SlideShare a Scribd company logo
1 of 20
PERI INSTITUTE OF TECHNOLOGY
INNOVATION X 2024
REVIEW - 2
Prepared By,
Name of the faculty 1: Athirayan .S
Name of the faculty 2:Noble Lourdhu Raj S.R
DATE : 17-02-2024
Privacy and Security Data Acquisition in VANET using
vehicle-assisted data delivery (VADD)
Brief Problem Statement:
Inter vehicular communication lies at the core of a number of industry and academic research initiatives
that aim at enhancing the safety and efficiency of transportation systems. Vehicular ad hoc networks
(VANETs) enable vehicles to communicate with each other and with roadside units (RSUs).
Service oriented vehicular networks are special types of VANETs that support diverse infrastructure-based
commercial services, including Internet access, real-time traffic management, video streaming, and content
distribution.
Many forms of attacks against service oriented VANETs that attempt to threaten their security have
emerged. The success of data acquisition and delivery systems depends on their ability to defend against
the different types of security and privacy attacks that exist in service-oriented VANETs. This paper
introduces a system that takes advantage of the RSUs that are connected to the Internet and that provide
various types of information to VANET users
Summary of Literature survey
Name of Author Title of Literature Key findings
Mohandas.B,
Nayak.A, Naik.K,
and Goel.N
A service discovery
approach for vehicular ad
hoc networks,”
Vehicular network is an emerging wireless network
where vehicles and roadside units are the
communicating nodes, which provides information
with each other such as safety warning, traffic
information and the services available in region. There
are numerous service providers available in the
network providing various services, vehicles can get
benefit from them. Service discovery protocols enable
the vehicles to discover service provider in their
region of interest providing desired service.
Summary of Literature survey
Name of Author Title of Literature Key findings
Biswas.S, Misic.J,
and Misic.J,
ID-based safety message
authentication for security
and trust in vehicular
networks
In this paper, a security system for VANETs to
achieve privacy desired by vehicles and traceability
required by law enforcement authorities, in addition to
satisfying fundamental security requirements
including authentication, non repudiation, message
integrity, and confidentiality. Moreover, I propose a
privacy-preserving defense technique for network
authorities to handle misbehavior in VANET access,
considering the challenge that privacy provides
avenue for misbehavior.
Name of Author Title of Literature Key findings
El Ali.F and
Ducmythial.B
A light architecture for
opportunistic vehicle-to-
infrastructure
communications
. In this paper, an architecture designed for
opportunistic vehicles to infrastructure
communication. This light architecture allows to
transfer data from the vehicles to the infrastructure
through IPv4 or IPv6 connections using 4G networks
or WiFi access points, depending on their availability.
It relies on any VANET routing protocol like geocast
or conditional based routing instead of traditional
routing. I use conditional transmissions to benefit
from its intrinsic discovery facilities, in order to find a
gateway towards the infrastructure and the
architecture, its implementation and my road test beds,
allowing to conclude on the interest of such an
architecture that allows to exploit already installed
net- works.
Name of Author Title of Literature Key findings
Li.C.T, Hwang.M.
S and Chu.Y. P
A secure and efficient
communication scheme
with authenticated key
establishment and privacy
preserving for vehicular ad
hoc networks
This proposed scheme not only accomplishes vehicle-
to-vehicle and vehicle-to-roadside infrastructure
authentication and key establishment for
communication between members, but also integrates
blind signature techniques into the scheme in allowing
mobile vehicles to anonymously interact with the
services of roadside infrastructure. I also show that
my scheme is efficient in its implementation on
mobile vehicles in comparison with other related
proposals. A secure and efficient communication
scheme for vehicular ad hoc networks is proposed.
Name of Author Title of Literature Key findings
Lochert.C,
Scheuermann.B,Iitz
er.C,Luebke.A,and
Mauve
Data aggregation and
roadside unit placement
for a VANET traffic
information system,”
This proposed scheme not only accomplishes vehicle-
to-vehicle and vehicle-to-roadside infrastructure
authentication and key establishment for
communication between members, but also integrates
blind signature techniques into the scheme in allowing
mobile vehicles to anonymously interact with the
services of roadside infrastructure. I also show that my
scheme is efficient in its implementation on mobile
vehicles in comparison with other related proposals. A
secure and efficient communication scheme for
vehicular ad hoc networks is proposed.
Name of Author Title of Literature Key findings
Papadimitratos.P,
Buttyan.L,
Holczer.T, Schoch.E
Secure vehicular
communication systems:
Design and architecture
The concepts of memory-hard algorithms and sequential
memory-hard functions, and argue that in order for key
derivation functions to be maximally secure against
attacks using custom hardware, they should be
constructed from sequential memory-hard functions.
Methodology
•Architecture Model
•Packet Formation & Keys
•Data Exchange
•Find Attacker
•Collision Avoidance
•Performance Evolution
Architecture Model:
Although the performance of safety applications in
VANET has been intensively studied recently, the focus has mainly been
based on simulations without in-depth mathematical analysis.
To properly design a wireless CA system, it is essential to evaluate
whether vehicles located in the potentially dangerous zone are connected
to VANET. When vehicles are connected to VANET, the drivers can
immediately receive emergency messages. In such cases, drivers have
more time to react to hazards.
Probabilistic Method
Estimate the expected
delivery
delay from current
intersection
to the destination for each
possible forwarding
directions
Algorithm for Determining Communication Probability
Fix each hop(u1, u2) and Car A. Let ui = (x1, ti) for i = 1, 2.
 In time t = 0, 1, 2, . . . , t1, simulate the probabilistic movements of the car using
the intersection probabilities determined above, so
that the probability of A being at (x, t) is determined for all x ∈ M
and t ≦ t1. In the end, the probability of A being at u1 = (x1, t1)
is determined and stored into p1.
 Fix the position of A at t = t1 as x1. Simulate the probabilistic
movements of A in time t = t1 + 1, t1 + 2, . . . , t2. Find the
probability of A being at (x2, t2), and store it into p2.
 P(A, u1, u2) = p1 · p2 is the probability that A appears at u1 and
moves to u2.
 Repeat steps 1-1 through 1-4 for all the cars A ∈ C.
Packet Formation & Keys:
Different communications protocols use different
conventions for distinguishing between the elements and for formatting the
data. In Binary Synchronous Transmission, the packet is formatted in 8-bit
bytes, and special characters are used to delimit the different elements.
Data Exchange:
When users register using the RSU website, they specify their
personal details (i.e., name, address, and phone) plus a username and
password to use for authentication when they connect to the RSU network
from their vehicle. Users also choose a default RSU, which will save their
account in its database.
Find Attacker:
A Network Intrusion Detection System is used to monitor networks
for attacks or intrusions[ and report these intrusions to the administrator
in order to take evasive action. A large server can be set up on a
backbone network, to monitor all traffic; or smaller systems can be set up
to monitor traffic for a particular server, switch, gateway, or router.
Intrusion detection is needed in today’s computing environment because
it is impossible to keep pace with the current and potential threats and
vulnerabilities in my computing systems.
Collision Avoidance
wireless communication can be leveraged to improve the performance of
collision avoidance applications. Next, I propose an analytical model to provide
the probability of a rear-end collision between two vehicles traveling in the
same direction when a sudden braking situation occurs. Specifically, the
proposed model accommodates features developed by traffic flow theory . The
collision avoidance system is explained through a twocar highway platoon
example. Without loss of generality, the vehicles are traveling at a speed of 90
km/hr (25 m/s) and with an inter-vehicle spacing (headway) of 50 m
THANK YOU

More Related Content

Similar to Vehicular adhoc network for communication

Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsIJCNCJournal
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSIJCNCJournal
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography Pallavi Agarwal
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Editor IJCATR
 
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Networkpaperpublications3
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-finASMA HADELI
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
 
Traffic Control System by Incorporating Message Forwarding Approach
Traffic Control System by Incorporating Message Forwarding ApproachTraffic Control System by Incorporating Message Forwarding Approach
Traffic Control System by Incorporating Message Forwarding ApproachCSCJournals
 
T-ITS-12-09-0370.R1.pdf
T-ITS-12-09-0370.R1.pdfT-ITS-12-09-0370.R1.pdf
T-ITS-12-09-0370.R1.pdfssusera9ccce1
 
Internet for vanet network communications fleetnet
Internet for vanet network communications  fleetnetInternet for vanet network communications  fleetnet
Internet for vanet network communications fleetnetIJCNCJournal
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
Ijartes v1-i1-004
Ijartes v1-i1-004Ijartes v1-i1-004
Ijartes v1-i1-004IJARTES
 
Vehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic RoutingVehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic RoutingEditor IJCATR
 
Way to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanetWay to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanetIAEME Publication
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
 

Similar to Vehicular adhoc network for communication (20)

Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
 
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-fin
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
 
Traffic Control System by Incorporating Message Forwarding Approach
Traffic Control System by Incorporating Message Forwarding ApproachTraffic Control System by Incorporating Message Forwarding Approach
Traffic Control System by Incorporating Message Forwarding Approach
 
T-ITS-12-09-0370.R1.pdf
T-ITS-12-09-0370.R1.pdfT-ITS-12-09-0370.R1.pdf
T-ITS-12-09-0370.R1.pdf
 
Internet for vanet network communications fleetnet
Internet for vanet network communications  fleetnetInternet for vanet network communications  fleetnet
Internet for vanet network communications fleetnet
 
Security in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy
Security in Vehicular Ad Hoc Networks through Mix-Zones Based PrivacySecurity in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy
Security in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
Ijartes v1-i1-004
Ijartes v1-i1-004Ijartes v1-i1-004
Ijartes v1-i1-004
 
Ijsrdv9 i20118
Ijsrdv9 i20118Ijsrdv9 i20118
Ijsrdv9 i20118
 
Vehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic RoutingVehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic Routing
 
Way to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanetWay to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanet
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
 

Recently uploaded

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Recently uploaded (20)

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

Vehicular adhoc network for communication

  • 1. PERI INSTITUTE OF TECHNOLOGY INNOVATION X 2024 REVIEW - 2
  • 2. Prepared By, Name of the faculty 1: Athirayan .S Name of the faculty 2:Noble Lourdhu Raj S.R DATE : 17-02-2024 Privacy and Security Data Acquisition in VANET using vehicle-assisted data delivery (VADD)
  • 3. Brief Problem Statement: Inter vehicular communication lies at the core of a number of industry and academic research initiatives that aim at enhancing the safety and efficiency of transportation systems. Vehicular ad hoc networks (VANETs) enable vehicles to communicate with each other and with roadside units (RSUs). Service oriented vehicular networks are special types of VANETs that support diverse infrastructure-based commercial services, including Internet access, real-time traffic management, video streaming, and content distribution. Many forms of attacks against service oriented VANETs that attempt to threaten their security have emerged. The success of data acquisition and delivery systems depends on their ability to defend against the different types of security and privacy attacks that exist in service-oriented VANETs. This paper introduces a system that takes advantage of the RSUs that are connected to the Internet and that provide various types of information to VANET users
  • 4. Summary of Literature survey Name of Author Title of Literature Key findings Mohandas.B, Nayak.A, Naik.K, and Goel.N A service discovery approach for vehicular ad hoc networks,” Vehicular network is an emerging wireless network where vehicles and roadside units are the communicating nodes, which provides information with each other such as safety warning, traffic information and the services available in region. There are numerous service providers available in the network providing various services, vehicles can get benefit from them. Service discovery protocols enable the vehicles to discover service provider in their region of interest providing desired service.
  • 5. Summary of Literature survey Name of Author Title of Literature Key findings Biswas.S, Misic.J, and Misic.J, ID-based safety message authentication for security and trust in vehicular networks In this paper, a security system for VANETs to achieve privacy desired by vehicles and traceability required by law enforcement authorities, in addition to satisfying fundamental security requirements including authentication, non repudiation, message integrity, and confidentiality. Moreover, I propose a privacy-preserving defense technique for network authorities to handle misbehavior in VANET access, considering the challenge that privacy provides avenue for misbehavior.
  • 6. Name of Author Title of Literature Key findings El Ali.F and Ducmythial.B A light architecture for opportunistic vehicle-to- infrastructure communications . In this paper, an architecture designed for opportunistic vehicles to infrastructure communication. This light architecture allows to transfer data from the vehicles to the infrastructure through IPv4 or IPv6 connections using 4G networks or WiFi access points, depending on their availability. It relies on any VANET routing protocol like geocast or conditional based routing instead of traditional routing. I use conditional transmissions to benefit from its intrinsic discovery facilities, in order to find a gateway towards the infrastructure and the architecture, its implementation and my road test beds, allowing to conclude on the interest of such an architecture that allows to exploit already installed net- works.
  • 7. Name of Author Title of Literature Key findings Li.C.T, Hwang.M. S and Chu.Y. P A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks This proposed scheme not only accomplishes vehicle- to-vehicle and vehicle-to-roadside infrastructure authentication and key establishment for communication between members, but also integrates blind signature techniques into the scheme in allowing mobile vehicles to anonymously interact with the services of roadside infrastructure. I also show that my scheme is efficient in its implementation on mobile vehicles in comparison with other related proposals. A secure and efficient communication scheme for vehicular ad hoc networks is proposed.
  • 8. Name of Author Title of Literature Key findings Lochert.C, Scheuermann.B,Iitz er.C,Luebke.A,and Mauve Data aggregation and roadside unit placement for a VANET traffic information system,” This proposed scheme not only accomplishes vehicle- to-vehicle and vehicle-to-roadside infrastructure authentication and key establishment for communication between members, but also integrates blind signature techniques into the scheme in allowing mobile vehicles to anonymously interact with the services of roadside infrastructure. I also show that my scheme is efficient in its implementation on mobile vehicles in comparison with other related proposals. A secure and efficient communication scheme for vehicular ad hoc networks is proposed.
  • 9. Name of Author Title of Literature Key findings Papadimitratos.P, Buttyan.L, Holczer.T, Schoch.E Secure vehicular communication systems: Design and architecture The concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation functions to be maximally secure against attacks using custom hardware, they should be constructed from sequential memory-hard functions.
  • 10. Methodology •Architecture Model •Packet Formation & Keys •Data Exchange •Find Attacker •Collision Avoidance •Performance Evolution
  • 11. Architecture Model: Although the performance of safety applications in VANET has been intensively studied recently, the focus has mainly been based on simulations without in-depth mathematical analysis. To properly design a wireless CA system, it is essential to evaluate whether vehicles located in the potentially dangerous zone are connected to VANET. When vehicles are connected to VANET, the drivers can immediately receive emergency messages. In such cases, drivers have more time to react to hazards.
  • 12.
  • 13.
  • 14. Probabilistic Method Estimate the expected delivery delay from current intersection to the destination for each possible forwarding directions
  • 15. Algorithm for Determining Communication Probability Fix each hop(u1, u2) and Car A. Let ui = (x1, ti) for i = 1, 2.  In time t = 0, 1, 2, . . . , t1, simulate the probabilistic movements of the car using the intersection probabilities determined above, so that the probability of A being at (x, t) is determined for all x ∈ M and t ≦ t1. In the end, the probability of A being at u1 = (x1, t1) is determined and stored into p1.  Fix the position of A at t = t1 as x1. Simulate the probabilistic movements of A in time t = t1 + 1, t1 + 2, . . . , t2. Find the probability of A being at (x2, t2), and store it into p2.  P(A, u1, u2) = p1 · p2 is the probability that A appears at u1 and moves to u2.  Repeat steps 1-1 through 1-4 for all the cars A ∈ C.
  • 16. Packet Formation & Keys: Different communications protocols use different conventions for distinguishing between the elements and for formatting the data. In Binary Synchronous Transmission, the packet is formatted in 8-bit bytes, and special characters are used to delimit the different elements. Data Exchange: When users register using the RSU website, they specify their personal details (i.e., name, address, and phone) plus a username and password to use for authentication when they connect to the RSU network from their vehicle. Users also choose a default RSU, which will save their account in its database.
  • 17. Find Attacker: A Network Intrusion Detection System is used to monitor networks for attacks or intrusions[ and report these intrusions to the administrator in order to take evasive action. A large server can be set up on a backbone network, to monitor all traffic; or smaller systems can be set up to monitor traffic for a particular server, switch, gateway, or router. Intrusion detection is needed in today’s computing environment because it is impossible to keep pace with the current and potential threats and vulnerabilities in my computing systems.
  • 18. Collision Avoidance wireless communication can be leveraged to improve the performance of collision avoidance applications. Next, I propose an analytical model to provide the probability of a rear-end collision between two vehicles traveling in the same direction when a sudden braking situation occurs. Specifically, the proposed model accommodates features developed by traffic flow theory . The collision avoidance system is explained through a twocar highway platoon example. Without loss of generality, the vehicles are traveling at a speed of 90 km/hr (25 m/s) and with an inter-vehicle spacing (headway) of 50 m
  • 19.