SlideShare a Scribd company logo
5
Most read
10
Most read
11
Most read
PRESENTED BY:
AKASH KUMAR CHAUBEY(MCA/25014/18)
TOPIC: ARCHITECTURE ANDSECURITYIN VANET
OUTLINE
 Introduction
 Vehicular Communication
 VANET Architecture
 Characteristics
 Security
 Conclusion
 References
WHAT IS VANET?
 A VANET, is a technology that uses moving cars as
nodes in a network to create a mobile network.
 It is used toprovide communications among nearby
vehicles and between vehicles and nearest fixed
equipment, usually described as roadside equipment.
 “VANET make transportation systems more intelligent”
What is a VANET ?
• Communication patterns
– Roadside-to-Vehicle
Communications ( RVC or
V2I)
– Inter-Vehicle
Communications ( IVC or
V2V)
Roadside
base station
Inter-vehicle
communications
Vehicle-to-roadside
communications
Emergency
event
Roadside
units (RSU)
roadside -to-vehicle
communications
Why do we need VANET?
• Safety is the primary incentive
Hundreds of thousands of people are killed world- wide
due to road accidents yearly.
Many more areinjured.
 Traffic Optimization
Congestion/traffic jams cost time andfuel.
• Infotainment applications
– Traffic information, location of gas stations, Internet access
DSRC (Dedicated Short Range Communications ) is the
heart of the technology advance
Introduction – DSRC
• A short range communication system for safety and
infotainment applications in both roadside-to-vehicle and
vehicle-to-vehicle environment
• Designed to provide the high data transfer rates and
minimum latency in the communication link
• Federal Communication Commission allocated
5.9 GHz band (5.850-5.925 GHz) for DSRC to be used
by Intelligent Transportation Systems
Introduction – 5.9 GHz DSRC
• IEEE 802.11p
– an approved amendment to
the IEEE 802.11 standard to
add wireless access in
vehicular environments
(WAVE)
•IEEE 1609
– a higher
layer standard on IEEE
802.11p
DSRC ALLOWS:
Position
Direction
Speed
DSRC Adoption:
10 % by 2018
70 % by 2027
Differences from MANET
MANET
 Unicast and Multicast
protocols in MANETs
 Majority of nodes in MANETs
dependent on batteries fortheir
energy.
 Unavailability of infrastructure
VANET
 VANETs use broadcasting to
provide important controland
route establishment.
 VANET nodes are vehicles, so
there are less power andstorage
constraints.
 Fixed infrastructure forVANETs
Vehicular Communication
 VANET communicates through Wireless Accessfor
Vehicular Environments (WAVE).
 The WAVEuses different types of Wireless
Commutation devices such as (Wi-Fi / Wi-Max).
 The sensors or wireless devices can form a VANET
network which resides on top of the vehicle.
VANET ARCHITECTURE
 Staircase approach: An application can select among
multiple service access points to lower layers.
 Single-hop layer: communication to directradio
neighbors.
 Multi-hop layer :forwarding packets to non
neighbored nodes using neighbors asforwarders.
 Information connector: offering an interface to
events such as “Position Update Events” or “Neighbor
Position Change Events”.
IMPLEMENTING PROTOCOLS
In cases of emergencies, the protocol is used to open an instant
communication channel with the vehicle in the most dangerous
situation.
 Unicast information packed ina broadcast protocol
 Belongs to: Reliable Protocols fora Specific Purpose
VANET Characteristics
High mobility nodes
Dynamic Network Topology
No problem with power
Network Strength
Large Network
Problems in VANET
• Bogus information
– Attackers diffuse false information to affect the
behavior of other drivers
V changes its
route and frees
the road
A2 sends a false
message with1
2
traffic info
Problems in VANET
• ID disclosure
– Attackers tracks vehicles to obtain those drivers’
private information
1
*A at (x1,y1,) at time t1
*A communicates with B
2
*A refuels at time t2 and
location (x2,y2)
3
*A enters the parking lot at time
t3
*A downloads from Server x
Problems in VANET
• Masquerade
– Attackers use false identities to pretend
another vehicles
SLOW
DOWN
The way
is clear
Problems in VANET
• Denial of Service
– Attackers want to bring down the
VANET
Jammer
Roadside unit
Security Requirements
•
•
•
•
•
• Authentication
– Authenticate legitimate OBUs and senders of messages
Message Integrity
– Ensure data integrity
Privacy
– Provide message unlinkability and prevent driver’s tracking
Traceability and revocation
– Trace and disable abusing OBUs by the authority
Availability
– Provide network availability under jamming attacks
Efficiency
– Impose low computation and communication overheads
due to constraints on time
Assumptions
Roadways are divided
into geographic regions
 Trusted authorities
–
– Define regions to
identify thepositions of
the RSUs
Issue certificates to
RSUs and OBUs OBU
OBU
Assumptions
 RSUs
–
–
– Act as the regional authorities
for their regions
Are the tamper-proof devices
Get a copy of the authority’s
public key
 OBUs
– Know their current location
• GPS provides enough accuracy
– Know how to contact a RSU
Get a copy of the authority’s
public key
– OBU
OBU
Discussions and Conclusions
• VANET security is an emerging area
• As different VANET protocols and applications are
based on different assumptions, a common evaluation
framework is needed to compare different security
research contributions
• Detection of malicious vehicles is still a challenge
• Multicast source authentication which essentially
guarantees that the received data is sent from the
claimed source
References
R. Chen, D. Ma, and A. Regan, “TARI: Meeting delay
requirements in VANETs with efficient authentication and
revocation,” In Proceedings of WAVE, 2009
A. Perrig, R. Canetti, D. Tygar, D. Song, “The TESLA broadcast
authentication protocol,” CryptoBytes, vol. 5,2002
www.wikipedia.com
Security and Privacy in VANET:A Survey by Muhammed
Sameer,Jun Liang.
Architecture and security in Vanet PPT

More Related Content

PPTX
Vehicular ad hoc network - VANET
PPTX
VANET (BY-VEDANT)
PPTX
Vanet routing protocols issues and challenges
PPTX
VANETs Presentation
PPTX
Introduction of VANET
PPT
Directed diffusion for wireless sensor networking
PPTX
Flying ad hoc network
PPTX
Vanet ppt
Vehicular ad hoc network - VANET
VANET (BY-VEDANT)
Vanet routing protocols issues and challenges
VANETs Presentation
Introduction of VANET
Directed diffusion for wireless sensor networking
Flying ad hoc network
Vanet ppt

What's hot (20)

PPTX
Device to Device Communication-5G technology
PPTX
UWB and applications
PPTX
GSM. Global System for Mobile Communication.
PDF
Cellular V2X
PPTX
PPT
vehicular communications
PPT
VANET, Security and Trust
PPTX
Ultra wideband technology (UWB)
PPTX
Mobile Networks Overview (2G / 3G / 4G-LTE)
PPTX
Gsm architecture
PPT
Wcdma
PPTX
Evolution of mobile communication
PPTX
Frequency Division Multiple Access (FDMA)
PPTX
Mac protocols
PPTX
4G and 5gG Communication for Beginner
ODP
UMTS, Introduction.
PPTX
Mac protocols for ad hoc wireless networks
PPTX
Wireless local loop
PPTX
Mobile Generations
PPTX
Introduction to VANET
Device to Device Communication-5G technology
UWB and applications
GSM. Global System for Mobile Communication.
Cellular V2X
vehicular communications
VANET, Security and Trust
Ultra wideband technology (UWB)
Mobile Networks Overview (2G / 3G / 4G-LTE)
Gsm architecture
Wcdma
Evolution of mobile communication
Frequency Division Multiple Access (FDMA)
Mac protocols
4G and 5gG Communication for Beginner
UMTS, Introduction.
Mac protocols for ad hoc wireless networks
Wireless local loop
Mobile Generations
Introduction to VANET
Ad

Similar to Architecture and security in Vanet PPT (20)

PDF
vanets presentation-.pdf
PDF
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
PDF
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
PPS
PDF
Vehicular Ad-hoc Network, its Security and Issues: A Review
PDF
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
PDF
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
PPT
VANETS Vehicular Adhoc NETworkS
PDF
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
PDF
Security issues and solutions in vehicular adhoc network a review approach
PDF
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
PDF
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
PPTX
Architecture Security in VANET
PDF
VANET SECURITY AND PRIVACY – AN OVERVIEW
PDF
VANET SECURITY AND PRIVACY – AN OVERVIEW
PDF
VANET SECURITY AND PRIVACY – AN OVERVIEW
PDF
Technical Review on Different Applications, Challenges and Security in VANET
PDF
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
PDF
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
PDF
Security and Trust Management in VANET
vanets presentation-.pdf
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Vehicular Ad-hoc Network, its Security and Issues: A Review
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
VANETS Vehicular Adhoc NETworkS
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
Security issues and solutions in vehicular adhoc network a review approach
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Architecture Security in VANET
VANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEW
Technical Review on Different Applications, Challenges and Security in VANET
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
Security and Trust Management in VANET
Ad

More from Meghaj Mallick (20)

PPT
24 partial-orderings
PPTX
PORTFOLIO BY USING HTML & CSS
PPTX
Introduction to Software Testing
PPTX
Introduction to System Programming
PPTX
MACRO ASSEBLER
PPTX
Icons, Image & Multimedia
PPTX
Project Tracking & SPC
PPTX
Peephole Optimization
PPTX
Routing in MANET
PPTX
Macro assembler
PPTX
Design Model & User Interface Design in Software Engineering
PPTX
Text Mining of Twitter in Data Mining
PPTX
DFS & BFS in Computer Algorithm
PPTX
Software Development Method
PPTX
Secant method in Numerical & Statistical Method
PPTX
Motivation in Organization
PPTX
Communication Skill
PPT
Partial-Orderings in Discrete Mathematics
PPTX
Hashing In Data Structure
PPTX
Complexity Analysis of Recursive Function
24 partial-orderings
PORTFOLIO BY USING HTML & CSS
Introduction to Software Testing
Introduction to System Programming
MACRO ASSEBLER
Icons, Image & Multimedia
Project Tracking & SPC
Peephole Optimization
Routing in MANET
Macro assembler
Design Model & User Interface Design in Software Engineering
Text Mining of Twitter in Data Mining
DFS & BFS in Computer Algorithm
Software Development Method
Secant method in Numerical & Statistical Method
Motivation in Organization
Communication Skill
Partial-Orderings in Discrete Mathematics
Hashing In Data Structure
Complexity Analysis of Recursive Function

Recently uploaded (20)

PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Classroom Observation Tools for Teachers
PDF
01-Introduction-to-Information-Management.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
RMMM.pdf make it easy to upload and study
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Yogi Goddess Pres Conference Studio Updates
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Trump Administration's workforce development strategy
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Classroom Observation Tools for Teachers
01-Introduction-to-Information-Management.pdf
Microbial disease of the cardiovascular and lymphatic systems
RMMM.pdf make it easy to upload and study
Final Presentation General Medicine 03-08-2024.pptx
Final Presentation General Medicine 03-08-2024.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
GDM (1) (1).pptx small presentation for students
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Supply Chain Operations Speaking Notes -ICLT Program
Yogi Goddess Pres Conference Studio Updates
Pharmacology of Heart Failure /Pharmacotherapy of CHF
A systematic review of self-coping strategies used by university students to ...
2.FourierTransform-ShortQuestionswithAnswers.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Trump Administration's workforce development strategy
Microbial diseases, their pathogenesis and prophylaxis

Architecture and security in Vanet PPT

  • 1. PRESENTED BY: AKASH KUMAR CHAUBEY(MCA/25014/18) TOPIC: ARCHITECTURE ANDSECURITYIN VANET
  • 2. OUTLINE  Introduction  Vehicular Communication  VANET Architecture  Characteristics  Security  Conclusion  References
  • 3. WHAT IS VANET?  A VANET, is a technology that uses moving cars as nodes in a network to create a mobile network.  It is used toprovide communications among nearby vehicles and between vehicles and nearest fixed equipment, usually described as roadside equipment.  “VANET make transportation systems more intelligent”
  • 4. What is a VANET ? • Communication patterns – Roadside-to-Vehicle Communications ( RVC or V2I) – Inter-Vehicle Communications ( IVC or V2V) Roadside base station Inter-vehicle communications Vehicle-to-roadside communications Emergency event Roadside units (RSU) roadside -to-vehicle communications
  • 5. Why do we need VANET? • Safety is the primary incentive Hundreds of thousands of people are killed world- wide due to road accidents yearly. Many more areinjured.  Traffic Optimization Congestion/traffic jams cost time andfuel. • Infotainment applications – Traffic information, location of gas stations, Internet access DSRC (Dedicated Short Range Communications ) is the heart of the technology advance
  • 6. Introduction – DSRC • A short range communication system for safety and infotainment applications in both roadside-to-vehicle and vehicle-to-vehicle environment • Designed to provide the high data transfer rates and minimum latency in the communication link • Federal Communication Commission allocated 5.9 GHz band (5.850-5.925 GHz) for DSRC to be used by Intelligent Transportation Systems
  • 7. Introduction – 5.9 GHz DSRC • IEEE 802.11p – an approved amendment to the IEEE 802.11 standard to add wireless access in vehicular environments (WAVE) •IEEE 1609 – a higher layer standard on IEEE 802.11p DSRC ALLOWS: Position Direction Speed DSRC Adoption: 10 % by 2018 70 % by 2027
  • 8. Differences from MANET MANET  Unicast and Multicast protocols in MANETs  Majority of nodes in MANETs dependent on batteries fortheir energy.  Unavailability of infrastructure VANET  VANETs use broadcasting to provide important controland route establishment.  VANET nodes are vehicles, so there are less power andstorage constraints.  Fixed infrastructure forVANETs
  • 9. Vehicular Communication  VANET communicates through Wireless Accessfor Vehicular Environments (WAVE).  The WAVEuses different types of Wireless Commutation devices such as (Wi-Fi / Wi-Max).  The sensors or wireless devices can form a VANET network which resides on top of the vehicle.
  • 11.  Staircase approach: An application can select among multiple service access points to lower layers.  Single-hop layer: communication to directradio neighbors.  Multi-hop layer :forwarding packets to non neighbored nodes using neighbors asforwarders.  Information connector: offering an interface to events such as “Position Update Events” or “Neighbor Position Change Events”.
  • 12. IMPLEMENTING PROTOCOLS In cases of emergencies, the protocol is used to open an instant communication channel with the vehicle in the most dangerous situation.  Unicast information packed ina broadcast protocol  Belongs to: Reliable Protocols fora Specific Purpose
  • 13. VANET Characteristics High mobility nodes Dynamic Network Topology No problem with power Network Strength Large Network
  • 14. Problems in VANET • Bogus information – Attackers diffuse false information to affect the behavior of other drivers V changes its route and frees the road A2 sends a false message with1 2 traffic info
  • 15. Problems in VANET • ID disclosure – Attackers tracks vehicles to obtain those drivers’ private information 1 *A at (x1,y1,) at time t1 *A communicates with B 2 *A refuels at time t2 and location (x2,y2) 3 *A enters the parking lot at time t3 *A downloads from Server x
  • 16. Problems in VANET • Masquerade – Attackers use false identities to pretend another vehicles SLOW DOWN The way is clear
  • 17. Problems in VANET • Denial of Service – Attackers want to bring down the VANET Jammer Roadside unit
  • 18. Security Requirements • • • • • • Authentication – Authenticate legitimate OBUs and senders of messages Message Integrity – Ensure data integrity Privacy – Provide message unlinkability and prevent driver’s tracking Traceability and revocation – Trace and disable abusing OBUs by the authority Availability – Provide network availability under jamming attacks Efficiency – Impose low computation and communication overheads due to constraints on time
  • 19. Assumptions Roadways are divided into geographic regions  Trusted authorities – – Define regions to identify thepositions of the RSUs Issue certificates to RSUs and OBUs OBU OBU
  • 20. Assumptions  RSUs – – – Act as the regional authorities for their regions Are the tamper-proof devices Get a copy of the authority’s public key  OBUs – Know their current location • GPS provides enough accuracy – Know how to contact a RSU Get a copy of the authority’s public key – OBU OBU
  • 21. Discussions and Conclusions • VANET security is an emerging area • As different VANET protocols and applications are based on different assumptions, a common evaluation framework is needed to compare different security research contributions • Detection of malicious vehicles is still a challenge • Multicast source authentication which essentially guarantees that the received data is sent from the claimed source
  • 22. References R. Chen, D. Ma, and A. Regan, “TARI: Meeting delay requirements in VANETs with efficient authentication and revocation,” In Proceedings of WAVE, 2009 A. Perrig, R. Canetti, D. Tygar, D. Song, “The TESLA broadcast authentication protocol,” CryptoBytes, vol. 5,2002 www.wikipedia.com Security and Privacy in VANET:A Survey by Muhammed Sameer,Jun Liang.