VANET
Vehicular ad hoc network
What is vehicular ad hoc network
VANET is a type of wireless
network in which moving vehicles
act as either a node or a router to
exchange messages between
vehicles, or an Access Point (AP)
Subclass of mobile ad hoc
network(MANET)
A vehicular ad hoc
network(VANET) consist of
groups of moving or
stationary vehicles connected
by a wireless network.
Characteristics of VANET
• High Mobility: The nodes in VANETs usually are moving
at high speed. This makes harder to predict a node’s
position and making protection of node privacy .
• Rapidly changing network topology: Due to high node
mobility and random speed of vehicles, the position of
node changes frequently. As a result of this, network
topology in VANETs tends to change frequently.
Characteristics of VANET
• Unbounded network size: VANET can be implemented
for one city, several cities or for countries. This means that
network size in VANET is geographically unbounded.
• Frequent exchange of information: The ad hoc nature of
VANET motivates the nodes to gather information from
the other vehicles and road side units. Hence the
information exchange among node becomes frequent.
Characteristics of VANET
• Wireless Communication: VANET is designed for the
wireless environment. Nodes are connected and
exchange their information via wireless network.
Therefore some security measure must be considered in
communication.
• Time Critical: The information in VANET must be
delivered to the nodes with in time limit so that a decision
can be made by the node and perform action accordingly.
Characteristics of VANET
• Sufficient Energy: The VANET nodes have no issue of
energy and computation resources. This allows VANET
usage of demanding techniques such as RSA, ECDSA
implementation and also provides unlimited power.
• Better Physical Protection: The VANET nodes are
physically better protected. Thus, VANET nodes are more
difficult to compromise physically and reduce the effect of
infrastructure attack.
Applications of
VANET
❖ Safety related Application
❖ User based Application
❖ Vehicular Application
Safety related Applications
Collision prevention: When a emergency situation happens the system broadcast
the warning message to others vehicle for automatic break control to prevent
collision.
Co-operative Driving: Drivers will obtain signals for traffic associated warnings
like Lane change warning, curve speed warning etc. The signal is able to co-operate
and make the driver for a non-interruptible safe driving.
Traffic optimization: Traffic can optimized by make use of sending signals like
accidents, jam etc. to the vehicles. So that they can decide their alternate pathway
and they can rescue time.
User Based Applications
Peer to peer application: For sharing music, movies, videos, etc this type
of application is very useful among the network used by the vehicle.
Internet Connectivity: At any time, people want to connect with the
internet. So for user VANET provides the constant connectivity of the
internet.
Other Services: The other user based application will make use of
VANET by accessing the location of fuel station, restaurant, and
payment service to collect the taxes.
Vehicular Applications
Road Safety: Safety applications require timely reaction to the
broadcasted message. Using DSRC reduces delay in communication.
Driver assistance: It’s main aim to make easy for driving and also help the
driver in specific situations.
Passengers comfort: These applications make it comfortable to the
passengers and also the driver by using messaging, discussion between
vehicles, mobile internet access, collaborative network games etc.
Components of
VANET
● Mobile Components (OBU)
● Generic components (TA)
● Infrastructure Components (RSU)
Mobile Components
All vehicles like cars, jeeps, trucks, buses, motorcycles, and
pedestrians fall in this category.
It also includes all those components or devices which are carried
by passengers and those components which remain in the vehicle.
For example Personal Digital Assistant (PDA), navigation devices
such as Global Positioning System (GPS), laptops, and smart
mobile phones, etc.
Infrastructure Components
These components don’t move, but play important role in
network communication.
Components are placed on the road side and they are called
Road-Side Units (RSUs).
For example, charging spots, poles, and traffic lights are
considered as RSUs.
Communication
Process of VANET
● V2V communication
● V2I communication
V2V Communication
● Vehicle to vehicle communication
● Works with Dedicated Short Range Communication(DSRC)
● DSRC is a type of Wifi that sends brief messages up to 10 times a
second over short distance
● Distance is upto 1000 feet
V2I Communication
● Vehicle to Infrastructure communication
● Wireless exchange of data between vehicle and road
infrastructure
● Works with GPRS, Wifi or Wimax communication
● Enabled by a system of hardware
● Infrastructure components can wirelessly provide information
to vehicle and vice versa
VANET and
Authentication
Sometimes malicious network will attack the
VANET system and will destroy the system.
To prevent This type of malicious network we have
to add authentication system in VANET.
Authentication
techniques
● Cryptography technique
● Digital Signature
● Message verification technique
Handover
Mechanism
In communication handover is a process of
switching from one area of coverage or cell to
another area of coverage or cell in case of
weakening of a call in current state.
Handover
Mechanism
● Soft Handover ( possibility of continue)
● Hard Handover ( Connection get disconnected)
Handover Mechanism
in VANET
In case of VANETs handovers means change in the
point of attachment (PoA) of a mobile node (vehicle).
Used for improving the mobility in VANET.
When a vehicle enters a new area of RSU leaving its
current coverage area handover is required.
5G Security in VANET
5G and it’s security
measures for VANET
1. Basics of 5G
2. Security measures for VANET
Basic Overview of 5G Networks
5G is derived from existing 4G and 3G technologies and
fulfills the requirements for future applications.
It fulfills the needs of as uninterrupted network
access,availability, sufficient coverage and sufficient
bandwidth.
Basic Overview of 5G Networks
The characteristics of 5G networks are
● Based on the IEEE 802.11ac standard of broadband
technology.
● 1ms latency
● 10 Gb/s speed
These characteristics of 5G security play a vital role in
various functions of vehicular networks.
Security in 5G Networks
5G has to support various services with diverse
requirements.
Traditional protocols as well as complex and
compute-intensive cryptographic protocols are not suitable
for 5G.
Layered Security is applied in 5G networks where it focuses
on security at the physical layer , and security control and
management at upper layers.
Physical Layer Security
Physical layer uses interference to degrade the quality
of a signal received by malicious devices, thus making
the signal communication more secure and reliable.
Noise, channel fading, and inter and intra-cellular
interference are conventional degrading factors in
any type of wireless communication.They can be
beneficial if exploited carefully from a signal security
perspective.
Network Layer Security
Network Security is enabled by separating user,
control, and management traffic. 5G divides the
entire network into various zones.Various
security mechanisms such as firewalls and
intrusion detection systems (IDSs) can be
implemented using virtual network functions
(VNFs) between various network zones.
Integration of 5G into VANETs
VANET safety applications require almost minimum
latency as safety of lives may be at stake which is
guaranteed by 5G. It also benefits from the speed,high
bandwidth, reliability, efficiency, coverage, and security
features of 5G.
VANET Security Standards
The design and implementation of safety applications for
VANETs remain challenging because of several practical issues,
including the highly dynamic nature of VANETs and intermittent
communication among vehicles. Over the last few years, a few
VANET security standards have emerged, and we discuss them
briefly with reference to the DSRC communication architecture.
VANET Standards
IEEE 1609:The IEEE 802.11p protocol is used for wireless
communication in VANETs.
SAE J2735: SAE J2735 defines the set of messages exchanged among
communicating nodes in VANET. It contains message sets, data
frames, and data elements used by applications to exchange data
SAE J3061 : The SAE J3061 standard establishes guidance for the
engineering processes including product design, validation,
deployment, and communication tasks
LTE, LTE-A, and 5G
In LTE(-A) and 5G, the security requirements for network
elements are:
1. Mutual authentication
2. Data integrity
3. Confidentiality
4. Protection against replay attacks.
Security and Privacy Requirements defined by
3GPP
1. Confidentiality
2. Integrity
3. Authenticity
4. Replay Attack Protection
Challenges in 5G enabled vehicular networks
Despite the advances in technology, many challenges remain
in the use of 5G in vehicular networks. These challenges can
be classified into the following issues:
1. Security
2. Privacy
Security for V2I communication
V2I faces great challenges due to frequent handover and large
scale vehicular machine-to-machine (M2M) communications.
The integration of Internet Protocol Version 6 (IPv6) to the
existing work has not been done well which leaves loopholes.The
handoff scenario between LTE and 802.11p is a challenging issue
which occurs frequently in networks .
Security for V2I communication
Currently, standardized 3GPP tunneling options, — GPRS
Tunneling Protocol, Generic Routing Encapsulation-Based (GRE)
Proxy Mobile Internet Protocol, and IPsec strongly rely on
centralized anchor nodes and cannot support cross-domain
handover authentications. The schemes cannot efficiently support
group-oriented communication scenarios.
Security for V2V communication
For V2V service, a new application scenario is cooperative driving, which
allows autonomous vehicles to drive in a platooning pattern to reduce
fuel consumption and driver mistakes. It is vulnerable to various attacks
such as :
Sybil attack: Falsify multiple identities to attack the networks
Message Falsification: Falsifies the messages sent to obstruct emergency
braking, position hijacking to falsify members and leaders and other
models
Security for V2V communication
To prevent attacks we authenticate the messages sent. Each
message sent should be verified. Batch verification technique can
be used along with high efficiency group testing technique should
be proposed, which can find invalid signatures within a batch of
signatures
Security for V2N communication
In V2N , the main application scenario is real time map updates
for autonomous driving. The potential attacks for this case are:
1. Forged Identification
2. Forged location
3. Forged event
Security for V2N communication
Cyber attacks are also a main concern for networks as the
potential danger will occur at any time. The attack types
include hacking into vehicle and remote control or spreading
virus. Also, SDN based attacks include as denial of service
(DoS) and distributed DoS (DDoS), man in the middle (MITM)
attacks, scanning attacks, unauthorized access, and privilege
escalation.
Privacy in networks
Privacy means only authorized users can access and control
vehicle-related information, such as a vehicle’s real identity and
location profile. The method to hide a vehicle’s real identity is
anonymity, which can be provided by pseudonyms. Beacon messages
sent by vehicles contain vehicle’s real identity, the status of the vehicle
(the GPS coordinates, speed, etc.), and a timestamp. In this case, we
try to send these messages without breach of privacy as an entity
could obtain information about the passengers from these messages.
Privacy in networks
The addition of social networks to autonomous vehicles for
entertainment in leisure time brings additional challenges. The
key issue is how to efficiently explore common attributes for
cooperation among autonomous vehicles in proximity without
exposing the passengers personal information to strangers
Privacy in networks
In Vehicular networking chain, different stakeholders require
different data about vehicles and passengers. In some special
scenarios, the vehicle needs to send real time location
information to the server which is authenticated by comparing
with other vehicles in the vicinity. In this case, it is necessary to
insure sensitive data cannot be leaked. For this case, practical
multi-party private set intersection (PSI) protocols supporting big
data processing need to be designed.
Thank You