Vehicular ad hoc network is one of the most interesting research areas due to flexibility, low cost, high sensing fidelity, fault tolerance, creating many new and exciting application areas for remote sensing. So, it has emerged as a promising tool for monitoring the physical world with wireless sensor that can sense, process and communicate. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. VANETs have now been established as reliable networks that vehicles use for communication purpose on highways or urban environments. VANET considered as a distinct type of Mobile Ad Hoc Networks holds the opportunity to make peoples life and death decisions by predicting and helping the drivers and other people about the road safety and other critical conditions.
2. Prepared By,
Name of the faculty 1: Athirayan .S
Name of the faculty 2:Noble Lourdhu Raj S.R
DATE : 17-02-2024
Privacy and Security Data Acquisition in VANET using
vehicle-assisted data delivery (VADD)
3. Brief Problem Statement:
Inter vehicular communication lies at the core of a number of industry and academic research initiatives
that aim at enhancing the safety and efficiency of transportation systems. Vehicular ad hoc networks
(VANETs) enable vehicles to communicate with each other and with roadside units (RSUs).
Service oriented vehicular networks are special types of VANETs that support diverse infrastructure-based
commercial services, including Internet access, real-time traffic management, video streaming, and content
distribution.
Many forms of attacks against service oriented VANETs that attempt to threaten their security have
emerged. The success of data acquisition and delivery systems depends on their ability to defend against
the different types of security and privacy attacks that exist in service-oriented VANETs. This paper
introduces a system that takes advantage of the RSUs that are connected to the Internet and that provide
various types of information to VANET users
4. Summary of Literature survey
Name of Author Title of Literature Key findings
Mohandas.B,
Nayak.A, Naik.K,
and Goel.N
A service discovery
approach for vehicular ad
hoc networks,”
Vehicular network is an emerging wireless network
where vehicles and roadside units are the
communicating nodes, which provides information
with each other such as safety warning, traffic
information and the services available in region. There
are numerous service providers available in the
network providing various services, vehicles can get
benefit from them. Service discovery protocols enable
the vehicles to discover service provider in their
region of interest providing desired service.
5. Summary of Literature survey
Name of Author Title of Literature Key findings
Biswas.S, Misic.J,
and Misic.J,
ID-based safety message
authentication for security
and trust in vehicular
networks
In this paper, a security system for VANETs to
achieve privacy desired by vehicles and traceability
required by law enforcement authorities, in addition to
satisfying fundamental security requirements
including authentication, non repudiation, message
integrity, and confidentiality. Moreover, I propose a
privacy-preserving defense technique for network
authorities to handle misbehavior in VANET access,
considering the challenge that privacy provides
avenue for misbehavior.
6. Name of Author Title of Literature Key findings
El Ali.F and
Ducmythial.B
A light architecture for
opportunistic vehicle-to-
infrastructure
communications
. In this paper, an architecture designed for
opportunistic vehicles to infrastructure
communication. This light architecture allows to
transfer data from the vehicles to the infrastructure
through IPv4 or IPv6 connections using 4G networks
or WiFi access points, depending on their availability.
It relies on any VANET routing protocol like geocast
or conditional based routing instead of traditional
routing. I use conditional transmissions to benefit
from its intrinsic discovery facilities, in order to find a
gateway towards the infrastructure and the
architecture, its implementation and my road test beds,
allowing to conclude on the interest of such an
architecture that allows to exploit already installed
net- works.
7. Name of Author Title of Literature Key findings
Li.C.T, Hwang.M.
S and Chu.Y. P
A secure and efficient
communication scheme
with authenticated key
establishment and privacy
preserving for vehicular ad
hoc networks
This proposed scheme not only accomplishes vehicle-
to-vehicle and vehicle-to-roadside infrastructure
authentication and key establishment for
communication between members, but also integrates
blind signature techniques into the scheme in allowing
mobile vehicles to anonymously interact with the
services of roadside infrastructure. I also show that
my scheme is efficient in its implementation on
mobile vehicles in comparison with other related
proposals. A secure and efficient communication
scheme for vehicular ad hoc networks is proposed.
8. Name of Author Title of Literature Key findings
Lochert.C,
Scheuermann.B,Iitz
er.C,Luebke.A,and
Mauve
Data aggregation and
roadside unit placement
for a VANET traffic
information system,”
This proposed scheme not only accomplishes vehicle-
to-vehicle and vehicle-to-roadside infrastructure
authentication and key establishment for
communication between members, but also integrates
blind signature techniques into the scheme in allowing
mobile vehicles to anonymously interact with the
services of roadside infrastructure. I also show that my
scheme is efficient in its implementation on mobile
vehicles in comparison with other related proposals. A
secure and efficient communication scheme for
vehicular ad hoc networks is proposed.
9. Name of Author Title of Literature Key findings
Papadimitratos.P,
Buttyan.L,
Holczer.T, Schoch.E
Secure vehicular
communication systems:
Design and architecture
The concepts of memory-hard algorithms and sequential
memory-hard functions, and argue that in order for key
derivation functions to be maximally secure against
attacks using custom hardware, they should be
constructed from sequential memory-hard functions.
11. Architecture Model:
Although the performance of safety applications in
VANET has been intensively studied recently, the focus has mainly been
based on simulations without in-depth mathematical analysis.
To properly design a wireless CA system, it is essential to evaluate
whether vehicles located in the potentially dangerous zone are connected
to VANET. When vehicles are connected to VANET, the drivers can
immediately receive emergency messages. In such cases, drivers have
more time to react to hazards.
12.
13.
14. Probabilistic Method
Estimate the expected
delivery
delay from current
intersection
to the destination for each
possible forwarding
directions
15. Algorithm for Determining Communication Probability
Fix each hop(u1, u2) and Car A. Let ui = (x1, ti) for i = 1, 2.
In time t = 0, 1, 2, . . . , t1, simulate the probabilistic movements of the car using
the intersection probabilities determined above, so
that the probability of A being at (x, t) is determined for all x ∈ M
and t ≦ t1. In the end, the probability of A being at u1 = (x1, t1)
is determined and stored into p1.
Fix the position of A at t = t1 as x1. Simulate the probabilistic
movements of A in time t = t1 + 1, t1 + 2, . . . , t2. Find the
probability of A being at (x2, t2), and store it into p2.
P(A, u1, u2) = p1 · p2 is the probability that A appears at u1 and
moves to u2.
Repeat steps 1-1 through 1-4 for all the cars A ∈ C.
16. Packet Formation & Keys:
Different communications protocols use different
conventions for distinguishing between the elements and for formatting the
data. In Binary Synchronous Transmission, the packet is formatted in 8-bit
bytes, and special characters are used to delimit the different elements.
Data Exchange:
When users register using the RSU website, they specify their
personal details (i.e., name, address, and phone) plus a username and
password to use for authentication when they connect to the RSU network
from their vehicle. Users also choose a default RSU, which will save their
account in its database.
17. Find Attacker:
A Network Intrusion Detection System is used to monitor networks
for attacks or intrusions[ and report these intrusions to the administrator
in order to take evasive action. A large server can be set up on a
backbone network, to monitor all traffic; or smaller systems can be set up
to monitor traffic for a particular server, switch, gateway, or router.
Intrusion detection is needed in today’s computing environment because
it is impossible to keep pace with the current and potential threats and
vulnerabilities in my computing systems.
18. Collision Avoidance
wireless communication can be leveraged to improve the performance of
collision avoidance applications. Next, I propose an analytical model to provide
the probability of a rear-end collision between two vehicles traveling in the
same direction when a sudden braking situation occurs. Specifically, the
proposed model accommodates features developed by traffic flow theory . The
collision avoidance system is explained through a twocar highway platoon
example. Without loss of generality, the vehicles are traveling at a speed of 90
km/hr (25 m/s) and with an inter-vehicle spacing (headway) of 50 m