Vanet: Vehicular Ad Hoc Network

Download as pdf or txt
Download as pdf or txt
You are on page 1of 45

VANET

Vehicular ad hoc network

What is vehicular ad hoc network


VANET is a type of wireless
network in which moving vehicles
act as either a node or a router to
exchange messages between
vehicles, or an Access Point (AP)

Subclass of mobile ad hoc


network(MANET)
A vehicular ad hoc
network(VANET) consist of
groups of moving or
stationary vehicles connected
by a wireless network.
Characteristics of VANET

• High Mobility: The nodes in VANETs usually are moving


at high speed. This makes harder to predict a node’s
position and making protection of node privacy .

• Rapidly changing network topology: Due to high node


mobility and random speed of vehicles, the position of
node changes frequently. As a result of this, network
topology in VANETs tends to change frequently.
Characteristics of VANET

• Unbounded network size: VANET can be implemented


for one city, several cities or for countries. This means that
network size in VANET is geographically unbounded.

• Frequent exchange of information: The ad hoc nature of


VANET motivates the nodes to gather information from
the other vehicles and road side units. Hence the
information exchange among node becomes frequent.
Characteristics of VANET

• Wireless Communication: VANET is designed for the


wireless environment. Nodes are connected and
exchange their information via wireless network.
Therefore some security measure must be considered in
communication.

• Time Critical: The information in VANET must be


delivered to the nodes with in time limit so that a decision
can be made by the node and perform action accordingly.
Characteristics of VANET

• Sufficient Energy: The VANET nodes have no issue of


energy and computation resources. This allows VANET
usage of demanding techniques such as RSA, ECDSA
implementation and also provides unlimited power.

• Better Physical Protection: The VANET nodes are


physically better protected. Thus, VANET nodes are more
difficult to compromise physically and reduce the effect of
infrastructure attack.
Applications of
VANET

❖ Safety related Application


❖ User based Application
❖ Vehicular Application
Safety related Applications

Collision prevention: When a emergency situation happens the system broadcast


the warning message to others vehicle for automatic break control to prevent
collision.

Co-operative Driving: Drivers will obtain signals for traffic associated warnings
like Lane change warning, curve speed warning etc. The signal is able to co-operate
and make the driver for a non-interruptible safe driving.

Traffic optimization: Traffic can optimized by make use of sending signals like
accidents, jam etc. to the vehicles. So that they can decide their alternate pathway
and they can rescue time.
User Based Applications

Peer to peer application: For sharing music, movies, videos, etc this type
of application is very useful among the network used by the vehicle.

Internet Connectivity: At any time, people want to connect with the


internet. So for user VANET provides the constant connectivity of the
internet.

Other Services: The other user based application will make use of
VANET by accessing the location of fuel station, restaurant, and
payment service to collect the taxes.
Vehicular Applications

Road Safety: Safety applications require timely reaction to the


broadcasted message. Using DSRC reduces delay in communication.

Driver assistance: It’s main aim to make easy for driving and also help the
driver in specific situations.

Passengers comfort: These applications make it comfortable to the


passengers and also the driver by using messaging, discussion between
vehicles, mobile internet access, collaborative network games etc.
Components of
VANET
● Mobile Components (OBU)
● Generic components (TA)
● Infrastructure Components (RSU)
Mobile Components

All vehicles like cars, jeeps, trucks, buses, motorcycles, and


pedestrians fall in this category.

It also includes all those components or devices which are carried


by passengers and those components which remain in the vehicle.

For example Personal Digital Assistant (PDA), navigation devices


such as Global Positioning System (GPS), laptops, and smart
mobile phones, etc.
Infrastructure Components

These components don’t move, but play important role in


network communication.

Components are placed on the road side and they are called
Road-Side Units (RSUs).

For example, charging spots, poles, and traffic lights are


considered as RSUs.
Communication
Process of VANET

● V2V communication
● V2I communication
V2V Communication

● Vehicle to vehicle communication


● Works with Dedicated Short Range Communication(DSRC)
● DSRC is a type of Wifi that sends brief messages up to 10 times a
second over short distance
● Distance is upto 1000 feet
V2I Communication

● Vehicle to Infrastructure communication


● Wireless exchange of data between vehicle and road
infrastructure
● Works with GPRS, Wifi or Wimax communication
● Enabled by a system of hardware
● Infrastructure components can wirelessly provide information
to vehicle and vice versa
VANET and
Authentication

Sometimes malicious network will attack the


VANET system and will destroy the system.
To prevent This type of malicious network we have
to add authentication system in VANET.
Authentication
techniques

● Cryptography technique
● Digital Signature
● Message verification technique
Handover
Mechanism

In communication handover is a process of


switching from one area of coverage or cell to
another area of coverage or cell in case of
weakening of a call in current state.
Handover
Mechanism

● Soft Handover ( possibility of continue)


● Hard Handover ( Connection get disconnected)
Handover Mechanism
in VANET

In case of VANETs handovers means change in the


point of attachment (PoA) of a mobile node (vehicle).

Used for improving the mobility in VANET.

When a vehicle enters a new area of RSU leaving its


current coverage area handover is required.
5G Security in VANET
5G and it’s security
measures for VANET

1. Basics of 5G
2. Security measures for VANET
Basic Overview of 5G Networks

5G is derived from existing 4G and 3G technologies and


fulfills the requirements for future applications.

It fulfills the needs of as uninterrupted network


access,availability, sufficient coverage and sufficient
bandwidth.
Basic Overview of 5G Networks

The characteristics of 5G networks are


● Based on the IEEE 802.11ac standard of broadband
technology.
● 1ms latency
● 10 Gb/s speed
These characteristics of 5G security play a vital role in
various functions of vehicular networks.
Security in 5G Networks

5G has to support various services with diverse


requirements.
Traditional protocols as well as complex and
compute-intensive cryptographic protocols are not suitable
for 5G.
Layered Security is applied in 5G networks where it focuses
on security at the physical layer , and security control and
management at upper layers.
Physical Layer Security

Physical layer uses interference to degrade the quality


of a signal received by malicious devices, thus making
the signal communication more secure and reliable.
Noise, channel fading, and inter and intra-cellular
interference are conventional degrading factors in
any type of wireless communication.They can be
beneficial if exploited carefully from a signal security
perspective.
Network Layer Security

Network Security is enabled by separating user,


control, and management traffic. 5G divides the
entire network into various zones.Various
security mechanisms such as firewalls and
intrusion detection systems (IDSs) can be
implemented using virtual network functions
(VNFs) between various network zones.
Integration of 5G into VANETs

VANET safety applications require almost minimum


latency as safety of lives may be at stake which is
guaranteed by 5G. It also benefits from the speed,high
bandwidth, reliability, efficiency, coverage, and security
features of 5G.
VANET Security Standards

The design and implementation of safety applications for


VANETs remain challenging because of several practical issues,
including the highly dynamic nature of VANETs and intermittent
communication among vehicles. Over the last few years, a few
VANET security standards have emerged, and we discuss them
briefly with reference to the DSRC communication architecture.
VANET Standards

IEEE 1609:The IEEE 802.11p protocol is used for wireless


communication in VANETs.
SAE J2735: SAE J2735 defines the set of messages exchanged among
communicating nodes in VANET. It contains message sets, data
frames, and data elements used by applications to exchange data
SAE J3061 : The SAE J3061 standard establishes guidance for the
engineering processes including product design, validation,
deployment, and communication tasks
LTE, LTE-A, and 5G

In LTE(-A) and 5G, the security requirements for network


elements are:

1. Mutual authentication

2. Data integrity

3. Confidentiality

4. Protection against replay attacks.


Security and Privacy Requirements defined by
3GPP

1. Confidentiality
2. Integrity
3. Authenticity
4. Replay Attack Protection
Challenges in 5G enabled vehicular networks

Despite the advances in technology, many challenges remain


in the use of 5G in vehicular networks. These challenges can
be classified into the following issues:
1. Security
2. Privacy
Security for V2I communication

V2I faces great challenges due to frequent handover and large


scale vehicular machine-to-machine (M2M) communications.
The integration of Internet Protocol Version 6 (IPv6) to the
existing work has not been done well which leaves loopholes.The
handoff scenario between LTE and 802.11p is a challenging issue
which occurs frequently in networks .
Security for V2I communication

Currently, standardized 3GPP tunneling options, — GPRS


Tunneling Protocol, Generic Routing Encapsulation-Based (GRE)
Proxy Mobile Internet Protocol, and IPsec strongly rely on
centralized anchor nodes and cannot support cross-domain
handover authentications. The schemes cannot efficiently support
group-oriented communication scenarios.
Security for V2V communication

For V2V service, a new application scenario is cooperative driving, which


allows autonomous vehicles to drive in a platooning pattern to reduce
fuel consumption and driver mistakes. It is vulnerable to various attacks
such as :

Sybil attack: Falsify multiple identities to attack the networks

Message Falsification: Falsifies the messages sent to obstruct emergency


braking, position hijacking to falsify members and leaders and other
models
Security for V2V communication

To prevent attacks we authenticate the messages sent. Each


message sent should be verified. Batch verification technique can
be used along with high efficiency group testing technique should
be proposed, which can find invalid signatures within a batch of
signatures
Security for V2N communication

In V2N , the main application scenario is real time map updates


for autonomous driving. The potential attacks for this case are:

1. Forged Identification
2. Forged location
3. Forged event
Security for V2N communication

Cyber attacks are also a main concern for networks as the


potential danger will occur at any time. The attack types
include hacking into vehicle and remote control or spreading
virus. Also, SDN based attacks include as denial of service
(DoS) and distributed DoS (DDoS), man in the middle (MITM)
attacks, scanning attacks, unauthorized access, and privilege
escalation.
Privacy in networks

Privacy means only authorized users can access and control


vehicle-related information, such as a vehicle’s real identity and
location profile. The method to hide a vehicle’s real identity is
anonymity, which can be provided by pseudonyms. Beacon messages
sent by vehicles contain vehicle’s real identity, the status of the vehicle
(the GPS coordinates, speed, etc.), and a timestamp. In this case, we
try to send these messages without breach of privacy as an entity
could obtain information about the passengers from these messages.
Privacy in networks

The addition of social networks to autonomous vehicles for


entertainment in leisure time brings additional challenges. The
key issue is how to efficiently explore common attributes for
cooperation among autonomous vehicles in proximity without
exposing the passengers personal information to strangers
Privacy in networks

In Vehicular networking chain, different stakeholders require


different data about vehicles and passengers. In some special
scenarios, the vehicle needs to send real time location
information to the server which is authenticated by comparing
with other vehicles in the vicinity. In this case, it is necessary to
insure sensitive data cannot be leaked. For this case, practical
multi-party private set intersection (PSI) protocols supporting big
data processing need to be designed.
Thank You

You might also like