Académique Documents
Professionnel Documents
Culture Documents
Many of you wont be knowing what is VANET. Well VANET are subclass on manet.
Many of you have heard of mobile ad hoc networks. A mobile ad hoc network (MANET)
is a continuously self-configuring, infrastructure-less network of mobile devices
connected without wires. In the same way Vehicular Ad-Hoc Network, or VANET, is a
technology that uses moves cars as nodes in a network to create a mobile
network.VANET turns every participating car into a wireless router or node, allowing
cars approximately 100 to 300 metres of each other to connect and, in turn, create a
network with a wide range. Nearly 1.3 million people die in road crashes each year, on
average 3,287 deaths a day. Due to such a huge number of road accidents take place,
Vanet is been introduced. Vehicular Ad hoc Networks (VANETs) are the promising
approach to provide safety and other applications to the drivers as well as passengers. It
becomes a key component of the intelligent transport system. With the help of VANET
traffic will also be reduced drastically. Probably most of you would be knowing there are
different sensors are used in cars. Basic examples would be rain sensor if the sensor
detects rain then the wipers start automatically, in the same way light sensor are used
when its even and dark the headlight of the car starts automatically. VANETs are also
infrastructure less , they work through sensors. But there is also a plan with infrastructure.
In the vanet technology messages are exchanged through sensors. There are different
types of communication in VANET. Firstly its vehlice to vehicle communication.
Message are sent through each other without and infrastructure involved. Secondly we
have Vehicle to infrastructure (V2I) and infrastructure to vehicle(I2V). Messages are sent
to infrastructure and received from infrastructure.
Slide 4
Now I would give you a brief idea of VANET components, first we will discuss about
Infrastructure environment. On one hand, manufacturers are sometimes considered within
the VANET model. As part of the manufacturing process, they identify uniquely each
vehicle. On the other hand, the legal authority is commonly present in VANET models.
Despite the different regulations on each country, it is habitually related to two main tasks
- vehicle registration and offence reporting. Every vehicle in an administrative region
should get registered once manufactured. As a result of this process, the authority issues a
license plate. On the other hand, it also processes traffic reports and fines. Trusted Third
Parties (TTP) are also present in this environment. They offer different services like
credential management or timestamping. Both manufacturers and the authority are related
to TTPs because they eventually need their services (for example, for issuing electronic
credentials). Service providers are also considered in VANETs. They offer services that
can be accessed through the VANET. Location-Based Services (LBS) or Digital Video
Broadcasting (DVB) are two examples of such services. In this part of the network,
sporadic (ad-hoc) communications are established from vehicles. From the VANET point
of view, they are equipped with three different devices. Firstly, they are equipped with a
communication unit (OBU, On-Board Unit) that enables Vehicle-to-Vehicle (V2V) and
Vehicle-to-Infrastructure (V2I, I2V) communications. On the other hand, they have a set
of sensors to measure their own status (e.g. fuel consumption) and its environment (e.g.
slippery road, safety distance). These sensorial data can be shared with other vehicles to
increase their awareness and improve road safety. Finally, a Trusted Platform Module
(TPM) is often mounted on vehicles. These devices are especially interesting for security
purposes, as they offer reliable storage and computation. They usually have a reliable
Slide 5
Now I would be talking about different VANET settings. V2V group communication is
communication with the group members, a warning message is sent when an emergency
is occurred. This message is sent without the help of infrastructure, but it uses nodes.
Only cars having this technology can use this message exchanging system. A routing
protocol is needed to forward that message to the destination. We can take an example as
a ambulance need a clear way at highway N9 , vehicle using N9 will receive message for
the clearance of the road so that Ambulance can move faster. Next we talk about V2V
beaconing, here messages include hard braking, current speed etc. This messages are only
single hop they are not forwarded. Beacon messages are sent periodically to nearby
vehicles. Next is V2I I2V , messages are exchanged through infrastructure via Road side
unit.
Slide 6
Slide 8
Now we talk about different attacks in VANET Identification is and person is identified
by its name which is unique. On the other hand, authentication means a person needs to
claim himself as a genuine person/authorized person.First problem is Impersonation in
which a person claims to be another entity. Warning message sent to the desired one
reached undesired one. This can be done by plagiarism. False Attribute Possession is a
sub type of impersonation. In this attack attacker tries to be a part of the group to get
some benefit. It is not necessary that the attacker enters the group with its own entity. It
can enter as a regular vehicle and sends message to others claiming a police vehicle for a
freeway. Sybil the attacker uses multiple identity at a same time. For example, a vehicle
enters with identity named Y but as soon he joins another group he changes its identity as
well Now he claims to be Z. As presented in the VANET model, TPMs mounted on
vehicles can store sensitive information like identifiers. In this way, the Sybil threat is
alleviated. However, security mechanisms must be designed to provide identification and
authentication, thus protecting against impersonation attacks.
Slide 9
Privacy means information one would not like to share such as home address, name
etc. Drivers personal information should be private and not to be shared, attackers
may use another persons information. This can lead to location tracking of the
registered vehicle. With the help of the address the person can be also be revealed.
Confidentiality involves a set of rules or a promise that limits access or restrictions on
certain types of information. Eavesdropping is the most prominent attack over Vanets against
confidentiality. Attacker can perform this attack by being a part of the group or by falsifying
RSU. By this way it gets another entity information.
matches perfectly then the signature and the message is geneuiene.NRR is not
extensively used in vanet but would be used in future. For example a car is overspeed
and a message should be sent and delivery receipt should be also received.
NRR1 Problem is only within group leader and receiver of the message. NRR should
get for other member of the group. Secondly a large groups can lead to scalability
problems, so small groups has been made called splits. This can help to use NRR as
well no sacalabilty problems would occur. Third problems is all NRR is stores under
group leader, prof would be required by the legal authroirtes.Collection should be
continuous
Slide 14
Confidentiality in vanet is needed in V2V communication.
1) First proposals RSU should provide symmetric key with each registered
vehicle .If a vehicle enters a RSU region RSU should provide a symmetric
key, it will help to encrypt the data with the range of RSU. Bigger RSU can
lead to conflict so smaller region is better called Split. The next split key is
automatically generated as soon as the vehicle joins another RSU region. The
key management is managed by service provider.
2) Second proposal is to establish self-organizing geofraphically region. Often a
group is created and a group leader is required. The group leader is been made
which ever member is the centremost. The group leader is often incharge to
provide symmetric key to the newest member of the group. This options
allows a group to have a longer communication period.
3) Attribute-based encryption is a type of public-key encryption in which
the secret key of a user and the ciphertext are dependent upon attribute. Each
vehicle has its own attributes which are fed while manufacturing of the
vehicle. Each attribute is associated with one public key and its private key is
divided into several parts called key shares. Each key share is installed in a
different vehicle . In that only way only the group members would be able to
decrypt the message . RSU should be employed to deliver key shares .
Slide 15
As we discussed about the sinkhole and selfish behaviour. Nugglets are been
introduced to deal with this attack. Nugglets are electronic currecy which are earned
by being honestly in networking issues or by being genuine.
Data Trust
Information trust has been brought up in VANET which means entity trust.
Information 1trust depends upon relaiblity of an entity. It is very important how
thruthful information it is