SlideShare a Scribd company logo
VANET Security Research and
Development Ecosystem
VANET Security Research
Group (VSRG)
Dr I.A.Sumra
 Vehicular ad-hoc network is a special kind of network in which
nodes (Vehicles) can communicate with each other on the road
and with its Infrastructure.
Road Side Unit (RSU)
V2VV2V
Basic VANET Architecture
2
V2I
Introduction
 Safety Applications
 Non Safety Applications
Work
in Progress
Plz! use Alt.
route
Work Zone
Warning:!!!
Work Zone
Warning:!!!
Shopping MALL
( TESCO )
Parking Slot
Available!!!
RSU Parking Slot
Available!!!
3
 The first aspect of the VANET Security R&D Ecosystem is the Academic Research.
Past researchers have contributed a lot of novel ideas in new life saving network.
 Vehicular Ad hoc Network (VANET) have been introduced to provide the
infrastructure for life saving applications.
 The second aspect of the VANET Security R&D Ecosystem is the car manufacturers which form
a big and important industry. Researchers proposed and designed the concept of smart vehicle
with some special sensors that run using VANET infrastructure.
 Smart vehicles are different from the normal vehicles which are fitted with sensors, equipped
with processing and communication abilities that can help users access to services using their
private information, access to information useful for their journeys, doing business
transactions and making decisions.
 The third aspect of the VANET
Security R&D Ecosystem is the
Govt. Agencies (GA) that is
responsible for providing
authentication services for
users using secure public and
private keys, whether
permanent or temporary based
on the type of services on
highway.
 GA provides these keys for
secure communications
between vehicles and
infrastructure.
 Last aspect of VANET Security R&D Ecosystem is
end users.
 End users have their own security, trust and privacy
requirements
 Security is one of the key challenges in vehicular
network.
 This paper presents VANET Security R&D Ecosystem
that is necessary to be considered for successful
implementation.
 The major aspects of the ecosystem i.e. academic
research, car manufacturers, government
authorities, and end users were discussed.
 It is necessary to do further research related to the
four major aspects of the ecosystem.
10
 Complete paper is available on IEEE and Research
gate.
 Please download complete research paper from
researchgate.
11

More Related Content

What's hot

International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
ijfcst journal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
ijfcst journal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
MiajackB
 
Ijcs
IjcsIjcs
Ijcs
MiajackB
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
ijfcst journal
 
Ijcs
IjcsIjcs
Ijcs
MiajackB
 
Ijcs
IjcsIjcs
Ijcs
MiajackB
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
ijfcst journal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
ijfcst journal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
ijfcst journal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
ijfcst journal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
ijfcst journal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
ijfcst journal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)    International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
aciijournal
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)    International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
jackson130
 
SASD students win big at NY International Auto Show | University of Bridgeport
SASD students win big at NY International Auto Show | University of BridgeportSASD students win big at NY International Auto Show | University of Bridgeport
SASD students win big at NY International Auto Show | University of BridgeportMichael D. Handler
 

What's hot (17)

Capstone PPT
Capstone PPTCapstone PPT
Capstone PPT
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
Ijcs
IjcsIjcs
Ijcs
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
Ijcs
IjcsIjcs
Ijcs
 
Ijcs
IjcsIjcs
Ijcs
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)    International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)    International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
SASD students win big at NY International Auto Show | University of Bridgeport
SASD students win big at NY International Auto Show | University of BridgeportSASD students win big at NY International Auto Show | University of Bridgeport
SASD students win big at NY International Auto Show | University of Bridgeport
 

Similar to VANET Security Research and Development Ecosystem

Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Dr.Irshad Ahmed Sumra
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET Journal
 
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
IOSR Journals
 
Towards design strong emergency and COVID-19 authentication scheme in VANET
Towards design strong emergency and COVID-19  authentication scheme in VANETTowards design strong emergency and COVID-19  authentication scheme in VANET
Towards design strong emergency and COVID-19 authentication scheme in VANET
nooriasukmaningtyas
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANET
Dr.Irshad Ahmed Sumra
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
nooriasukmaningtyas
 
IRJET- Internet of Things based Emergency System
IRJET- Internet of Things based Emergency SystemIRJET- Internet of Things based Emergency System
IRJET- Internet of Things based Emergency System
IRJET Journal
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
IRJET Journal
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
IRJET Journal
 
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
IJERA Editor
 
What smart road technologies are shaping the future of transportation
What smart road technologies are shaping the  future of transportationWhat smart road technologies are shaping the  future of transportation
What smart road technologies are shaping the future of transportation
nahaksomanath7064
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
IJNSA Journal
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
IJNSA Journal
 
A Review Of Motion Planning For Highway Autonomous Driving
A Review Of Motion Planning For Highway Autonomous DrivingA Review Of Motion Planning For Highway Autonomous Driving
A Review Of Motion Planning For Highway Autonomous Driving
Andrew Parish
 
Classes of Attacks in VANET
Classes of Attacks in VANETClasses of Attacks in VANET
Classes of Attacks in VANET
Dr.Irshad Ahmed Sumra
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET Journal
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-fin
ASMA HADELI
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
Dr.Irshad Ahmed Sumra
 
Ijartes v1-i1-004
Ijartes v1-i1-004Ijartes v1-i1-004
Ijartes v1-i1-004
IJARTES
 
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
coachdave
 

Similar to VANET Security Research and Development Ecosystem (20)

Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
 
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
 
Towards design strong emergency and COVID-19 authentication scheme in VANET
Towards design strong emergency and COVID-19  authentication scheme in VANETTowards design strong emergency and COVID-19  authentication scheme in VANET
Towards design strong emergency and COVID-19 authentication scheme in VANET
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANET
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
 
IRJET- Internet of Things based Emergency System
IRJET- Internet of Things based Emergency SystemIRJET- Internet of Things based Emergency System
IRJET- Internet of Things based Emergency System
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
 
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
 
What smart road technologies are shaping the future of transportation
What smart road technologies are shaping the  future of transportationWhat smart road technologies are shaping the  future of transportation
What smart road technologies are shaping the future of transportation
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
 
A Review Of Motion Planning For Highway Autonomous Driving
A Review Of Motion Planning For Highway Autonomous DrivingA Review Of Motion Planning For Highway Autonomous Driving
A Review Of Motion Planning For Highway Autonomous Driving
 
Classes of Attacks in VANET
Classes of Attacks in VANETClasses of Attacks in VANET
Classes of Attacks in VANET
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-fin
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
 
Ijartes v1-i1-004
Ijartes v1-i1-004Ijartes v1-i1-004
Ijartes v1-i1-004
 
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
 

More from Dr.Irshad Ahmed Sumra

Using the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETUsing the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANET
Dr.Irshad Ahmed Sumra
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Dr.Irshad Ahmed Sumra
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A Survey
Dr.Irshad Ahmed Sumra
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
Dr.Irshad Ahmed Sumra
 
Trusted Computing in VANET
Trusted Computing in VANETTrusted Computing in VANET
Trusted Computing in VANET
Dr.Irshad Ahmed Sumra
 
Comparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETComparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANET
Dr.Irshad Ahmed Sumra
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
Dr.Irshad Ahmed Sumra
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Dr.Irshad Ahmed Sumra
 
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Dr.Irshad Ahmed Sumra
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Dr.Irshad Ahmed Sumra
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Dr.Irshad Ahmed Sumra
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationBehavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Dr.Irshad Ahmed Sumra
 
Timing Attack in Vehicular Network
Timing Attack in Vehicular NetworkTiming Attack in Vehicular Network
Timing Attack in Vehicular Network
Dr.Irshad Ahmed Sumra
 
User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET Applications
Dr.Irshad Ahmed Sumra
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement
Dr.Irshad Ahmed Sumra
 
VANET Security and Trust
VANET Security and TrustVANET Security and Trust
VANET Security and Trust
Dr.Irshad Ahmed Sumra
 
ITS and VSS
ITS and VSSITS and VSS
VANET Trust
VANET TrustVANET Trust

More from Dr.Irshad Ahmed Sumra (18)

Using the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETUsing the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANET
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A Survey
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
 
Trusted Computing in VANET
Trusted Computing in VANETTrusted Computing in VANET
Trusted Computing in VANET
 
Comparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETComparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANET
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
 
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationBehavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
 
Timing Attack in Vehicular Network
Timing Attack in Vehicular NetworkTiming Attack in Vehicular Network
Timing Attack in Vehicular Network
 
User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET Applications
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement
 
VANET Security and Trust
VANET Security and TrustVANET Security and Trust
VANET Security and Trust
 
ITS and VSS
ITS and VSSITS and VSS
ITS and VSS
 
VANET Trust
VANET TrustVANET Trust
VANET Trust
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

VANET Security Research and Development Ecosystem

  • 1. VANET Security Research and Development Ecosystem VANET Security Research Group (VSRG) Dr I.A.Sumra
  • 2.  Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. Road Side Unit (RSU) V2VV2V Basic VANET Architecture 2 V2I Introduction
  • 3.  Safety Applications  Non Safety Applications Work in Progress Plz! use Alt. route Work Zone Warning:!!! Work Zone Warning:!!! Shopping MALL ( TESCO ) Parking Slot Available!!! RSU Parking Slot Available!!! 3
  • 4.
  • 5.  The first aspect of the VANET Security R&D Ecosystem is the Academic Research. Past researchers have contributed a lot of novel ideas in new life saving network.  Vehicular Ad hoc Network (VANET) have been introduced to provide the infrastructure for life saving applications.
  • 6.  The second aspect of the VANET Security R&D Ecosystem is the car manufacturers which form a big and important industry. Researchers proposed and designed the concept of smart vehicle with some special sensors that run using VANET infrastructure.  Smart vehicles are different from the normal vehicles which are fitted with sensors, equipped with processing and communication abilities that can help users access to services using their private information, access to information useful for their journeys, doing business transactions and making decisions.
  • 7.  The third aspect of the VANET Security R&D Ecosystem is the Govt. Agencies (GA) that is responsible for providing authentication services for users using secure public and private keys, whether permanent or temporary based on the type of services on highway.  GA provides these keys for secure communications between vehicles and infrastructure.
  • 8.  Last aspect of VANET Security R&D Ecosystem is end users.  End users have their own security, trust and privacy requirements
  • 9.  Security is one of the key challenges in vehicular network.  This paper presents VANET Security R&D Ecosystem that is necessary to be considered for successful implementation.  The major aspects of the ecosystem i.e. academic research, car manufacturers, government authorities, and end users were discussed.  It is necessary to do further research related to the four major aspects of the ecosystem.
  • 10. 10
  • 11.  Complete paper is available on IEEE and Research gate.  Please download complete research paper from researchgate. 11