Architecture and security in Vanet PPT

1,062 views 23 slides Sep 25, 2020
Slide 1
Slide 1 of 23
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23

About This Presentation

This is a PPT of Data Communication. It is about "architecture and security in Vanet" .


Slide Content

PRESENTED BY: AKASH KUMAR CHAUBEY(MCA/25014/18) BIRLA Institute OF TECHNOLOGY MESRA , JAIPUR CAMPUS TOPIC : ARCHITECTURE AND SECURITY IN VANET

OUTLINE Introduction Vehicular Communication VANET Architecture Characteristics Security Conclusion References

WHAT IS VANET? A VANET, is a technology that uses moving cars as nodes in a network to create a mobile network. It is used to provide communications among nearby vehicles and between vehicles and nearest fixed equipment, usually described as roadside equipment. “VANET make transportation systems more intelligent”

What is a VANET ? Communication patterns Roadside-to-Vehicle C o m m unications ( R V C or V2I) Inter-Vehicle Communications ( IVC or V2V) Roadside base station Inter-vehicle co mm un i ca t i on s Veh i c l e - t o - r oad s i de communications E m e r gen c y event Roadside units (RSU) roadside -to-vehicle communications

Why do we need VANET? Safety is the primary incentive Hundreds of thousands of people are killed world- wide due to road accidents yearly. Many more are injured. Traffic O ptimization Congestion/traffic jams cost time and fuel . Infotainment applications Traffic information, location of gas stations, Internet access DSRC (Dedicated Short Range Communications ) is the heart of the technology advance

Introduction – DSRC A short range communication system for safety and infotainment applications in both roadside-to-vehicle and vehicle-to-vehicle environment Designed to provide the high data transfer rates and minimum latency in the communication link Federal Communication Commission allocated 5.9 GHz band ( 5.850-5.925 GHz ) for DSRC to be used by Intelligent Transportation Systems

Introduction – 5.9 GHz DSRC IEEE 802.11p – an approved amendment to the IEEE 802.11 standard to add wireless access in vehicular environments ( WAVE ) IEEE 1609 – a higher layer standard on IEEE 802.11p DSRC ALLOWS: Position Direction Speed DSRC Adoption: 10 % by 2018 70 % by 2027

Differences from MANET MANET Unicast and Multicast protocols in MANETs Majority of nodes in MANETs dependent on batteries for their energy . Unavailability of infrastructure VANET VANETs use broadcasting to provide important control and route establishment. VANET nodes are vehicles, so there are less power and storage constraints. Fixed infrastructure for VANETs

Vehicular Communication VANET communicates through Wireless Access for Vehicular Environments (WAVE). The WAVE uses different types of Wireless Commutation devices such as (Wi-Fi / Wi-Max). The sensors or wireless devices can form a VANET network which resides on top of the vehicle.

VANET ARCHITECTURE

Staircase approach : An application can select among multiple service access points to lower layers. Single-hop layer : communication to direct radio neighbors. Multi-hop layer :forwarding packets to non neighbored nodes using neighbors as forwarders. Information connector : offering an interface to events such as “Position Update Events” or “Neighbor Position Change Events”.

IMPLEMENTING PROTOCOLS In cases of emergencies, the protocol is used to open an instant communication channel with the vehicle in the most dangerous situation. Unicast information packed in a broadcast protocol Belongs to: Reliable Protocols for a Specific Purpose

VANET Characteristics High mobility nodes Dynamic Network Topology No problem with power Network Strength Large Network

Problems in VANET Bogus information – Attackers diffuse false information to affect the behavior of other drivers V changes its route and frees the road A2 sends a false message with 1 2 traffic info

Problems in VANET ID disclosure – Attackers tracks vehicles to obtain those drivers’ private information 1 *A at (x1,y1,) at time t1 *A communicates with B 2 *A refuels at time t2 and location (x2,y2) 3 *A enters the parking lot at time t3 *A downloads from Server x

Problems in VANET Masquerade – Attackers use false identities to pretend another vehicles SLOW D O W N The way is clear

Problems in VANET Denial of Service – Attackers want to bring down the VANET Jammer Roadside unit

Security Requirements • • • • • Authentication Authenticate legitimate OBUs and senders of messages Message Integrity Ensure data integrity Privacy Provide message unlinkability and prevent driver’s tracking Traceability and revocation Trace and disable abusing OBUs by the authority Availability Provide network availability under jamming attacks Efficiency Impose low computation and communication overheads due to constraints on time

Assumptions Roadways are divided into geographic regions Trusted authorities – – Define regions to identify the positions of the RSUs Issue certificates to RSUs and OBUs O B U O B U

Assumptions RSUs – – – Act as the regional authorities for their regions Are the tamper-proof devices Get a copy of the authority’s public key OBUs – Know their current location • GPS provides enough accuracy – Know how to contact a RSU Get a copy of the authority’s public key – O B U O B U

Discussions and Conclusions VANET security is an emerging area As different VANET protocols and applications are based on different assumptions, a common evaluation framework is needed to compare different security research contributions Detection of malicious vehicles is still a challenge Multicast source authentication which essentially guarantees that the received data is sent from the claimed source

References R. Chen, D. Ma, and A. Regan, “TARI: Meeting delay requirements in VANETs with efficient authentication and revocation,” In Proceedings of WAVE , 2009 A. Perrig, R. Canetti, D. Tygar, D. Song, “The TESLA broadcast authentication protocol,” CryptoBytes, vol . 5,2002 www.wikipedia.com Se curity and Privacy in VANET:A Survey by Muhammed Sameer,Jun Liang.

THANK YOU…!!!