Introduction of VANET

9,520 views 29 slides Jan 25, 2018
Slide 1
Slide 1 of 29
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29

About This Presentation

It provides the complete introduction of Vehicular Ad Hoc Network and some description about trust in VANET.


Slide Content

Vehicular Ad Hoc Network Made By: Pallavi Agarwal

Outlines Introduction of VANET Components of VANET Communication VANET Model Overview Smart Vehicle Characteristics Applications Security Requirements Bottlenecks In Deployment Major players in VANET Trust Trust Establishment Technique References 2

Introduction of VANET Vehicular Ad-Hoc Network or VANET is an application of MANET that uses moving vehicles as nodes to create a mobile network [1]. 3 Fig. 1. Types of Networks

Cont… VANET turns every participating vehicle into a wireless router or node, allowing vehicles approximately 300m to 1 km of each other to connect and, in turn, create a network with a wide range. VANET enables communication among the vehicles and roadside infrastructures. It makes transportation systems more intelligent. Since the movement of vehicles are restricted by roads, traffic regulations we can deploy fixed infrastructure at critical locations [2]. The primary goal of VANET is to provide road safety measures where information about vehicle’s current speed, location coordinates are passed with or without the deployment of infrastructure. Apart from safety measures, VANET also provides value added services like email, audio/video sharing etc [3]. The best example of VANET is Transport System of any travel agency or any company which is joined internally. 4

Components of VANET The major components of a VANET are : On-Board Unit (OBU) Road Side Unit (RSU) Trusted Authority (TA) 5 Fig. 2. VANET Architecture[4]

Cont… OBUs are installed in vehicles to provide wireless communication capability. While RSUs are deployed on intersections or hotspots as an infrastructure to provide information or access to the Internet for vehicles within their radio coverage. The AS is responsible for installing the secure parameters in the OBU to authenticate the user 6

Communication VANET vehicular communication are of three types: Vehicle-to-Vehicle communication (V2V) Vehicle-to-Infrastructure communication (V2I) Infrastructure-to-Infrastructure communication (I2I) 7

VANET Model Overview There are various entities available for the VANET deployment. Some necessary operations are used in VANET which are performed by the vehicles and other entities. There are several ways to communicate with each other. Two types of environment are provided in the network such as: Infrastructure environment A d hoc environment 8 Fig.3. VANET Model

Cont… DSRC (Dedicated Short Range Communications), WAVE (Wireless Access in Vehicular Environments) or even IEEE 802.11p are used to designate the entire protocol stack of standards dealing with VANETs. An intelligent vehicle as it was designed in incorporates basically a set of sensors (front radar, reversing radar, etc.) that receive useful environmental information that generally the driver alone is unable to perceive. We find also a positioning system such as GPS (Global Positioning System) for example, which is essential for locating and driving assistance. A smart vehicle is obviously equipped with a communication system (can be multi-interface), a computing system, an event recording device which is a device whose functioning is similar to the black box of an aircraft. Mainly, and for security measures, a smart vehicle must be equipped with an ELP (Electronic License Plate) or with ECN (Electronic Chassis Number) which represent the electronic identity of the vehicle instead of the conventional identification by license plates. The ITS current terminology includes some features such as transceiving , display and interactivity with the driver in a single unit called OBU. 9

Cont… Infrastructure environments The entities are permanently connected and are responsible for the traffic or external services. It consists of M anufacturer which is used to uniquely identify the vehicles, Trusted Third Parties (TTP) offer many services like credential management or time stamping, Legal authority which is for registration of vehicles and reporting of offenses as different rules or regulations of each country and Service providers offer services like Digital Video Broadcasting (DVB) or Location-Based Services (LBS). Ad-hoc environment In this environment, vehicles are communicating. There are three devices such as OBU, which enables communication among V2V, V2I and I2I, Sensors which is used to sense the environment and improve the road safety and TPM (Trusted Platform Module) which is used for computation and storage provide the security. 10

Smart Vehicle 11

Characteristics High Mobility Rapid Changing Network Topology Predictable Mobility No Power Criteria Time Management [6] 12

Cont… VANET is an application of MANET but it has its own distinct characteristics, the characteristics of VANETs are basically a mixture of wireless medium characteristics. The characteristics are: 1. High Mobility: - This is important features of the VANET as nodes move in a high speed all the time with different direction . The high mobility of nodes reduces the mesh in the network (fewer routes between nodes). Compared to MANET, VANET mobility is relatively high. 2. Rapid Changing Network Topology: - As nodes move in very high speed so the position of node changes frequently so therefore network topology in VANETs tends to change frequently. The connection times are short especially between nodes moving in opposite direction. 3. No Power criteria: - The VANET node is equipped with a battery that is used as an infinite power supply for the communication and computation task 4. Time Management: - Safety message are the main goal of VANET. Message in VANET must be delivered to the nodes within the time limit so that a decision can be made by the node and perform action according. 5. Wireless Communication: - Data transmission is generally done by nodes. Nodes are connected and exchange their information via wireless communication. 13

Cont… The main challenges of the VANETs can be summarized as follows: Due to high mobility neighborhood location changes frequently-network Management. The unbounded network size.(channel load)Congestion and collision Control: Due to mobility signal power changes continuously. Environmental impact VANETs uses the electromagnetic waves for communication. Security as VANET provides the road safety applications which are life critical therefore security of these messages must be satisfied. 14

Applications The aim of VANET is to improve driving experience and the safety of transportation [5]. 1. Safety Application (to enhance driving safety): EEBL – Emergency Electronic Brake Light (sudden braking) PCN – Post Crash Notification RFN – Road Feature Notification (ex. downhill curve) LCA – Lane Change Assistance 15

Cont… 2. Convenience Application (for better driving experience): Road Congestion Notification Dynamic Route/Travel Time Planning Finding Parking Spots 3. Other Commercial/ Infotainment Application: Free flow Tolling Social Networking Multimedia Content Exchange 16

Cont… The Emergency Electronic Brake Light (EEBL) application enables a vehicle to broadcast a self-generated emergency brake event to surrounding vehicles. Upon receiving the event information, the receiving vehicle determines the relevance of the event and if appropriate provides a warning to the driver in order to avoid a crash. This application is particularly useful when the driver's line of sight is obstructed by other vehicles or bad weather conditions (e.g., fog, heavy rain). When a vehicle brakes hard, the Emergency Electronic Brake Light application conveys this information to surrounding  vehicles via one or more Basic Safety Messages. This application will help the driver of a following vehicle by giving an early notification that the lead vehicle is braking hard even when the driver’s visibility is limited (e.g. a large truck blocks the driver’s view, heavy fog, rain).   The current brake lamp goes on when the driver applies the brake. The Emergency Electronic Brake Light application might not only enhance the range of a hard braking message but also might provide important information such as acceleration/deceleration rate and duration. At present, brake lamps do not differentiate level of deceleration and are only useful as far rearward as line of sight allows. 17

Cont… A Post Collision Notification application detects an incident based on the speed and deceleration of each vehicle or node. Lane Change Assist (LCA) uses radar sensors to help the driver to monitor the blind-spot area and the traffic situation behind the vehicle. Lane Change Assist measures the closing speed of an approaching vehicle in the adjacent lane to determine if changing lanes is safe and if it’s not, gives the driver an audible and visual warning. Cooperative Collision Warning (CCW), which provides an active safety mechanism for vehicles on highways, is implemented by exchanging static and dynamic vehicle parameters with neighboring vehicles through inter-vehicle wireless communications. Received information is not only used for calculating the relative safety distance between neighboring vehicles, but also stored in a Motor Vehicle Event Data Recorder (MVEDR) for future accident investigation. 18

Cont… The CCW concept provides warnings or situation awareness displays to drivers based on information about the motions of neighboring vehicles obtained by wireless communications from those vehicles, without use of any ranging sensors. Collision Warning Systems share a common need: the vehicle needs to know about the locations and motions of all the neighboring vehicles, representing the state of the vehicle neighborhood. Most collision warning systems in the literature try to learn the state of the neighboring vehicles or roadway by using sensors like radar, laser, or vision (1) looking forward, to the rear, to the right lane and left lane. In contrast, our collision warning system develops its knowledge of the vehicle neighborhood by listening to the wireless communications of other vehicles and reciprocates with communications of its own. 19

Security Requirements VANET must fulfill some security prerequisites before they are transferred. A security system in VANET should fulfill the following necessary condition [9]. Authentication Integrity Availability Privacy Confidentiality 20

Cont… 1) Efficiency: In VANETs, the computational cost of vehicles must be as low as possible in order to have a real-time response. 2) Anonymity: The anonymous authentication procedure verifies that an OBU does not use its real identity to execute the authentication procedure. 3) Location privacy: An adversary collects the serial authentication messages of the OBU but it still failed to track the location of the vehicle. 4) Mutual authentication: A mutual authentication procedure is implemented whereby the LE must verify that the OBU is a legal user and the OBU must ensure that the LE is genuine. 5) Integrity: The message integrity means that data cannot be modified undetectably. 21

Bottlenecks In Deployment Unavailability of basic road side infrastructure Lack of coordination among manufacturing giants Security, the most challenging part and biggest issue Privacy of the vehicles Internet connectivity 24*7 22

Major players in VANET 23

Trust Trust is the key element in creating a trusted vehicular environment which promotes security in vehicular networks [14]. Trust establishment is very challenging as the network is highly mobile and vehicles may come in or depart at any time [7]. Trust management in VANETs is necessary to prevent broadcast of selfish or malicious messages and also enable other vehicles to filter out such messages. There are three models to establish trust: entity trust model, data trust model and combined trust model. Entity trust model emphasizes on modeling the trustworthiness of peers. Data trust model focuses on evaluating the trustworthiness of transmission data. Combined trust model uses peer trust to evaluate the trustworthiness of data [8]. 24

Trust Establishment Techniques 25 Fig. 4. Trust Establishment Trust can be established [15] by various ways in VANET: Direct / Indirect: Nodes calculate trust by direct communication. Centralized/Distributed: Trustworthiness is calculated by infrastructure and trusted authority. Proactive/Reactive: Periodic interaction occurs to maintain the trust value. Data centric/Attribute: Trust is measured in terms of data, which is send by sender or sometimes it is based on attribute/vehicles by checking its authenticity.

Cont… Trust is transitive which is acquired directly or indirectly. Direct trust is earned through direct communication between nodes. Whereas, indirect trust is earned by taking other nodes’ opinions. As shown in Figure 4, static trust is the previously predefined role-based trust or identity-based trust, where trust value is static and unchangeable. Dynamic trust indicates that the trust value changes by time. Interaction-based trust is similar to experience-based trust. Infrastructure models Certified Central Authority (CA) provides certificates to all other nodes/vehicles that provide authentication to particular peers/vehicles. The presence of RSU is necessary in infrastructure models for communication. Self Organizing models Self Organization models are classified in three sub categories: Direct trust model, indirect trust model, Hybrid trust model. 26

References [1] Maxim Raya, “The Security of Vehicular Ad Hoc Networks”, SASN’05, Nov 7 2005, Alexandria, Verginia , USA, pp. 11-21. [2] S Bhuvaneshwari , G Divya , K.B. Kirithika and S Nithya , “A Survey on Vehicular Ad-Hoc Network”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol. 2, issue 10, October 2013. [3] Hannes Hartenstein et al., “A tutorial survey on vehicular Ad Hoc Networks”, IEEE Communication Magazine, June 2008, pp. 164-171. [4] Chen, Chen, Jie Zhang, Robin Cohen, and Pin-Han Ho, "Secure and efficient trust opinion aggregation for vehicular ad-hoc networks", In Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd, pp. 1-5. IEEE, 2010. [5 ] Sabih ur Rehman , M. Arif Khan, Tanveer A. Zia and Lihong Zheng , “Vehicular Ad-Hoc Networks (VANETs) - An Overview and Challenges,” Journal of Wireless Networking and Communications, 3(3): 29-38, 2013. [ 6] J.Zhang , “A survey on trust management for VANETs”, International Conference on Advanced Information Networking and Applications, pp.105-112, 2011. [7] J.Zhang , “Trust management for VANETs: challenges, desired properties and future directions”, International Journal of Distributed Systems and Technologies, pp.48-62, 2012. [8] Verma , Mayank and Dijiang Huang, “ SeGCom : secure group communication in VANETs.” In Consumer Communications and Networking Conference, 2009, CCNC 2009, 6th IEEE, pp. 1-5. IEEE, 2009. 27

Cont… [9 ] Liao, Cong, Jian Chang, Insup Lee, and Krishna K. Venkatasubramanian , "A trust model for vehicular network-based incident reports", In Wireless Vehicular Communications ( WiVeC ), IEEE 5th International Symposium on, pp-1-5, IEEE, 2013 . [10] Hortelano , Jorge, Juan Carlos Ruiz, and Pietro Manzoni, "Evaluating the usefulness of watchdogs for intrusion detection in VANETs", Communications Workshops (ICC), IEEE International Conference on, pp- 1-5. IEEE, 2010. [11] Teerawat Issariyakul , Ekram Hossain , “Introduction to Network Simulator NS2”, ISBN 978-1-4614-1405-6, DOI 10.1007/978-1-4614-1406-3. [ 12] Ming-Chin Chuang and Jeng-Farn Le, “TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks” 1932-8184/2014 IEEE . [14] I. Ahmed Sumra , H. Hasbullah , I. Ahmad, and J. Bin Ab. Manan , “Forming vehicular web of trust in VANET, Electronics Communications and Photonics Conference (SIECPC), IEEE (2011) pp. 1-6 . [15] Jyoti Grover, Manoj Gaur and Vijay Laxmi , “Trust Establishment Techniques in VANET,” DOI: 10.1007/978-3-642-36169-2_8, January 2013. 28

29