VEHICULAR AD HOC
NETWORK
Made By: Pallavi Agarwal
OUTLINES
ο‚’ Introduction of VANET
ο‚’ Components of VANET
ο‚’ Communication
ο‚’ VANET Model Overview
ο‚’ Smart Vehicle
ο‚’ Characteristics
ο‚’ Applications
ο‚’ Security Requirements
ο‚’ Bottlenecks In Deployment
ο‚’ Major players in VANET
ο‚’ Trust
ο‚’ Trust Establishment Technique
ο‚’ References
2
INTRODUCTION OF VANET
ο‚’ Vehicular Ad-Hoc Network or VANET is an application of MANET that
uses moving vehicles as nodes to create a mobile network [1].
3
Fig. 1. Types of Networks
CONT…
ο‚’ VANET turns every participating vehicle into a wireless router or node, allowing
vehicles approximately 300m to 1 km of each other to connect and, in turn, create a
network with a wide range.
ο‚’ VANET enables communication among the vehicles and roadside infrastructures. It
makes transportation systems more intelligent. Since the movement of vehicles are
restricted by roads, traffic regulations we can deploy fixed infrastructure at critical
locations [2].
ο‚’ The primary goal of VANET is to provide road safety measures where information
about vehicle’s current speed, location coordinates are passed with or without the
deployment of infrastructure. Apart from safety measures, VANET also provides
value added services like email, audio/video sharing etc [3].
ο‚’ The best example of VANET is Transport System of any travel agency or any
company which is joined internally.
4
COMPONENTS OF VANET
ο‚’ The major components of a VANET are :
ο‚— On-Board Unit (OBU)
ο‚— Road Side Unit (RSU)
ο‚— Trusted Authority (TA)
5
Fig. 2. VANET Architecture[4]
CONT…
ο‚’ OBUs are installed in vehicles to provide wireless
communication capability.
ο‚’ While RSUs are deployed on intersections or
hotspots as an infrastructure to provide information
or access to the Internet for vehicles within their
radio coverage.
ο‚’ The AS is responsible for installing the secure
parameters in the OBU to authenticate the user
6
COMMUNICATION
ο‚’ VANET vehicular communication are of three types:
ο‚— Vehicle-to-Vehicle communication (V2V)
ο‚— Vehicle-to-Infrastructure communication (V2I)
ο‚— Infrastructure-to-Infrastructure communication (I2I)
7
VANET MODEL OVERVIEW
ο‚’ There are various entities available for the VANET deployment. Some necessary
operations are used in VANET which are performed by the vehicles and other
entities. There are several ways to communicate with each other. Two types of
environment are provided in the network such as:
ο‚’ Infrastructure environment
ο‚’ Ad hoc environment
8
Fig.3. VANET Model
CONT…
ο‚’ DSRC (Dedicated Short Range Communications), WAVE (Wireless Access in
Vehicular Environments) or even IEEE 802.11p are used to designate the entire
protocol stack of standards dealing with VANETs.
ο‚’ An intelligent vehicle as it was designed in incorporates basically a set of sensors
(front radar, reversing radar, etc.) that receive useful environmental information that
generally the driver alone is unable to perceive. We find also a positioning system
such as GPS (Global Positioning System) for example, which is essential for
locating and driving assistance. A smart vehicle is obviously equipped with a
communication system (can be multi-interface), a computing system, an event
recording device which is a device whose functioning is similar to the black box of
an aircraft.
ο‚’ Mainly, and for security measures, a smart vehicle must be equipped with an ELP
(Electronic License Plate) or with ECN (Electronic Chassis Number) which
represent the electronic identity of the vehicle instead of the conventional
identification by license plates. The ITS current terminology includes some features
such as transceiving, display and interactivity with the driver in a single unit called
OBU.
9
CONT…
ο‚— Infrastructure environments
ο‚’ The entities are permanently connected and are responsible for the
traffic or external services. It consists of Manufacturer which is used
to uniquely identify the vehicles, Trusted Third Parties (TTP) offer
many services like credential management or time stamping, Legal
authority which is for registration of vehicles and reporting of
offenses as different rules or regulations of each country and Service
providers offer services like Digital Video Broadcasting (DVB) or
Location-Based Services (LBS).
ο‚— Ad-hoc environment
ο‚’ In this environment, vehicles are communicating. There are three
devices such as OBU, which enables communication among V2V,
V2I and I2I, Sensors which is used to sense the environment and
improve the road safety and TPM (Trusted Platform Module) which is
used for computation and storage provide the security.
10
SMART VEHICLE
11
CHARACTERISTICS
ο‚’ High Mobility
ο‚’ Rapid Changing Network Topology
ο‚’ Predictable Mobility
ο‚’ No Power Criteria
ο‚’ Time Management [6]
12
CONT…
ο‚’ VANET is an application of MANET but it has its own distinct characteristics, the
characteristics of VANETs are basically a mixture of wireless medium characteristics. The
characteristics are:
ο‚’ 1. High Mobility: - This is important features of the VANET as nodes move in a high speed
all the time with different direction . The high mobility of nodes reduces the mesh in the
network (fewer routes between nodes). Compared to MANET, VANET mobility is
relatively high.
ο‚’ 2. Rapid Changing Network Topology: - As nodes move in very high speed so the position
of node changes frequently so therefore network topology in VANETs tends to change
frequently. The connection times are short especially between nodes moving in opposite
direction.
ο‚’ 3. No Power criteria: - The VANET node is equipped with a battery that is used as an
infinite power supply for the communication and computation task
ο‚’ 4. Time Management: - Safety message are the main goal of VANET. Message in VANET
must be delivered to the nodes within the time limit so that a decision can be made by the
node and perform action according.
ο‚’ 5. Wireless Communication: - Data transmission is generally done by nodes. Nodes are
connected and exchange their information via wireless communication.
13
CONT…
ο‚’ The main challenges of the VANETs can be summarized as follows:
ο‚’ Due to high mobility neighborhood location changes frequently-
network Management.
ο‚’ The unbounded network size.(channel load)Congestion and collision
Control:
ο‚’ Due to mobility signal power changes continuously.
ο‚’ Environmental impact VANETs uses the electromagnetic waves for
communication.
ο‚’ Security as VANET provides the road safety applications which are
life critical therefore security of these messages must be satisfied.
14
APPLICATIONS
ο‚’ The aim of VANET is to improve driving experience and the safety of
transportation [5].
1. Safety Application (to enhance driving safety):
ο‚’ EEBL – Emergency Electronic Brake Light (sudden braking)
ο‚’ PCN – Post Crash Notification
ο‚’ RFN – Road Feature Notification (ex. downhill curve)
ο‚’ LCA – Lane Change Assistance
15
CONT…
2. Convenience Application (for better driving experience):
ο‚’ Road Congestion Notification
ο‚’ Dynamic Route/Travel Time Planning
ο‚’ Finding Parking Spots
3. Other Commercial/ Infotainment Application:
ο‚’ Free flow Tolling
ο‚’ Social Networking
ο‚’ Multimedia Content Exchange
16
CONT…
ο‚’ The Emergency Electronic Brake Light (EEBL) application enables a vehicle to broadcast
a self-generated emergency brake event to surrounding vehicles. Upon receiving the
event information, the receiving vehicle determines the relevance of the event and if
appropriate provides a warning to the driver in order to avoid a crash. This application is
particularly useful when the driver's line of sight is obstructed by other vehicles or bad
weather conditions (e.g., fog, heavy rain).
ο‚’ When a vehicle brakes hard, the Emergency Electronic Brake Light application conveys
this information to surrounding vehicles via one or more Basic Safety Messages. This
application will help the driver of a following vehicle by giving an early notification that the
lead vehicle is braking hard even when the driver’s visibility is limited (e.g. a large truck
blocks the driver’s view, heavy fog, rain).
ο‚’ The current brake lamp goes on when the driver applies the brake. The Emergency
Electronic Brake Light application might not only enhance the range of a hard braking
message but also might provide important information such as acceleration/deceleration
rate and duration. At present, brake lamps do not differentiate level of deceleration and
are only useful as far rearward as line of sight allows.
17
CONT…
ο‚’ A Post Collision Notification application detects an incident based on the
speed and deceleration of each vehicle or node.
ο‚’ Lane Change Assist (LCA) uses radar sensors to help the driver to monitor
the blind-spot area and the traffic situation behind the vehicle. Lane Change
Assist measures the closing speed of an approaching vehicle in the adjacent
lane to determine if changing lanes is safe and if it’s not, gives the driver an
audible and visual warning.
ο‚’ Cooperative Collision Warning (CCW), which provides an active safety
mechanism for vehicles on highways, is implemented by exchanging static
and dynamic vehicle parameters with neighboring vehicles through inter-
vehicle wireless communications. Received information is not only used for
calculating the relative safety distance between neighboring vehicles, but also
stored in a Motor Vehicle Event Data Recorder (MVEDR) for future accident
investigation.
18
CONT…
ο‚’ The CCW concept provides warnings or situation awareness
displays to drivers based on information about the motions of
neighboring vehicles obtained by wireless communications from
those vehicles, without use of any ranging sensors. Collision Warning
Systems share a common need: the vehicle needs to know about the
locations and motions of all the neighboring vehicles, representing
the state of the vehicle neighborhood.
ο‚’ Most collision warning systems in the literature try to learn the state
of the neighboring vehicles or roadway by using sensors like radar,
laser, or vision (1) looking forward, to the rear, to the right lane and
left lane. In contrast, our collision warning system develops its
knowledge of the vehicle neighborhood by listening to the wireless
communications of other vehicles and reciprocates with
communications of its own.
19
SECURITY REQUIREMENTS
ο‚’ VANET must fulfill some security prerequisites before they are
transferred. A security system in VANET should fulfill the following
necessary condition [9].
1) Authentication
2) Integrity
3) Availability
4) Privacy
5) Confidentiality
20
CONT…
ο‚’ 1) Efficiency: In VANETs, the computational cost of vehicles must
be as low as possible in order to have a real-time response.
ο‚’ 2) Anonymity: The anonymous authentication procedure verifies
that an OBU does not use its real identity to execute the
authentication procedure.
ο‚’ 3) Location privacy: An adversary collects the serial
authentication messages of the OBU but it still failed to track the
location of the vehicle.
ο‚’ 4) Mutual authentication: A mutual authentication procedure is
implemented whereby the LE must verify that the OBU is a legal
user and the OBU must ensure that the LE is genuine.
ο‚’ 5) Integrity: The message integrity means that data cannot be
modified undetectably. 21
BOTTLENECKS IN DEPLOYMENT
ο‚’ Unavailability of basic road side infrastructure
ο‚’ Lack of coordination among manufacturing giants
ο‚’ Security, the most challenging part and biggest issue
ο‚’ Privacy of the vehicles
ο‚’ Internet connectivity 24*7
22
MAJOR PLAYERS IN VANET
23
TRUST
ο‚’ Trust is the key element in creating a trusted vehicular environment
which promotes security in vehicular networks [14].
ο‚’ Trust establishment is very challenging as the network is highly mobile
and vehicles may come in or depart at any time [7]. Trust management
in VANETs is necessary to prevent broadcast of selfish or malicious
messages and also enable other vehicles to filter out such messages.
ο‚’ There are three models to establish trust: entity trust model, data trust
model and combined trust model.
ο‚— Entity trust model emphasizes on modeling the trustworthiness of peers.
ο‚— Data trust model focuses on evaluating the trustworthiness of transmission
data.
ο‚— Combined trust model uses peer trust to evaluate the trustworthiness of data
[8]. 24
TRUST ESTABLISHMENT TECHNIQUES
25
Fig. 4. Trust Establishment
Trust can be established [15] by various ways in VANET:
1. Direct/ Indirect: Nodes calculate trust by direct communication.
2. Centralized/Distributed: Trustworthiness is calculated by infrastructure and trusted
authority.
3. Proactive/Reactive: Periodic interaction occurs to maintain the trust value.
4. Data centric/Attribute: Trust is measured in terms of data, which is send by sender or
sometimes it is based on attribute/vehicles by checking its authenticity.
CONT…
ο‚’ Trust is transitive which is acquired directly or indirectly. Direct
trust is earned through direct communication between nodes.
Whereas, indirect trust is earned by taking other nodes’ opinions.
As shown in Figure 4, static trust is the previously predefined
role-based trust or identity-based trust, where trust value is static
and unchangeable. Dynamic trust indicates that the trust value
changes by time. Interaction-based trust is similar to experience-
based trust.
ο‚’ Infrastructure models
Certified Central Authority (CA) provides certificates to all other
nodes/vehicles that provide authentication to particular
peers/vehicles. The presence of RSU is necessary in
infrastructure models for communication.
ο‚’ Self Organizing models
Self Organization models are classified in three sub categories:
Direct trust model, indirect trust model, Hybrid trust model.
26
REFERENCES
[1] Maxim Raya, β€œThe Security of Vehicular Ad Hoc Networks”, SASN’05, Nov 7 2005, Alexandria, Verginia,
USA, pp. 11-21.
[2] S Bhuvaneshwari, G Divya, K.B. Kirithika and S Nithya, β€œA Survey on Vehicular Ad-Hoc Network”,
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol.
2, issue 10, October 2013.
[3] Hannes Hartenstein et al., β€œA tutorial survey on vehicular Ad Hoc Networks”, IEEE Communication
Magazine, June 2008, pp. 164-171.
[4] Chen, Chen, Jie Zhang, Robin Cohen, and Pin-Han Ho, "Secure and efficient trust opinion aggregation for
vehicular ad-hoc networks", In Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd,
pp. 1-5. IEEE, 2010.
[5] Sabih ur Rehman, M. Arif Khan, Tanveer A. Zia and Lihong Zheng, β€œVehicular Ad-Hoc Networks
(VANETs) - An Overview and Challenges,” Journal of Wireless Networking and Communications, 3(3): 29-
38, 2013.
[6] J.Zhang, β€œA survey on trust management for VANETs”, International Conference on Advanced Information
Networking and Applications, pp.105-112, 2011.
[7] J.Zhang, β€œTrust management for VANETs: challenges, desired properties and future directions”,
International Journal of Distributed Systems and Technologies, pp.48-62, 2012.
[8] Verma, Mayank and Dijiang Huang, β€œSeGCom: secure group communication in VANETs.” In Consumer
Communications and Networking Conference, 2009, CCNC 2009, 6th IEEE, pp. 1-5. IEEE, 2009.
27
CONT…
[9] Liao, Cong, Jian Chang, Insup Lee, and Krishna K. Venkatasubramanian, "A trust model for
vehicular network-based incident reports", In Wireless Vehicular Communications (WiVeC),
IEEE 5th International Symposium on, pp-1-5, IEEE, 2013.
[10] Hortelano, Jorge, Juan Carlos Ruiz, and Pietro Manzoni, "Evaluating the usefulness of
watchdogs for intrusion detection in VANETs", Communications Workshops (ICC), IEEE
International Conference on, pp- 1-5. IEEE, 2010.
[11] Teerawat Issariyakul, Ekram Hossain, β€œIntroduction to Network Simulator NS2”, ISBN 978-1-
4614-1405-6, DOI 10.1007/978-1-4614-1406-3.
[12] Ming-Chin Chuang and Jeng-Farn Le, β€œTEAM: Trust-Extended Authentication Mechanism for
Vehicular Ad Hoc Networks” 1932-8184/2014 IEEE.
[14] I. Ahmed Sumra, H. Hasbullah, I. Ahmad, and J. Bin Ab. Manan, β€œForming vehicular web of
trust in VANET, Electronics Communications and Photonics Conference (SIECPC), IEEE (2011)
pp. 1-6.
[15] Jyoti Grover, Manoj Gaur and Vijay Laxmi, β€œTrust Establishment Techniques in VANET,” DOI:
10.1007/978-3-642-36169-2_8, January 2013.
28
29

More Related Content

PPTX
Vanet ppt
PPTX
Vehicular ad hoc network - VANET
PPTX
VANETs Presentation
PDF
CONTOH PROPOSAL PKM-KARSA CIPTA (DIDANAI DIKTI 2018)
PPTX
Social Media Sentiments Analysis
PPTX
library management system in SQL
PDF
CΖ‘ sở dα»― liệu PTIT Δ‘αΊ‘i sα»‘ quan hệ
PPTX
Differential equations
Vanet ppt
Vehicular ad hoc network - VANET
VANETs Presentation
CONTOH PROPOSAL PKM-KARSA CIPTA (DIDANAI DIKTI 2018)
Social Media Sentiments Analysis
library management system in SQL
CΖ‘ sở dα»― liệu PTIT Δ‘αΊ‘i sα»‘ quan hệ
Differential equations

What's hot (20)

PPTX
Wireless application protocol ppt
PPT
Manet
PPTX
PPTX
VANET (BY-VEDANT)
PPTX
Geographic Routing in WSN
PPTX
Vanet Presentation
PPT
vechile to vechile communication
PPTX
Ad-Hoc Networks
PPSX
Mobile ip overview
PPTX
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
PPTX
Architecture and security in Vanet PPT
ODP
UMTS, Introduction.
PPTX
Ad hoc networks
PDF
Wireless Local Area Networks
PPT
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
PPTX
Introduction to VANET
PPTX
ASYNCHRONOUS TRANSFER MODE (ATM)
PPTX
Wireless sensor network applications
PPTX
Gprs architecture ppt
PPTX
Wlan architecture
Wireless application protocol ppt
Manet
VANET (BY-VEDANT)
Geographic Routing in WSN
Vanet Presentation
vechile to vechile communication
Ad-Hoc Networks
Mobile ip overview
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
Architecture and security in Vanet PPT
UMTS, Introduction.
Ad hoc networks
Wireless Local Area Networks
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Introduction to VANET
ASYNCHRONOUS TRANSFER MODE (ATM)
Wireless sensor network applications
Gprs architecture ppt
Wlan architecture
Ad

Similar to Introduction of VANET (20)

PDF
Review Paper on VANET
PPT
Adhoc network
PPT
Adhoc network
PDF
Master thesis on Vehicular Ad hoc Networks (VANET)
PDF
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
PDF
Aodv routing protocol implementation design
PDF
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
PDF
Technical Review on Different Applications, Challenges and Security in VANET
PDF
Security and Trust Management in VANET
PDF
A Survey on Vehicular Ad hoc Networks
PDF
Overview of VANET with Its Features and Security Attacks
PDF
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
PDF
Internet for vanet network communications fleetnet
PDF
Effective Road Model for Congestion Control in VANETS
Β 
PPTX
Vehicular network-project-fin
PDF
Communications in Vehicular networks
PDF
Preparing for CV Deployment read ahead 9-8-18
PDF
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
PDF
V2V- Vehicle to Vehicle Communication
Review Paper on VANET
Adhoc network
Adhoc network
Master thesis on Vehicular Ad hoc Networks (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
Aodv routing protocol implementation design
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
Technical Review on Different Applications, Challenges and Security in VANET
Security and Trust Management in VANET
A Survey on Vehicular Ad hoc Networks
Overview of VANET with Its Features and Security Attacks
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
Internet for vanet network communications fleetnet
Effective Road Model for Congestion Control in VANETS
Β 
Vehicular network-project-fin
Communications in Vehicular networks
Preparing for CV Deployment read ahead 9-8-18
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
V2V- Vehicle to Vehicle Communication
Ad

More from Pallavi Agarwal (7)

PPTX
Smoothing in Digital Image Processing
PPTX
Secure physical infrastructure
PPTX
Facial Recognition
PPTX
Presentation on Software Piracy
PDF
VANET for Security using Cryptography
PDF
VANET: Trust and Hashing
PDF
Overview of Trust and Cryptography in VANET
Smoothing in Digital Image Processing
Secure physical infrastructure
Facial Recognition
Presentation on Software Piracy
VANET for Security using Cryptography
VANET: Trust and Hashing
Overview of Trust and Cryptography in VANET

Recently uploaded (20)

PDF
ITEC 1010 - Information and Organizations Database System and Big data
PPTX
sinteringn kjfnvkjdfvkdfnoeneornvoirjoinsonosjf).pptx
PDF
Disaster Management_Lecture_ PPT_Dr. Kunjari Mog, NITH.pdf
PDF
BBC NW_Tech Facilities_30 Odd Yrs Ago [J].pdf
PDF
Snapchat product teardown product management
PPTX
unit 1 computer graphics introduction types
PDF
M01-Manage Safety and Environmental Protection 1.pdf
PPT
linux chapter 1 learning operating system
PDF
ITEC 1010 - Networks and Cloud Computing
PPTX
Downstream processing_in Module1_25.pptx
PDF
ForSee by Languify Teardown final product management
PDF
Computer Networks and Internet Protocol Week-1
PDF
Thesis of the Fruit Harvesting Robot .pdf
PDF
02. INDUSTRIAL REVOLUTION & Cultural, Technical and territorial transformatio...
PPTX
Retail.pptx internet of things mtech 2 nd sem
PPTX
Electric vehicle very important for detailed information.pptx
PDF
Human CELLS and structure in Anatomy and human physiology
PPTX
5-2d2b20afbe-basic-concepts-of-mechanics.ppt
PPTX
MODULE 3 SUSTAINABLE DEVELOPMENT GOALSPPT.pptx
PPTX
Embedded Systems Microcontrollers and Microprocessors.pptx
ITEC 1010 - Information and Organizations Database System and Big data
sinteringn kjfnvkjdfvkdfnoeneornvoirjoinsonosjf).pptx
Disaster Management_Lecture_ PPT_Dr. Kunjari Mog, NITH.pdf
BBC NW_Tech Facilities_30 Odd Yrs Ago [J].pdf
Snapchat product teardown product management
unit 1 computer graphics introduction types
M01-Manage Safety and Environmental Protection 1.pdf
linux chapter 1 learning operating system
ITEC 1010 - Networks and Cloud Computing
Downstream processing_in Module1_25.pptx
ForSee by Languify Teardown final product management
Computer Networks and Internet Protocol Week-1
Thesis of the Fruit Harvesting Robot .pdf
02. INDUSTRIAL REVOLUTION & Cultural, Technical and territorial transformatio...
Retail.pptx internet of things mtech 2 nd sem
Electric vehicle very important for detailed information.pptx
Human CELLS and structure in Anatomy and human physiology
5-2d2b20afbe-basic-concepts-of-mechanics.ppt
MODULE 3 SUSTAINABLE DEVELOPMENT GOALSPPT.pptx
Embedded Systems Microcontrollers and Microprocessors.pptx

Introduction of VANET

  • 1. VEHICULAR AD HOC NETWORK Made By: Pallavi Agarwal
  • 2. OUTLINES ο‚’ Introduction of VANET ο‚’ Components of VANET ο‚’ Communication ο‚’ VANET Model Overview ο‚’ Smart Vehicle ο‚’ Characteristics ο‚’ Applications ο‚’ Security Requirements ο‚’ Bottlenecks In Deployment ο‚’ Major players in VANET ο‚’ Trust ο‚’ Trust Establishment Technique ο‚’ References 2
  • 3. INTRODUCTION OF VANET ο‚’ Vehicular Ad-Hoc Network or VANET is an application of MANET that uses moving vehicles as nodes to create a mobile network [1]. 3 Fig. 1. Types of Networks
  • 4. CONT… ο‚’ VANET turns every participating vehicle into a wireless router or node, allowing vehicles approximately 300m to 1 km of each other to connect and, in turn, create a network with a wide range. ο‚’ VANET enables communication among the vehicles and roadside infrastructures. It makes transportation systems more intelligent. Since the movement of vehicles are restricted by roads, traffic regulations we can deploy fixed infrastructure at critical locations [2]. ο‚’ The primary goal of VANET is to provide road safety measures where information about vehicle’s current speed, location coordinates are passed with or without the deployment of infrastructure. Apart from safety measures, VANET also provides value added services like email, audio/video sharing etc [3]. ο‚’ The best example of VANET is Transport System of any travel agency or any company which is joined internally. 4
  • 5. COMPONENTS OF VANET ο‚’ The major components of a VANET are : ο‚— On-Board Unit (OBU) ο‚— Road Side Unit (RSU) ο‚— Trusted Authority (TA) 5 Fig. 2. VANET Architecture[4]
  • 6. CONT… ο‚’ OBUs are installed in vehicles to provide wireless communication capability. ο‚’ While RSUs are deployed on intersections or hotspots as an infrastructure to provide information or access to the Internet for vehicles within their radio coverage. ο‚’ The AS is responsible for installing the secure parameters in the OBU to authenticate the user 6
  • 7. COMMUNICATION ο‚’ VANET vehicular communication are of three types: ο‚— Vehicle-to-Vehicle communication (V2V) ο‚— Vehicle-to-Infrastructure communication (V2I) ο‚— Infrastructure-to-Infrastructure communication (I2I) 7
  • 8. VANET MODEL OVERVIEW ο‚’ There are various entities available for the VANET deployment. Some necessary operations are used in VANET which are performed by the vehicles and other entities. There are several ways to communicate with each other. Two types of environment are provided in the network such as: ο‚’ Infrastructure environment ο‚’ Ad hoc environment 8 Fig.3. VANET Model
  • 9. CONT… ο‚’ DSRC (Dedicated Short Range Communications), WAVE (Wireless Access in Vehicular Environments) or even IEEE 802.11p are used to designate the entire protocol stack of standards dealing with VANETs. ο‚’ An intelligent vehicle as it was designed in incorporates basically a set of sensors (front radar, reversing radar, etc.) that receive useful environmental information that generally the driver alone is unable to perceive. We find also a positioning system such as GPS (Global Positioning System) for example, which is essential for locating and driving assistance. A smart vehicle is obviously equipped with a communication system (can be multi-interface), a computing system, an event recording device which is a device whose functioning is similar to the black box of an aircraft. ο‚’ Mainly, and for security measures, a smart vehicle must be equipped with an ELP (Electronic License Plate) or with ECN (Electronic Chassis Number) which represent the electronic identity of the vehicle instead of the conventional identification by license plates. The ITS current terminology includes some features such as transceiving, display and interactivity with the driver in a single unit called OBU. 9
  • 10. CONT… ο‚— Infrastructure environments ο‚’ The entities are permanently connected and are responsible for the traffic or external services. It consists of Manufacturer which is used to uniquely identify the vehicles, Trusted Third Parties (TTP) offer many services like credential management or time stamping, Legal authority which is for registration of vehicles and reporting of offenses as different rules or regulations of each country and Service providers offer services like Digital Video Broadcasting (DVB) or Location-Based Services (LBS). ο‚— Ad-hoc environment ο‚’ In this environment, vehicles are communicating. There are three devices such as OBU, which enables communication among V2V, V2I and I2I, Sensors which is used to sense the environment and improve the road safety and TPM (Trusted Platform Module) which is used for computation and storage provide the security. 10
  • 12. CHARACTERISTICS ο‚’ High Mobility ο‚’ Rapid Changing Network Topology ο‚’ Predictable Mobility ο‚’ No Power Criteria ο‚’ Time Management [6] 12
  • 13. CONT… ο‚’ VANET is an application of MANET but it has its own distinct characteristics, the characteristics of VANETs are basically a mixture of wireless medium characteristics. The characteristics are: ο‚’ 1. High Mobility: - This is important features of the VANET as nodes move in a high speed all the time with different direction . The high mobility of nodes reduces the mesh in the network (fewer routes between nodes). Compared to MANET, VANET mobility is relatively high. ο‚’ 2. Rapid Changing Network Topology: - As nodes move in very high speed so the position of node changes frequently so therefore network topology in VANETs tends to change frequently. The connection times are short especially between nodes moving in opposite direction. ο‚’ 3. No Power criteria: - The VANET node is equipped with a battery that is used as an infinite power supply for the communication and computation task ο‚’ 4. Time Management: - Safety message are the main goal of VANET. Message in VANET must be delivered to the nodes within the time limit so that a decision can be made by the node and perform action according. ο‚’ 5. Wireless Communication: - Data transmission is generally done by nodes. Nodes are connected and exchange their information via wireless communication. 13
  • 14. CONT… ο‚’ The main challenges of the VANETs can be summarized as follows: ο‚’ Due to high mobility neighborhood location changes frequently- network Management. ο‚’ The unbounded network size.(channel load)Congestion and collision Control: ο‚’ Due to mobility signal power changes continuously. ο‚’ Environmental impact VANETs uses the electromagnetic waves for communication. ο‚’ Security as VANET provides the road safety applications which are life critical therefore security of these messages must be satisfied. 14
  • 15. APPLICATIONS ο‚’ The aim of VANET is to improve driving experience and the safety of transportation [5]. 1. Safety Application (to enhance driving safety): ο‚’ EEBL – Emergency Electronic Brake Light (sudden braking) ο‚’ PCN – Post Crash Notification ο‚’ RFN – Road Feature Notification (ex. downhill curve) ο‚’ LCA – Lane Change Assistance 15
  • 16. CONT… 2. Convenience Application (for better driving experience): ο‚’ Road Congestion Notification ο‚’ Dynamic Route/Travel Time Planning ο‚’ Finding Parking Spots 3. Other Commercial/ Infotainment Application: ο‚’ Free flow Tolling ο‚’ Social Networking ο‚’ Multimedia Content Exchange 16
  • 17. CONT… ο‚’ The Emergency Electronic Brake Light (EEBL) application enables a vehicle to broadcast a self-generated emergency brake event to surrounding vehicles. Upon receiving the event information, the receiving vehicle determines the relevance of the event and if appropriate provides a warning to the driver in order to avoid a crash. This application is particularly useful when the driver's line of sight is obstructed by other vehicles or bad weather conditions (e.g., fog, heavy rain). ο‚’ When a vehicle brakes hard, the Emergency Electronic Brake Light application conveys this information to surrounding vehicles via one or more Basic Safety Messages. This application will help the driver of a following vehicle by giving an early notification that the lead vehicle is braking hard even when the driver’s visibility is limited (e.g. a large truck blocks the driver’s view, heavy fog, rain). ο‚’ The current brake lamp goes on when the driver applies the brake. The Emergency Electronic Brake Light application might not only enhance the range of a hard braking message but also might provide important information such as acceleration/deceleration rate and duration. At present, brake lamps do not differentiate level of deceleration and are only useful as far rearward as line of sight allows. 17
  • 18. CONT… ο‚’ A Post Collision Notification application detects an incident based on the speed and deceleration of each vehicle or node. ο‚’ Lane Change Assist (LCA) uses radar sensors to help the driver to monitor the blind-spot area and the traffic situation behind the vehicle. Lane Change Assist measures the closing speed of an approaching vehicle in the adjacent lane to determine if changing lanes is safe and if it’s not, gives the driver an audible and visual warning. ο‚’ Cooperative Collision Warning (CCW), which provides an active safety mechanism for vehicles on highways, is implemented by exchanging static and dynamic vehicle parameters with neighboring vehicles through inter- vehicle wireless communications. Received information is not only used for calculating the relative safety distance between neighboring vehicles, but also stored in a Motor Vehicle Event Data Recorder (MVEDR) for future accident investigation. 18
  • 19. CONT… ο‚’ The CCW concept provides warnings or situation awareness displays to drivers based on information about the motions of neighboring vehicles obtained by wireless communications from those vehicles, without use of any ranging sensors. Collision Warning Systems share a common need: the vehicle needs to know about the locations and motions of all the neighboring vehicles, representing the state of the vehicle neighborhood. ο‚’ Most collision warning systems in the literature try to learn the state of the neighboring vehicles or roadway by using sensors like radar, laser, or vision (1) looking forward, to the rear, to the right lane and left lane. In contrast, our collision warning system develops its knowledge of the vehicle neighborhood by listening to the wireless communications of other vehicles and reciprocates with communications of its own. 19
  • 20. SECURITY REQUIREMENTS ο‚’ VANET must fulfill some security prerequisites before they are transferred. A security system in VANET should fulfill the following necessary condition [9]. 1) Authentication 2) Integrity 3) Availability 4) Privacy 5) Confidentiality 20
  • 21. CONT… ο‚’ 1) Efficiency: In VANETs, the computational cost of vehicles must be as low as possible in order to have a real-time response. ο‚’ 2) Anonymity: The anonymous authentication procedure verifies that an OBU does not use its real identity to execute the authentication procedure. ο‚’ 3) Location privacy: An adversary collects the serial authentication messages of the OBU but it still failed to track the location of the vehicle. ο‚’ 4) Mutual authentication: A mutual authentication procedure is implemented whereby the LE must verify that the OBU is a legal user and the OBU must ensure that the LE is genuine. ο‚’ 5) Integrity: The message integrity means that data cannot be modified undetectably. 21
  • 22. BOTTLENECKS IN DEPLOYMENT ο‚’ Unavailability of basic road side infrastructure ο‚’ Lack of coordination among manufacturing giants ο‚’ Security, the most challenging part and biggest issue ο‚’ Privacy of the vehicles ο‚’ Internet connectivity 24*7 22
  • 23. MAJOR PLAYERS IN VANET 23
  • 24. TRUST ο‚’ Trust is the key element in creating a trusted vehicular environment which promotes security in vehicular networks [14]. ο‚’ Trust establishment is very challenging as the network is highly mobile and vehicles may come in or depart at any time [7]. Trust management in VANETs is necessary to prevent broadcast of selfish or malicious messages and also enable other vehicles to filter out such messages. ο‚’ There are three models to establish trust: entity trust model, data trust model and combined trust model. ο‚— Entity trust model emphasizes on modeling the trustworthiness of peers. ο‚— Data trust model focuses on evaluating the trustworthiness of transmission data. ο‚— Combined trust model uses peer trust to evaluate the trustworthiness of data [8]. 24
  • 25. TRUST ESTABLISHMENT TECHNIQUES 25 Fig. 4. Trust Establishment Trust can be established [15] by various ways in VANET: 1. Direct/ Indirect: Nodes calculate trust by direct communication. 2. Centralized/Distributed: Trustworthiness is calculated by infrastructure and trusted authority. 3. Proactive/Reactive: Periodic interaction occurs to maintain the trust value. 4. Data centric/Attribute: Trust is measured in terms of data, which is send by sender or sometimes it is based on attribute/vehicles by checking its authenticity.
  • 26. CONT… ο‚’ Trust is transitive which is acquired directly or indirectly. Direct trust is earned through direct communication between nodes. Whereas, indirect trust is earned by taking other nodes’ opinions. As shown in Figure 4, static trust is the previously predefined role-based trust or identity-based trust, where trust value is static and unchangeable. Dynamic trust indicates that the trust value changes by time. Interaction-based trust is similar to experience- based trust. ο‚’ Infrastructure models Certified Central Authority (CA) provides certificates to all other nodes/vehicles that provide authentication to particular peers/vehicles. The presence of RSU is necessary in infrastructure models for communication. ο‚’ Self Organizing models Self Organization models are classified in three sub categories: Direct trust model, indirect trust model, Hybrid trust model. 26
  • 27. REFERENCES [1] Maxim Raya, β€œThe Security of Vehicular Ad Hoc Networks”, SASN’05, Nov 7 2005, Alexandria, Verginia, USA, pp. 11-21. [2] S Bhuvaneshwari, G Divya, K.B. Kirithika and S Nithya, β€œA Survey on Vehicular Ad-Hoc Network”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol. 2, issue 10, October 2013. [3] Hannes Hartenstein et al., β€œA tutorial survey on vehicular Ad Hoc Networks”, IEEE Communication Magazine, June 2008, pp. 164-171. [4] Chen, Chen, Jie Zhang, Robin Cohen, and Pin-Han Ho, "Secure and efficient trust opinion aggregation for vehicular ad-hoc networks", In Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd, pp. 1-5. IEEE, 2010. [5] Sabih ur Rehman, M. Arif Khan, Tanveer A. Zia and Lihong Zheng, β€œVehicular Ad-Hoc Networks (VANETs) - An Overview and Challenges,” Journal of Wireless Networking and Communications, 3(3): 29- 38, 2013. [6] J.Zhang, β€œA survey on trust management for VANETs”, International Conference on Advanced Information Networking and Applications, pp.105-112, 2011. [7] J.Zhang, β€œTrust management for VANETs: challenges, desired properties and future directions”, International Journal of Distributed Systems and Technologies, pp.48-62, 2012. [8] Verma, Mayank and Dijiang Huang, β€œSeGCom: secure group communication in VANETs.” In Consumer Communications and Networking Conference, 2009, CCNC 2009, 6th IEEE, pp. 1-5. IEEE, 2009. 27
  • 28. CONT… [9] Liao, Cong, Jian Chang, Insup Lee, and Krishna K. Venkatasubramanian, "A trust model for vehicular network-based incident reports", In Wireless Vehicular Communications (WiVeC), IEEE 5th International Symposium on, pp-1-5, IEEE, 2013. [10] Hortelano, Jorge, Juan Carlos Ruiz, and Pietro Manzoni, "Evaluating the usefulness of watchdogs for intrusion detection in VANETs", Communications Workshops (ICC), IEEE International Conference on, pp- 1-5. IEEE, 2010. [11] Teerawat Issariyakul, Ekram Hossain, β€œIntroduction to Network Simulator NS2”, ISBN 978-1- 4614-1405-6, DOI 10.1007/978-1-4614-1406-3. [12] Ming-Chin Chuang and Jeng-Farn Le, β€œTEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks” 1932-8184/2014 IEEE. [14] I. Ahmed Sumra, H. Hasbullah, I. Ahmad, and J. Bin Ab. Manan, β€œForming vehicular web of trust in VANET, Electronics Communications and Photonics Conference (SIECPC), IEEE (2011) pp. 1-6. [15] Jyoti Grover, Manoj Gaur and Vijay Laxmi, β€œTrust Establishment Techniques in VANET,” DOI: 10.1007/978-3-642-36169-2_8, January 2013. 28
  • 29. 29