion University,
Norfolk, VA 23529
April 26, 2010
1 / 53
2. Table of Contents
Providing
Location
Security in
Vehicular
Adhoc
Networks
1 Introduction
Introduction 2 Related Work
Related Work
Location
Integrity 3 Location Integrity
Location
Confidentiality
Summary 4 Location Confidentiality
5 Summary
2 / 53
3. Introduction: Modern Vehicles
Providing
Location
Security in
Vehicular
Adhoc
Networks
Digital ID and
Introduction Wireless Transceiver
Related Work
Location
Integrity
Location
Confidentiality
Radar
Summary
GPS Receiver
3 / 53
4. Introduction: Modern Vehicles
Providing
Location
Security in
Vehicular
Adhoc
Networks
Introduction Roadside
Related Work Infrastructure
Location
Integrity
Location
Confidentiality Other Vehicles
Summary GPS
Transceiver Radar
4 / 53
5. Vehicular Adhoc Network (VANET)
Providing
Location
Security in
Vehicular
Create a Vehicular Adhoc Network (VANET).
Adhoc
Networks Supported by gov, industry, and academic.
Introduction
Related Work
Location
Integrity
Location
Confidentiality
Summary
1
1 http://www.comnets.rwth-aachen.de/
5 / 53
6. Vehicular Adhoc Network (VANET)
Providing
Location
Security in
Vehicular
Create a Vehicular Adhoc Network (VANET).
Adhoc
Networks Supported by gov, industry, and academic.
Introduction
Related Work
Location
Integrity
Location
Confidentiality
Summary
1
1 http://www.comnets.rwth-aachen.de/
5 / 53
7. Vehicular Adhoc Network
Providing
Location
Security in
Vehicular
Adhoc
Networks
Vehicular Adhoc Network (VANET) applications:
Introduction Safety:
Related Work Collision warning, road sign alarms, merge assistance
Location Left turn assistance, pedestrians crossing alert, etc.
Integrity
Comfort (infotainment) to passengers:
Location
Confidentiality Intelligent navigation
Summary Multimedia, internet connectivity
Automatic payment of parking, toll collection, etc.
6 / 53
8. Vehicular Adhoc Network
Providing
Location
Security in
Vehicular
Adhoc
Networks
Vehicular Adhoc Network (VANET) applications:
Introduction Safety:
Related Work Collision warning, road sign alarms, merge assistance
Location Left turn assistance, pedestrians crossing alert, etc.
Integrity
Comfort (infotainment) to passengers:
Location
Confidentiality Intelligent navigation
Summary Multimedia, internet connectivity
Automatic payment of parking, toll collection, etc.
6 / 53
9. Vehicular Adhoc Network
Providing
Location
Security in
Vehicular
Adhoc
Networks
Vehicular Adhoc Network (VANET) applications:
Introduction Safety:
Related Work Collision warning, road sign alarms, merge assistance
Location Left turn assistance, pedestrians crossing alert, etc.
Integrity
Comfort (infotainment) to passengers:
Location
Confidentiality Intelligent navigation
Summary Multimedia, internet connectivity
Automatic payment of parking, toll collection, etc.
6 / 53
10. Vehicular Adhoc Network
Providing
Location
Security in
Vehicular
Adhoc
Networks
Vehicular Adhoc Network (VANET) applications:
Introduction Safety:
Related Work Collision warning, road sign alarms, merge assistance
Location Left turn assistance, pedestrians crossing alert, etc.
Integrity
Comfort (infotainment) to passengers:
Location
Confidentiality Intelligent navigation
Summary Multimedia, internet connectivity
Automatic payment of parking, toll collection, etc.
6 / 53
11. Vehicular Adhoc Network
Providing
Location
Security in
Vehicular
Adhoc
Networks
Vehicular Adhoc Network (VANET) applications:
Introduction Safety:
Related Work Collision warning, road sign alarms, merge assistance
Location Left turn assistance, pedestrians crossing alert, etc.
Integrity
Comfort (infotainment) to passengers:
Location
Confidentiality Intelligent navigation
Summary Multimedia, internet connectivity
Automatic payment of parking, toll collection, etc.
6 / 53
12. Vehicular Adhoc Network
Providing
Location
Security in
Vehicular
Adhoc
Networks
Vehicular Adhoc Network (VANET) applications:
Introduction Safety:
Related Work Collision warning, road sign alarms, merge assistance
Location Left turn assistance, pedestrians crossing alert, etc.
Integrity
Comfort (infotainment) to passengers:
Location
Confidentiality Intelligent navigation
Summary Multimedia, internet connectivity
Automatic payment of parking, toll collection, etc.
6 / 53
13. Vehicular Adhoc Network
Providing
Location
Security in
Vehicular
Adhoc
Networks
Vehicular Adhoc Network (VANET) applications:
Introduction Safety:
Related Work Collision warning, road sign alarms, merge assistance
Location Left turn assistance, pedestrians crossing alert, etc.
Integrity
Comfort (infotainment) to passengers:
Location
Confidentiality Intelligent navigation
Summary Multimedia, internet connectivity
Automatic payment of parking, toll collection, etc.
6 / 53
14. Vehicular Adhoc Network
Providing
Location
Security in
Vehicular
Adhoc
Networks
Vehicular Adhoc Network (VANET) applications:
Introduction Safety:
Related Work Collision warning, road sign alarms, merge assistance
Location Left turn assistance, pedestrians crossing alert, etc.
Integrity
Comfort (infotainment) to passengers:
Location
Confidentiality Intelligent navigation
Summary Multimedia, internet connectivity
Automatic payment of parking, toll collection, etc.
6 / 53
15. Applications: TrafficView
Providing
Location
Security in
Vehicular
Adhoc
Networks
Introduction
Related Work
Location
Integrity
Location
Confidentiality
Summary
[Nadeem et al.(2004)]
7 / 53
16. Location Attack: Intersection
Providing
Location
The line of sight is blocked and you trust only the location
Security in
Vehicular
over VANET. No traffic lights.
Adhoc
Networks
Introduction
Related Work
Traffic Direction
Location
Integrity
Location
Confidentiality
Summary
Traffic Direction
8 / 53
17. Location Attack: Highway
Providing
Location
The line of sight is blocked and you trust only the location
Security in
Vehicular
over VANET.
Adhoc
Networks
Introduction
Related Work
Location Traffic Direction
Integrity
Location
Confidentiality
Summary
Traffic Direction
9 / 53
18. Research Question
Providing
Location
Security in
Vehicular
Most, if not all, applications rely on locations.
Adhoc
Networks Research question:
How to improve location security?
Introduction
What do we protect?
Related Work
Location
Right time, right ID, right location
Integrity
Synchronized time can be obtain from GPS
Location
Confidentiality
What is ID?
Summary
A unique digital identity
Anonymous to drivers/passengers’ identity
What is location?
location ≡ <latitude, longitude, altitude>
Obtained from: transceivers, radar, GPS
10 / 53
19. Research Question
Providing
Location
Security in
Vehicular
Most, if not all, applications rely on locations.
Adhoc
Networks Research question:
How to improve location security?
Introduction
What do we protect?
Related Work
Location
Right time, right ID, right location
Integrity
Synchronized time can be obtain from GPS
Location
Confidentiality
What is ID?
Summary
A unique digital identity
Anonymous to drivers/passengers’ identity
What is location?
location ≡ <latitude, longitude, altitude>
Obtained from: transceivers, radar, GPS
10 / 53
20. Research Question
Providing
Location
Security in
Vehicular
Most, if not all, applications rely on locations.
Adhoc
Networks Research question:
How to improve location security?
Introduction
What do we protect?
Related Work
Location
Right time, right ID, right location
Integrity
Synchronized time can be obtain from GPS
Location
Confidentiality
What is ID?
Summary
A unique digital identity
Anonymous to drivers/passengers’ identity
What is location?
location ≡ <latitude, longitude, altitude>
Obtained from: transceivers, radar, GPS
10 / 53
21. Research Question
Providing
Location
Security in
Vehicular
Most, if not all, applications rely on locations.
Adhoc
Networks Research question:
How to improve location security?
Introduction
What do we protect?
Related Work
Location
Right time, right ID, right location
Integrity
Synchronized time can be obtain from GPS
Location
Confidentiality
What is ID?
Summary
A unique digital identity
Anonymous to drivers/passengers’ identity
What is location?
location ≡ <latitude, longitude, altitude>
Obtained from: transceivers, radar, GPS
10 / 53
22. Research Question
Providing
Location
Security in
Vehicular
Most, if not all, applications rely on locations.
Adhoc
Networks Research question:
How to improve location security?
Introduction
What do we protect?
Related Work
Location
Right time, right ID, right location
Integrity
Synchronized time can be obtain from GPS
Location
Confidentiality
What is ID?
Summary
A unique digital identity
Anonymous to drivers/passengers’ identity
What is location?
location ≡ <latitude, longitude, altitude>
Obtained from: transceivers, radar, GPS
10 / 53
23. Research Question
Providing
Location
Security in
Vehicular
Most, if not all, applications rely on locations.
Adhoc
Networks Research question:
How to improve location security?
Introduction
What do we protect?
Related Work
Location
Right time, right ID, right location
Integrity
Synchronized time can be obtain from GPS
Location
Confidentiality
What is ID?
Summary
A unique digital identity
Anonymous to drivers/passengers’ identity
What is location?
location ≡ <latitude, longitude, altitude>
Obtained from: transceivers, radar, GPS
10 / 53
24. Location Security
Providing
Location Assume: <time, ID, Location> can be attacked.
Security in
Vehicular What is threat model?
Adhoc
Networks Dropping Availability
Eavesdropping Confidentiality
Introduction
Related Work
Modifying Integrity + Confidentiality
Location Replaying Integrity
Integrity
Location Sybil Attack Integrity
Confidentiality
Summary Sybil Attack
T
11 / 53
25. Location Security
Providing
Location Assume: <time, ID, Location> can be attacked.
Security in
Vehicular What is threat model?
Adhoc
Networks Dropping Availability
Eavesdropping Confidentiality
Introduction
Related Work
Modifying Integrity + Confidentiality
Location Replaying Integrity
Integrity
Location Sybil Attack Integrity
Confidentiality
Summary Sybil Attack
T
11 / 53
26. Location Security
Providing
Location Assume: <time, ID, Location> can be attacked.
Security in
Vehicular What is threat model?
Adhoc
Networks Dropping Availability
Eavesdropping Confidentiality
Introduction
Related Work
Modifying Integrity + Confidentiality
Location Replaying Integrity
Integrity
Location Sybil Attack Integrity
Confidentiality
Summary Sybil Attack
T
11 / 53
27. Location Security
Providing
Location Assume: <time, ID, Location> can be attacked.
Security in
Vehicular What is threat model?
Adhoc
Networks Dropping Availability
Eavesdropping Confidentiality
Introduction
Related Work
Modifying Integrity + Confidentiality
Location Replaying Integrity
Integrity
Location Sybil Attack Integrity
Confidentiality
Summary Sybil Attack
T
11 / 53
28. Location Security
Providing
Location Assume: <time, ID, Location> can be attacked.
Security in
Vehicular What is threat model?
Adhoc
Networks Dropping Availability
Eavesdropping Confidentiality
Introduction
Related Work
Modifying Integrity + Confidentiality
Location Replaying Integrity
Integrity
Location Sybil Attack Integrity
Confidentiality
Summary Sybil Attack
T
11 / 53
29. Location Security
Providing
Location Assume: <time, ID, Location> can be attacked.
Security in
Vehicular What is threat model?
Adhoc
Networks Dropping Availability
Eavesdropping Confidentiality
Introduction
Related Work
Modifying Integrity + Confidentiality
Location Replaying Integrity
Integrity
Location Sybil Attack Integrity
Confidentiality
Summary Sybil Attack
T
11 / 53
30. Location Security
Providing
Location Assume: <time, ID, Location> can be attacked.
Security in
Vehicular What is threat model?
Adhoc
Networks Dropping Availability
Eavesdropping Confidentiality
Introduction
Related Work
Modifying Integrity + Confidentiality
Location Replaying Integrity
Integrity
Location Sybil Attack Integrity
Confidentiality
Summary Sybil Attack
T
11 / 53
31. Our Solution: Ensure Confidentiality, Integrity,
Availability (CIA)
Providing
Location
Security in Integrity
Vehicular
Adhoc Unreliable Global Integrity Plaintext
Networks routing message
Propagation Aggregation
Local Integrity
Introduction
Related Work
Location Reliable Routing Location Encrypt/Decrypt
Integrity
Select Maintain Security Access Control
Location
Confidentiality Link Model (CIA)
Summary
Availability Confidentiality
12 / 53
32. Related Work
Providing
Location
Security in Location integrity:
Vehicular
Adhoc Digital signatures [Armknecht et al.(2007), Choi et
Networks
al.(2006)], etc.
Introduction Resource:
Related Work Radio signal [Suen & Yasinsac(2005), Xiao et
Location al.(2006)], etc.
Integrity
Computational resources [Douceur(2002)], etc.
Location
Confidentiality
Identification [Piro et al.(2006)], etc.
Summary Location confidentiality:
PKI [Choi et al.(2006), Hubaux et al.(2004), Raya et
al.(2006)], etc.
Location-based encryption
[Denning & MacDoran(1996)], etc.
13 / 53
33. Related Work
Providing
Location
Security in Location integrity:
Vehicular
Adhoc Digital signatures [Armknecht et al.(2007), Choi et
Networks
al.(2006)], etc.
Introduction Resource:
Related Work Radio signal [Suen & Yasinsac(2005), Xiao et
Location al.(2006)], etc.
Integrity
Computational resources [Douceur(2002)], etc.
Location
Confidentiality
Identification [Piro et al.(2006)], etc.
Summary Location confidentiality:
PKI [Choi et al.(2006), Hubaux et al.(2004), Raya et
al.(2006)], etc.
Location-based encryption
[Denning & MacDoran(1996)], etc.
13 / 53
34. Related Work
Providing
Location
Security in Location integrity:
Vehicular
Adhoc Digital signatures [Armknecht et al.(2007), Choi et
Networks
al.(2006)], etc.
Introduction Resource:
Related Work Radio signal [Suen & Yasinsac(2005), Xiao et
Location al.(2006)], etc.
Integrity
Computational resources [Douceur(2002)], etc.
Location
Confidentiality
Identification [Piro et al.(2006)], etc.
Summary Location confidentiality:
PKI [Choi et al.(2006), Hubaux et al.(2004), Raya et
al.(2006)], etc.
Location-based encryption
[Denning & MacDoran(1996)], etc.
13 / 53
35. Related Work
Providing
Location
Security in Location integrity:
Vehicular
Adhoc Digital signatures [Armknecht et al.(2007), Choi et
Networks
al.(2006)], etc.
Introduction Resource:
Related Work Radio signal [Suen & Yasinsac(2005), Xiao et
Location al.(2006)], etc.
Integrity
Computational resources [Douceur(2002)], etc.
Location
Confidentiality
Identification [Piro et al.(2006)], etc.
Summary Location confidentiality:
PKI [Choi et al.(2006), Hubaux et al.(2004), Raya et
al.(2006)], etc.
Location-based encryption
[Denning & MacDoran(1996)], etc.
13 / 53
36. Contributions
Providing
Location
Security in
The main contribution of this dissertation is:
Vehicular
Adhoc
To enhance location security in VANETs
Networks
Specifically,
Introduction
1 Enabling location integrity
Related Work 2 Ensuring location confidentiality
Location
Integrity
3 Including integrity and availability in location security
Location 4 Enabling location availability
Confidentiality
Summary
5 Reducing control overhead
6 Reducing response time
7 New Geoencryption can operate with only one PKI peer
8 New Geolock can compute key dynamically
9 New Geolock can tolerate larger location errors
14 / 53
37. Location Integrity: Overview
Providing
Location
Security in
Vehicular
Adhoc
Networks
The main task:
Introduction
Validate the tuple <time, ID, location>
Related Work
Location Three sub-solutions:
Integrity
Location
1 Active integrity: strong assumption (radar, GPS,
Confidentiality transceiver)
Summary 2 Passive integrity: weaker assumption (GPS,
transceiver)
3 General integrity: real world environment
15 / 53
38. Location Integrity: Overview
Providing
Location
Security in
Vehicular
Adhoc
Networks
The main task:
Introduction
Validate the tuple <time, ID, location>
Related Work
Location Three sub-solutions:
Integrity
Location
1 Active integrity: strong assumption (radar, GPS,
Confidentiality transceiver)
Summary 2 Passive integrity: weaker assumption (GPS,
transceiver)
3 General integrity: real world environment
15 / 53
39. Active Integrity: “Seeing is believing"
Providing
Location
Security in
Vehicular
Adhoc
Networks
Introduction
Related Work
Location
Integrity
Location
Confidentiality
Summary
16 / 53
40. GPS Location
Providing Y
Location
Security in
Vehicular
Adhoc
Networks
∆y
Introduction
∆x
Related Work B
Location (Xgps, Ygps)
Integrity
Location
Confidentiality
Summary
X
0
Figure: GPS location. (xgps , ygps ) is a measurement value of the
GPS coordinates.
For GPS: let measurement error ∆α = ∆x = ∆y , write
(x − xgps )2 + (y − ygps )2 ≤ (∆α)2 (1)
17 / 53
41. Radar Detection
Providing
Location
Security in
Vehicular
Adhoc
Networks
Introduction
Related Work
Location
Integrity
Location
Confidentiality
Summary
For Radar detection:
(x − γ × cos (θ − ∆θ ))2 + (y − γ × sin (θ − ∆θ ))2 ≤ (∆γ)2 (2)
(x − γ × cos (θ + ∆θ ))2 + (y − γ × sin (θ + ∆θ ))2 ≤ (∆γ)2 (3)
θ : the detected angle; γ: the detected radius.
For the region FCGHDE:
γ − ∆γ ≤ x 2 + y 2 ≤ γ + ∆γ
x (4)
θ − ∆θ ≤ arctan y ≤ θ + ∆θ
18 / 53
42. Validating GPS Location
Providing
Location
Security in
Vehicular
Adhoc
Networks
Introduction
Related Work
Location
Integrity
Location
Confidentiality
Summary
Validating GPS location means resolutions of: (1) {
(2) (3) (4) }
The accuracy of this solution is 99.1%.
19 / 53
43. Validating GPS Location
Providing
Location
Security in
Vehicular
Adhoc
Networks
Introduction
Related Work
Location
Integrity
Location
Confidentiality
Summary
Validating GPS location means resolutions of: (1) {
(2) (3) (4) }
The accuracy of this solution is 99.1%.
19 / 53
44. Passive Integrity:
Statistically remove and refine
Providing
Location
Security in
Vehicular
Adhoc
Networks
Introduction
Related Work
Location
Integrity
Location
Confidentiality
Summary
Possible data sources:
Neighbors: All vehicles in the transmission range
On-coming vehicles: All neighbors in opposite direction
20 / 53
45. Passive Integrity:
Statistically remove and refine
Providing
Location
Security in
Vehicular
Adhoc
Networks
Introduction
Related Work
Location
Integrity
Location
Confidentiality
Summary
Possible data sources:
Neighbors: All vehicles in the transmission range
On-coming vehicles: All neighbors in opposite direction
20 / 53
46. Passive Integrity: Data Input
Providing
Location
Security in
Vehicular
Adhoc
Networks 120
120
100
100
Introduction
Position (m)
Position (m)
80 80
Related Work
60 60
Location
Integrity
40
40
Location
20
Confidentiality 20
Summary 0
0 1000 2000 3000 4000 0 1000 2000 3000 4000
N N
Figure: Bob’s location collected by Alice (raw vs. filtered)
21 / 53
47. M-Distance
Providing
Location
Security in
Vehicular
Mahalanobis distance (M-Distance) introduced by P. C.
Adhoc
Networks
Mahalanobis [Mahalanobis(1936)]
Vectors x and y with the covariance matrix V ,
Introduction M-Distance:
Related Work
Location
Integrity
d(x, y ) = (x − y )T V −1 (x − y ).
Location
Confidentiality
Let x: the sample mean vector;
Summary
V : the sample covariance matrix,
1 n
V = ∑ (xi − x)(xi − x)T .
n − 1 i=1
(5)
22 / 53
48. M-Distance
Providing
Location
Security in
Vehicular
Mahalanobis distance (M-Distance) introduced by P. C.
Adhoc
Networks
Mahalanobis [Mahalanobis(1936)]
Vectors x and y with the covariance matrix V ,
Introduction M-Distance:
Related Work
Location
Integrity
d(x, y ) = (x − y )T V −1 (x − y ).
Location
Confidentiality
Let x: the sample mean vector;
Summary
V : the sample covariance matrix,
1 n
V = ∑ (xi − x)(xi − x)T .
n − 1 i=1
(5)
22 / 53
49. M-Distance
Providing
Location
Security in
Vehicular
Mahalanobis distance (M-Distance) introduced by P. C.
Adhoc
Networks
Mahalanobis [Mahalanobis(1936)]
Vectors x and y with the covariance matrix V ,
Introduction M-Distance:
Related Work
Location
Integrity
d(x, y ) = (x − y )T V −1 (x − y ).
Location
Confidentiality
Let x: the sample mean vector;
Summary
V : the sample covariance matrix,
1 n
V = ∑ (xi − x)(xi − x)T .
n − 1 i=1
(5)
22 / 53
50. Intuitive Explanation
Providing
Location
An intuitive explanation: the distance of a test point from the
Security in
Vehicular
center of mass divided by the width of the ellipse/ellipsoid
Adhoc
Networks
Introduction
Related Work
Location
Integrity
Location
Confidentiality Figure: Two-dimensional space.
Summary
Figure: Three-dimensional space.
23 / 53
51. Passive Integrity
Providing
Location
Security in
Vehicular
Adhoc
Networks
Outliers can change the value of mean and covariance.
Introduction We replace the mean x by the median x ∗ and obtain
Related Work the robust covariance S.
Location
Integrity ∑n K ( xi − x ∗ )(xi − x ∗ )(xi − x ∗ )T
i=1
S = , (6)
Location
Confidentiality ∑n K ( xi − x ∗ )
i=1
Summary
where X = XV −1 X T , K (u) = exp(−hu),
By [Caussinus & Ruiz(1990)], h = 0.1,
24 / 53
52. Passive Integrity
Providing
Location
Security in
Vehicular
Adhoc
Networks
Outliers can change the value of mean and covariance.
Introduction We replace the mean x by the median x ∗ and obtain
Related Work the robust covariance S.
Location
Integrity ∑n K ( xi − x ∗ )(xi − x ∗ )(xi − x ∗ )T
i=1
S = , (6)
Location
Confidentiality ∑n K ( xi − x ∗ )
i=1
Summary
where X = XV −1 X T , K (u) = exp(−hu),
By [Caussinus & Ruiz(1990)], h = 0.1,
24 / 53
53. Passive Integrity
Providing
Location
Security in
Vehicular
Adhoc
Networks
Outliers can change the value of mean and covariance.
Introduction We replace the mean x by the median x ∗ and obtain
Related Work the robust covariance S.
Location
Integrity ∑n K ( xi − x ∗ )(xi − x ∗ )(xi − x ∗ )T
i=1
S = , (6)
Location
Confidentiality ∑n K ( xi − x ∗ )
i=1
Summary
where X = XV −1 X T , K (u) = exp(−hu),
By [Caussinus & Ruiz(1990)], h = 0.1,
24 / 53
54. Passive Integrity
Providing
Location
Security in The new M-distance Dir :
Vehicular
Adhoc
Networks
Dir = {(xi − x ∗ )S −1 (xi − x ∗ )T } (7)
Introduction Exclude the deviation caused by the outliers
Related Work
For multivariate normally distributed data, the values of
Location
Integrity Dir are approximately chi-square distributed (χ2 )
2
Location [Filzmoser(2004)]
Confidentiality
The observations can be abandoned by using the
Summary
chi-squared distribution (e.g., the 97.5% quantile).
The sample mean:
∑N=1 xk
∗
x∗ = k
(8)
N
The accuracy of this solution is 96.2%.
25 / 53
55. Passive Integrity
Providing
Location
Security in The new M-distance Dir :
Vehicular
Adhoc
Networks
Dir = {(xi − x ∗ )S −1 (xi − x ∗ )T } (7)
Introduction Exclude the deviation caused by the outliers
Related Work
For multivariate normally distributed data, the values of
Location
Integrity Dir are approximately chi-square distributed (χ2 )
2
Location [Filzmoser(2004)]
Confidentiality
The observations can be abandoned by using the
Summary
chi-squared distribution (e.g., the 97.5% quantile).
The sample mean:
∑N=1 xk
∗
x∗ = k
(8)
N
The accuracy of this solution is 96.2%.
25 / 53
56. Passive Integrity
Providing
Location
Security in The new M-distance Dir :
Vehicular
Adhoc
Networks
Dir = {(xi − x ∗ )S −1 (xi − x ∗ )T } (7)
Introduction Exclude the deviation caused by the outliers
Related Work
For multivariate normally distributed data, the values of
Location
Integrity Dir are approximately chi-square distributed (χ2 )
2
Location [Filzmoser(2004)]
Confidentiality
The observations can be abandoned by using the
Summary
chi-squared distribution (e.g., the 97.5% quantile).
The sample mean:
∑N=1 xk
∗
x∗ = k
(8)
N
The accuracy of this solution is 96.2%.
25 / 53
57. Passive Integrity
Providing
Location
Security in The new M-distance Dir :
Vehicular
Adhoc
Networks
Dir = {(xi − x ∗ )S −1 (xi − x ∗ )T } (7)
Introduction Exclude the deviation caused by the outliers
Related Work
For multivariate normally distributed data, the values of
Location
Integrity Dir are approximately chi-square distributed (χ2 )
2
Location [Filzmoser(2004)]
Confidentiality
The observations can be abandoned by using the
Summary
chi-squared distribution (e.g., the 97.5% quantile).
The sample mean:
∑N=1 xk
∗
x∗ = k
(8)
N
The accuracy of this solution is 96.2%.
25 / 53
58. Passive Integrity
Providing
Location
Security in The new M-distance Dir :
Vehicular
Adhoc
Networks
Dir = {(xi − x ∗ )S −1 (xi − x ∗ )T } (7)
Introduction Exclude the deviation caused by the outliers
Related Work
For multivariate normally distributed data, the values of
Location
Integrity Dir are approximately chi-square distributed (χ2 )
2
Location [Filzmoser(2004)]
Confidentiality
The observations can be abandoned by using the
Summary
chi-squared distribution (e.g., the 97.5% quantile).
The sample mean:
∑N=1 xk
∗
x∗ = k
(8)
N
The accuracy of this solution is 96.2%.
25 / 53
59. Passive Integrity
Providing
Location
Security in The new M-distance Dir :
Vehicular
Adhoc
Networks
Dir = {(xi − x ∗ )S −1 (xi − x ∗ )T } (7)
Introduction Exclude the deviation caused by the outliers
Related Work
For multivariate normally distributed data, the values of
Location
Integrity Dir are approximately chi-square distributed (χ2 )
2
Location [Filzmoser(2004)]
Confidentiality
The observations can be abandoned by using the
Summary
chi-squared distribution (e.g., the 97.5% quantile).
The sample mean:
∑N=1 xk
∗
x∗ = k
(8)
N
The accuracy of this solution is 96.2%.
25 / 53
60. General Integrity: Real World Solution
Providing
Location
Security in
Vehicular
Adhoc
Networks
Introduction
Related Work
Location
Integrity
Location
Confidentiality
Summary
Data source:
Radar: Radar of observer
Neighbors: All vehicles in the transmission range
On-coming vehicles: All neighbors in on-coming
direction
26 / 53
61. General Integrity: Real World Solution
Providing
Location
Security in
Vehicular
Adhoc
Networks
Introduction
Related Work
Location
Integrity
Location
Confidentiality
Summary
Data source:
Radar: Radar of observer
Neighbors: All vehicles in the transmission range
On-coming vehicles: All neighbors in on-coming
direction
26 / 53
62. General Integrity: Real World Solution
Providing
Location
Security in
Vehicular
Adhoc
Networks
Introduction
Related Work
Location
Integrity
Location
Confidentiality
Summary
Data source:
Radar: Radar of observer
Neighbors: All vehicles in the transmission range
On-coming vehicles: All neighbors in on-coming
direction
26 / 53
63. General Integrity: Data Input
Providing
Location
Security in Before filtering 90 Neighbors
Vehicular Oncoming
Adhoc 120 60
Radar
Networks
Introduction 150 30
Related Work
Location N
Integrity
Location 180 0
Confidentiality 0 20 40 60 80 100 120
Location (m)
Summary
210 330
240 300
270
27 / 53
64. General Integrity: Location Measurement
Providing
Location Neighbors
Security in After filtering 90
Oncoming
Vehicular
120 60 Radar
Adhoc
Networks
Introduction 150 30
Related Work
Location N
Integrity
Location 180 0
Confidentiality 0 10 20 30 40
Location (m)
Summary
210 330
240 300
270
28 / 53
65. General Integrity
Providing
Location Let:
Security in
Vehicular X: radar detection
Adhoc
Networks Y: on-coming vehicle detection
Z: neighbor detection
Introduction
The final estimation of location:
Related Work
Location ∗ ∗ ∗
Integrity P = w1 ∗ X + w2 ∗ Y + w3 ∗ Z
Location
Confidentiality where the weights of
Summary w1 : radar detection
w2 : on-coming vehicle detection
w3 : neighbor detection
w1 ≥ w2 ≥ w3
The accuracy of this solution is 94.7%
(w1 = 0.4, w2 = 0.4, w3 = 0.2).
29 / 53
66. General Integrity
Providing
Location Let:
Security in
Vehicular X: radar detection
Adhoc
Networks Y: on-coming vehicle detection
Z: neighbor detection
Introduction
The final estimation of location:
Related Work
Location ∗ ∗ ∗
Integrity P = w1 ∗ X + w2 ∗ Y + w3 ∗ Z
Location
Confidentiality where the weights of
Summary w1 : radar detection
w2 : on-coming vehicle detection
w3 : neighbor detection
w1 ≥ w2 ≥ w3
The accuracy of this solution is 94.7%
(w1 = 0.4, w2 = 0.4, w3 = 0.2).
29 / 53
67. General Integrity
Providing
Location Let:
Security in
Vehicular X: radar detection
Adhoc
Networks Y: on-coming vehicle detection
Z: neighbor detection
Introduction
The final estimation of location:
Related Work
Location ∗ ∗ ∗
Integrity P = w1 ∗ X + w2 ∗ Y + w3 ∗ Z
Location
Confidentiality where the weights of
Summary w1 : radar detection
w2 : on-coming vehicle detection
w3 : neighbor detection
w1 ≥ w2 ≥ w3
The accuracy of this solution is 94.7%
(w1 = 0.4, w2 = 0.4, w3 = 0.2).
29 / 53
68. General Integrity
Providing
Location Let:
Security in
Vehicular X: radar detection
Adhoc
Networks Y: on-coming vehicle detection
Z: neighbor detection
Introduction
The final estimation of location:
Related Work
Location ∗ ∗ ∗
Integrity P = w1 ∗ X + w2 ∗ Y + w3 ∗ Z
Location
Confidentiality where the weights of
Summary w1 : radar detection
w2 : on-coming vehicle detection
w3 : neighbor detection
w1 ≥ w2 ≥ w3
The accuracy of this solution is 94.7%
(w1 = 0.4, w2 = 0.4, w3 = 0.2).
29 / 53
69. General Integrity
Providing
Location Let:
Security in
Vehicular X: radar detection
Adhoc
Networks Y: on-coming vehicle detection
Z: neighbor detection
Introduction
The final estimation of location:
Related Work
Location ∗ ∗ ∗
Integrity P = w1 ∗ X + w2 ∗ Y + w3 ∗ Z
Location
Confidentiality where the weights of
Summary w1 : radar detection
w2 : on-coming vehicle detection
w3 : neighbor detection
w1 ≥ w2 ≥ w3
The accuracy of this solution is 94.7%
(w1 = 0.4, w2 = 0.4, w3 = 0.2).
29 / 53
70. General Integrity
Providing
Location Let:
Security in
Vehicular X: radar detection
Adhoc
Networks Y: on-coming vehicle detection
Z: neighbor detection
Introduction
The final estimation of location:
Related Work
Location ∗ ∗ ∗
Integrity P = w1 ∗ X + w2 ∗ Y + w3 ∗ Z
Location
Confidentiality where the weights of
Summary w1 : radar detection
w2 : on-coming vehicle detection
w3 : neighbor detection
w1 ≥ w2 ≥ w3
The accuracy of this solution is 94.7%
(w1 = 0.4, w2 = 0.4, w3 = 0.2).
29 / 53
71. Simulation Methods
Providing
Location
Security in
Vehicular
Adhoc
Networks
For simulation, we find the location attackers out of all
vehicles.
Introduction
Related Work
Q-Q plot (Quantile-Quantile Plots) [Thode(2002)]
Location A commonly used tool in statistics to show the outliers.
Integrity Is a kind of graphical method for comparing two
Location probability distributions
Confidentiality
Plots the two distributions’ quantiles against each other.
Summary
A Q-Q plot is applied to show the Mahalanobis distance
vs. normal quantile.
30 / 53
72. Simulation Methods
Providing
Location
Security in
Vehicular
Adhoc
Networks
For simulation, we find the location attackers out of all
vehicles.
Introduction
Related Work
Q-Q plot (Quantile-Quantile Plots) [Thode(2002)]
Location A commonly used tool in statistics to show the outliers.
Integrity Is a kind of graphical method for comparing two
Location probability distributions
Confidentiality
Plots the two distributions’ quantiles against each other.
Summary
A Q-Q plot is applied to show the Mahalanobis distance
vs. normal quantile.
30 / 53
73. Simulation Methods
Providing
Location
Security in
Vehicular
Adhoc
Networks
For simulation, we find the location attackers out of all
vehicles.
Introduction
Related Work
Q-Q plot (Quantile-Quantile Plots) [Thode(2002)]
Location A commonly used tool in statistics to show the outliers.
Integrity Is a kind of graphical method for comparing two
Location probability distributions
Confidentiality
Plots the two distributions’ quantiles against each other.
Summary
A Q-Q plot is applied to show the Mahalanobis distance
vs. normal quantile.
30 / 53
74. Simulation Settings
Providing
Location
Security in
Vehicular
Table: Parameters and Values
Adhoc
Networks Parameters Values
Initial traffic density 30 vehicles/Km/lane
Introduction The length of the road L 3 Km
Related Work Average speed 60 km/h
Location The number of lanes 4/direction
Integrity
The mean error µ 1m
Location
Confidentiality
The deviation of error σ 1m
Summary
Error ε 3m
The sample size n 1000
# of neighbor outliers mn 8
# of opposite outliers mo 2
The weight for radar w1 0.5
The weight for opposite w2 0.3
The weight for neighbors w3 0.2
31 / 53
75. Neighboring Report Filtering
Providing QQ Plot of Reported Location versus standard normal
Location
4
Security in
Quantiles of Input Sample (Reported Location)
Vehicular
Adhoc 3.5
Networks
3
Introduction 2.5
Related Work 2
Location
Integrity 1.5
Location 1
Confidentiality
Summary 0.5
0
-0.5
-3 -2 -1 0 1 2 3
Standard Normal Quantiles
Figure: Q-Q plot of the Mahalanobis distance for neighboring
samples.
32 / 53
76. All Measurements Estimation
Providing
Location 15
Security in
Vehicular
Adhoc 10
Networks
5
Introduction
Related Work 0
Y
Location
Integrity
-5
Location
Confidentiality
Summary -10
-15
-10 -5 0 5 10
X
Figure: The x-y coordinates of location observation and the
location estimation.
33 / 53
77. Location Integrity: Summary
Providing
Location
Security in
Vehicular
Adhoc
Networks
Main points:
Introduction Validate the tuple <time, ID, location>
Related Work Start with a homogenous model and strong
Location assumptions
Integrity
Improve to a real world solution
Location
Confidentiality Contributions:
Summary
Novel idea: active location security
Real world solution
34 / 53
78. Location Integrity: Summary
Providing
Location
Security in
Vehicular
Adhoc
Networks
Main points:
Introduction Validate the tuple <time, ID, location>
Related Work Start with a homogenous model and strong
Location assumptions
Integrity
Improve to a real world solution
Location
Confidentiality Contributions:
Summary
Novel idea: active location security
Real world solution
34 / 53
79. Location Integrity: Summary
Providing
Location
Security in
Vehicular
Adhoc
Networks
Main points:
Introduction Validate the tuple <time, ID, location>
Related Work Start with a homogenous model and strong
Location assumptions
Integrity
Improve to a real world solution
Location
Confidentiality Contributions:
Summary
Novel idea: active location security
Real world solution
34 / 53
80. Location Integrity: Summary
Providing
Location
Security in
Vehicular
Adhoc
Networks
Main points:
Introduction Validate the tuple <time, ID, location>
Related Work Start with a homogenous model and strong
Location assumptions
Integrity
Improve to a real world solution
Location
Confidentiality Contributions:
Summary
Novel idea: active location security
Real world solution
34 / 53
81. Location Integrity: Summary
Providing
Location
Security in
Vehicular
Adhoc
Networks
Main points:
Introduction Validate the tuple <time, ID, location>
Related Work Start with a homogenous model and strong
Location assumptions
Integrity
Improve to a real world solution
Location
Confidentiality Contributions:
Summary
Novel idea: active location security
Real world solution
34 / 53
82. Location Integrity: Summary
Providing
Location
Security in
Vehicular
Adhoc
Networks
Main points:
Introduction Validate the tuple <time, ID, location>
Related Work Start with a homogenous model and strong
Location assumptions
Integrity
Improve to a real world solution
Location
Confidentiality Contributions:
Summary
Novel idea: active location security
Real world solution
34 / 53
83. Location Integrity: Summary
Providing
Location
Security in
Vehicular
Adhoc
Networks
Main points:
Introduction Validate the tuple <time, ID, location>
Related Work Start with a homogenous model and strong
Location assumptions
Integrity
Improve to a real world solution
Location
Confidentiality Contributions:
Summary
Novel idea: active location security
Real world solution
34 / 53
84. Location Confidentiality: Overview
Providing
Location
Security in
Vehicular
Adhoc
Networks
Introduction
Related Work
Location
Integrity
Location
Confidentiality
Summary
Denning’s GeoEncryption:
Public Key Infrastructure (PKI): public key & private key
Geolock table
35 / 53
85. Location Confidentiality: Overview
Providing
Location
Security in
Vehicular
Adhoc
Networks
Introduction
Related Work
Location
Integrity
Location
Confidentiality
Summary
Denning’s GeoEncryption:
Public Key Infrastructure (PKI): public key & private key
Geolock table
35 / 53
86. Location Confidentiality: Overview
Providing
Location
Security in
Vehicular
Adhoc
Networks
Introduction
Related Work
Location
Integrity
Location
Confidentiality
Summary
Denning’s GeoEncryption:
Public Key Infrastructure (PKI): public key & private key
Geolock table
35 / 53
87. Denning’s GeoLock Table 2
Providing
Location
Security in
Vehicular
Adhoc
Networks
Introduction
Related Work
Location
Integrity
Location
Confidentiality
Summary
Geolock table is preinstalled on all the nodes.
2 [Denning & MacDoran(1996)]
36 / 53
89. Confidentiality: Our Method
Providing
Location
Security in Random Numbers
Vehicular
Adhoc Key_S Key_C
Networks Alice
Key_S'
Encryption Decryption GeoLock
GeoLock
Introduction Decryption Key_C
Key_E Encryption
Related Work
Location Wireless Channel E{Key} E{Req} E{Rep} E{Key'}
Integrity
Location Key_D Decryption Encryption
Confidentiality
Key_S Encryption Key_C
Summary Bob GeoLock Decryption
GeoLock
Key_S'
Key_C Random Number
To crack this scheme, attackers must have both location and
private key.
38 / 53
90. New GeoLock
Providing
Location
Security in
Vehicular
Adhoc
Networks
V X0 Y0 T
Introduction
Related Work
P P P P
Location
Integrity
Location
Confidentiality Mux
Summary
Hash
Key
39 / 53
91. An Example: New GeoLock
Providing
Location
Security in
GPS Coordinates
Vehicular
Adhoc
in
Networks Coordinates
in Region
E 04200 N 91500
Introduction Size
Related Work
E 042.00 N 915.00
Location
Integrity
E 042 N 915
Location
Confidentiality
Mux 042915
Summary
Hash SHA(042915)
output
GeoLock
d97e0e02efdb13de05d90abf1a99e8feac134f63
Figure: An example of GeoLock.
40 / 53
92. Simulation Scenario
Providing
Location
Security in
Vehicular
Adhoc
Networks
Introduction
Related Work
Location
Integrity
Location
Confidentiality
Summary
Figure: Decryption region snapshot (Decryption region is not
proportionally drawn)
Comparing our extension with a geoencryption
extension: Al-Fuqaha [Al-Fuqaha & Al-Ibrahim(2007)].
Al-Fuqaha added decryption region prediction
algorithm to geoencryption in mobile networks.
41 / 53
93. Simulation Settings
Providing
Location
Security in
Vehicular
Adhoc
Networks
Table: The selected environment configuration
Name Value
Introduction Transmission range 300m
Related Work Simulation map Urban
Location
Integrity
Map area 3.2*3.2 Km2
Location
Decryption area 100*100 m2
Confidentiality Traffic density 1500 vehicles/hour
Summary Average speed 28 m/s
Acceleration range [0,2] m/s2
Initial acceleration 0 m/s2
Initial speed 25 m/s
Mobility model IDM [Treiber et al.(2000)]
42 / 53
94. GeoEncryption Decryption Ratio
Providing
Location
As expected, our algorithm can tolerate larger location
Security in errors. No. of successful decryption
Vehicular
Adhoc
DecryptionRatio =
Networks
No. of received ciphertext
1
Introduction Yan
Al-Fuqaha
0.9
Related Work
Location
Integrity 0.8
Decryption ratio
Location
Confidentiality
0.7
Summary
0.6
0.5
0 2 4 6 8 10
Location error (%)
43 / 53
95. GeoEncryption Decryption Ratio Vs. Overhead
Providing
Location
As expected, our algorithm
Security in
Vehicular
Has smaller decryption error.
Adhoc
Networks
Has fewer control message.
Control overhead (Yan)
1
Introduction Decryption Error (Yan)
Control overhead (AlFuqaha)
Related Work Decryption error (AlFuqaha)
Location 0.8
Integrity
Location
Confidentiality 0.6
Ratio
Summary
0.4
0.2
0
0 5 10 15 20 25
Update pause (s)
44 / 53
96. Location Confidentiality: Summary
Providing
Location
Security in
Vehicular
Adhoc
Networks
Main points:
Encrypt/decrypt location information
Introduction
Location is part of the key: GeoLock
Related Work
Key exchange is secured by GeoLock + private key
Location
Integrity
Contributions:
Location
Confidentiality New Geoencryption can operate with only one PKI peer
Summary New Geolock can compute key dynamically.
New Geolock can tolerate larger location errors.
New Geoencryption has lower control overhead.
45 / 53
97. Location Confidentiality: Summary
Providing
Location
Security in
Vehicular
Adhoc
Networks
Main points:
Encrypt/decrypt location information
Introduction
Location is part of the key: GeoLock
Related Work
Key exchange is secured by GeoLock + private key
Location
Integrity
Contributions:
Location
Confidentiality New Geoencryption can operate with only one PKI peer
Summary New Geolock can compute key dynamically.
New Geolock can tolerate larger location errors.
New Geoencryption has lower control overhead.
45 / 53
98. Location Confidentiality: Summary
Providing
Location
Security in
Vehicular
Adhoc
Networks
Main points:
Encrypt/decrypt location information
Introduction
Location is part of the key: GeoLock
Related Work
Key exchange is secured by GeoLock + private key
Location
Integrity
Contributions:
Location
Confidentiality New Geoencryption can operate with only one PKI peer
Summary New Geolock can compute key dynamically.
New Geolock can tolerate larger location errors.
New Geoencryption has lower control overhead.
45 / 53
99. Location Confidentiality: Summary
Providing
Location
Security in
Vehicular
Adhoc
Networks
Main points:
Encrypt/decrypt location information
Introduction
Location is part of the key: GeoLock
Related Work
Key exchange is secured by GeoLock + private key
Location
Integrity
Contributions:
Location
Confidentiality New Geoencryption can operate with only one PKI peer
Summary New Geolock can compute key dynamically.
New Geolock can tolerate larger location errors.
New Geoencryption has lower control overhead.
45 / 53
100. Location Confidentiality: Summary
Providing
Location
Security in
Vehicular
Adhoc
Networks
Main points:
Encrypt/decrypt location information
Introduction
Location is part of the key: GeoLock
Related Work
Key exchange is secured by GeoLock + private key
Location
Integrity
Contributions:
Location
Confidentiality New Geoencryption can operate with only one PKI peer
Summary New Geolock can compute key dynamically.
New Geolock can tolerate larger location errors.
New Geoencryption has lower control overhead.
45 / 53
101. Location Confidentiality: Summary
Providing
Location
Security in
Vehicular
Adhoc
Networks
Main points:
Encrypt/decrypt location information
Introduction
Location is part of the key: GeoLock
Related Work
Key exchange is secured by GeoLock + private key
Location
Integrity
Contributions:
Location
Confidentiality New Geoencryption can operate with only one PKI peer
Summary New Geolock can compute key dynamically.
New Geolock can tolerate larger location errors.
New Geoencryption has lower control overhead.
45 / 53
102. Location Confidentiality: Summary
Providing
Location
Security in
Vehicular
Adhoc
Networks
Main points:
Encrypt/decrypt location information
Introduction
Location is part of the key: GeoLock
Related Work
Key exchange is secured by GeoLock + private key
Location
Integrity
Contributions:
Location
Confidentiality New Geoencryption can operate with only one PKI peer
Summary New Geolock can compute key dynamically.
New Geolock can tolerate larger location errors.
New Geoencryption has lower control overhead.
45 / 53
103. Location Confidentiality: Summary
Providing
Location
Security in
Vehicular
Adhoc
Networks
Main points:
Encrypt/decrypt location information
Introduction
Location is part of the key: GeoLock
Related Work
Key exchange is secured by GeoLock + private key
Location
Integrity
Contributions:
Location
Confidentiality New Geoencryption can operate with only one PKI peer
Summary New Geolock can compute key dynamically.
New Geolock can tolerate larger location errors.
New Geoencryption has lower control overhead.
45 / 53
104. Location Confidentiality: Summary
Providing
Location
Security in
Vehicular
Adhoc
Networks
Main points:
Encrypt/decrypt location information
Introduction
Location is part of the key: GeoLock
Related Work
Key exchange is secured by GeoLock + private key
Location
Integrity
Contributions:
Location
Confidentiality New Geoencryption can operate with only one PKI peer
Summary New Geolock can compute key dynamically.
New Geolock can tolerate larger location errors.
New Geoencryption has lower control overhead.
45 / 53
105. Summary
Providing
Location
Security in
Vehicular “Art is never finished, only abandoned."(Leonardo da Vinci)
Adhoc
Networks
Introduction
Related Work
Location Focused on studying location information security
Integrity
CIA model
Location
Confidentiality Location availability: A mobility and probability model in
Summary VANET communication
Location integrity: The active, passive and general
models
Location confidentiality: The location-based encryption
and decryption
46 / 53
106. Summary
Providing
Location
Security in
Vehicular “Art is never finished, only abandoned."(Leonardo da Vinci)
Adhoc
Networks
Introduction
Related Work
Location Focused on studying location information security
Integrity
CIA model
Location
Confidentiality Location availability: A mobility and probability model in
Summary VANET communication
Location integrity: The active, passive and general
models
Location confidentiality: The location-based encryption
and decryption
46 / 53
107. Summary
Providing
Location
Security in
Vehicular “Art is never finished, only abandoned."(Leonardo da Vinci)
Adhoc
Networks
Introduction
Related Work
Location Focused on studying location information security
Integrity
CIA model
Location
Confidentiality Location availability: A mobility and probability model in
Summary VANET communication
Location integrity: The active, passive and general
models
Location confidentiality: The location-based encryption
and decryption
46 / 53
108. Summary
Providing
Location
Security in
Vehicular “Art is never finished, only abandoned."(Leonardo da Vinci)
Adhoc
Networks
Introduction
Related Work
Location Focused on studying location information security
Integrity
CIA model
Location
Confidentiality Location availability: A mobility and probability model in
Summary VANET communication
Location integrity: The active, passive and general
models
Location confidentiality: The location-based encryption
and decryption
46 / 53
109. Summary
Providing
Location
Security in
Vehicular “Art is never finished, only abandoned."(Leonardo da Vinci)
Adhoc
Networks
Introduction
Related Work
Location Focused on studying location information security
Integrity
CIA model
Location
Confidentiality Location availability: A mobility and probability model in
Summary VANET communication
Location integrity: The active, passive and general
models
Location confidentiality: The location-based encryption
and decryption
46 / 53
110. Putting The Work In Perspective
Providing
Location
Security in
What remains to be done:
Vehicular
Adhoc Cross layer issues
Networks
Extensive simulation
Introduction Integrate to other research, e.g. privacy
Related Work Optimization of the algorithm
Location
Integrity Real traffic data import
Location
Confidentiality
Test bed implementation
Summary Prototype design
Applying the research in real applications
Theory analysis of the transportation issues
Disaster evacuation
Data storage in VANET
47 / 53
111. VANET Applications
Providing VANET Applications
Location 1. Dangerous road features 1. Curve speed warning, 2 low bridge warning,
Security in 3. traffic lights violation warning
Vehicular I. Active safety 2. Abnormal conditions 1. Vehicle-based road condition warning, 2.
Adhoc infrastructure-based road condition warning, 3.
Networks visibility enhancer, 4. work zone warning.
3. Danger of collision 1. Blind spot warning, 2. lane change warning,
3. intersection collision warning, 4. forward/rear
Introduction collision warning, 5. emergency electronic brake
lights, 6. rail collision warning, 7. warning about
Related Work pedestrians crossing
4. Incident occurred 1. Post-crash warning, 2. incident recovery (in-
Location surance), 3. SOS service, 4. evacuate people
Integrity 1.Support for authorities 1. Electronic license plate, 2. electronic drivers
II. Public service
license, 3. vehicle safety inspection, 4. stolen
Location
vehicles tracking, 5. Emergency vehicle warning,
Confidentiality
1. Enhanced Driving 1. Highway merge assistant, 2. left turn as-
III. Improved driving
Summary sistant, 3. cooperative adaptive cruise control,
4. cooperative glare reduction, 5. in-vehicle sig-
nage, 6. adaptive drivetrain management
2. Traffic Efficiency 1. Notification of crash, 2. intelligent traffic flow
control, 3. enhanced route guidance and naviga-
tion, 4. map download/update, 5. parking spot
locator service
1. Mobile Services 1. Internet service provisioning, 2. instant mes-
saging, 3. point-of-interest notification
IV. Entertainment
2. E-Commerce 1. Fleet management, 2. rental car processing,
3. area access control, 4. cargo tracking; 5. toll
collection, 6. parking/gas payment
1. E. Schoch, at el, "Communication Patterns in VANETs," IEEE Communications Magazine, Vol.46 48 / 53
112. Selected Publication Lists
Providing
Location Journal
Security in
Vehicular 1. G Yan, S. Olariu, "An Efficient Geographic Location-based
Adhoc
Networks
Security Mechanism for Vehicular Ad hoc Networks", IEEE
Transactions on Intelligent Transportation System, 2010.
Accepted with minor revision (Impact factor: 2.844).
Introduction
2. G Yan, S. Olariu, S. Salleh, "A Probabilistic Routing Protocol in
Related Work
VANET," International Journal of Mobile Computing and
Location
Integrity Multimedia Communication, IGI-Global, 2010.
Location 3. G. Yan, S. Olariu, M. C. Weigle, "Providing Location Security in
Confidentiality Vehicular Ad hoc Networks ", IEEE Wireless Communication
Summary Magazine Special Issue On-The-Road Communications, 16(6),
pp. 48-53, 2009. (Impact factor: 2.0).
4. G. Yan, S. Olariu, M. C. Weigle, "Providing VANET Security
through Active Position Detection", Computer Communications -
Elsevier, Special Issue on Mobility Protocols for ITS/VANET,
31(12):2883-2897, 2008. (Impact factor: 0.884)
49 / 53
113. Refereed Conference Publication Lists
Providing Refereed Conference
Location 5. G. Yan, S. Olariu, D. B. Rawat, "Provisioning Vehicular Ad hoc Networks with Quality of
Security in Service", in Proceedings of The International Workshop on Wireless Sensor, Actuator and
Vehicular Robot Networks (WiSARN). Montreal, Canada, June 17, 2010.
Adhoc 6. G. Yan, S. Olariu and S. Salleh, "A Probabilistic Routing Protocol in VANET", in
Networks Proceedings of the 7th International Conference on Advances in Mobile Computing and
Multimedia (MoMM2009), 14-16 December 2009, Kuala Lumpur, Malaysia.
7. G. Yan, M. C. Weigle and S. Olariu, "A Novel Parking Service Using Wireless Networks," In
Proceedings of the International 2009 IEEE International Conference on Service Operations,
Introduction
Logistics and Informatics (SOLI 2009), July 22 - 24, 2009, Chicago, IL, USA, The Best
Related Student Paper Award.
Work 8. G. Yan, S. Olariu, "An Efficient Geographic Location-based Security Mechanism for
Vehicular Ad hoc Networks," In Proceedings of the 2009 IEEE International Symposium on
Location Trust, Security and Privacy for Pervasive Applications (TSP). Macau, October 12-14, 2009.
Integrity 9. G. Yan, X. Chen, S. Olariu, "Providing VANET Position Integrity Through Filtering," In
Proceedings of the 12th International IEEE Conference on Intelligent Transportation Systems
Location (ITSC2009). St. Louis, MO, USA. Accepted, October 3-7, 2009.
Confiden- 10. G. Yan, Y. Wang, M. C. Weigle, S. Olariu and K. Ibrahim, "WEHealth: A Secure and
tiality Privacy Preserving eHealth Using NOTICE," In Proceedings of the IEEE International
Conference on Wireless Access in Vehicular Environments (WAVE). Dearborn, 2008.
Summary 11. G. Yan, S. Olariu, M. C. Weigle and M. Abuelela, "SmartParking: A Secure and Intelligent
Parking System Using NOTICE," In Proceedings of the International IEEE Conference on
Intelligent Transportation Systems (ITSC). Beijing, October 2008, pp. 569-574.
50 / 53
114. Selected Book Chapters
Providing
Location
Security in Book Chapters
Vehicular 12. G. Yan, K. Ibrahim and M. C. Weigle, "Vehicular Network
Adhoc
Networks Simulators," In Vehicular Networks: From Theory to Practice, S.
Olariu and M. C. Weigle, Eds. Chapman & Hall/CRC, 2009.
13. G. Yan, S. El-Tawab, and D. B. Rawat, "Reliable Routing
Introduction Protocols in VANETs," In Advances in Vehicular Ad-Hoc
Related Networks: Developments and Challenges, Mohamed Watfa, Ed.
Work IGI Global, 2009.
Location 14. G. Yan, S. Olariu, D. B. Rawat, W. Yang, "E-Parking: A
Integrity Electronic Parking Service Using Wireless Networks". in
Location
E-Business Issues Challenges and Opportunities for SMEs:
Confiden- Driving Competitiveness, M. Manuela Cruz-Cunha and João
tiality Eduardo Varajão, Eds, IGI Global, 2010.
Summary
51 / 53